Preferred Language
Articles
/
jpgiafs-378
Risks of Audit under Environment of Information Technology
...Show More Authors

Standards of audit have been defined issued them by professional organizations the audit risk is: Failure of the auditor inadvertently to amend his opinion on the financial statements in suitable method, although these statements are Interpolated Essentially. As result the deep impacts caused by electronic operating systems in the accounting data in the audit process which audit risk has gained attention of many professional sides, especially the audit process and quality is relating with level of discovery the auditor for the mistakes of origin (misrepresentations) all their types and give the necessary confidence for the auditor to express his technical opinion in fidelity and certified financial statements which prepared electronically. According to the international standard of audit No. 400 and it's characterized by risk assessment and internal audit, the risks defined by the International Federation of Accountants (IFAC) they are the risk of misinformation that occurs in account balance or set of transactions that can be Material alone or when combined them with incorrect transactions in other assets or groups which cannot be prevented, detected and corrected them only by the accounting system or internal audit systems opportunely. These risks and challenges that face the accounts auditor were very necessary to keep pace with developments in information technology and they can be able express his technical opinion neutrally in the financial statements. From this point, our research have included four sections focused on the risk of audit job and the possibility of reducing these risks to minimum, and we have reached set of conclusions and recommendations serving auditors and other entities for working purposes professionally to get the efficiency and quality of the audit job.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Asymmetry of accounting information - the reasons and proposed treatments
...Show More Authors

The research aims to identify the reasons that lead to asymmetry of information between economic unity administration and the parties that use accounting information such as shareholders, So,  the ability to reach to the solutions that would reduce this problem, these factors have been divided into two types: the first one is the internal factors which represent the administration's desire   in order to expand the self-interest of getting the profits and increase the value and competitive entity and investors to obtaining greater returns for their shares, so the second type is the external factors, which represent the failer that occurs ​​in the laws and regula

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Formulate a strategy to manage tax compliance risks: An applied research in the General commission for Taxes
...Show More Authors

  This research discussed and analyzed the formulation of a strategy to manage tax compliance risks, as an applied research in the General commission for Taxes. The questionnaire was used as a research tool to identify the factors that stimulate or retard the research sample from being compliant. The K-means clustering method was also used to enable the classification of the research sample's views into four behaviors, some of these views pose tax-compliance risks. The research concluded that risk management is a continuous process and that all departments of the General commission for Taxes are responsible for its implementation to enable them to deal with the behavior of the taxpayer towards tax compliance. And it recommended

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Strategic audit in detection of financial corruption cases in Iraq - Proposed Framework
...Show More Authors

This research focuses on detecting the financial corruption cases in Iraq in light of adoption the strategic audit, the paper deals with the problem of the proliferation corruption cases particularly financial in Iraq and dramatically in the presence of audit and control devices as well as inspection and integrity devices, which indicates the existence of deficiencies and weaknesses in those devices in the implementation of audit and control functions in order to detect the corruption cases in the economic units in Iraq.

Stems objective of this research through the provision of approach of strategic audit concepts and indicate the extent importance of adopting of strategic audit as a means to detect the f

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
Evaluating the level of readiness to teach science in the light of the information, media, and technology skills among undergraduate students at the Faculty of Education, King Khalid University
...Show More Authors

This research aimed to evaluate the level of readiness to teach science in the light of the information, media, and technology skills among undergraduate students at the Faculty of Edu-cation, King Khalid University. To achieve this goal, a descriptive and analytical approach was used. A list of readiness to teach science was prepared in the light of Information, media, and technology skills, and in the light of this list, a cognitive test, observation sheet, and attitude scale were prepared to assess readiness to teach science in its three aspects, cognitive, behavioral, and emotional. The sample of the research consisted of (42) students enrolled in field training courses at the sixth, seventh and eighth levels. Research tools were app

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The Bourgeois ascendancy under Fatimids
...Show More Authors

The bourgeoisie groups derived great advantages from the system upon which the Fatimids built up their Regime out the land-tax and other taxes against a fixed sum . The surpulus revenue was the prophet of the farmers . A striking feature of the Fatimid was freedom of enterprise .All sectors of economic life were free-crafts , industry and trade . The government interfered in the trade in victuals only so far to in order to guarantee the supply of wheat to the big towns
The Egyptian Bourgeoisie enjoyed also the great prosperity which was produced among other reasons by the inflationary system of Fatimid economy .
The maintenance of gold dinar being almost pure and of full weight was only possible because Egypt steadily received cons

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Employing the references of Shariah Audit in supporting Governance of Iraqi Islamic Banks: An analytically study
...Show More Authors

The Islamic Banks including the Iraqi ones are often resorted to support their governance frameworks in order to improve its competitiveness in their communities. Where, those banks are looking for activities that enhance their governance; one of these activities is Shariah Audit that provided the auditing capabilities to face of developmental challenges and increase competitiveness. Therefore, the content of this paper, discusses know-how to use the Shariah Audit and its references in support of the Shariah Governance in the Iraqi Isla

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The risks of derivatives contracts and their reflections on the global financial crisis Analytical study in (Toronto – Dominion) bank
...Show More Authors

The research tacklets the role of risks arising from the excessive use of derivative contracts for trading in financial crises, including the recent global financial crisis in (2008) which is known the mortgage crisis.

   In order to prove the hypothesis of the research, the risk index of derivative contracts has been chosed as expressed in the measure of (value at risk) to be the main field for testing the hypothesis of research. The duration of the contract  has been also chased  for (15) years between the years (2001- 2015), the period preceding the global financial crisis, while the second represents the period of time that followed. The research reached a number of conclusions, bu

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Nov 01 2018
Journal Name
International Journal Of Computing And Digital Systems
The Perception of Information Security Threats Surrounding the Cloud Computing Environment
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Fri May 15 2009
Journal Name
Journal Of Planner And Development
Study of Change in Regional Land Use Using Remote Sensing Technology and Geographic Information Systems / Study Area (Hawr Al Huweiza) for the Years 1973-1990-2004
...Show More Authors

 

his project try to explain the using ability of spatial techniques for land cover change detection on regional level with the time parameter and did select for explain these abilities study case (Hewaizah marsh ) . this area apply to many big changes with the time. These changes made action on characters and behaviors of this area as well as all activities in it . This Project concerting to recognize the Using importance of remote sensing and GIS Methodology in data collecting for the changes of land use and the methodology for the analyses and getting the results for the next using as a base data for development and drawing the plans as well as in regional planning .This project focus on practical

... Show More
View Publication Preview PDF