Do joint audits improve audit quality? Evidence from voluntary joint audits

M Zerni, E Haapamäki, T Järvinen… - European Accounting …, 2012 - Taylor & Francis
This study examines whether the decision to voluntarily (ie without a statutory obligation)
employ two audit firms to conduct a joint audit is related to audit quality. We use separate …

Anonymity meets game theory: secure data integration with malicious participants

N Mohammed, BCM Fung, M Debbabi - The VLDB Journal, 2011 - Springer
Data integration methods enable different data providers to flexibly integrate their expertise
and deliver highly customizable services to their customers. Nonetheless, combining data …

Cryptographic approaches for privacy preservation in location-based services: A survey

E Magkos - Systems approach applications for developments in …, 2012 - igi-global.com
Current research in location-based services (LBSs) highlights the importance of
cryptographic primitives in privacy preservation for LBSs, and presents solutions that attempt …

Multi-party, privacy-preserving distributed data mining using a game theoretic framework

H Kargupta, K Das, K Liu - … Discovery in Databases: PKDD 2007: 11th …, 2007 - Springer
Abstract Analysis of privacy-sensitive data in a multi-party environment often assumes that
the parties are well-behaved and they abide by the protocols. Parties compute whatever is …

Iot privacy-preserving data mining with dynamic incentive mechanism

Y Gao, L Chen, J Han, G Wu… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the rise of the Internet of Things (IoT), IoT data analytics has gradually step** into the
spotlight of data mining. Existing research has primarily focused on enhancing the precision …

Privacy-preserving data analysis on graphs and social networks

K Liu, K Das, T Grandison… - Next generation of data …, 2008 - taylorfrancis.com
Computation............................................... 433 21.7 Conclusion and Future
Work.................................................. 434 References …

A game theoretic framework for data privacy preservation in recommender systems

M Halkidi, I Koutsopoulos - … PKDD 2011, Athens, Greece, September 5-9 …, 2011 - Springer
We address the fundamental tradeoff between privacy preservation and high-quality
recommendation stemming from a third party. Multiple users submit their ratings to a third …

Incentive compatible privacy-preserving data analysis

M Kantarcioglu, W Jiang - IEEE transactions on knowledge and …, 2012 - ieeexplore.ieee.org
In many cases, competing parties who have private data may collaboratively conduct privacy-
preserving distributed data analysis (PPDA) tasks to learn beneficial data models or analysis …

Accurate and large-scale privacy-preserving data mining using the election paradigm

E Magkos, M Maragoudakis, V Chrissikopoulos… - Data & Knowledge …, 2009 - Elsevier
With the proliferation of the Web and ICT technologies there have been concerns about the
handling and use of sensitive information by data mining systems. Recent research has …

Abolition of mandated joint‐audit requirements: Impact on audit reporting lag in an emerging capital market

JLWM Van der Zahn - International Journal of Auditing, 2023 - Wiley Online Library
The study aims to examine how changes in the Kuwait audit market following abolition of
mandated joint‐audit requirements impact audit reporting lag. Analysis tests whether joint …