801 resultados para secure audit
Resumo:
This study reports the results of a content analysis of the comment letters sent to the UK Financial Reporting Council (FRC), in response to its consultation document on the 2012 revisions of the UK Corporate Governance Code, concerning the proposal for mandatory audit tendering. The results indicate a general support for the FRC’s proposals with a number of key concerns related to audit quality, auditor independence and audit cost. There is also clear conflict of interests among some stakeholder groups such as audit firms and companies on one side and institutional investors on the other side. There is evidence of conflict of interest between Big 4 and non-Big 4 audit firms. Implications for future consultations and legislations are also discussed.
Resumo:
This study provides novel evidence on the extent to which auditors perceive the usage and importance of audit technology in an emerging market. It explores the types of audit technology tools used and factors influencing the use of these; it tests the association between the perceived use and importance of the tools and firm-specific/ auditor-specific characteristics. Using interviews and questionnaires from auditors at Big 4 and international non-Big 4 audit firms, the findings reflect the highly perceived importance of using audit technology in technical and administrative procedures, specifically to assess risk. We find that the perceived use and importance of audit technology is relatively higher for those in Big 4 firms, with less years of auditor experience and higher auditor technology expertise, and those in management positions. The results provide policy makers with guidance on the opportunities and challenges of using information technology in the audit process.
Resumo:
The Private Finance Initiative (PFI) has become one of the UK’s most contentious public policies. Despite New Labour’s advocacy of PFI as a means of achieving better value for money, criticisms of PFI have centred on key issues such as a lack of cost effectiveness, exaggerated pricing of risk transfers, excessive private sector profits, inflexibility and cumbersome administrative arrangements. Nevertheless, PFI has persisted as a key
infrastructure procurement method in the UK and has been supported as such by successive governments, as well as influencing policy in the Republic of Ireland and other European Nations. This paper explores this paradoxical outcome in relation to the role played in the UK by the National Audit Office (NAO). Under pressure to justify its support for PFI, the Blair government sought support for its policies by encouraging the NAO to investigate issues relating to PFI as well as specific PFI projects. It would have been expected that in fulfilling its role as independent auditor, the NAO would have examined whether PFI projects could have been delivered more efficiently, effectively or economically through other means. Yet, in line with earlier research, we find evidence that the NAO failed to comprehensively assess
key issues such as the value for money of PFI projects, and in so doing effectively acted as a legitimator of PFI policy. Using concepts relating to legitimacy theory and the idea of framing, our paper looks into 67 NAO private finance reports published between 1997 and 2011, with the goal of identifying the preferences, values and ideology underpinning the
NAO’s view on PFI during this period. Our analysis suggests that the NAO sought to legitimise existing PFI practices via a selective framing of problems and questions. Utilising a longitudinal approach, our analysis further suggests that this patterns of selective framing persisted over an extended time period during which fundamental parameters of the policy (such as contract length, to name one of the most important issues) were rarely addressed.
Overall the NAO’ supportive stance toward PFI seems to have relied on 1) a focused on positive aspects of PFI, such as on time delivery or lessons learned, and 2) positive comments on aspects of PFI that were criticised elsewhere, such as the lack of flexibility of underlying contractual arrangements. Our paper highlights the possibility that, rather than providing for a critical assessment of existing policies, national auditing bodies can
contribute to the creation of legitimatory environments. In terms of accounting research we would suggests that the objectivity and independence of accounting watchdogs should not be taken for granted, and that instead a critical investigation of the biases which can characterise these bodies can contribute to a deeper understanding of the nature of lobbying networks in the modern state.
Resumo:
In 2015 the Irish Mathematics Learning Support Network (IMLSN) commissioned a comprehensive audit of the extent and nature of mathematics learning support (MLS) provision on the island of Ireland. An online survey was sent to 32 institutions, including universities, institutes of technology, further education and teacher training colleges, and a 97% response rate was achieved. While the headline figure – 84% of institutions that responded to the survey provide MLS – sounds good, deeper analysis reveals that the true state of MLS is not so solid. For example, in 25% of institutions offering MLS, only five hours per week (at most) of physical MLS are available, while in 20% of institutions the service is provided by only one or two staff members. Furthermore, training of tutors is minimal or non-existent in at least half of the institutions offering MLS. The results provide an illuminating picture, however, identifying the true state of MLS in Ireland is beneficial only if it informs developments in the years ahead. This talk will present some of the findings of the survey in more depth along with conclusions and recommendations. Key among these is the need for institutions to recognise MLS as a vital element of mathematics teaching and learning strategy at third level and devote the necessary resources to facilitate the provision of a service which can grow and adapt to meet student requirements.
Resumo:
Introduction
This paper outlines an innovative approach to auditing and evaluating the content of a management and leadership module for undergraduate nursing students after their final management clinical placement. Normally evaluations of teaching in a module take place at the end of a teaching module and therefore do not properly reflect the value of the teaching in relation to practical clinical experience.
Aim
This audit and evaluation sought to explore both the practical value of the teaching and learning, and also the degree to which it the teaching reflected against the NMC Standards of Education and Learning (2010 domain 3).
Methods
Having piloted the evaluative tool with an earlier cohort of nursing students, this evaluation explored both a quantitative assessment employing a Personal Response System (n =172), together with a qualitative dimension (n=116), thus delivering paper-based comments and reflections from students on the value and practicality of the module teaching theory to their final clinical management experience. The quantitative audit data were analysed for frequencies and cross tabulation and the qualitative audit data were thematically analysed.
Results
Results suggest a significant proportion of the students, appreciated the quality of the standard of teaching, but more importantly, ‘valued or highly valued’ the teaching and learning in relation to how it helped to significantly inform their management placement experience. A smaller proportion of the students underlined limitations and areas in which further improvement can be made in teaching and learning to the module.
Conclusion
Significantly positive evaluation by the students of the practical value of teaching and learning, to the theoretical management module. This has proved a useful auditing approach in assessing the theoretical teaching to student’s Level 3 clinical experience, and facilitated significant recommendations as far as developing the teaching and learning to better reflect the practice needs of nursing students
Resumo:
In this paper, we investigate the secrecy performance of an energy harvesting relay system, where a legitimate source communicates with a legitimate destination via the assistance of multiple trusted relays. In the considered system, the source and relays deploy the time-switching-based radio frequency energy harvesting technique to harvest energy from a multi-antenna beacon. Different antenna selection and relay selection schemes are applied to enhance the security of the system. Specifically, two relay selection schemes based on the partial and full knowledge of channel state information, i.e., optimal relay selection and partial relay selection, and two antenna selection schemes for harvesting energy at source and relays, i.e., maximizing energy harvesting channel for the source and maximizing energy harvesting channel for the selected relay, are proposed. The exact and asymptotic expressions of secrecy outage probability in these schemes are derived. We demonstrate that applying relay selection approaches in the considered energy harvesting system can enhance the security performance. In particular, optimal relay selection scheme outperforms partial relay selection scheme and achieves full secrecy diversity order, regardless of energy harvesting scenarios.
Resumo:
In this paper, we propose three relay selection schemes for full-duplex heterogeneous networks in the presence of multiple cognitive radio eavesdroppers. In this setup, the cognitive small-cell nodes (secondary network) can share the spectrum licensed to the macro-cell system (primary network) on the condition that the quality-of-service of the primary network is always satisfied subjected to its outage probability constraint. The messages are delivered from one small-cell base station to the destination with the help of full-duplex small-cell base stations, which act as relay nodes. Based on the availability of the network’s channel state information at the secondary information source, three different selection criteria for full-duplex relays, namely: 1) partial relay selection; 2) optimal relay selection; and 3) minimal self-interference relay selection, are proposed. We derive the exact closed-form and asymptotic expressions of the secrecy outage probability for the three criteria under the attack of non-colluding/colluding eavesdroppers. We demonstrate that the optimal relay selection scheme outperforms the partial relay selection and minimal self-interference relay selection schemes at the expense of acquiring full channel state information knowledge. In addition, increasing the number of the full-duplex small-cell base stations can improve the security performance. At the illegitimate side, deploying colluding eavesdroppers and increasing the number of eavesdroppers put the confidential information at a greater risk. Besides, the transmit power and the desire outage probability of the primary network have great influences on the secrecy outage probability of the secondary network.
Resumo:
We investigate the secrecy performance of dualhop amplify-and-forward (AF) multi-antenna relaying systems over Rayleigh fading channels, by taking into account the direct link between the source and destination. In order to exploit the available direct link and the multiple antennas for secrecy improvement, different linear processing schemes at the relay and different diversity combining techniques at the destination are proposed, namely, 1) Zero-forcing/Maximal ratio combining (ZF/MRC), 2) ZF/Selection combining (ZF/SC), 3) Maximal ratio transmission/MRC (MRT/MRC) and 4) MRT/Selection combining (MRT/SC). For all these schemes, we present new closed-form approximations for the secrecy outage probability. Moreover, we investigate a benchmark scheme, i.e., cooperative jamming/ZF (CJ/ZF), where the secrecy outage probability is obtained in exact closed-form. In addition, we present asymptotic secrecy outage expressions for all the proposed schemes in the high signal-to-noise ratio (SNR) regime, in order to characterize key design parameters, such as secrecy diversity order and secrecy array gain. The outcomes of this paper can be summarized as follows: a) MRT/MRC and MRT/SC achieve a full diversity order of M + 1, ZF/MRC and ZF/SC achieve a diversity order of M, while CJ/ZF only achieves unit diversity order, where M is the number of antennas at the relay. b) ZF/MRC (ZF/SC) outperforms the corresponding MRT/MRC (MRT/SC) in the low SNR regime, while becomes inferior to the corresponding MRT/MRC (MRT/SC) in the high SNR. c) All of the proposed schemes tend to outperform the CJ/ZF with moderate number of antennas, and linear processing schemes with MRC attain better performance than those with SC.
Resumo:
In this paper, we investigate the secrecy outage performance of spectrum sharing multiple-input multiple-output networks using generalized transmit antenna selection with maximal ratio combining over Nakagami-m channels. In particular, the outdated channel state information is considered at the process of antenna selection due to feedback delay. Considering a practical passive eavesdropper scenario, we derive the exact and asymptotic closed-form expressions of secrecy outage probability, which enable us to evaluate the secrecy performance with high efficiency and present a new design insight into the impact of key parameters on the secrecy performance. In addition, the analytical results demonstrate that the achievable secrecy diversity order is only determined by the parameters of the secondary network, while other parameters related to primary or eavesdropper’s channels have a significantly impact on the secrecy coding gain.
Resumo:
We consider a cooperative relaying network in which a source communicates with a group of users in the presence of one eavesdropper. We assume that there are no source-user links and the group of users receive only retransmitted signal from the relay. Whereas, the eavesdropper receives both the original and retransmitted signals. Under these assumptions, we exploit the user selection technique to enhance the secure performance. We first find the optimal power allocation strategy when the source has the full channel state information (CSI) of all links. We then evaluate the security level through: i) ergodic secrecy rate and ii) secrecy outage probability when having only the statistical knowledge of CSIs.
Resumo:
In recent years, the adaptation of Wireless Sensor Networks (WSNs) to application areas requiring mobility increased the security threats against confidentiality, integrity and privacy of the information as well as against their connectivity. Since, key management plays an important role in securing both information and connectivity, a proper authentication and key management scheme is required in mobility enabled applications where the authentication of a node with the network is a critical issue. In this paper, we present an authentication and key management scheme supporting node mobility in a heterogeneous WSN that consists of several low capabilities sensor nodes and few high capabilities sensor nodes. We analyze our proposed solution by using MATLAB (analytically) and by simulation (OMNET++ simulator) to show that it has less memory requirement and has good network connectivity and resilience against attacks compared to some existing schemes. We also propose two levels of secure authentication methods for the mobile sensor nodes for secure authentication and key establishment.
Resumo:
In this paper a new method of establishing secret keys for wireless communications is proposed. A retrodirective array (RDA) that is configured to receive and re-transmit at different frequencies is utilized as a relay node. Specifically the analogue RDA is able to respond in ‘real-time’, reducing the required number of time slots for key establishment to two, compared with at least three in previous relay key generation schemes. More importantly, in the proposed architecture equivalent reciprocal wireless channels between legitimate keying nodes can be randomly updated within one channel coherence time period, leading to greatly increased key generation rates (KGRs) in slow fading environment. The secrecy performance of this RDA assisted key generation system is evaluated and it is shown that it outperforms previous relay key generation systems.