scholarly journals Research on Information Security Internal Control Mechanism of Intelligent Electric Grid

Author(s):  
Feng Gao ◽  
Long Qin ◽  
Ying Yang ◽  
Fangfang Dang
2016 ◽  
Vol 11 (1) ◽  
pp. 237
Author(s):  
Kasno Kasno

This article examines the interfaith relation of Muslims and Christians in the process of establishment of churches in Perumahan Non-Dinas TNI Angkatan Laut in Driyorejo Gresik. The article concludes that the real inter-religious relation in Driyorejo is very good. It is characterized by a relationship of mutual respect and tolerance in order to implement the teachings of their respective religions in the area. This relationship functionally indicates that the process of adaptation is very good. The harmony of inter-religious relation contributes to the creation of an orderly and safe society. Social-religious elements can be integrated together to create a solid and unified society. The harmony can be achieved because their religious and cultural values of society emphasize the accommodation and tolerant attitude. The social problems associated with the establishment of churches in the Perumahan indeed could lead to social unrest. Borrowing structural-functionalist theory, it can be stated that systemic balance is likely to change because of the influence of extra system. The public unrest indicates that the system is experiencing instability. However, the social system has an internal control mechanism that can stabilize the system after disorder. In the case of the establishment of churches, the community tend to choose legal approach as a means of controlling or resolving conflict.


2019 ◽  
Vol 9 (10) ◽  
pp. 2085 ◽  
Author(s):  
Muye Pang ◽  
Xiangui Xu ◽  
Biwei Tang ◽  
Kui Xiang ◽  
Zhaojie Ju

Revealing human internal control mechanisms during environmental interaction remains paramount and helpful in solving issues related to human-robot interaction. Muscle reflexes, which can directly and rapidly modify the dynamic behavior of joints, are the fundamental control loops of the Central Nervous System. This study investigates the calf muscle reflex control in the “ankle strategy” for human push-recovery movement. A time-increasing searching method is proposed to evaluate the feasibility of the reflex model in terms of predicting real muscle activations. Constraints with physiological implications are imposed to find the appropriate reflex gains. The experimental results show that the reflex model fits over 90% of the forepart of muscle activation. With the increasing of time, the Variance Accounted For (VAF) values drop to below 80% and reflex gains lose the physiology meaning. By dividing the muscle activation into two parts, the reflex formula is still workable for the rest part, with different gains and lower VAF values. This result may indicate that reflex control could more likely dominate the forepart of the push-recovery motion and an analogous control mechanism is still feasible for the rest of the motion part, with different gains. The proposed method provides an alternative way to obtain the human internal control mechanism desired for human-robot interaction task.


Author(s):  
Gurpreet Dhillon ◽  
Sushma Mishra

This chapter discusses the impact of Sarbanes-Oxley (SOX) Act on corporate information security governance practices. The resultant regulatory intervention forces a company to revisit its internal control structures and assess the nature and scope of its compliance with the law. This chapter reviews the organizational implications emerging from the mandatory compliance with SOX. Industry internal control assessment frameworks, such as COSO and COBIT, are reviewed and their usefulness in ensuring compliance evaluated. Other emergent issues related to IT governance and the general integrity of the enterprise are identified and discussed.


Author(s):  
Engin Meriç

In today's globalised world, internationalisation is an obligation beyond being a choice and it is inevitable for the small and medium-sized accommodation enterprises to take place in this process. Since utilising from global opportunities depends on the protection of themselves from threats, their incomes should be tracked daily, and their internal control mechanism must be strengthened. With this purpose, the study aims to realise the room revenues of SMEs with Main Courante and other unit revenues with DRRs. For the accounting of the revenues Main Courante offset is given place, whereas for the control accounts the daily revenue report offset is preferred. Documents related to income record that can be used in the flow of the process in SMEs have been included. With this method, it is aimed to prevent losses and leaks, provide data flow towards accounting internal control system, sustain competitive advantage and contribute to the internationalization efforts.


2021 ◽  
Vol 11 (1) ◽  
pp. 39-49
Author(s):  
Ign.Novie Endi Nugroho ◽  
Rahmawati Rahmawati ◽  
Bandi Bandi ◽  
Agung Nur Probohudono

This study examines the effect of family end control with a pyramid structure, RPTs disclosure, internal auditors and independent commissioners on related loan tunneling in Indonesia. This study used a sample of 258 public companies listed on the Indonesia Stock Exchange from 2016-2018. This study provides empirical evidence that the final controller of the family with a pyramid structure is proven to practice tunneling through related loans. The next finding of this study is that the level of disclosure of related transactions can reduce the potential for the practice of tunneling related loans. Another important finding is the failure of the internal control mechanism by internal auditors and independent commissioners which is not able to reduce the potential for related loan tunneling practices in family companies in Indonesia.


2021 ◽  
Vol 2021 ◽  
pp. 1-6
Author(s):  
Ran Wei ◽  
Sheng Yao

With the deepening of business informatization, all kinds of business application data are rapidly gathering, which promotes enterprises to enter the era of big data. Enterprises begin to build the concept of big data, deepen the understanding of big data, extract potential data value, and improve the operation ability of enterprises and information systems. At the same time, big data brings internal control information to the system, which is becoming more and more challenging, so enterprises pay more and more attention to the security of the information system. This paper aims to introduce the enterprise financial risk identification and information security management and control under the big data environment and master the enterprise financial risk identification method so that the enterprise can adapt to the needs of the times competition faster and better. This paper introduces the method of identifying financial risk in the background of big data by classifying the methods of financial risk identification and designing the factor model. Through the experimental investigation of the company's financial asset rate, the enterprise financial risk situation is displayed, and the enterprise can improve the internal management to control the financial risk within a certain range. The experimental results show that from 2016 to 2020, the internal control and asset rate of the enterprise affect the financial risk of the enterprise, 82% of the operators only have a reasonable debt structure and sufficient solvency, the operator can operate in a safe state and then maintain a low financial risk, and the operator should also take measures to prevent the occurrence of risk in advance and realize the business goal of maximizing benefits.


Sign in / Sign up

Export Citation Format

Share Document