Preferred Language
Articles
/
jeasiq-569
: financial fraud ,Audit risks ,inherent risk ,Detection risk, Data Mining .
...Show More Authors

Abstract

The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help the fraudster to commit and these factors are (the opportunity, motivation, justification, ability) and often scammers with experience in concealing the fraud and the reason for this is weak internal control economic system of the unit, and that the process of detection of financial fraud is done through the availability of indications that.            

The research has come to the most important conclusions:

1-  The process of identifying and evaluating audit is important for the auditor's risk when planning the audit process or when determining what audit procedures for these risks is important and essential role in the process of making mistakes and fraud.

2-  Although the fraudulent can concealing fraud, but he could be detected through the use of a set of techniques that can provide indications about the whereabouts.

The most important recommendations:

1- The need to develop and train Audit stuff and to introduce definition fraud, causes, forms in order to put the investigation of fraud strategy.

2- The researchers recommend examining the causes of financial fraud in the case discovered in its various forms is possible to lead the auditor to determine the features of the person who carried out the fraud.

The researchers recommend using one of the techniques (Data Mining), a Logic Regression for test and Analyes financial ratios for the inherited risk that OBTAINED from banks' financial statements to determine the financial fraud within the existing indicators variables such ratios

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 01 2009
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
أهمية الإفصاح عن المعلومات المتعلقة بتدريب وتطوير العاملين وأثره في قرارات الاستثمار
...Show More Authors

يكتسب موضوع تدريب وتطوير العاملين أهمية بالغة في الظروف الاقتصادية الحالية التي تسودها مفاهيم وتوجهات جديدة كعولمة الاقتصاد ورأس المال المعرفي والفكري، وحيث صارت المعارف والمهارات والقابليات التي يمتلكها العاملون محركاً أساسياً باتجاه النجاح، وعنصراً مهماً في زيادة فاعلية منشأة الأعمال، وإدامة وجودها واستمرارها.

إن العاملين المدربين بشكل جيد على عمليات المنشأة وطبيعة المواد التي تستخدمها وإنتاجه

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
The Impact of Governance Mechanisms on the Accounting Disclosure of the Sustainable Development of Iraqi Economic Units
...Show More Authors

The research aims to demonstrate the impact of governance mechanisms on the quality of financial reports in the light of the accounting disclosure for sustainable development represented in (accounting disclosure for economic development, accounting disclosure for environmental development, and accounting disclosure for social development) in a sample of banks listed in the Iraq Stock Exchange.

Governance mechanisms were measured by evaluating and analyzing the mechanisms in banks for the research sample consisting of (15) banks, based on the governance guide issued by the Central Bank, as well as the banks’ financial reports for the years 2016 -2018, and the dimensions of accounting disclosure for sust

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Comparing Bayesian methods to estimate the failure probability for electronic systems in case the life time data are not available
...Show More Authors

In this research, we find the Bayesian formulas and the estimation of Bayesian expectation for product system of Atlas Company.  The units of the system have been examined by helping the technical staff at the company and by providing a real data the company which manufacturer the system.  This real data include the failed units for each drawn sample, which represents the total number of the manufacturer units by the company system.  We calculate the range for each estimator by using the Maximum Likelihood estimator.  We obtain that the expectation-Bayesian estimation is better than the Bayesian estimator of the different partially samples which were drawn from the product system after  it checked by the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 03 2010
Journal Name
مجلة العلوم القانونية
المسؤولية المدنية الناشئة عن الاعلان التجاري
...Show More Authors

المسؤولية المدنية الناشئة عن الاعلان التجاري

Publication Date
Tue Nov 01 2022
Journal Name
مجلة كلية القانون والعلوم السياسية
المسؤولية التعاقدية عن اساءة استعمال الحق
...Show More Authors

يتناول البحث دراسة تطبيق نظرية اساءة استعمال الحق في مجال المسؤولية التعاقدية

Preview PDF
Publication Date
Sat Jan 30 2016
Journal Name
مجلة جامعة الانبار للعلوم القانونية والسياسية
المسؤولية المدنية للمستثمر عن تلوث البيئة
...Show More Authors

يتناول البحث دراسة مسؤولية المستثمر المدنية عن تلوث البيئة من حيث اساسها واركانها واثرها

Preview PDF
Publication Date
Sun Jan 01 2006
Journal Name
Journal Of Educational And Psychological Researches
عزوف المرأة العراقية عن المشاركة السياسية
...Show More Authors

       خلاصة تحاول هدة الدراسة التعرف على أسباب عزوف المرأة عن المشاركة بالعمل السياسى وقد تم اختيار عينة عشوايية من التدريسيات  في جامعة بغداد والمستنصرية ودلك للوقوف على هدة الأسباب وبعد تحليل البيانات أشارت نتائح الدراسة الى ان أسباب العزوف عن المشاركة فى العمل السياسى هى أسباب سياسية بالدرجة الأولى تليها الأسباب النفسية والاجتماعية وقد اوصت الدراسة ببعض الم

... Show More
View Publication Preview PDF
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Practical Study for the Properties of Hueckel Edge Detection Operator
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref