Preferred Language
Articles
/
jpgiafs-378
Risks of Audit under Environment of Information Technology
...Show More Authors

Standards of audit have been defined issued them by professional organizations the audit risk is: Failure of the auditor inadvertently to amend his opinion on the financial statements in suitable method, although these statements are Interpolated Essentially. As result the deep impacts caused by electronic operating systems in the accounting data in the audit process which audit risk has gained attention of many professional sides, especially the audit process and quality is relating with level of discovery the auditor for the mistakes of origin (misrepresentations) all their types and give the necessary confidence for the auditor to express his technical opinion in fidelity and certified financial statements which prepared electronically. According to the international standard of audit No. 400 and it's characterized by risk assessment and internal audit, the risks defined by the International Federation of Accountants (IFAC) they are the risk of misinformation that occurs in account balance or set of transactions that can be Material alone or when combined them with incorrect transactions in other assets or groups which cannot be prevented, detected and corrected them only by the accounting system or internal audit systems opportunely. These risks and challenges that face the accounts auditor were very necessary to keep pace with developments in information technology and they can be able express his technical opinion neutrally in the financial statements. From this point, our research have included four sections focused on the risk of audit job and the possibility of reducing these risks to minimum, and we have reached set of conclusions and recommendations serving auditors and other entities for working purposes professionally to get the efficiency and quality of the audit job.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
التدقيق الداخلي وأثرة في الحد من ظاهرة غسيل الأموال
...Show More Authors

Still Financial institutions, including banks, a key target for money launderers to transfer illicit funds to the legitimate funds and by weaknesses in the internal audit procedures applied in the banks or through a lack of legal structure to combat this phenomenon in addition to the procedures by other regulations                                                                

T

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
The role of road elements in providing a safe environment for pedestrians
...Show More Authors

In the years recently city planning projects have been confirmed sustainable high concentration on planning streets and pedestrian paths being the most prominent component of the urban structure in the city and these me and diverse departments link the city’s sectors and serve as a space for economic, service, and social activities. On the other hand, pedestrian traffic is an essential component of the various means of transportation within the city. Suffer cities in the Middle East and Arab cities in particular are neglecting pedestrian paths in the vital urban environment. Vehicle control mechanisms on roads, and changing the uses of pedestrian paths as result of encroaching on the sidewalks designated for pedestrians. Which leads to a

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Classroom environment & its Relation Cognitive motive and Reflective Thinking of university Student
...Show More Authors

The present research aims at the following:
- Measure Classroom environment of university Student (research sample)- Measure
Cognitive motive and Reflective Thinking of university Student (research Sample) .
- In order to Know the relationship between the Scores of Classroom environment and
Scores of cognitive motive and Scores of Reflective Thinking of university Student
(research Sample) .
Sample of research consisted of (500) Students for both genders distrivbted upon ten
colleges in Baghdad University , (5) Scientific Colleges , and (5) human Colleges , Sample
was chosen by using radom method  Research instruments were three , Prepared by the researcher ,The first is to measure
classroom environme

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 31 2025
Journal Name
Journal Of Engineering
Design and Implementation of ICT-Based Recycle-Rewarding System for Green Environment
...Show More Authors

View Publication
Publication Date
Thu Jun 01 2023
Journal Name
South Asian Journal Of Social Sciences & Humanities
The Impact of University Internal Environment, Development Talents on Sustainable Competitive Advantage.
...Show More Authors

There is a need to make serious efforts For Iraqi universities to be in the ranks of advanced universities in the world. This requires attracting teaching talents and providing an incubating environment for them. Therefore, the objective of the research was to explore the influence of (the environment, the development of talents) on sustainable competitive advantages. The research followed the descriptive approach and used the quantitative analysis method. Almaqaal university is the field of study. The study sample size (of 76 people), from almaaqal university teachers, and the sample comprised the available staff specialized in the field of Teaching and research. The questionnaire was utilised as a data collection tool and (spss) program w

... Show More
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Oct 06 2022
Journal Name
Advances In Systems Science And Applications
Stability and Bifurcation of a Delay Cancer Model in the Polluted Environment
...Show More Authors

It is well known that the spread of cancer or tumor growth increases in polluted environments. In this paper, the dynamic behavior of the cancer model in the polluted environment is studied taking into consideration the delay in clearance of the environment from their contamination. The set of differential equations that simulates this epidemic model is formulated. The existence, uniqueness, and the bound of the solution are discussed. The local and global stability conditions of disease-free and endemic equilibrium points are investigated. The occurrence of the Hopf bifurcation around the endemic equilibrium point is proved. The stability and direction of the periodic dynamics are studied. Finally, the paper is ended with a numerical simul

... Show More
View Publication
Scopus (2)
Scopus
Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
A proposed model for disclosing the role of the collective intelligence system in improving joint auditing
...Show More Authors

This research aims to present a proposed model for disclosure and documentation when performing the audit according to the joint audit method by using the questions and principles of the collective intelligence system, which leads to improving and enhancing the efficiency of the joint audit, and thus enhancing the confidence of the parties concerned in the outputs of the audit process. As the research problem can be formulated through the following question: “Does the proposed model for disclosure of the role of the collective intelligence system contribute to improving joint auditing?”   

The proposed model is designed for the disclosure of joint auditing and the role

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 03 2003
Journal Name
جامعة بغداد
المرأة في ظل التشريعات القديمة والاسلام
...Show More Authors

قسمت هذه الدراسة إلى فصلين تسبقهما مقدمة وتليهما خاتمة ثم قائمة. وقد تم استعراض مصادر البحث ومراجعه في الفصل الأول بعنوان المرأة في التشريع القديم وأثرها على وضع المرأة من خلال هذه التشريعات. أما الفصل الثاني بعنوان “المرأة في التشريع الإسلامي” فقد استعرض وضع المرأة من خلال التشريع الإسلامي، ممثلا بمصدريه الأساسيين، القرآن الكريم. والحديث النبوي الشريف والخاتمة لخصت نتائج البحث.

Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
College Of Islamic Sciences
Principles of war and jihad to protect the environment and civilians in times of war in Islamic Sharia
...Show More Authors

Research summary

Islam protects the environment and civilians in peace and war, and in international humanitarian law protection of the environment and civilians in international conflicts only. As for wars and internal conflicts, it is not within the jurisdiction of international humanitarian law. In Islamic law, the principles of protecting the environment and civilians are fixed in all wars and conflicts, whether internal or external, local. or international.

Islam laid down moral principles in war, including:

- Preserving the environment and avoiding corruption in the land by burning trees and killing animals unnecessarily.

- Not to be exposed to non-combatants, including women, boys, the elderly, the disa

... Show More
View Publication Preview PDF