Preferred Language
Articles
/
jeasiq-569
: financial fraud ,Audit risks ,inherent risk ,Detection risk, Data Mining .
...Show More Authors

Abstract

The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help the fraudster to commit and these factors are (the opportunity, motivation, justification, ability) and often scammers with experience in concealing the fraud and the reason for this is weak internal control economic system of the unit, and that the process of detection of financial fraud is done through the availability of indications that.            

The research has come to the most important conclusions:

1-  The process of identifying and evaluating audit is important for the auditor's risk when planning the audit process or when determining what audit procedures for these risks is important and essential role in the process of making mistakes and fraud.

2-  Although the fraudulent can concealing fraud, but he could be detected through the use of a set of techniques that can provide indications about the whereabouts.

The most important recommendations:

1- The need to develop and train Audit stuff and to introduce definition fraud, causes, forms in order to put the investigation of fraud strategy.

2- The researchers recommend examining the causes of financial fraud in the case discovered in its various forms is possible to lead the auditor to determine the features of the person who carried out the fraud.

The researchers recommend using one of the techniques (Data Mining), a Logic Regression for test and Analyes financial ratios for the inherited risk that OBTAINED from banks' financial statements to determine the financial fraud within the existing indicators variables such ratios

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 31 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Application of data content analysis (DEA) technology to evaluate performance efficiency: applied research in the General Tax Authority
...Show More Authors

The aim of the research is to use the data content analysis technique (DEA) in evaluating the efficiency of the performance of the eight branches of the General Tax Authority, located in Baghdad, represented by Karrada, Karkh parties, Karkh Center, Dora, Bayaa, Kadhimiya, New Baghdad, Rusafa according to the determination of the inputs represented by the number of non-accountable taxpayers and according to the categories professions and commercial business, deduction, transfer of property ownership, real estate and tenders, In addition to determining the outputs according to the checklist that contains nine dimensions to assess the efficiency of the performance of the investigated branches by investing their available resources T

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
مجلة كلية دجلة الجامعة
الاستخدامات والتقنيات الحديثة للمحاسبة القضائية للحد من الفساد المالي
...Show More Authors

ت لا نم ظ او ره لا يأ لاح اهلاح رضاحلا رصعلا يف ةريطخ ه ةوشرلا لثم ةيداصتقا ةميرج ديعصلا ىلع ةيبلس بقاوع اهل يتلاو زازتبلااو لاوملأا لسغو ني ىلا ةجاحلا تءاج انه نم ، يداصتقلااو يعامتجلاا تاسسؤم لبق نم اهينبت يغبني يرادلإاو يلاملا داسفلا نم دحت تامدخو بيلاسأو تاينقت ةيلاملا مئارجلا نم دحلل ةلودلا اع ىلع عقت يتلا تاسسؤملا نمو ةيئاصقتسلاا ةبساحملا وا ةيئاضقلا ةبساحملاب تلثمت ةيداصتقلاا تادحولا يف ينبت اهقت ة

... Show More
View Publication
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
Cognitive dimensions For grammar work at Sibweh In light of the data of the speech
...Show More Authors

The Arabic grammatical theory is characterized by the characteristics that distinguish it from other languages. It is based on the following equation: In its entirety a homogeneous linguistic system that blends with the social nature of the Arab, his beliefs, and his culture.
    This means that this theory was born naturally, after the labor of maintaining an integrated inheritance, starting with its legal text (the Koran), and ends with its features of multiple attributes.
Saber was carrying the founding crucible of that theory, which takes over from his teacher, Hebron, to be built on what it has reached. It is redundant to point to his location and the status of his book.
So came to my research tagged: (c

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
تحليل الاداء المالي للقطاع المصرفي في احدى المصارف المدرجة في سوق العراق للأوراق المالية
...Show More Authors

Analysis of the main financial statements (financial position, income, cash flow) using the analysis tools gives a clear picture of the results of the annual activity of the economic units, which contribute to the development of future plans and programs and identify weaknesses in the work of economic units including banks. Therefore, the indicators used in the analysis Would be feasible for the rest of the other sectors. such as Central Bank , Security exchange market , which will accordingly contribute in National product , determining market requirements , investor’s desires , knowing economic situation and providing liquidity in a timing manner.

View Publication Preview PDF
Publication Date
Sun Oct 14 2018
Journal Name
Arab Science Heritage Journal
النظام النظام المالي في الاندلس في عصري المرابطين والموحدين (484- 620 ه/ 1092-1223م)
...Show More Authors

The research dealt with the financial policies adopted by Almurabitin (484-520 / 1092-1143) and Almuahadin (540-620 / 1145-1223) in Andalusia, their characteristics, and how they dealt with increasing the resources of Bayt Almal and organizing the spending process. The first axis of the research discussed the policies of the management of public funds in the provinces of Almurabitin and Almuahadin in Andalusia. While the second presented to the most prominent and most important resources of Andalusia financial in the era of these two countries such as Zakat, Alkhiraj, Alghanayim, confiscations and illegal taxes and others. The third axis reviewed the public spending policies of the two countries and the political and military conditions

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 18 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role of the financial Statements in Achieving of the Banking Supervision: An Applied Study in A sample of Iraqi Banks
...Show More Authors

Banks are considered the main basis of financial sector ,so they must be submitted to sound and strict regulatory system and so as to ensure their operations and according to instructions and regulations , in order to maintain the integrity of the banking sector and financial sector in general .One of the importance regulatory tools that are adopted by the Iraqi Central Bank to control over the banks an financial and periodic statements that are provided by the banks in accordance with planned schedules .The financial statements of the banks must reflect clearly and accurately financial situation and the result of their activities during the period in which they represent to achiveing its purposes.So it has the goal of Search is statemen

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Asian Multicultural Research For Social Sciences Study
Remote Data Auditing in a Cloud Computing Environment
...Show More Authors

In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud serv

... Show More
View Publication
Crossref
Publication Date
Sun Mar 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Estimation Liquid Permeability Using Air Permeability Laboratory Data
...Show More Authors

Permeability data has major importance work that should be handled in all reservoir simulation studies. The importance of permeability data increases in mature oil and gas fields due to its sensitivity for the requirements of some specific improved recoveries. However, the industry has a huge source of data of air permeability measurements against little number of liquid permeability values. This is due to the relatively high cost of special core analysis.
The current study suggests a correlation to convert air permeability data that are conventionally measured during laboratory core analysis into liquid permeability. This correlation introduces a feasible estimation in cases of data loose and poorly consolidated formations, or in cas

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Wasit Journal Of Computer And Mathematics Science
Dynamic Data Replication for Higher Availability and Security
...Show More Authors

The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Some NONPARAMETRIC ESTIMATORS FOR RIGHT CENSORED SURVIVAL DATA
...Show More Authors

The using of the parametric models and the subsequent estimation methods require the presence of many of the primary conditions to be met by those models to represent the population under study adequately, these prompting researchers to search for more flexible parametric models and these models were nonparametric, many researchers, are interested in the study of the function of permanence and its estimation methods, one of these non-parametric methods.

For work of purpose statistical inference parameters around the statistical distribution for life times which censored data , on the experimental section of this thesis has been the comparison of non-parametric methods of permanence function, the existence

... Show More
View Publication Preview PDF
Crossref