This research aims to clarify the importance of an accounting information system that uses artificial intelligence to detect earnings manipulation. The research problem stems from the widespread manipulation of earning in economic entities, especially at the local level, exacerbated by the high financial and administrative corruption rates in Iraq due to fraudulent accounting practices. Since earning manipulation involves intentional fraudulent acts, it is necessary to implement preventive measures to detect and deter such practices. The main hypothesis of the research assumes that an accounting information system based on artificial intelligence cannot effectively detect the manipulation of profits in Iraqi economic entities. The researchers have reached several conclusions, the most prominent of which is that applying accounting information systems based on artificial intelligence in the accounting world is an inevitable trend that will bring about significant changes and developments in detecting and preventing the manipulation of earning. Using the Beneish model and one of the Data Mining techniques, namely the logistical regression technique, can effectively identify earnings management situations and enhance the functionality of accounting information systems. This includes improving system speed and efficiency, ensuring accurate output, and enhancing system security. Researchers strongly call for using and developing artificial intelligence within accounting information systems, especially the Beneish model. This will make it easier to detect earning manipulation and enhance cybersecurity measures, ultimately protecting the integrity and reliability of the computer system. The authors use the Benish model on a sample of economic units including (5) units and logistic regression on a sample including (5) Iraqi private banks. The result of applying these two methods was that using the Benish model led to one company that practices earnings management. However, when applying the logistic regression technique, there are two ratios, namely cash/total deposits and the creditors/total debts ratio, in which there is earnings management in private Iraqi banks. Accountants should continuously increase their knowledge and experience through training and continuing education to prepare themselves for greater responsibility in achieving the Sustainable Development Goals.
Autorías: Muayad Kadhim Raheem, Lina Fouad Jawad. Localización: Opción: Revista de Ciencias Humanas y Sociales. Nº. 21, 2019. Artículo de Revista en Dialnet.
Abstract
Investment in the human resource has become an important part of the strategies of educational organizations so that they can be competitive, so that the access of academics in universities to the international awards as a result of their research excellence indicates the effectiveness of this human talent so the interest has emerged in the implementation of a strategy to manage these human talent in organizations in general and educational ones In particular as one of the power sources that can not be imitated. The focus of the organization on the interaction between the working people has increased attention to the human element in order to achieve the desired quality levels, which called for organi
... Show MoreBackground: The isthmus is a difficult area in the root canal complex to manage. The research aimed to evaluate the efficiency of three different obturation techniques (lateral condensation, EandQ (thermoplasticized gutta percha system) and Soft Core (thermoplasticized core carrier gutta percha system)) to obturate the isthmus area of roots prepared by two different instrumentation techniques (rotary ProTaper universal and ProTaper Next systems). Material and method: Sixty freshly extracted teeth were randomly divided into two main groups (A and B) of 30 teeth each. Group A was prepared by rotary ProTaper Universal whereas group B was prepared by ProTaper Next system. Each main group was then randomly subdivided into three subgroups of 10 t
... Show MoreThis research studies the rheological properties ( plastic viscosity, yield point and apparent viscosity) of Non-Newtonian fluids under the effect of temperature using different chemical additives, such as (xanthan gum (xc-polymer), carboxyl methyl cellulose ( High and low viscosity ) ,polyacrylamide, polyvinyl alcohol, starch, Quebracho and Chrome Lignosulfonate). The samples were prepared by mixing 22.5g of bentonite with 350 ml of water and adding the additives in four different concentrations (3, 6, 9, 13) g by using Hamilton Beach mixer. The rheological properties of prepared samples were measured by using Fan viscometer model 8-speeds. All the samples were subjected to Bingham plastic model. The temperature range studi
... Show MoreIn data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me
The security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreBackground and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show MoreThe aim of this study is to compare the effects of three methods: problem-based learning (PBL), PBL with lecture method, and conventional teaching on self-directed learning skills among physics undergraduates. The actual sample size comprises of 122 students, who were selected randomly from the Physics Department, College of Education in Iraq. In this study, the pre- and post-test were done and the instruments were administered to the students for data collection. The data was analyzed and statistical results rejected null hypothesis of this study. This study revealed that there are no signifigant differences between PBL and PBL with lecture method, thus the PBL without or with lecture method enhances the self-directed learning skills bette
... Show MoreThe organization and coordination of any communication is based on the system of turn-taking which refers to the process by which a participant in a conversation takes the role of speaker. The progression of any conversation is achieved by the change of roles between speaker and hearer which, in its turn, represents the heart of the turn-taking system. The turn-taking system is not a random process but it is a highly organized process governed by a set of rules. Thus, this system has certain features and rules which exist in any English communicative process. These rules, if applied by speakers, help to achieve successful exchange of turns in any conversation. This paper attempts to present full exposition of the concepts of conversation
... Show MoreThis research aims to study the influence of organizational power on the achievement of entrepreneurship for business organizations. It is an analytical study of the views of a sample of managers in the Iraqi Ministry of Education. The research highlights the contribution that can be made from the knowledge of the theory of business organizations in achieving organizational success. The organizational power of the organization contributes to achieving entrepreneurship in the business environment and achieving a competitive position in the work environment. The research dealt with two variables: the first is the independent variable, the organizational power in its dimensions (Expend Power, Structural Power, Prestige Power). And t
... Show More