Computer Audit Update最新文献

筛选
英文 中文
Neural networks and the auditor 神经网络和审计师
Computer Audit Update Pub Date : 1997-10-01 DOI: 10.1016/S0960-2593(97)87190-X
Tim Macguire
{"title":"Neural networks and the auditor","authors":"Tim Macguire","doi":"10.1016/S0960-2593(97)87190-X","DOIUrl":"https://doi.org/10.1016/S0960-2593(97)87190-X","url":null,"abstract":"","PeriodicalId":100310,"journal":{"name":"Computer Audit Update","volume":"1997 10","pages":"Pages 20-24"},"PeriodicalIF":0.0,"publicationDate":"1997-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0960-2593(97)87190-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91736744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Neural networks and the auditor 神经网络和审计师
Computer Audit Update Pub Date : 1997-10-01 DOI: 10.1016/S0960-2593(97)87190-X
T. Macguire
{"title":"Neural networks and the auditor","authors":"T. Macguire","doi":"10.1016/S0960-2593(97)87190-X","DOIUrl":"https://doi.org/10.1016/S0960-2593(97)87190-X","url":null,"abstract":"","PeriodicalId":100310,"journal":{"name":"Computer Audit Update","volume":"77 1","pages":"20-24"},"PeriodicalIF":0.0,"publicationDate":"1997-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75285197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Unwary franchisees risk prosecution 不谨慎的特许经营商面临被起诉的风险
Computer Audit Update Pub Date : 1997-10-01 DOI: 10.1016/S0960-2593(97)80004-3
{"title":"Unwary franchisees risk prosecution","authors":"","doi":"10.1016/S0960-2593(97)80004-3","DOIUrl":"https://doi.org/10.1016/S0960-2593(97)80004-3","url":null,"abstract":"","PeriodicalId":100310,"journal":{"name":"Computer Audit Update","volume":"1997 10","pages":"Page 6"},"PeriodicalIF":0.0,"publicationDate":"1997-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0960-2593(97)80004-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90126467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Outsourcing contracts: 41% fail to make transition 外包合同:41%未能完成转型
Computer Audit Update Pub Date : 1997-10-01 DOI: 10.1016/S0960-2593(97)80001-8
{"title":"Outsourcing contracts: 41% fail to make transition","authors":"","doi":"10.1016/S0960-2593(97)80001-8","DOIUrl":"https://doi.org/10.1016/S0960-2593(97)80001-8","url":null,"abstract":"","PeriodicalId":100310,"journal":{"name":"Computer Audit Update","volume":"1997 10","pages":"Page 5"},"PeriodicalIF":0.0,"publicationDate":"1997-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0960-2593(97)80001-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91759981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An expert system for financial and accounting information system auditing 财务会计信息系统审计专家系统
Computer Audit Update Pub Date : 1997-10-01 DOI: 10.1016/S0960-2593(97)87189-3
J. Akoka, I. Comyn-Wattiau
{"title":"An expert system for financial and accounting information system auditing","authors":"J. Akoka, I. Comyn-Wattiau","doi":"10.1016/S0960-2593(97)87189-3","DOIUrl":"https://doi.org/10.1016/S0960-2593(97)87189-3","url":null,"abstract":"","PeriodicalId":100310,"journal":{"name":"Computer Audit Update","volume":"1997 10","pages":"Pages 8-19"},"PeriodicalIF":0.0,"publicationDate":"1997-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0960-2593(97)87189-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90126463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
BSA invites you to get legal via LegalWare BSA邀请您通过LegalWare获得合法
Computer Audit Update Pub Date : 1997-10-01 DOI: 10.1016/S0960-2593(97)80005-5
{"title":"BSA invites you to get legal via LegalWare","authors":"","doi":"10.1016/S0960-2593(97)80005-5","DOIUrl":"https://doi.org/10.1016/S0960-2593(97)80005-5","url":null,"abstract":"","PeriodicalId":100310,"journal":{"name":"Computer Audit Update","volume":"1997 10","pages":"Page 6"},"PeriodicalIF":0.0,"publicationDate":"1997-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0960-2593(97)80005-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90126465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An expert system for financial and accounting information system auditing 财务会计信息系统审计专家系统
Computer Audit Update Pub Date : 1997-10-01 DOI: 10.1016/S0960-2593(97)87189-3
J. Akoka, I. Comyn-Wattiau
{"title":"An expert system for financial and accounting information system auditing","authors":"J. Akoka, I. Comyn-Wattiau","doi":"10.1016/S0960-2593(97)87189-3","DOIUrl":"https://doi.org/10.1016/S0960-2593(97)87189-3","url":null,"abstract":"","PeriodicalId":100310,"journal":{"name":"Computer Audit Update","volume":"293 1","pages":"8-19"},"PeriodicalIF":0.0,"publicationDate":"1997-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77169080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Proxima secures sign-ons Proxima安全标志
Computer Audit Update Pub Date : 1997-10-01 DOI: 10.1016/S0960-2593(97)80002-X
{"title":"Proxima secures sign-ons","authors":"","doi":"10.1016/S0960-2593(97)80002-X","DOIUrl":"https://doi.org/10.1016/S0960-2593(97)80002-X","url":null,"abstract":"","PeriodicalId":100310,"journal":{"name":"Computer Audit Update","volume":"1997 10","pages":"Page 5"},"PeriodicalIF":0.0,"publicationDate":"1997-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0960-2593(97)80002-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136602338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Theft of data in cyberspace: Management's role 网络空间中的数据盗窃:管理层的角色
Computer Audit Update Pub Date : 1997-10-01 DOI: 10.1016/S0960-2593(97)87191-1
August Bequai
{"title":"Theft of data in cyberspace: Management's role","authors":"August Bequai","doi":"10.1016/S0960-2593(97)87191-1","DOIUrl":"https://doi.org/10.1016/S0960-2593(97)87191-1","url":null,"abstract":"<div><p>Securing data in Cyber-space can frequently prove difficult. It can also prove costly, especially where high-tech security systems are involved. A meaningful data security program must, by necessity, also incorporate an array of personnel safeguards.</p></div>","PeriodicalId":100310,"journal":{"name":"Computer Audit Update","volume":"1997 10","pages":"Pages 25-27"},"PeriodicalIF":0.0,"publicationDate":"1997-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0960-2593(97)87191-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91736745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scanning tool slashes time wasted on year 2000 work 扫描工具减少了2000年工作浪费的时间
Computer Audit Update Pub Date : 1997-10-01 DOI: 10.1016/S0960-2593(97)80003-1
{"title":"Scanning tool slashes time wasted on year 2000 work","authors":"","doi":"10.1016/S0960-2593(97)80003-1","DOIUrl":"https://doi.org/10.1016/S0960-2593(97)80003-1","url":null,"abstract":"","PeriodicalId":100310,"journal":{"name":"Computer Audit Update","volume":"1997 10","pages":"Page 5"},"PeriodicalIF":0.0,"publicationDate":"1997-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0960-2593(97)80003-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90126466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信