Do joint audits improve audit quality? Evidence from voluntary joint audits
M Zerni, E Haapamäki, T Järvinen… - European Accounting …, 2012 - Taylor & Francis
This study examines whether the decision to voluntarily (ie without a statutory obligation)
employ two audit firms to conduct a joint audit is related to audit quality. We use separate …
employ two audit firms to conduct a joint audit is related to audit quality. We use separate …
Anonymity meets game theory: secure data integration with malicious participants
Data integration methods enable different data providers to flexibly integrate their expertise
and deliver highly customizable services to their customers. Nonetheless, combining data …
and deliver highly customizable services to their customers. Nonetheless, combining data …
Cryptographic approaches for privacy preservation in location-based services: A survey
E Magkos - Systems approach applications for developments in …, 2012 - igi-global.com
Current research in location-based services (LBSs) highlights the importance of
cryptographic primitives in privacy preservation for LBSs, and presents solutions that attempt …
cryptographic primitives in privacy preservation for LBSs, and presents solutions that attempt …
Multi-party, privacy-preserving distributed data mining using a game theoretic framework
Abstract Analysis of privacy-sensitive data in a multi-party environment often assumes that
the parties are well-behaved and they abide by the protocols. Parties compute whatever is …
the parties are well-behaved and they abide by the protocols. Parties compute whatever is …
Iot privacy-preserving data mining with dynamic incentive mechanism
With the rise of the Internet of Things (IoT), IoT data analytics has gradually step** into the
spotlight of data mining. Existing research has primarily focused on enhancing the precision …
spotlight of data mining. Existing research has primarily focused on enhancing the precision …
Privacy-preserving data analysis on graphs and social networks
Computation............................................... 433 21.7 Conclusion and Future
Work.................................................. 434 References …
Work.................................................. 434 References …
A game theoretic framework for data privacy preservation in recommender systems
We address the fundamental tradeoff between privacy preservation and high-quality
recommendation stemming from a third party. Multiple users submit their ratings to a third …
recommendation stemming from a third party. Multiple users submit their ratings to a third …
Incentive compatible privacy-preserving data analysis
M Kantarcioglu, W Jiang - IEEE transactions on knowledge and …, 2012 - ieeexplore.ieee.org
In many cases, competing parties who have private data may collaboratively conduct privacy-
preserving distributed data analysis (PPDA) tasks to learn beneficial data models or analysis …
preserving distributed data analysis (PPDA) tasks to learn beneficial data models or analysis …
Accurate and large-scale privacy-preserving data mining using the election paradigm
With the proliferation of the Web and ICT technologies there have been concerns about the
handling and use of sensitive information by data mining systems. Recent research has …
handling and use of sensitive information by data mining systems. Recent research has …
Abolition of mandated joint‐audit requirements: Impact on audit reporting lag in an emerging capital market
JLWM Van der Zahn - International Journal of Auditing, 2023 - Wiley Online Library
The study aims to examine how changes in the Kuwait audit market following abolition of
mandated joint‐audit requirements impact audit reporting lag. Analysis tests whether joint …
mandated joint‐audit requirements impact audit reporting lag. Analysis tests whether joint …