In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several ...In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several security-related problems,such as user privacy breaches,data disclosure,data corruption,and so on,during the process of data outsourcing.For addressing and handling the security-related issues on Cloud,several models were proposed.With that concern,this paper develops a Privacy-Preserved Data Security Approach(PP-DSA)to provide the data security and data integrity for the out-sourcing data in Cloud Environment.Privacy preservation is ensured in this work with the Efficient Authentication Technique(EAT)using the Group Signature method that is applied with Third-Party Auditor(TPA).The role of the auditor is to secure the data and guarantee shared data integrity.Additionally,the Cloud Service Provider(CSP)and Data User(DU)can also be the attackers that are to be handled with the EAT.Here,the major objective of the work is to enhance cloud security and thereby,increase Quality of Service(QoS).The results are evaluated based on the model effectiveness,security,and reliability and show that the proposed model provides better results than existing works.展开更多
With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.Th...With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.The best way to enhance traffic flow for vehicles and traffic management departments is to share thedata they receive.There needs to be more protection for the VANET systems.An effective and safe methodof outsourcing is suggested,which reduces computation costs by achieving data security using a homomorphicmapping based on the conjugate operation of matrices.This research proposes a VANET-based data outsourcingsystem to fix the issues.To keep data outsourcing secure,the suggested model takes cryptography models intoaccount.Fog will keep the generated keys for the purpose of vehicle authentication.For controlling and overseeingthe outsourced data while preserving privacy,the suggested approach considers the Trusted Certified Auditor(TCA).Using the secret key,TCA can identify the genuine identity of VANETs when harmful messages aredetected.The proposed model develops a TCA-based unique static vehicle labeling system using cryptography(TCA-USVLC)for secure data outsourcing and privacy preservation in VANETs.The proposed model calculatesthe trust of vehicles in 16 ms for an average of 180 vehicles and achieves 98.6%accuracy for data encryption toprovide security.The proposedmodel achieved 98.5%accuracy in data outsourcing and 98.6%accuracy in privacypreservation in fog-enabled VANETs.Elliptical curve cryptography models can be applied in the future for betterencryption and decryption rates with lightweight cryptography operations.展开更多
The paper is about how Lebanese auditors detect fraud in the course of their work and what they advise companies to implement in order to avoid fraudulent acts. For this purpose, various interviews were carded out fro...The paper is about how Lebanese auditors detect fraud in the course of their work and what they advise companies to implement in order to avoid fraudulent acts. For this purpose, various interviews were carded out from different experienced and well-reputed external auditors. This was also for their wide knowledge of all kinds of frauds. Data were taken from primary as well as secondary resources. The paper presents the theoretical and practical aspects. The theoretical part contains the accounting scandals, frauds, auditing processes, and auditor's responsibilities and tools for auditors to detect fraud. The practical part consists of case study analysis and detailed research processes.展开更多
Against the background of China’s strengthening of finance and accounting supervision,this study examines the practice among listed companies of changing signing auditors at the last minute and explores whether Chine...Against the background of China’s strengthening of finance and accounting supervision,this study examines the practice among listed companies of changing signing auditors at the last minute and explores whether Chinese investors can capture this information in a timely manner.We find that China’s capital market responds significantly negatively to these last-minute changes,implying that investors perceive a potential negative impact of this behavior.Crosssectional analyses suggest that the characteristics of the change event,recent corporate events,and accounting firm capability significantly affect the stock price response.Furthermore,in terms of the individual characteristics of signing auditors,external investors appear to comprehensively consider busyness level,industry experience,and the timing of the change to determine the causes and effects of the auditor change and make different market reactions accordingly.In addition,consistent with investor perceptions,we find that last-minute changes significantly impair the quality of financial statements,indicating that external investors’judgments based on information about changes in signing auditors are rational and effective.展开更多
Identity-based public cloud storage auditing schemes can check the integrity of cloud data, and reduce the complicated certificate management. In such a scheme, one Private Key Generator(PKG) is employed to authentica...Identity-based public cloud storage auditing schemes can check the integrity of cloud data, and reduce the complicated certificate management. In such a scheme, one Private Key Generator(PKG) is employed to authenticate the identity and generate private keys for all users, and one Third Party Auditor(TPA) is employed to by users to check the integrity of cloud data. This approach is undesirable for large-scale users since the PKG and the TPA might not be able to afford the heavy workload. To solve the problem, we give a hierarchical Private Key Generator structure for large-scale user groups, in which a root PKG delegates lower-level PKGs to generate private keys and authenticate identities. Based on the proposed structure, we propose an authorized identity-based public cloud storage auditing scheme, in which the lowest-level PKGs play the role of TPA, and only the authorized lowest-level PKGs can represent users in their domains to check cloud data's integrity. Furthermore, we give the formal security analysis and experimental results, which show that our proposed scheme is secure and efficient.展开更多
Merger and acquisition(M&A)has become an im-portant fashion for corporation to expand the operatingscale.In the course of drawing up the M&A strategy,it’s necessary that a method be adopted to balancesome kin...Merger and acquisition(M&A)has become an im-portant fashion for corporation to expand the operatingscale.In the course of drawing up the M&A strategy,it’s necessary that a method be adopted to balancesome kinds of objectives.Analytic Hierarchy Process(AHP)is the multi-criterion decisional method,whichintegrates qualitative analysis with quantitative analysisto solve the complicated problem.This article intro-duces how to apply AHP to drawing up scientific M&Astrategy.展开更多
The aim of this research is to study the impact of auditor reputation and audit opinion on earnings management in French banks. This article used a sample of 162 French banks over the period from 2005 to 2012. By usin...The aim of this research is to study the impact of auditor reputation and audit opinion on earnings management in French banks. This article used a sample of 162 French banks over the period from 2005 to 2012. By using three different tests (loss-avoidance, just-meeting-or-beating prior year's earnings, and abnormal loan loss provision), the findings of this paper show that both high auditor reputation and qualified audit opinion constrain earnings management to avoid loss or to just meet or beat prior year's earnings in banks. In separate tests related to earnings management through abnormal loan loss provisions, the paper also finds that high auditor reputation constrains earnings management. Qualified audit opinion has a negative but non-significant effect on abnormal loan loss provisions.展开更多
文中针对多媒体及广告(Multimedia and Advertisement)系统的功能需求,研究分析了基于应用的M&A系统存在的问题,结合SaaS技术和Web环境的特点,建立了一个基于SaaS的M&A系统体系框架。在此基础上,给出了七层结构设计和服务设计,...文中针对多媒体及广告(Multimedia and Advertisement)系统的功能需求,研究分析了基于应用的M&A系统存在的问题,结合SaaS技术和Web环境的特点,建立了一个基于SaaS的M&A系统体系框架。在此基础上,给出了七层结构设计和服务设计,以及部署方式定义。实现结果表明,新系统具有服务灵活、降低成本、易于维护等明显特点。展开更多
This thesis aims at studying the cultural integration of M&A enterprises,mainly involved with the manifesta-tion,process,type,method,risk and countermeasures of cultural integration in M&A enterprises.It inten...This thesis aims at studying the cultural integration of M&A enterprises,mainly involved with the manifesta-tion,process,type,method,risk and countermeasures of cultural integration in M&A enterprises.It intends to provide a complete set of management and operation sys-tem on cultural integration for M&A enterprises.Keywords:cultural integration,M&A(merger and acquisi-tion).展开更多
This paper constructs a model on the factors that influence knowledge transfer in mergers and acquisitions(M&A) and validates it via questionnaire surveys. Using 125valid collected questionnaires, multiple linear ...This paper constructs a model on the factors that influence knowledge transfer in mergers and acquisitions(M&A) and validates it via questionnaire surveys. Using 125valid collected questionnaires, multiple linear regression analysis and hierarchical regression analysis showed that five out of the ten factors had a positive effect on knowledge transfer effect. The ranking of factor importance, from high to low, was knowledge explicitness, relationship quality, learning intent, advanced transfer activities, and learning capability, which is fairly consistent with positive factors observed in other interorganizational knowledge transfer researches. Our results also showed that one of the control variables(size of acquired firm) had neither a direct or indirect effect on knowledge transfer in M&A. Additionally, our research found that knowledge distance and degree of M&A integration had a positive influence on knowledge transfer effect at the early stage after M&A, but had a negative influence at the late stage. Based on this research, several suggestions for knowledge transfer in M&A are proposed.展开更多
This study provides some insights of investors' view on auditor independence focusing on auditor switching. Hence, the purpose of this study is to examine the effect of appointing a new auditor on investors' reliabi...This study provides some insights of investors' view on auditor independence focusing on auditor switching. Hence, the purpose of this study is to examine the effect of appointing a new auditor on investors' reliability on reported earnings in financial accounts. Analyses are based on a matched-pair sample of 162 listed companies in the Bursa Malaysia for the year 2011. The results of the ordinary least squares (OLS) regression show that earnings response coefficients for auditor switching companies are significantly higher than for non-auditor switching companies. The results provide support for the contention that investors place greater reliability on the financial accounts audited by newly appointed auditors. This finding is consistent with the Malaysian audit market where long audit tenure is a common practice and auditor switching is considered rare. Findings provide support for the long discussed issue of the importance of auditor rotation in maintaining auditor independence.展开更多
文摘In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several security-related problems,such as user privacy breaches,data disclosure,data corruption,and so on,during the process of data outsourcing.For addressing and handling the security-related issues on Cloud,several models were proposed.With that concern,this paper develops a Privacy-Preserved Data Security Approach(PP-DSA)to provide the data security and data integrity for the out-sourcing data in Cloud Environment.Privacy preservation is ensured in this work with the Efficient Authentication Technique(EAT)using the Group Signature method that is applied with Third-Party Auditor(TPA).The role of the auditor is to secure the data and guarantee shared data integrity.Additionally,the Cloud Service Provider(CSP)and Data User(DU)can also be the attackers that are to be handled with the EAT.Here,the major objective of the work is to enhance cloud security and thereby,increase Quality of Service(QoS).The results are evaluated based on the model effectiveness,security,and reliability and show that the proposed model provides better results than existing works.
文摘With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.The best way to enhance traffic flow for vehicles and traffic management departments is to share thedata they receive.There needs to be more protection for the VANET systems.An effective and safe methodof outsourcing is suggested,which reduces computation costs by achieving data security using a homomorphicmapping based on the conjugate operation of matrices.This research proposes a VANET-based data outsourcingsystem to fix the issues.To keep data outsourcing secure,the suggested model takes cryptography models intoaccount.Fog will keep the generated keys for the purpose of vehicle authentication.For controlling and overseeingthe outsourced data while preserving privacy,the suggested approach considers the Trusted Certified Auditor(TCA).Using the secret key,TCA can identify the genuine identity of VANETs when harmful messages aredetected.The proposed model develops a TCA-based unique static vehicle labeling system using cryptography(TCA-USVLC)for secure data outsourcing and privacy preservation in VANETs.The proposed model calculatesthe trust of vehicles in 16 ms for an average of 180 vehicles and achieves 98.6%accuracy for data encryption toprovide security.The proposedmodel achieved 98.5%accuracy in data outsourcing and 98.6%accuracy in privacypreservation in fog-enabled VANETs.Elliptical curve cryptography models can be applied in the future for betterencryption and decryption rates with lightweight cryptography operations.
文摘The paper is about how Lebanese auditors detect fraud in the course of their work and what they advise companies to implement in order to avoid fraudulent acts. For this purpose, various interviews were carded out from different experienced and well-reputed external auditors. This was also for their wide knowledge of all kinds of frauds. Data were taken from primary as well as secondary resources. The paper presents the theoretical and practical aspects. The theoretical part contains the accounting scandals, frauds, auditing processes, and auditor's responsibilities and tools for auditors to detect fraud. The practical part consists of case study analysis and detailed research processes.
基金support from the National Natural Science Foundation of China(Grants No.72362023 and No.72062020)Social Science Foundation for Youth of Jiangxi Province(Grant No.23GL31)Jiangxi University of Finance and Economics“Class A”Discipline Innovation Team(Capital Market Financial Behavior Innovation Team).
文摘Against the background of China’s strengthening of finance and accounting supervision,this study examines the practice among listed companies of changing signing auditors at the last minute and explores whether Chinese investors can capture this information in a timely manner.We find that China’s capital market responds significantly negatively to these last-minute changes,implying that investors perceive a potential negative impact of this behavior.Crosssectional analyses suggest that the characteristics of the change event,recent corporate events,and accounting firm capability significantly affect the stock price response.Furthermore,in terms of the individual characteristics of signing auditors,external investors appear to comprehensively consider busyness level,industry experience,and the timing of the change to determine the causes and effects of the auditor change and make different market reactions accordingly.In addition,consistent with investor perceptions,we find that last-minute changes significantly impair the quality of financial statements,indicating that external investors’judgments based on information about changes in signing auditors are rational and effective.
基金supported by National Natural Science Foundation of China (No. 61572267, No. 61272425, No. 61402245)the Open Project of Co-Innovation Center for Information Supply & Assurance Technology, Anhui University+1 种基金the Open Project of the State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences(No.2017-MS-21, No.2016-MS-23)National Cryptography Development Fund of China (MMJJ20170118)
文摘Identity-based public cloud storage auditing schemes can check the integrity of cloud data, and reduce the complicated certificate management. In such a scheme, one Private Key Generator(PKG) is employed to authenticate the identity and generate private keys for all users, and one Third Party Auditor(TPA) is employed to by users to check the integrity of cloud data. This approach is undesirable for large-scale users since the PKG and the TPA might not be able to afford the heavy workload. To solve the problem, we give a hierarchical Private Key Generator structure for large-scale user groups, in which a root PKG delegates lower-level PKGs to generate private keys and authenticate identities. Based on the proposed structure, we propose an authorized identity-based public cloud storage auditing scheme, in which the lowest-level PKGs play the role of TPA, and only the authorized lowest-level PKGs can represent users in their domains to check cloud data's integrity. Furthermore, we give the formal security analysis and experimental results, which show that our proposed scheme is secure and efficient.
文摘Merger and acquisition(M&A)has become an im-portant fashion for corporation to expand the operatingscale.In the course of drawing up the M&A strategy,it’s necessary that a method be adopted to balancesome kinds of objectives.Analytic Hierarchy Process(AHP)is the multi-criterion decisional method,whichintegrates qualitative analysis with quantitative analysisto solve the complicated problem.This article intro-duces how to apply AHP to drawing up scientific M&Astrategy.
文摘The aim of this research is to study the impact of auditor reputation and audit opinion on earnings management in French banks. This article used a sample of 162 French banks over the period from 2005 to 2012. By using three different tests (loss-avoidance, just-meeting-or-beating prior year's earnings, and abnormal loan loss provision), the findings of this paper show that both high auditor reputation and qualified audit opinion constrain earnings management to avoid loss or to just meet or beat prior year's earnings in banks. In separate tests related to earnings management through abnormal loan loss provisions, the paper also finds that high auditor reputation constrains earnings management. Qualified audit opinion has a negative but non-significant effect on abnormal loan loss provisions.
文摘文中针对多媒体及广告(Multimedia and Advertisement)系统的功能需求,研究分析了基于应用的M&A系统存在的问题,结合SaaS技术和Web环境的特点,建立了一个基于SaaS的M&A系统体系框架。在此基础上,给出了七层结构设计和服务设计,以及部署方式定义。实现结果表明,新系统具有服务灵活、降低成本、易于维护等明显特点。
文摘This thesis aims at studying the cultural integration of M&A enterprises,mainly involved with the manifesta-tion,process,type,method,risk and countermeasures of cultural integration in M&A enterprises.It intends to provide a complete set of management and operation sys-tem on cultural integration for M&A enterprises.Keywords:cultural integration,M&A(merger and acquisi-tion).
基金supported by the National Planning Office of Philosophy and Social Science(Grant No.07BTQ011)
文摘This paper constructs a model on the factors that influence knowledge transfer in mergers and acquisitions(M&A) and validates it via questionnaire surveys. Using 125valid collected questionnaires, multiple linear regression analysis and hierarchical regression analysis showed that five out of the ten factors had a positive effect on knowledge transfer effect. The ranking of factor importance, from high to low, was knowledge explicitness, relationship quality, learning intent, advanced transfer activities, and learning capability, which is fairly consistent with positive factors observed in other interorganizational knowledge transfer researches. Our results also showed that one of the control variables(size of acquired firm) had neither a direct or indirect effect on knowledge transfer in M&A. Additionally, our research found that knowledge distance and degree of M&A integration had a positive influence on knowledge transfer effect at the early stage after M&A, but had a negative influence at the late stage. Based on this research, several suggestions for knowledge transfer in M&A are proposed.
文摘This study provides some insights of investors' view on auditor independence focusing on auditor switching. Hence, the purpose of this study is to examine the effect of appointing a new auditor on investors' reliability on reported earnings in financial accounts. Analyses are based on a matched-pair sample of 162 listed companies in the Bursa Malaysia for the year 2011. The results of the ordinary least squares (OLS) regression show that earnings response coefficients for auditor switching companies are significantly higher than for non-auditor switching companies. The results provide support for the contention that investors place greater reliability on the financial accounts audited by newly appointed auditors. This finding is consistent with the Malaysian audit market where long audit tenure is a common practice and auditor switching is considered rare. Findings provide support for the long discussed issue of the importance of auditor rotation in maintaining auditor independence.