152 resultados para secure audit


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The safety, effectiveness and capabilities of therapeutic upper fibreoptic endoscopy in children undergoing therapeutic endoscopic procedures (n = 443) was studied. Therapy for gastrointestinal bleeding formed the major group (injection sclerotherapy for varices, n = 197 procedures; thermocoagulation for haemorrhagic gastritis, n = 1; and photocoaulation for Dieulafoy's disease, n = 1). Sclerotherapy was 97% effective in controlling acute bleeding and 84% effective in obliterating varices with no serious complications or deaths. Oesophageal dilatations for surgical, caustic, congenital and peptic strictures and achalasia (n = 193) were performed with no oesophageal perforations or deaths. Foreign bodies were retrieved (n = 34) with no failures or complications. Percutaneous endoscopic gastrostomy was performed (n = 11) with one failure, proceeding to an unsuccessful surgical gastrostomy. Miscellaneous procedures included endoscopic transpyloric tube placement (n = 5) and endoscopic diathermy of pyloric web (n = 1). Therapeutic fibreoptic endoscopy is therefore concluded to be safe and effective in children, replacing rigid oesophagoscopy and some traditional surgical approaches.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Surgery is an example of expanded practice scope that enhances podiatry and incorporates inter-professional collaboration. By 2050 demand for foot and ankle procedures is predicted to rise nationally by 61.9%. Performance management of this increase motivated the development of an online audit tool. Developed in collaboration with the Australasian College of Podiatric Surgeons (ACPS), the ACPS audit tool provides real-time data capture and reporting. It is the first audit tool designed in Australia to support and improve the outcomes of foot and ankle surgery. Methods Audit activity in general, orthopaedic, plastic and podiatric surgery was examined using a case study design. Audit participation enablers and barriers were explored. Case study results guided a Delphi survey of international experts experienced or associated with foot and ankle surgery. Delphi survey-derived consensus informed modification of a generic data set from the Royal Australasian College of Surgeons (RACS). Based on the Delphi survey findings the ACPS online audit tool was developed and piloted. Reliability and validity of data entry and usability of this new tool was then assessed with an online survey. Results The case study found surgeon attitudes and behaviours positively impacted audit participation, and also indicated that audit data should be: (1) available in real time, (2) identify practice change, (3) applicable for safety and quality management, and; (4) useful for peer review discussion. The Delphi process established consensus on audit variables to be captured, including the modified RACS generic data set. 382 cases of foot and ankle surgery were captured across 3 months using the new tool. Data entry was found to be valid and reliable. Real-time outcome reporting and practice change identification impacted positively on safety and quality management and assisted peer review discussion. An online survey showed high levels of usability. Conclusions Surgeon contribution to audit tool development resulted in 100% audit participation. The data from the ACPS audit tool supported the ACPS submission to the Medical Services Advisory Committee to list podiatric surgery under Medicare, an outcome noted by the Federal Minister of Health.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secure communication channels are typically constructed from an authenticated key exchange (AKE) protocol, which authenticates the communicating parties and establishes shared secret keys, and a secure data transmission layer, which uses the secret keys to encrypt data. We address the partial leakage of communicating parties' long-term secret keys due to various side-channel attacks, and the partial leakage of plaintext due to data compression. Both issues can negatively affect the security of channel establishment and data transmission. In this work, we advance the modelling of security for AKE protocols by considering more granular partial leakage of parties' long-term secrets. We present generic and concrete constructions of two-pass leakage-resilient key exchange protocols that are secure in the proposed security models. We also examine two techniques--heuristic separation of secrets and fixed-dictionary compression--for enabling compression while protecting high-value secrets.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security models for two-party authenticated key exchange (AKE) protocols have developed over time to capture the security of AKE protocols even when the adversary learns certain secret values. Increased granularity of security can be modelled by considering partial leakage of secrets in the manner of models for leakage-resilient cryptography, designed to capture side-channel attacks. In this work, we use the strongest known partial-leakage-based security model for key exchange protocols, namely continuous after-the-fact leakage eCK (CAFL-eCK) model. We resolve an open problem by constructing the first concrete two-pass leakage-resilient key exchange protocol that is secure in the CAFL-eCK model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this chapter, we look at the step beyond reporting, to the external audit or assurance function. The role of any audit engagement is to provide a professional opinion on a set of financial or non-financial assertions reported by an organization's management, based on an agreed evaluative framework. Any such opinion is not a guarantee that the underlying report is free from fraud or misstatement. Where an audit opinion on financial statements is incorrect, this is referred to as an audit failure. Specifically, the textbook definition of audit failure has two components: that the financial statements contain a serious error and that the auditor has failed to detect the error due to the auditor's failure during the audit process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Corporations' commitment to their social responsibilities has long been a global concern with reference to sustainability, transparency and fair practice, which is of great concern to stakeholders. Corporations are expected to be responsible to the society they operate within and do business in a socially responsible manner.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We investigate the association between asset revaluations of non-current assets and audit fees, using a sample of ASX 300 companies from the years 2003–2007.We report that there is a significant increase in the audit fees paid when non-financial assets (PPEs, investment properties and intangible assets) are measured at fair values. Moreover, we provide evidence that an independent valuer or appraiser significantly weakens the positive association between asset revaluations and audit fees. Furthermore, companies whose noncurrent assets are revalued upwards and those that revalue their non-current assets upwards every year have significantly higher audit fees. Additional tests provide empirical evidence that the strength of corporate governance has a moderating effect on the level of audit fees. This study contributes to the ongoing debate on the role of fair value accounting. The findings suggest agency costs associated with fair value estimates may offset the benefits from the use of fair value accounting.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Social audit is one of those important mechanisms for strengthening NGOs’ accountability to poor communities (as NGOs’ key beneficiaries). However, conducting social audits within the NGO sector often rests on the individual interests and priorities of donors or NGOs themselves, effectively resulting in self-selection bias, and limiting the effectiveness and usefulness of social audits as a control and evaluation mechanism. The purpose of this chapter is to identify the prevalence, scale, and scope of social audits within the NGO sector, particularly NGOs engaging in microenterprise development programs. Accordingly, this study examined 20 NGOs operating in two countries - Bangladesh and Indonesia. Data were collected from publicly available sources and in-depth interviews with senior executives of the participating NGOs. Further, 10 interviews were conducted with a small sample of beneficiaries (individuals or groups from four of the participating NGOs) in order to gain an understanding of beneficiaries’ perceptions of the NGOs’ social audit mechanism. The findings reveal a range of approaches to social audit among NGOs, as well as the usefulness and limitations of this mechanism for strengthening NGO accountability, particularly to beneficiaries. Findings highlight that within the NGOs investigated the conduct of social audits remained voluntary and was strongly dependant on donors’ requirements. As social audit regulation within the NGO sector is minimal, the findings provide regulators with valuable guidance for better understanding the value of social audit as a mechanism to strengthen accountability of the NGO sector, particularly accountability to beneficiaries.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There are limited studies on the adequacy of prisoner diet and food practices, yet understanding these are important to inform food provision and assure duty of care for this group. The aim of this research was to assess the dietary intakes of prisoners to inform food and nutrition policy in this setting. This research used a cross-sectional design with convenience sampling in a 945 bed male high secure prison. Multiple methods were used to assess food available at the group level, including verification of food portion, quality, and practices. A pictorial tool supported the diet history method. Of 276 eligible prisoners, 120 dietary interviews were conducted and verified against prison records, with 106 deemed plausible. The results showed the planned food to be nutritionally adequate, with the exception of vitamin D for older males and long chain fatty acids, with sodium above Upper Limits. The Australian Dietary Targets for chronic disease risk were not achieved. High energy intakes were reported with median 13.8MJ (SE 0.3MJ). Probability estimates of inadequate intake varied with age groups: magnesium 8% (>30 years), 2.9% (<30 years); calcium 6.0% (>70 years), 1.5% (<70 years); folate 3.5%; zinc and iodine 2.7%; and vitamin A 2.3%. Nutrient intakes were greatly impacted by self-funded snacks. Results suggest nutrient intakes nutritionally favourable when compared to males in the community. This study highlights the complexity of food provision in the prison environment, and also poses questions for population level dietary guidance in delivering appropriate nutrients within energy limits.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There is an increase in the uptake of cloud computing services (CCS). CCS is adopted in the form of a utility, and it incorporates business risks of the service providers and intermediaries. Thus, the adoption of CCS will change the risk profile of an organization. In this situation, organisations need to develop competencies by reconsidering their IT governance structures to achieve a desired level of IT-business alignment and maintain their risk appetite to source business value from CCS. We use the resource-based theories to suggest that collaborative board oversight of CCS, competencies relating to CCS information and financial management, and a CCS-related continuous audit program can contribute to business process performance improvements and overall firm performance. Using survey data, we find evidence of a positive association between these IT governance considerations and business process performance. We also find evidence of positive association between business process performance improvements and overall firm performance. The results suggest that the suggested considerations on IT governance structures can contribute to CCS-related IT-business alignment and lead to anticipated business value from CCS. This study provides guidance to organizations on competencies required to secure business value from CCS.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There is an increase in the uptake of cloud computing services (CCS). CCS is adopted in the form of a utility, and it incorporates business risks of the service providers and intermediaries. Thus, the adoption of CCS will change the risk profile of an organization. In this situation, organizations need to develop competencies by reconsidering their IT governance structures to achieve a desired level of IT-business alignment and maintain their risk appetite to source business value from CCS. We use the resource-based theories to suggest that collaborative board oversight of CCS, competencies relating to CCS information and financial management, and a CCS-related continuous audit program can contribute to business process performance improvements and overall firm performance. Using survey data, we find evidence of a positive association between these IT governance considerations and business process performance. We also find evidence of positive association between business process performance improvements and overall firm performance. The results suggest that the suggested considerations on IT governance structures can contribute to CCS-related IT-business alignment and lead to anticipated business value from CCS. This study provides guidance to organizations on competencies required to secure business value from CCS.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper I examine how one political actor–former Prime Minister Kevin Rudd–proposes to use education for the purpose of securing national productivity and foreign policy. I work with Foucault’s suggestion that the apparatus of security is the essential technical instrument of governmentality and that the production of milieu, made up of human, spatial, temporal and cultural objects, and the government of risk are key strategies in the bio-politicisation of security. The discourse analysis also draws on Bacchi to problematise statements that (a) represent both the nation and regional neighbours as governable milieu within the ambit of a whole of government approach, and (b) locate literacy and education as both risk and solution in a security apparatus. My examination of the emergence of literacy and education as security technologies, takes account of the discursive effects of Rudd’s representation of the spaces and scale of national, geopolitical and global policy problems. I argue that in these examples of policy texts, education is used as a discursive tool to secure education workers and youth as subjects of economic interest and sovereign rule.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Corporate governance mandates and listing rules identify internal audit functions (IAF) as a central internal control mechanism. External audits are expected to assess the quality of IAF before placing reliance on its work. We provide evidence on the effect of IAF quality and IAF contribution to external audit on audit fees. Using data from a matched survey of both external and internal audits, we extend prior research which is based mainly on internal audits' assessment and conducted predominantly in highly developed markets. We find a positive relationship between IAF quality and audit fees as well as a reduction in audit fees as a result of external auditors' reliance on IAF. The interaction between IAF quality and IAF contribution to external audit suggests that high quality IAF induces greater external auditor reliance on internal auditors' work and thus result in lower external audit fees.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis evaluates the security of Supervisory Control and Data Acquisition (SCADA) systems, which are one of the key foundations of many critical infrastructures. Specifically, it examines one of the standardised SCADA protocols called the Distributed Network Protocol Version 3, which attempts to provide a security mechanism to ensure that messages transmitted between devices, are adequately secured from rogue applications. To achieve this, the thesis applies formal methods from theoretical computer science to formally analyse the correctness of the protocol.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Historically, school leaders have occupied a somewhat ambiguous position within networks of power. On the one hand, they appear to be celebrated as what Ball (2003) has termed the ‘new hero of educational reform'; on the other, they are often ‘held to account’ through those same performative processes and technologies. These have become compelling in schools and principals are ‘doubly bound’ through this. Adopting a Foucauldian notion of discursive production, this paper addresses the ways that the discursive ‘field’ of ‘principal’ (within larger regimes of truth such as schools, leadership, quality and efficiency) is produced. It explores how individual principals understand their roles and ethics within those practices of audit emerging in school governance, and how their self-regulation is constituted through NAPLAN – the National Assessment Program, Literacy and Numeracy. A key effect of NAPLAN has been the rise of auditing practices that change how education is valued. Open-ended interviews with 13 primary and secondary school principals from Western Australia, South Australia and New South Wales asked how they perceived NAPLAN's impact on their work, their relationships within their school community and their ethical practice.