Preferred Language
Articles
/
jeasiq-569
: financial fraud ,Audit risks ,inherent risk ,Detection risk, Data Mining .
...Show More Authors

Abstract

The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help the fraudster to commit and these factors are (the opportunity, motivation, justification, ability) and often scammers with experience in concealing the fraud and the reason for this is weak internal control economic system of the unit, and that the process of detection of financial fraud is done through the availability of indications that.            

The research has come to the most important conclusions:

1-  The process of identifying and evaluating audit is important for the auditor's risk when planning the audit process or when determining what audit procedures for these risks is important and essential role in the process of making mistakes and fraud.

2-  Although the fraudulent can concealing fraud, but he could be detected through the use of a set of techniques that can provide indications about the whereabouts.

The most important recommendations:

1- The need to develop and train Audit stuff and to introduce definition fraud, causes, forms in order to put the investigation of fraud strategy.

2- The researchers recommend examining the causes of financial fraud in the case discovered in its various forms is possible to lead the auditor to determine the features of the person who carried out the fraud.

The researchers recommend using one of the techniques (Data Mining), a Logic Regression for test and Analyes financial ratios for the inherited risk that OBTAINED from banks' financial statements to determine the financial fraud within the existing indicators variables such ratios

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Developing Workers’ Performance and Its Role in Settling Financial Claim: An applied research in the General Iraqi Insurance Company
...Show More Authors

This research seeks to identify the dimensions of the development of staff performance (training ', incentives, management skills) and its impact on the settlement of compensatory claims adopted in the current research in the Iraqi insurance company،This research aims to highlight the role of developing insurance company’s workers’ performance in settling insurance compensation, and to check this process, the research was applied in the general Iraqi insurance company as it considered as the research community, and a sample was taken from this community that represented by company’s insurance department workers or by collecting actual data that is related to the research’s sample, in addition to the financial compensation data.<

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More
Publication Date
Sun Jan 01 2023
Journal Name
2nd International Conference On Mathematical Techniques And Applications: Icmta2021
Review of clustering for gene expression data
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering
Load balance in data center SDN networks
...Show More Authors

In the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and

... Show More
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Sun Mar 03 2024
Journal Name
مجلة الذكوات البيض
أشكالية توظيف الخطاب السياسي ودوره في تعزيز السلم المجتمعي: العراق انموذجا
...Show More Authors

لكل دولة في هذا العالم خطابها السياسي والذي يحدد سياستها الداخلية والخارجية، وهي سياسة ثابتة تنطلق من مفاهيم وبرامج وثوابت تخدم مصالحها الحيوية، لكون الخطاب السياسي ليس مجرد كلام عابر في عالم السياسة الدولية وانما هو ثوابت مهمة يحدد توجهات هذه الدولة او تلك ويحدد دورها الدولي وطبيعة العلاقة مع البلدان الاخرى ومنها الدول المجاورة لها. شهد العراق بعد العام 2003 تحديات جديدة تمثلت بتغليب خطابات الطائفية والكراه

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 02 2024
Journal Name
مجلة الذكوات البيض
أشكالية توظيف الخطاب السياسي ودوره في تعزيز السلم المجتمعي: العراق انموذجا
...Show More Authors

لكل دولة في هذا العالم خطابها السياسي والذي يحدد سياستها الداخلية والخارجية، وهي سياسة ثابتة تنطلق من مفاهيم وبرامج وثوابت تخدم مصالحها الحيوية، لكون الخطاب السياسي ليس مجرد كلام عابر في عالم السياسة الدولية وانما هو ثوابت مهمة يحدد توجهات هذه الدولة او تلك ويحدد دورها الدولي وطبيعة العلاقة مع البلدان الاخرى ومنها الدول المجاورة لها. شهد العراق بعد العام 2003 تحديات جديدة تمثلت بتغليب خطابات الطائفية والكراه

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 03 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of voluntary accounting disclosure in enhancing information confidence in
...Show More Authors

 

ABSTRACT:

The study aimed to identify the impact of the role of voluntary accounting disclosure in enhancing confidence in the informational content of financial reports. Correlation - Spearman to measure the degree of correlation, as well as the method of simple linear regression analysis, and the study reached several results, including: The level of enhancing the information content in the annual financial reports of the Palestinian banks listed on the Palestine Exchange under study reached the overall average (total) (94.1%), and also Voluntary Accounting Disclosure in Enhancing Confidence in the Informational Content of the List of Change in Ownership Equity of Listed

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
The effect of sensory marketing in enhancing the mental image of the customer)Applied research(
...Show More Authors

    The research aims to study the extent of the influence of the dimensions of sensory marketing on the perceptual mental image of customers, knowing the type of relationships that link the dimensions of sensory marketing with each other, no one from the researcher mentioned (as far as the researcher knows) the link between sensory marketing and mental image, from this point of view the main goal is determined, the effect of sensory marketing on the mental image taken from customers, as the research was conducted on a number of first-class restaurants represented (Chef City, Chili House, Mado, Fried Chicken Saj Alreef) and the research community was represented by the customers of the aforementioned restaurants, a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref