Currently,there is a growing trend among users to store their data in the cloud.However,the cloud is vulnerable to persistent data corruption risks arising from equipment failures and hacker attacks.Additionally,when ...Currently,there is a growing trend among users to store their data in the cloud.However,the cloud is vulnerable to persistent data corruption risks arising from equipment failures and hacker attacks.Additionally,when users perform file operations,the semantic integrity of the data can be compromised.Ensuring both data integrity and semantic correctness has become a critical issue that requires attention.We introduce a pioneering solution called Sec-Auditor,the first of its kind with the ability to verify data integrity and semantic correctness simultaneously,while maintaining a constant communication cost independent of the audited data volume.Sec-Auditor also supports public auditing,enabling anyone with access to public information to conduct data audits.This feature makes Sec-Auditor highly adaptable to open data environments,such as the cloud.In Sec-Auditor,users are assigned specific rules that are utilized to verify the accuracy of data semantic.Furthermore,users are given the flexibility to update their own rules as needed.We conduct in-depth analyses of the correctness and security of Sec-Auditor.We also compare several important security attributes with existing schemes,demonstrating the superior properties of Sec-Auditor.Evaluation results demonstrate that even for time-consuming file upload operations,our solution is more efficient than the comparison one.展开更多
With the intelligentization of the Internet of Vehicles(lovs),Artificial Intelligence(Al)technology is becoming more and more essential,especially deep learning.Federated Deep Learning(FDL)is a novel distributed machi...With the intelligentization of the Internet of Vehicles(lovs),Artificial Intelligence(Al)technology is becoming more and more essential,especially deep learning.Federated Deep Learning(FDL)is a novel distributed machine learning technology and is able to address the challenges like data security,privacy risks,and huge communication overheads from big raw data sets.However,FDL can only guarantee data security and privacy among multiple clients during data training.If the data sets stored locally in clients are corrupted,including being tampered with and lost,the training results of the FDL in intelligent IoVs must be negatively affected.In this paper,we are the first to design a secure data auditing protocol to guarantee the integrity and availability of data sets in FDL-empowered IoVs.Specifically,the cuckoo filter and Reed-Solomon codes are utilized to guarantee error tolerance,including efficient corrupted data locating and recovery.In addition,a novel data structure,Skip Hash Table(SHT)is designed to optimize data dynamics.Finally,we illustrate the security of the scheme with the Computational Diffie-Hellman(CDH)assumption on bilinear groups.Sufficient theoretical analyses and performance evaluations demonstrate the security and efficiency of our scheme for data sets in FDL-empowered IoVs.展开更多
This paper attempts to explore interdisciplinary integration from four aspects:the necessity of interdisciplinary integration between legal studies and auditing,the difficulties and challenges encountered in this inte...This paper attempts to explore interdisciplinary integration from four aspects:the necessity of interdisciplinary integration between legal studies and auditing,the difficulties and challenges encountered in this integration,the ideas for teaching reform in the context of interdisciplinary integration,and the expected outcomes.The aim is to achieve an organic integration of legal studies and auditing through systematic teaching reforms,thereby providing students with comprehensive and integrated knowledge and skills training,ensuring the quality of talent cultivation,and adapting to the needs of social development.展开更多
Background: Appropriate sample requesting, collecting and timely dispatch to the appropriate laboratory is essential in establishing diagnosis of pathologies with lesions. Much time and effort may be wasted if this is...Background: Appropriate sample requesting, collecting and timely dispatch to the appropriate laboratory is essential in establishing diagnosis of pathologies with lesions. Much time and effort may be wasted if this is not done according to certain standards. We conducted this study to assess the route of lymph node samples from requests to reaching the laboratories. Methods: We conducted an audit over a period from 4th June until 10th Aug 2023. Data for all the procedures performed over this period on lymph node samples (was entered into and analysed using Excel. Results: A total of eighteen samples for sixteen patients were obtained during this period. Median age of the patients was 34 years (19 - 73) with a M:F ratio of 5:11. Among the IR samples, nine samples were from the neck, three from inguinal area and one from axilla. Seven samples (53.8%) were tru-cut biopsies, six samples (46.15%) were FNA. All samples were sent to the pathology laboratory fixed in formalin. Samples for TB were sent only for five cases (31.25%) and for only two cases (12.5%) were samples sent for bacterial culture. For the OR samples, none were sent for either bacterial culture or TB. Overall, eight patients (50%) were not investigated for any infectious etiologies like brucella, toxoplasmosis, CMV, EBV plus other possible causes. Repeat sampling was required for 25% of patients (within and out of the audit period). Conclusions: to avoid delays in making diagnoses, it is paramount to consider infectious etiologies as possible diagnosis for lymphadenopathy and request appropriate investigations. This requires liaising with infectious diseases/clinical microbiology experts to guide regarding types of samples, types of media and timely dispatch to the correct laboratory.展开更多
Federated learning is an important distributed model training technique in Internet of Things(IoT),in which participant selection is a key component that plays a role in improving training efficiency and model accurac...Federated learning is an important distributed model training technique in Internet of Things(IoT),in which participant selection is a key component that plays a role in improving training efficiency and model accuracy.This module enables a central server to select a subset of participants to performmodel training based on data and device information.By doing so,selected participants are rewarded and actively perform model training,while participants that are detrimental to training efficiency and model accuracy are excluded.However,in practice,participants may suspect that the central server may have miscalculated and thus not made the selection honestly.This lack of trustworthiness problem,which can demotivate participants,has received little attention.Another problem that has received little attention is the leakage of participants’private information during the selection process.We will therefore propose a federated learning framework with auditable participant selection.It supports smart contracts in selecting a set of suitable participants based on their training loss without compromising the privacy.Considering the possibility of malicious campaigning and impersonation of participants,the framework employs commitment schemes and zero-knowledge proofs to counteract these malicious behaviors.Finally,we analyze the security of the framework and conduct a series of experiments to demonstrate that the framework can effectively improve the efficiency of federated learning.展开更多
The supply of quality energy is a major concern for distribution network managers. This is the case for the company ASEMI, whose subscribers on the DJEGBE mini-power station network are faced with problems of current ...The supply of quality energy is a major concern for distribution network managers. This is the case for the company ASEMI, whose subscribers on the DJEGBE mini-power station network are faced with problems of current instability, voltage drops, and repetitive outages. This work is part of the search for the stability of the electrical distribution network by focusing on the audit of the DJEGBE mini photovoltaic solar power plant electrical network in the commune of OUESSE (Benin). This aims to highlight malfunctions on the low-voltage network to propose solutions for improving current stability among subscribers. Irregularities were noted, notably the overloading of certain lines of the PV network, implying poor distribution of loads by phase, which is the main cause of voltage drops;repetitive outages linked to overvoltage caused by lightning and overcurrent due to overload;faulty meters, absence of earth connection at subscribers. Peaks in consumption were obtained at night, which shows that consumption is greater in the evening. We examined the existing situation and processed the data collected, then simulated the energy consumption profiles with the network analyzer “LANGLOIS 6830” and “Excel”. The power factor value recorded is an average of 1, and the minimum value is 0.85. The daily output is 131.08 kWh, for a daily demand of 120 kWh and the average daily consumption is 109.92 kWh, or 83.86% of the energy produced per day. These results showed that the dysfunctions are linked to the distribution and the use of produced energy. Finally, we proposed possible solutions for improving the electrical distribution network. Thus, measures without investment and those requiring investment have been proposed.展开更多
It is a complex and important topic to study the linkage mechanism of government audit,social audit,and internal audit in the context of China’s high-quality economic development.The implementation of measures,such a...It is a complex and important topic to study the linkage mechanism of government audit,social audit,and internal audit in the context of China’s high-quality economic development.The implementation of measures,such as establishing a sound and perfect organizational safeguard mechanism,strengthening project collaborative audit mechanism,enhancing the mechanism for utilizing audit results,and establishing an audit and rectification joint mechanism can promote the efficient operation of the audit supervision system and the high-quality development of audit services.展开更多
As a unique environmental regulation in China,the official accountability audit was piloted in 2014.With a focus on prioritizing the ecological environment,officials in pilot districts have implemented economic constr...As a unique environmental regulation in China,the official accountability audit was piloted in 2014.With a focus on prioritizing the ecological environment,officials in pilot districts have implemented economic construction,adjusted industrial structures,and promoted coordinated development between the economy and environment.The effects of implementation have garnered widespread attention from society.However,there is limited research on the impact of an accountability audit on industrial structure adjustments.Using the“Accountability Audit of Officials for Natural Resource Assets(Trial)”released in 2015 as a quasi-natural experiment,this study collected panel data from 279 cities between 2013 and 2017.It then empirically analyzed the impact mechanism and effects of the accountability audit on industrial structure adjustment using the Propensity Score Matching and Difference-in-Differences model.The research findings indicate that the accountability audit directly impacted industrial structure adjustment,promoting the upgrading of the primary industry to the secondary industry and restricting the development of the tertiary industry.In addition,the audit is beneficial for enterprise entry,but not conducive to technological innovation,and has no significant impact on foreign direct investment.This conclusion fills a gap in the existing research and provides valuable insights for policymakers.展开更多
This paper aims to investigate the effect of the characteristics of the internal audit function(IAF)on earnings management(EM)for a sample of 27 Tunisian listed companies.The authors employed the Correlated Panels Cor...This paper aims to investigate the effect of the characteristics of the internal audit function(IAF)on earnings management(EM)for a sample of 27 Tunisian listed companies.The authors employed the Correlated Panels Corrected Standard Errors model to estimate the regression equation.The results showed that EM is negatively associated with internal audit effectiveness,frequency of audit committee meetings with Chief Audit Executives(CAEs),the partial outsourcing of internal audit,and the firm’s size.Moreover,the authors found a positive relationship between EM and the use of IAF as a training ground for management and the private sector.This study is important to academics,regulators,and policymakers in introducing new governance reforms to strengthen the IAF as an important internal governance mechanism to reduce earnings management practices in emerging countries.The results also provide useful information for investors to examine the effect of internal audit characteristics on earnings management.展开更多
The aim of this study is to examine the qualities that auditors engaged in detecting potential fraud within multinational corporations in Sub-Saharan Africa should possess.To achieve this goal,a quantitative approach ...The aim of this study is to examine the qualities that auditors engaged in detecting potential fraud within multinational corporations in Sub-Saharan Africa should possess.To achieve this goal,a quantitative approach was used to develop and test a research model based on three theories:agency theory,attribution theory,and cognitive dissonance theory.Responses from a panel of two hundred and nine(209)auditors who conducted a legal audit mission in a Sub-Saharan multinational were analyzed using SmartPLS 3.3.3 software.The results emphasize the crucial importance of auditors’competence and continuous training in fraud detection.However,professional skepticism and time pressure were found to be non-significant in this context.This conclusion provides essential insights for auditors,highlighting the key qualities needed to effectively address fraud detection within multinational corporations in Sub-Saharan Africa.展开更多
This paper focuses on the innovation of audit business management in the information technology era.In the wave of digitalization,audit companies need to adjust their management mode to take advantage of the advantage...This paper focuses on the innovation of audit business management in the information technology era.In the wave of digitalization,audit companies need to adjust their management mode to take advantage of the advantages of informatization.The key is to use digital tools to strengthen data analysis and reshape the audit process.This not only improves efficiency and accuracy but also improves the overall audit quality.The article also highlights the importance of developing a culture of continued auditor learning and skills development to ensure competitiveness in the digital age.At the end of the paper,the success of audit companies depends on innovation ability and the importance of combining management mode with technological innovation.展开更多
This paper explores the audit risks associated with the recognition of data assets on financial statements,focusing on the complexities arising from their replicability,unique valuation patterns,and contextual depende...This paper explores the audit risks associated with the recognition of data assets on financial statements,focusing on the complexities arising from their replicability,unique valuation patterns,and contextual dependencies.It identifies major misstatement risks at both the financial statement and assertion levels,including the potential for management to exaggerate data asset values,uncertainties in valuation methods,and deficiencies in data governance and internal controls.Additionally,auditors’lack of professional knowledge and inappropriate audit methods can lead to inspection risks.The paper emphasizes the urgent need for enhanced accounting standards for data assets,effective guidelines for their recognition and measurement,and robust internal controls.Furthermore,it advocates for the exploration of effective valuation methods and the incorporation of advanced technologies,such as big data and AI,into auditing practices.By improving auditor training and methodologies,organizations can better manage the inherent risks associated with data asset auditing.展开更多
As China strives towards the second centenary goal,increasing attention is being paid to environmental pollution and other related issues.Concurrently,with the rapid development of big data technology,many big data so...As China strives towards the second centenary goal,increasing attention is being paid to environmental pollution and other related issues.Concurrently,with the rapid development of big data technology,many big data solutions have been applied to environmental pollution control audits,exerting a significant impact.This paper presents the current situation of environmental pollution audits,summarizing the application of big data from the perspectives of both domestic and international research.In terms of data collection and data analysis for environmental pollution audits,cloud platform technology,and visualization technology are selected based on multiple data sources.The impact in the field of environmental pollution control audits is further analyzed.It is found that the environmental pollution audit cloud platform is not yet perfect,the technical skills of audit personnel are insufficient,and some technologies are not mature.Relevant suggestions are put forward to provide a reference for the future development of big data technology and its integration with environmental pollution control audits.展开更多
This study focused on a multi-indicator assessment methodology for governmental environmental auditing of water protection programs. The environmental status of Wuli Lake in China was assessed using the global indicat...This study focused on a multi-indicator assessment methodology for governmental environmental auditing of water protection programs. The environmental status of Wuli Lake in China was assessed using the global indicators (driver-status-response) developed by the Commission on Sustainable Development, and four additional indicators proposed by the author: water quality, pollution load, aquatic ecosystem status, and lake sediment deposition. Various hydrological, chemical, biological and environmental parameters were used to estimate the values of the indicators for assessment of environmental status of the lake based on time series data sets for twenty years. The indicators proposed can be customized to meeting the needs for particular assessment of water protection programs. This method can be used to evaluate the performance of national environmental protection programs and provide technical support for environmental auditors.展开更多
Perfecting the natural resource system and auditing natural resource assets are requirements in protecting natural resources and developing an ecological civilization in practice.While the natural resource asset audit...Perfecting the natural resource system and auditing natural resource assets are requirements in protecting natural resources and developing an ecological civilization in practice.While the natural resource asset audit both confirms and quantifies natural resources,the nature of such resources makes it difficult to identify their ownership.Further,these resources'diversity creates complex measurement standards and activities,all of which require relevant institutional guarantees.However,the existing audit system for natural resource assets includes insufficient stock,incremental difficulties,and poor guidance,which cannot meet the requirements for environmental governance and an ecological civilization.Thus,it is necessary to define natural resource assets’rights and measurement systems and responsibility regulations,among others;construct an auditing participation system,technical regulations,and evaluation criterion for natural resource assets;amend the Audit Law in a timely manner;and enact natural resource asset legislation.Ultimately,such efforts would eliminate the bottleneck in the natural resource asset auditing system and facilitate the construction of a resource-saving,environmentally friendly society.展开更多
Identity-based public cloud storage auditing schemes can check the integrity of cloud data, and reduce the complicated certificate management. In such a scheme, one Private Key Generator(PKG) is employed to authentica...Identity-based public cloud storage auditing schemes can check the integrity of cloud data, and reduce the complicated certificate management. In such a scheme, one Private Key Generator(PKG) is employed to authenticate the identity and generate private keys for all users, and one Third Party Auditor(TPA) is employed to by users to check the integrity of cloud data. This approach is undesirable for large-scale users since the PKG and the TPA might not be able to afford the heavy workload. To solve the problem, we give a hierarchical Private Key Generator structure for large-scale user groups, in which a root PKG delegates lower-level PKGs to generate private keys and authenticate identities. Based on the proposed structure, we propose an authorized identity-based public cloud storage auditing scheme, in which the lowest-level PKGs play the role of TPA, and only the authorized lowest-level PKGs can represent users in their domains to check cloud data's integrity. Furthermore, we give the formal security analysis and experimental results, which show that our proposed scheme is secure and efficient.展开更多
The security of cloud data has always been a concern.Cloud server provider may maliciously tamper or delete user’s data for their own benefit,so data integrity audit is of great significance to verify whether data is...The security of cloud data has always been a concern.Cloud server provider may maliciously tamper or delete user’s data for their own benefit,so data integrity audit is of great significance to verify whether data is modified or not.Based on the general three-party audit architecture,a dynamic auditing scheme without bilinear pairings is proposed in this paper.It utilizes exponential operation instead of bilinear mapping to verify the validity of evidence.By establishing the mapping relation between logic index and tag index of data block with index transformation table,our scheme can easily support dynamic data operation.By hiding random numbers in the integrity evidence,our scheme can protect users’privacy information.Detailed security analysis shows that our scheme is secure against attacks such as forgery,replaying and substitution.Further experiments demonstrate that our scheme has lower computational overhead.展开更多
With the rapid advancement of cloud computing,cloud storage services have developed rapidly.One issue that has attracted particular attention in such remote storage services is that cloud storage servers are not enoug...With the rapid advancement of cloud computing,cloud storage services have developed rapidly.One issue that has attracted particular attention in such remote storage services is that cloud storage servers are not enough to reliably save and maintain data,which greatly affects users’confidence in purchasing and consuming cloud storage services.Traditional data integrity auditing techniques for cloud data storage are centralized,which faces huge security risks due to single-point-of-failure and vulnerabilities of central auditing servers.Blockchain technology offers a new approach to this problem.Many researchers have endeavored to employ the blockchain for data integrity auditing.Based on the search of relevant papers,we found that existing literature lacks a thorough survey of blockchain-based integrity auditing for cloud data.In this paper,we make an in-depth survey on cloud data integrity auditing based on blockchain.Firstly,we cover essential basic knowledge of integrity auditing for cloud data and blockchain techniques.Then,we propose a series of requirements for evaluating existing Blockchain-based Data Integrity Auditing(BDIA)schemes.Furthermore,we provide a comprehensive review of existing BDIA schemes and evaluate them based on our proposed criteria.Finally,according to our completed review and analysis,we explore some open issues and suggest research directions worthy of further efforts in the future.展开更多
基金This research was supported by the Qinghai Provincial High-End Innovative and Entrepreneurial Talents Project.
文摘Currently,there is a growing trend among users to store their data in the cloud.However,the cloud is vulnerable to persistent data corruption risks arising from equipment failures and hacker attacks.Additionally,when users perform file operations,the semantic integrity of the data can be compromised.Ensuring both data integrity and semantic correctness has become a critical issue that requires attention.We introduce a pioneering solution called Sec-Auditor,the first of its kind with the ability to verify data integrity and semantic correctness simultaneously,while maintaining a constant communication cost independent of the audited data volume.Sec-Auditor also supports public auditing,enabling anyone with access to public information to conduct data audits.This feature makes Sec-Auditor highly adaptable to open data environments,such as the cloud.In Sec-Auditor,users are assigned specific rules that are utilized to verify the accuracy of data semantic.Furthermore,users are given the flexibility to update their own rules as needed.We conduct in-depth analyses of the correctness and security of Sec-Auditor.We also compare several important security attributes with existing schemes,demonstrating the superior properties of Sec-Auditor.Evaluation results demonstrate that even for time-consuming file upload operations,our solution is more efficient than the comparison one.
基金supported by the National Natural Science Foundation of China under Grants No.U1836115,No.61922045,No.61877034,No.61772280the Natural Science Foundation of Jiangsu Province under Grant No.BK20181408+2 种基金the Peng Cheng Laboratory Project of Guangdong Province PCL2018KP004the CICAEET fundthe PAPD fund.
文摘With the intelligentization of the Internet of Vehicles(lovs),Artificial Intelligence(Al)technology is becoming more and more essential,especially deep learning.Federated Deep Learning(FDL)is a novel distributed machine learning technology and is able to address the challenges like data security,privacy risks,and huge communication overheads from big raw data sets.However,FDL can only guarantee data security and privacy among multiple clients during data training.If the data sets stored locally in clients are corrupted,including being tampered with and lost,the training results of the FDL in intelligent IoVs must be negatively affected.In this paper,we are the first to design a secure data auditing protocol to guarantee the integrity and availability of data sets in FDL-empowered IoVs.Specifically,the cuckoo filter and Reed-Solomon codes are utilized to guarantee error tolerance,including efficient corrupted data locating and recovery.In addition,a novel data structure,Skip Hash Table(SHT)is designed to optimize data dynamics.Finally,we illustrate the security of the scheme with the Computational Diffie-Hellman(CDH)assumption on bilinear groups.Sufficient theoretical analyses and performance evaluations demonstrate the security and efficiency of our scheme for data sets in FDL-empowered IoVs.
文摘This paper attempts to explore interdisciplinary integration from four aspects:the necessity of interdisciplinary integration between legal studies and auditing,the difficulties and challenges encountered in this integration,the ideas for teaching reform in the context of interdisciplinary integration,and the expected outcomes.The aim is to achieve an organic integration of legal studies and auditing through systematic teaching reforms,thereby providing students with comprehensive and integrated knowledge and skills training,ensuring the quality of talent cultivation,and adapting to the needs of social development.
文摘Background: Appropriate sample requesting, collecting and timely dispatch to the appropriate laboratory is essential in establishing diagnosis of pathologies with lesions. Much time and effort may be wasted if this is not done according to certain standards. We conducted this study to assess the route of lymph node samples from requests to reaching the laboratories. Methods: We conducted an audit over a period from 4th June until 10th Aug 2023. Data for all the procedures performed over this period on lymph node samples (was entered into and analysed using Excel. Results: A total of eighteen samples for sixteen patients were obtained during this period. Median age of the patients was 34 years (19 - 73) with a M:F ratio of 5:11. Among the IR samples, nine samples were from the neck, three from inguinal area and one from axilla. Seven samples (53.8%) were tru-cut biopsies, six samples (46.15%) were FNA. All samples were sent to the pathology laboratory fixed in formalin. Samples for TB were sent only for five cases (31.25%) and for only two cases (12.5%) were samples sent for bacterial culture. For the OR samples, none were sent for either bacterial culture or TB. Overall, eight patients (50%) were not investigated for any infectious etiologies like brucella, toxoplasmosis, CMV, EBV plus other possible causes. Repeat sampling was required for 25% of patients (within and out of the audit period). Conclusions: to avoid delays in making diagnoses, it is paramount to consider infectious etiologies as possible diagnosis for lymphadenopathy and request appropriate investigations. This requires liaising with infectious diseases/clinical microbiology experts to guide regarding types of samples, types of media and timely dispatch to the correct laboratory.
基金supported by the Key-Area Research and Development Program of Guangdong Province under Grant No.2020B0101090004the National Natural Science Foundation of China under Grant No.62072215,the Guangzhou Basic Research Plan City-School Joint Funding Project under Grant No.2024A03J0405+1 种基金the Guangzhou Basic and Applied Basic Research Foundation under Grant No.2024A04J3458the State Archives Administration Science and Technology Program Plan of China under Grant 2023-X-028.
文摘Federated learning is an important distributed model training technique in Internet of Things(IoT),in which participant selection is a key component that plays a role in improving training efficiency and model accuracy.This module enables a central server to select a subset of participants to performmodel training based on data and device information.By doing so,selected participants are rewarded and actively perform model training,while participants that are detrimental to training efficiency and model accuracy are excluded.However,in practice,participants may suspect that the central server may have miscalculated and thus not made the selection honestly.This lack of trustworthiness problem,which can demotivate participants,has received little attention.Another problem that has received little attention is the leakage of participants’private information during the selection process.We will therefore propose a federated learning framework with auditable participant selection.It supports smart contracts in selecting a set of suitable participants based on their training loss without compromising the privacy.Considering the possibility of malicious campaigning and impersonation of participants,the framework employs commitment schemes and zero-knowledge proofs to counteract these malicious behaviors.Finally,we analyze the security of the framework and conduct a series of experiments to demonstrate that the framework can effectively improve the efficiency of federated learning.
文摘The supply of quality energy is a major concern for distribution network managers. This is the case for the company ASEMI, whose subscribers on the DJEGBE mini-power station network are faced with problems of current instability, voltage drops, and repetitive outages. This work is part of the search for the stability of the electrical distribution network by focusing on the audit of the DJEGBE mini photovoltaic solar power plant electrical network in the commune of OUESSE (Benin). This aims to highlight malfunctions on the low-voltage network to propose solutions for improving current stability among subscribers. Irregularities were noted, notably the overloading of certain lines of the PV network, implying poor distribution of loads by phase, which is the main cause of voltage drops;repetitive outages linked to overvoltage caused by lightning and overcurrent due to overload;faulty meters, absence of earth connection at subscribers. Peaks in consumption were obtained at night, which shows that consumption is greater in the evening. We examined the existing situation and processed the data collected, then simulated the energy consumption profiles with the network analyzer “LANGLOIS 6830” and “Excel”. The power factor value recorded is an average of 1, and the minimum value is 0.85. The daily output is 131.08 kWh, for a daily demand of 120 kWh and the average daily consumption is 109.92 kWh, or 83.86% of the energy produced per day. These results showed that the dysfunctions are linked to the distribution and the use of produced energy. Finally, we proposed possible solutions for improving the electrical distribution network. Thus, measures without investment and those requiring investment have been proposed.
文摘It is a complex and important topic to study the linkage mechanism of government audit,social audit,and internal audit in the context of China’s high-quality economic development.The implementation of measures,such as establishing a sound and perfect organizational safeguard mechanism,strengthening project collaborative audit mechanism,enhancing the mechanism for utilizing audit results,and establishing an audit and rectification joint mechanism can promote the efficient operation of the audit supervision system and the high-quality development of audit services.
文摘As a unique environmental regulation in China,the official accountability audit was piloted in 2014.With a focus on prioritizing the ecological environment,officials in pilot districts have implemented economic construction,adjusted industrial structures,and promoted coordinated development between the economy and environment.The effects of implementation have garnered widespread attention from society.However,there is limited research on the impact of an accountability audit on industrial structure adjustments.Using the“Accountability Audit of Officials for Natural Resource Assets(Trial)”released in 2015 as a quasi-natural experiment,this study collected panel data from 279 cities between 2013 and 2017.It then empirically analyzed the impact mechanism and effects of the accountability audit on industrial structure adjustment using the Propensity Score Matching and Difference-in-Differences model.The research findings indicate that the accountability audit directly impacted industrial structure adjustment,promoting the upgrading of the primary industry to the secondary industry and restricting the development of the tertiary industry.In addition,the audit is beneficial for enterprise entry,but not conducive to technological innovation,and has no significant impact on foreign direct investment.This conclusion fills a gap in the existing research and provides valuable insights for policymakers.
文摘This paper aims to investigate the effect of the characteristics of the internal audit function(IAF)on earnings management(EM)for a sample of 27 Tunisian listed companies.The authors employed the Correlated Panels Corrected Standard Errors model to estimate the regression equation.The results showed that EM is negatively associated with internal audit effectiveness,frequency of audit committee meetings with Chief Audit Executives(CAEs),the partial outsourcing of internal audit,and the firm’s size.Moreover,the authors found a positive relationship between EM and the use of IAF as a training ground for management and the private sector.This study is important to academics,regulators,and policymakers in introducing new governance reforms to strengthen the IAF as an important internal governance mechanism to reduce earnings management practices in emerging countries.The results also provide useful information for investors to examine the effect of internal audit characteristics on earnings management.
文摘The aim of this study is to examine the qualities that auditors engaged in detecting potential fraud within multinational corporations in Sub-Saharan Africa should possess.To achieve this goal,a quantitative approach was used to develop and test a research model based on three theories:agency theory,attribution theory,and cognitive dissonance theory.Responses from a panel of two hundred and nine(209)auditors who conducted a legal audit mission in a Sub-Saharan multinational were analyzed using SmartPLS 3.3.3 software.The results emphasize the crucial importance of auditors’competence and continuous training in fraud detection.However,professional skepticism and time pressure were found to be non-significant in this context.This conclusion provides essential insights for auditors,highlighting the key qualities needed to effectively address fraud detection within multinational corporations in Sub-Saharan Africa.
文摘This paper focuses on the innovation of audit business management in the information technology era.In the wave of digitalization,audit companies need to adjust their management mode to take advantage of the advantages of informatization.The key is to use digital tools to strengthen data analysis and reshape the audit process.This not only improves efficiency and accuracy but also improves the overall audit quality.The article also highlights the importance of developing a culture of continued auditor learning and skills development to ensure competitiveness in the digital age.At the end of the paper,the success of audit companies depends on innovation ability and the importance of combining management mode with technological innovation.
文摘This paper explores the audit risks associated with the recognition of data assets on financial statements,focusing on the complexities arising from their replicability,unique valuation patterns,and contextual dependencies.It identifies major misstatement risks at both the financial statement and assertion levels,including the potential for management to exaggerate data asset values,uncertainties in valuation methods,and deficiencies in data governance and internal controls.Additionally,auditors’lack of professional knowledge and inappropriate audit methods can lead to inspection risks.The paper emphasizes the urgent need for enhanced accounting standards for data assets,effective guidelines for their recognition and measurement,and robust internal controls.Furthermore,it advocates for the exploration of effective valuation methods and the incorporation of advanced technologies,such as big data and AI,into auditing practices.By improving auditor training and methodologies,organizations can better manage the inherent risks associated with data asset auditing.
文摘As China strives towards the second centenary goal,increasing attention is being paid to environmental pollution and other related issues.Concurrently,with the rapid development of big data technology,many big data solutions have been applied to environmental pollution control audits,exerting a significant impact.This paper presents the current situation of environmental pollution audits,summarizing the application of big data from the perspectives of both domestic and international research.In terms of data collection and data analysis for environmental pollution audits,cloud platform technology,and visualization technology are selected based on multiple data sources.The impact in the field of environmental pollution control audits is further analyzed.It is found that the environmental pollution audit cloud platform is not yet perfect,the technical skills of audit personnel are insufficient,and some technologies are not mature.Relevant suggestions are put forward to provide a reference for the future development of big data technology and its integration with environmental pollution control audits.
基金Project supported by the International Project between The Netherlands Royal Academy of Arts and Sciences and Chinese Academy of Sciences (No. 04CDP014) the National Natural Science Foundation of China (No. 40471130)
文摘This study focused on a multi-indicator assessment methodology for governmental environmental auditing of water protection programs. The environmental status of Wuli Lake in China was assessed using the global indicators (driver-status-response) developed by the Commission on Sustainable Development, and four additional indicators proposed by the author: water quality, pollution load, aquatic ecosystem status, and lake sediment deposition. Various hydrological, chemical, biological and environmental parameters were used to estimate the values of the indicators for assessment of environmental status of the lake based on time series data sets for twenty years. The indicators proposed can be customized to meeting the needs for particular assessment of water protection programs. This method can be used to evaluate the performance of national environmental protection programs and provide technical support for environmental auditors.
基金supported by Chinese National Funding of Social Science[Grant number.18BJY024],Study on the Cooperative Supervision Mechanism of Budget Implementation Based on National Audit.
文摘Perfecting the natural resource system and auditing natural resource assets are requirements in protecting natural resources and developing an ecological civilization in practice.While the natural resource asset audit both confirms and quantifies natural resources,the nature of such resources makes it difficult to identify their ownership.Further,these resources'diversity creates complex measurement standards and activities,all of which require relevant institutional guarantees.However,the existing audit system for natural resource assets includes insufficient stock,incremental difficulties,and poor guidance,which cannot meet the requirements for environmental governance and an ecological civilization.Thus,it is necessary to define natural resource assets’rights and measurement systems and responsibility regulations,among others;construct an auditing participation system,technical regulations,and evaluation criterion for natural resource assets;amend the Audit Law in a timely manner;and enact natural resource asset legislation.Ultimately,such efforts would eliminate the bottleneck in the natural resource asset auditing system and facilitate the construction of a resource-saving,environmentally friendly society.
基金supported by National Natural Science Foundation of China (No. 61572267, No. 61272425, No. 61402245)the Open Project of Co-Innovation Center for Information Supply & Assurance Technology, Anhui University+1 种基金the Open Project of the State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences(No.2017-MS-21, No.2016-MS-23)National Cryptography Development Fund of China (MMJJ20170118)
文摘Identity-based public cloud storage auditing schemes can check the integrity of cloud data, and reduce the complicated certificate management. In such a scheme, one Private Key Generator(PKG) is employed to authenticate the identity and generate private keys for all users, and one Third Party Auditor(TPA) is employed to by users to check the integrity of cloud data. This approach is undesirable for large-scale users since the PKG and the TPA might not be able to afford the heavy workload. To solve the problem, we give a hierarchical Private Key Generator structure for large-scale user groups, in which a root PKG delegates lower-level PKGs to generate private keys and authenticate identities. Based on the proposed structure, we propose an authorized identity-based public cloud storage auditing scheme, in which the lowest-level PKGs play the role of TPA, and only the authorized lowest-level PKGs can represent users in their domains to check cloud data's integrity. Furthermore, we give the formal security analysis and experimental results, which show that our proposed scheme is secure and efficient.
基金This work is supported by the National Key R&D Program of China(2016YFB0800402)partially supported by the National Natural Science Foundation of China under Grant No.61232004and the Fundamental Research Funds for the Central Universities(2016YXMS020).
文摘The security of cloud data has always been a concern.Cloud server provider may maliciously tamper or delete user’s data for their own benefit,so data integrity audit is of great significance to verify whether data is modified or not.Based on the general three-party audit architecture,a dynamic auditing scheme without bilinear pairings is proposed in this paper.It utilizes exponential operation instead of bilinear mapping to verify the validity of evidence.By establishing the mapping relation between logic index and tag index of data block with index transformation table,our scheme can easily support dynamic data operation.By hiding random numbers in the integrity evidence,our scheme can protect users’privacy information.Detailed security analysis shows that our scheme is secure against attacks such as forgery,replaying and substitution.Further experiments demonstrate that our scheme has lower computational overhead.
基金This work was supported in part by the National Natural Science Foundation of China under Grant 62072351in part by the Academy of Finland under Grant 308087,Grant 335262,Grant 345072,and Grant 350464+1 种基金in part by the Open Project of Zhejiang Lab under Grant 2021PD0AB01and in part by the 111 Project under Grant B16037.
文摘With the rapid advancement of cloud computing,cloud storage services have developed rapidly.One issue that has attracted particular attention in such remote storage services is that cloud storage servers are not enough to reliably save and maintain data,which greatly affects users’confidence in purchasing and consuming cloud storage services.Traditional data integrity auditing techniques for cloud data storage are centralized,which faces huge security risks due to single-point-of-failure and vulnerabilities of central auditing servers.Blockchain technology offers a new approach to this problem.Many researchers have endeavored to employ the blockchain for data integrity auditing.Based on the search of relevant papers,we found that existing literature lacks a thorough survey of blockchain-based integrity auditing for cloud data.In this paper,we make an in-depth survey on cloud data integrity auditing based on blockchain.Firstly,we cover essential basic knowledge of integrity auditing for cloud data and blockchain techniques.Then,we propose a series of requirements for evaluating existing Blockchain-based Data Integrity Auditing(BDIA)schemes.Furthermore,we provide a comprehensive review of existing BDIA schemes and evaluate them based on our proposed criteria.Finally,according to our completed review and analysis,we explore some open issues and suggest research directions worthy of further efforts in the future.