|
|
|
Kusharyanti Kusharyanti
There are some factors considered to have an effect on the audit fee amount. These are importantfor the researchers to analyze. This research aimed to test the determinants of auditfee in companies that are listed on Indonesian Stock Exchange (ISE). The ...
ver más
|
|
|
|
|
|
|
Andik Setyono,Md. Jahangir Alam,C. Eswaran
Pág. pp. 25 - 32
Limitation of message size of the MMS technology is one of the important factors which make this technology less attractive. This limitation restricts the system developers in developing new mobile applications using MMS technology. This research attemp...
ver más
|
|
|
|
|
|
|
Novi Darmayanti
Pág. 237 - 248
The issue of Auditor Independence, the most frequently, makes the debate of auditor rotation. This auditor rotation is related to the company activity for doing auditor switching. Some previous studies showed that switching auditors leads to the various ...
ver más
|
|
|
|
|
|
|
Adnan Enshassi, Mohan Kumaraswamy, Sami Nairab
Pág. Page 161 - 214
Both the bid decision and the determination of the bid price are very important to every contractor. The importance of such decisions lies in the fact that, the success or failure of a contractor?s business depends on the outcomes derived from these deci...
ver más
|
|
|
|
|
|
|
Prem Lal Joshi,Ashutosh Deshmukh,Jamel Azibi
Pág. 25 - 35
This paper examines the association between audit fees and attributes of internal audit (IA), audit committee (AC), as measured by independence and financial expertise, as well as characteristics of the firm. The determinants of audit fees have been exte...
ver más
|
|
|
|
|
|
|
Cliff Oliver Winoto,Senny Harindahyani
Pág. in press
Audit failure practices have been the headlines in the past decade. At the same time, auditing is associated with high stress and over-timed work. However, a concern regarding the importance of audit quality rises nowadays. This research aims to find the...
ver más
|
|
|
|
|
|
|
Basma Badawi Hathout,Samy Ghoniemy,Osman Ibrahim
Pág. pp. 6 - 23
In spite of all the advantages delivered by cloud computing, several challenges are hindering the migration of customer software and data into the cloud. On top of the list is the security and privacy concerns arising from the storage and processing of s...
ver más
|
|
|
|
|
|
|
André Tchoia Relógio and Fernando Oliveira Tavares
This study aimed to investigate the level of client satisfaction among airline passengers and other users of Huambo?s airport in Angola. A quantitative method was used, based on a questionnaire addressed to airline passengers on their trips to Huambo and...
ver más
|
|
|
|
|
|
|
Bee Lan Oo, Teck Heng Benson Lim and Goran Runeson
Given that project selection is a vital and recurring strategic decision for construction firms, there is a sizeable collection of studies that examine the factors affecting contractors? decision to bid (d2b). With the aim to provide a global perspective...
ver más
|
|
|
|
|
|
|
Rong Zhao, Tinghua Ai and Chen Wen
With the rapid development of the internet and information technology, visualization techniques for mobile and interactive web maps have developed different requirements. Small screens make it difficult to simultaneously present information details and t...
ver más
|
|
|
|
|
|
|
Tuba PARLAR,Songül Kakilli ACARAVCI
Pág. 692 - 696
Collection of customer information is seen necessary for development of the marketing strategies. Developing technologies are used very effectively in bank marketing campaigns as in many field of life. Customer data is stored electronically and the size ...
ver más
|
|
|
|
|
|
|
Takuma Kawamura,Tomoyuki Noda,Yasuhiro Idomura
Pág. 43 - 54
We examine the performance of the in-situ data exploration framework based on the in-situ Particle Based Volume Rendering (In-Situ PBVR) on the latest many-core platform. In-Situ PBVR converts extreme scale volume data into small rendering primitive part...
ver más
|
|
|
|
|
|
|
Joris Sansen, Gaëlle Richer, Timothée Jourde, Frédéric Lalanne, David Auber and Romain Bourqui
The increase of data collection in various domains calls for an adaptation of methods of visualization to tackle magnitudes exceeding the number of available pixels on screens and challenging interactivity. This growth of datasets size has been supported...
ver más
|
|
|
|
|
|
|
Shamharir Abidin,Ishaku Vandi Ishaya,Mohamad Naimi M-Nor
Pág. 77 - 80
The purpose of this study is to examine the association between corporate governance and the propensity of auditor switching. In particular, the study seeks to investigate whether board independence and Chairman-CEO duality, influence the auditor-client ...
ver más
|
|
|
|
|
|
|
Therese Eriksson
Pág. 4 - 18
General management research has increasingly recognised the significance of routines in organisational performance. Among organisational tasks, megaprojects depend more on routines selected and created within the project than standard, small-scale projec...
ver más
|
|
|
|
|
|
|
Therese Eriksson
Pág. 4 - 18
General management research has increasingly recognised the significance of routines in organisational performance. Among organisational tasks, megaprojects depend more on routines selected and created within the project than standard, small-scale projec...
ver más
|
|
|
|
|
|
|
Andreas Wibowo,Wahyu Wuryanti
Pág. pp. 70 - 76
The desired accuracy level of an estimate heavily relies on the availability of data and information at the time of preparing the estimate. However, an estimate often must be made when data and information are not complete. At earlier stages of project i...
ver más
|
|
|
|
|
|
|
Mitsuhiro Ozaki, Jagannath Aryal and Paul Fox-Hughes
Wildfire, a natural part of many ecosystems, has also resulted in significant disasters impacting ecology and human life in Australia. This study proposes a prototype of fire propagation prediction as an extension of preceding research; this system is ca...
ver más
|
|
|
|
|
|
|
Sheeraz Ahmed, Zahoor Ali Khan, Syed Muhammad Mohsin, Shahid Latif, Sheraz Aslam, Hana Mujlid, Muhammad Adil and Zeeshan Najam
Distributed denial of service (DDoS) attacks pose an increasing threat to businesses and government agencies. They harm internet businesses, limit access to information and services, and damage corporate brands. Attackers use application layer DDoS attac...
ver más
|
|
|
|
|
|
|
Eirini Liotou, Dionysis Xenakis, Vasiliki Georgara, Georgios Kourouniotis and Lazaros Merakos
Dynamic Adaptive Streaming over HTTP (DASH) has prevailed as the dominant way of video transmission over the Internet. This technology is based on receiving small sequential video segments from a server. However, one challenge that has not been adequatel...
ver más
|
|
|
|