大数据、云计算技术与审计外文文献翻译最新译文

大数据、云计算技术与审计外文文献翻译最新译文
大数据、云计算技术与审计外文文献翻译最新译文

毕业设计附件

外文文献翻译:原文+译文

文献出处:Chaudhuri S. Big data,cloud computing technology and the audit[J]. IT Professional Magazine, 2016, 2(4): 38-51.

原文

Big data,cloud computing technology and the audit

Chaudhuri S

Abstract

At present, large data along with the development of cloud computing technology, is a significant impact on global economic and social life. Big data and cloud computing technology to modern audit provides a new technology and method of auditing organizations and audit personnel to grasp the big data, content and characteristics of cloud computing technology, to promote the further development of the modern audit technology and method.

Keywords: big data, cloud computing technology, audit, advice

1 Related concept

1.1 Large data

The word "data" (data) is the meaning of "known" in Latin, can also be interpreted as "fact”. In 2009, the concept of “big data” gradually begins to spread in society. The concept of "big data" truly become popular, it is because the Obama administration in 2012 high-profile announced its "big data research and development plan”. It marks the era of "big data" really began to enter the social economic life.” Big data" (big data), or "huge amounts of data, refers to the amount of data involved too big to use the current mainstream software tools, in a certain period of time to realize collection, analysis, processing, or converted to help decision-makers decision-making information available. Internet data center (IDC) said "big data" is for the sake of more economical, more efficient from high frequency, large capacity, different structures and types of data to derive value and design of a new generation of architecture and technology, and use it to describe and define the information explosion times produce huge amounts of data, and name the related technology development and innovation. Big data has four characteristics: first, the data volume is huge, jumped from TB level to the level of PB.Second, processing speed, the traditional

data mining technology are fundamentally different. Third, many data types’pictures, location information, video, web logs, and other forms. Fourth, the value of low density, high commercial value.

1.2 Cloud computing

"Cloud computing" concept was created in large Internet companies such as Google and IBM handle huge amounts of data in practice. On August 9, 2006, Google CEO Eric Schmidt (Eric Schmidt) in the search engine assembly for the first time put forward the concept of "cloud computing”. In October 2007, Google and IBM began in the United States university campus to promote cloud computing technology plan, the project hope to reduce the cost of distributed computing technology in academic research, and provide the related hardware and software equipment for these universities and technical support (Michael Mille, 2009).The world there are many about the definition of "cloud computing”.” Cloud computing" is the increase of the related services based on Internet, use and delivery mode, is through the Internet to provide dynamic easy extension and often virtualized resources. American national standards institute of technology (NIST) in 2009 about cloud computing is defined as: "cloud computing is a kind of pay by usage pattern, this pattern provides available, convenient, on-demand network access, enter the configurable computing resources Shared pool resources (including network, servers, storage, applications, services, etc.), these resources can be quick to provide, just in the management of the very few and or little interaction with service providers."

1.3 The relationship between big data and cloud computing

Overall, big data and cloud computing are complementary to each other. Big data mainly focus on the actual business, focus on "data", provide the technology and methods of data collection, mining and analysis, and emphasizes the data storage capacity. Cloud computing focuses on "computing", pay attention to IT infrastructure, providing IT solutions, emphasizes the ability to calculate, the data processing ability. If there is no large data storage of data, so the cloud computing ability strong again, also hard to find a place; If there is no cloud computing ability of data processing, the big data storage of data rich again, and ultimately, used in practice. From a technical point of view, large data relies on the cloud computing. Huge amounts of data storage technology, massive data management technology, graphs programming model is the key technology of cloud computing, are also big data technology base. And the data will be "big", the

most important is the technology provided by the cloud computing platform. After the data is on the "cloud", broke the past their segmentation of data storage, more easy to collect and obtain, big data to present in front of people. From the focus, the emphasis of the big data and cloud computing. The emphasis of the big data is all sorts of data, broad, deep huge amounts of data mining, found in the data value, forcing companies to shift from "business-driven" for "data driven”. And the cloud is mainly through the Internet, extension, and widely available computing and storage resources and capabilities, its emphasis is IT resources, processing capacity and a variety of applications, to help enterprises save IT deployment costs. Cloud computing the benefits of the IT department in enterprise, and big data benefit enterprise business management department.

2 Big data and cloud computing technology analysis of the influence of the audit

2.1 Big data and cloud computing technology promote the development of continuous audit mode

In traditional audit, the auditor only after completion of the audited business audit, and audit process is not audit all data and information, just take some part of the audit. This after the event, and limited audit on the audited complex production and business operation and management system is difficult to make the right evaluation in time, and for the evaluation of increasingly frequent and complex operation and management activities of the authenticity and legitimacy is too slow. Along with the rapid development of information technology, more and more audit organization began to implement continuous audit way, to solve the problem of the time difference between audit results and economic activity. However, auditors for audit, often limited by current business conditions and information technology means, the unstructured data to digital, or related detail data cannot be obtained, the causes to question the judgment of the are no specific further and deeper. And big data and cloud computing technology can promote the development of continuous audit mode, make the information technology and big data and cloud computing technology is better, especially for the business data and risk control "real time" to demand higher specific industry, such as banking, securities, insurance industry, the continuous audit in these industries is imminent.

2.2 Big data and cloud computing technology to promote the application of overall audit mode

The current audit mode is based on the evaluation of audit risk to implement sampling audit. In impossible to collect and analyze the audited all economic business data, the current audit mode

mainly depends on the audit sampling, from the perspective of the local inference as a whole, namely to extract the samples from working on the audit, and then deduced the whole situation of the audit object. The sampling audit mode, due to the limited sample drawn, and ignored the many and the specific business activity, the auditors cannot find and reveal the audited major fraud, hidden significant audit risks. Big data and cloud computing technology for the auditor, is not only a technical means are available, the technology and method will provide the auditor with the feasibility of implementing overall audit mode. Using big data and cloud computing technology, cross-industry, across the enterprise to collect and analysis of the data, can need not random sampling method, and use to collect and analyze all the data of general audit mode. Use of big data and cloud computing technology overall audit mode is to analyze all the data related to the audit object allows the auditor to establish overall audit of the thinking mode; can make the modern audit for revolutionary change. Auditors to implement overall audit mode, can avoid audit sampling risk. If could gather all the data in general, you can see more subtle and in-depth information, deep analysis of the data in multiple perspectives, to discover the hidden details in the data information of value to the audit problem. At the same time, the auditor implement overall audit mode, can be found from the audit sampling mode can find problems.

2.3 Big data and cloud computing technology for integrated application of the audit results

At present, the auditor audit results is mainly provided to the audit report of the audited, its format is fixed, single content, contains less information. As the big data and cloud computing technology is widely used in the audit, the auditor audit results in addition to the audit report, and in the process of audit collection, mining, analysis and processing of large amounts of information and data, can be provided to the audited to improve management, promote the integrated application of the audit results, improve the comprehensive application effect of the audit results. First of all, the auditor in the audit to obtain large amounts of data and related information of summary and induction, financial, business and find the inner rules of operation and management etc, common problems and development trend, through the summary induces a macroscopic and comprehensive strong audit information, to provide investors and other stakeholders audited data prove that, correlation analysis and decision making Suggestions, thus promoting the improvement of the audited management level. Second, auditors by using big data and cloud computing technology can be the same problem in different category analysis and processing, from a different

Angle and different level of integration of refining to satisfy the needs of different levels. Again, the auditor will audit results for intelligent retained, by big data and cloud computing technology, to regulation and curing the problem in the system, in order to calculate or determine the problem developing trend, an early warning of the auditees.

3 Big data and cloud computing technology promote the relationship between the applications of evidence

Auditors in the audit process should be based on sufficient and appropriate audit evidence audit opinion, and issue the audit report. However, under the big data and cloud computing environment, auditors are faced with both a huge amount data screening test, and facing the challenge of collecting appropriate audit evidence. Auditors when collecting audit evidence, the traditional thinking path is to collect audit evidence, based on the causal relationship between the big data analysis will be more use of correlation analysis to gather and found that the audit evidence. But from the perspective of audit evidence found, because of big data technology provides an unprecedented interdisciplinary, quantitative dimensions available, made a lot of relevant information to the audit records and analysis. Big data and cloud computing technology has not changed the causal relationship between things, but in the big data and cloud computing technology the development and use of correlation, makes the analysis of data dependence on causal logic relationship is reduced, and even more inclined to application based on the analysis of correlation data, on the basis of correlation analysis of data validation is large, one of the important characteristics of cloud computing technology. In the big data and cloud computing environment, the auditor can collect audit evidence are mostly electronic evidence. Electronic evidence itself is very complex, and cloud computing technology makes it more difficult to obtain evidence of the causal. Auditors should collect from long-term dependence on cause and effect and found that the audit evidence, into a correlation is used to collect and found that the audit evidence.

译文

大数据、云计算技术与审计

Chaudhuri S

摘要

目前,大数据伴随着云计算技术的发展,正在对全球经济社会生活产生巨大的影响。大数据、云计算技术给现代审计提供了新的技术和方法,要求审计组织和审计人员把握大数据、云计算技术的内容与特征,促进现代审计技术和方法的进一步发展。

关键词:大数据,云计算技术,审计,建议

1 相关概念

1.1 大数据

“数据”( data) 这个词在拉丁文里是“已知”的意思,也可以理解为“事实”。2009 年,“大数据”概念才逐渐开始在社会上传播。而“大数据”概念真正变得火爆,却是因为美国奥巴马政府在2012 年高调宣布了其“大数据研究和开发计划”。这标志着“大数据”时代真正开始进入社会经济生活中来了。“大数据”( big data) ,或称巨量资料,指的是所涉及的数据量规模大到无法利用现行主流软件工具,在一定的时间内实现收集、分析、处理或转化成为帮助决策者决策的可用信息。互联网数据中心( IDC)认为“大数据”是为了更经济、更有效地从高频率、大容量、不同结构和类型的数据中获取价值而设计的新一代架构和技术,用它来描述和定义信息爆炸时代产生的海量数据,并命名与之相关的技术发展与创新。大数据具有4 个特点: 第一,数据体量巨大,从TB 级别跃升到PB 级别。第二,处理速度快,这与传统的数据挖掘技术有着本质的不同。第三,数据种类多有图片、地理位置信息、视频、网络日志等多种形式。第四,价值密度低,商业价值高。

1.2 云计算

“云计算”概念产生于谷歌和IBM 等大型互联网公司处理海量数据的实践。2006 年8 月9 日,Google首席执行官埃里克·施密特( Eric Schmidt) 在搜索引擎大会首次提出“云计算”的概念。2007 年10 月,Google 与IBM 开始在美国大学校园推广云计算技术的计划,这项计划希望能降低分布式计算技术在学术研究方面的成本,并为这些大学提供相关的软硬件设备及技术支持( Michael Mille,2009) 。目前全世界关于“云计算”的定义有很多。“云计算”是基于互联网的相关服务的增加、使用和交付模式,是通过互联网来提供动态易扩展且经常是虚拟化的资源。美国国家标准技术研究院( NIST) 2009年关于云计算的定义是: “云计算是一种按使用量付费的模式,这种模式提供可用的、便捷的、按需的网络访问,进入可配置的计算资源共享池( 资源包括网络、服务器、存储、应用软件、服务等) ,这些资源能够被快速提供,只需投入很少的管理工作,或与服务供应商进行很少的交互。”

1.3 大数据与云计算的关系(完整译文请到百度文库)

从整体上看,大数据与云计算是相辅相成的。大数据主要专注实际业务,着眼于“数据”,提供数据采集、挖掘、分析的技术和方法,强调的是数据存储能力。云计算主要关注“计算”,关注IT 架构,提供IT 解决方案,强调的是计算能力,即数据处理能力。如果没有大数据的数据存储,那么云计算的计算能力再强大,也难以找到用武之地; 如果没有云计算的数据处理能力,则大数据的数据存储再丰富,也终究难以用于实践中去。从技术上看,大数据依赖于云计算。海量数据存储技术、海量数据管理技术、MapReduce 编程模型都是云计算的关键技术,也都是大数据的技术基础。而数据之所以会变“大”,最重要的便是云计算提供的技术平台。数据被放到“云”上之后,打破了过去那种各自分割的数据存储,更容易被收集和获得,大数据才能呈现在人们眼前。从侧重点看,大数据与云计算的侧重点不同。大数据的侧重点是各种数据,广泛、深入挖掘巨量数据,发现数据中的价值,迫使企业从“业务驱动”转变为“数据驱动”。而云计算主要通过互联网广泛获取、扩展和管理计算及存储资源和能力,其侧重点是IT 资源、处理能力和各种应用,以帮助企业节省IT部署成本。云计算使企业的IT 部门受益,而大数据使企业的业务管理部门受益。

2大数据、云计算技术对审计的影响分析

2.1 大数据、云计算技术促进持续审计方式的发展

传统审计中,审计人员只是在被审计单位业务完成后才进行审计,而且审计过程中并不是审计所有的数据和信息,只是抽取其中有的一部分进行审计。这种事后和有限的审计对被审计单位复杂的生产经营和管理系统来说很难及时做出正确的评价,而且对于评价日益频繁和复杂的经营管理活动的真实性和合法性则显得过于迟缓。随着信息技术迅速发展,越来越多的审计组织对被审计单位开始实施持续审计方式,以解决审计结果与经济活动的时差问题。但是,审计人员实施持续审计时,往往受目前业务条件和信息化手段的限制,取得的非结构化数据无法数据化,或者无法取得相关的明细数据,致使对问题的判断也难以进一步具体和深入。而大数据、云计算技术可以促进持续审计方式的发展,使信息技术与大数据、云计算技术较好交叉融合,尤其对业务数据和风险控制“实时性”要求较高的特定行业,如银行、证券、保险等行业,在这些行业中实施持续审计迫在眉睫。

2.2大数据、云计算技术促进总体审计模式的应用

现时的审计模式是在评价被审计单位风险基础上实施抽样审计。在不可能收集和分析被审计单位全部经济业务数据的情况下,现时的审计模式主要依赖于审计抽样,从局部入手推断整体,即从抽取的样本着手进行审计,再据此推断审计对象的整体情况。这种抽样审计模式,由于抽取样本的有限性,而忽视了大量和具体的业务活动,使审计人员无法完全发现和

外文文献翻译,好的外文文献这里找

香港科技大学图书馆Dspace https://www.360docs.net/doc/627357205.html,t.hk/dspace 包括香港科技大学的学术论文、学位论文、研究报告等内容,均可免费获取全文。 Openj-gate https://www.360docs.net/doc/627357205.html,/ 提供4350种开放获取的期刊的数百万期刊全文文献。 加利福尼亚大学国际和区域数字馆藏 https://www.360docs.net/doc/627357205.html,/escholarship/ 加利福尼亚大学国际和区域数字馆藏研究项目。eScholarshipRepository主要提供已出版的期刊论文、未出版的研究手稿、会议文献以及其他连接出版物上的文章1万多篇,均可免费阅读。 剑桥大学机构知识库 https://www.360docs.net/doc/627357205.html,/ 由Cambridge University Library和University Computing Service维护,提供剑桥大学相关的期刊、学术论文、学位论文等电子资源。 发展中国家联合期刊库 https://www.360docs.net/doc/627357205.html,.br/ 非营利的电子出版物服务机构,提供来自发展中国家(如巴西、古巴、印度、印尼、肯尼亚、南非、乌干达、津巴布韦等)的开放获取的多种期刊的全文。 美国密西根大学论文库 https://www.360docs.net/doc/627357205.html,/index.jsp 美国密西根大学论文库2万多篇期刊论文、技术报告、评论等文献全文。包含艺术学、生物学、社会科学、资源环境学等学科的相关论文,另还有博硕士论文。标识为OPEN的可以打开全文。 jfg CERN Document Server http://cdsweb.cern.ch/ 主要覆盖物理学(particle physics)及相关学科,提供360,000多篇全文文献,包括预印文献、期刊论文、图书、图片、学位论文等等。 kl ArXiv https://www.360docs.net/doc/627357205.html,/ ArXiv是属于Cornell University的非盈利教育机构,面向物理学、数学、非线性科学、计算机科学和定量生物学等学科提供16种免费电子期刊的访问。 NASA Technical Reports Server https://www.360docs.net/doc/627357205.html,/?method=browse 主要是关于航空航天领域研究的科技报告和会议论文。

审计风险外文文献翻译最新译文

文献出处:C E Hogan. The Discussion of Audit Risk Control [J]. Contemporary Accounting Research, 2015, 25(1): 219. 原文 The Discussion of Audit Risk Control C E Hogan Abstract For any one market, seeking resources optimal configuration is its internal requirements, this requirement with complete information between market subjects, in reality, however, investors and by investors, creditors and debtors, regulators and inevitable existence of information asymmetry between the regulated, audit the generation of the industry is to eliminate the information asymmetry. Certified public accountants to verify statements of the financial information of foreign enterprises and other information, the truth of market main body with information as close as possible to complete information is the process of the audit. Since the audit conclusion is certified public accountants in sampling surveys on the basis of the subjective conclusion, usually can't be absolutely perfect information, the audit risk and the audit risk is the audit itself inherent cannot evade a question. Keywords: audit risk, audit risk management and risk control 1 Introduction Auditing profession development, has become an indispensable organic part of market economy, in the establishment and maintenance of the capital market development, holds an important place of audit, audit of the financial market is hard to imagine. In recent years, however, in view of the accounting firms and certified public accountants case erupted repeatedly, most lawsuits and high litigation of the damages to the whole industry development.2002 of the American journal of accounting statistics results show that the United States over the past 15 years for the auditor to accuse lawsuit, far more than the whole industry occurred in the 105 - year history of the total number of ['];European Ernst & young, KPMG, delete and PWC international accounting firms in 2007, a year only received compensation lawsuit, claim amount

大数据文献综述

信息资源管理文献综述 题目:大数据背景下的信息资源管理 系别:信息与工程学院 班级:2015级信本1班 姓名: 学号:1506101015 任课教师: 2017年6月 大数据背景下的信息资源管理 摘要:随着网络信息化时代的日益普遍,我们正处在一个数据爆炸性增长的“大数据”时代,在我们的各个方面都产生了深远的影响。大数据是数据分析的前沿技术。简言之,从各种各样类型的数据中,快速获得有价值信息的能力就是大数据技术,这也是一个企业所需要必备的技术。“大数据”一词越来越地别提及与使用,我们用它来描述和定义信息爆炸时代产生的海量数据。就拿百度地图来说,我们在享受它带来的便利的同时,无偿的贡献了我们的“行踪”,比如说我们的上班地点,我们的家庭住址,甚至是我们的出行方式他们也可以知道,但我们不得不接受这个现实,我们每个人在互联网进入大数据时代,都将是透明性的存在。各种数据都在迅速膨胀并变大,所以我们需要对这些数据进行有效的管理并加以合理的运用。

关键词:大数据信息资源管理与利用 目录 大数据概念.......................................................... 大数据定义...................................................... 大数据来源...................................................... 传统数据库和大数据的比较........................................ 大数据技术.......................................................... 大数据的存储与管理.............................................. 大数据隐私与安全................................................ 大数据在信息管理层面的应用.......................................... 大数据在宏观信息管理层面的应用.................................. 大数据在中观信息管理层面的应用.................................. 大数据在微观信息管理层面的应用.................................. 大数据背景下我国信息资源管理现状分析................................ 前言:大数据泛指大规模、超大规模的数据集,因可从中挖掘出有价值 的信息而倍受关注,但传统方法无法进行有效分析和处理.《华尔街日

新技术云计算外文文献

云计算——新兴的计算技术 摘要:云计算是涉及通过互联网提供托管服务的总称。这些服务大致分为三类:基础设施即服务(IaaS)、平台即服务(PaaS)和软件即服务(SaaS)。云计算这个名字的灵感来自于云符号经常用来代表在互联网上流程图和图表。这是在继主机计算、个人电脑计算、客户端服务器计算和Web计算之后的第五代计算技术。本文将围绕云计算进行讨论。 关键词:云计算,IaaS(基础设施即服务),PaaS的(平台即服务),SaaS(软件即服务) 1引言 云服务有三个鲜明的特点区别于传统的主机服务模式,它们分别是:云服务的出售通常按分钟或小时收取费用;云服务是有弹性的,一个用户可以在不同的时间拥有可多可少的服务;云服务完全由供应商托管(消费者只需要通过个人电脑和互联网就可以使用)。虚拟化的重大创新、分布式计算的发展,以及高速互联网的建设和经济的衰落,都加速了对云计算的兴趣。 云可以是私有的或公有的。公有云向互联网上的任何人销售(目前,亚马逊的网络服务是最大的公有云服务提供商)。私有云是一个专有网络或数据中心,向一部分人提供托管服务。当服务提供商使用公有云资源来创建自己的私有云,这样的结果被称为虚拟化的私有云。私有云或公共云的云计算目标是提供方便的、可扩展的计算资源和IT服务[1]。 2云计算的优势 云计算具有的优势是什么? (a)最小化的资本开支 (b)位置和设备独立性 答案:供应商的视角:申请厂商更容易吸引新客户。 (a)提供最低成本的方法和配套应用; (b)能够使用商品服务器和存储硬件; 3云计算的障碍 从客户的视角来看,云计算的障碍有: (a)数据安全; (b)很多客户不希望他们的数据迁移到可以信任的“云”上; (c)数据必须进行本地保留; (d)延迟; (e)云可以走多少毫秒; (f)不是实时应用的理想选择; (g)应用程序可用性; (h)无法通过现有的传统应用进行切换; (i)等效的云应用不存在; 总结,并非所有的应用程序都要工作在公共云之上。

数据库外文参考文献及翻译.

数据库外文参考文献及翻译 数据库外文参考文献及翻译数据库管理系统——实施数据完整性一个数据库,只有用户对它特别有信心的时候。这就是为什么服务器必须实施数据完整性规则和商业政策的原因。执行SQL Server的数据完整性的数据库本身,保证了复杂的业务政策得以遵循,以及强制性数据元素之间的关系得到遵守。因为SQL Server的客户机/服务器体系结构允许你使用各种不同的前端应用程序去操纵和从服务器上呈现同样的数据,这把一切必要的完整性约束,安全权限,业务规则编码成每个应用,是非常繁琐的。如果企业的所有政策都在前端应用程序中被编码,那么各种应用程序都将随着每一次业务的政策的改变而改变。即使您试图把业务规则编码为每个客户端应用程序,其应用程序失常的危险性也将依然存在。大多数应用程序都是不能完全信任的,只有当服务器可以作为最后仲裁者,并且服务器不能为一个很差的书面或恶意程序去破坏其完整性而提供一个后门。SQL Server使用了先进的数据完整性功能,如存储过程,声明引用完整性(DRI),数据类型,限制,规则,默认和触发器来执行数据的完整性。所有这些功能在数据库里都有各自的用途;通过这些完整性功能的结合,可以实现您的数据库的灵活性和易于管理,而且还安全。声明数据完整性声明数据完整原文请找腾讯3249114六,维-论'文.网 https://www.360docs.net/doc/627357205.html, 定义一个表时指定构成的主键的列。这就是所谓的主键约束。SQL Server使用主键约束以保证所有值的唯一性在指定的列从未侵犯。通过确保这个表有一个主键来实现这个表的实体完整性。有时,在一个表中一个以上的列(或列的组合)可以唯一标志一行,例如,雇员表可能有员工编号( emp_id )列和社会安全号码( soc_sec_num )列,两者的值都被认为是唯一的。这种列经常被称为替代键或候选键。这些项也必须是唯一的。虽然一个表只能有一个主键,但是它可以有多个候选键。 SQL Server的支持多个候选键概念进入唯一性约束。当一列或列的组合被声明是唯一的, SQL Server 会阻止任何行因为违反这个唯一性而进行的添加或更新操作。在没有故指的或者合适的键存在时,指定一个任意的唯一的数字作为主键,往往是最有效的。例如,企业普遍使用的客户号码或账户号码作为唯一识别码或主键。通过允许一个表中的一个列拥有身份属性,SQL Server可以更容易有效地产生唯一数字。您使用的身份属性可以确保每个列中的值是唯一的,并且值将从你指定的起点开始,以你指定的数量进行递增(或递减)。(拥有特定属性的列通常也有一个主键或唯一约束,但这不是必需的。)第二种类型的数据完整性是参照完整性。 SQL Server实现了表和外键约束之间的逻辑关系。外键是一个表中的列或列的组合,连接着另一个表的主键(或着也可能是替代键)。这两个表之间的逻辑关系是关系模型的基础;参照完整性意味着这种关系是从来没有被违反的。例如,一个包括出版商表和标题表的简单的select例子。在标题表中,列title_id (标题编号)是主键。在出版商表,列pub_id (出版者ID )是主键。 titles表还包括一个pub_id列,这不是主键,因为出版商可以发布多个标题。相反, pub_id是一个外键,它对应着出版商表的主键。如果你在定义表的时候声明了这个关系, SQL Server由双方执行它。首先,它确保标题不能进入titles表,或在titles表中现有的pub_id无法被修改,除非有效的出版商ID作为新pub_id出现在出版商表中。其次,它确保在不考虑titles表中对应值的情况下,出版商表中的pub_id的值不做任何改变。以下两种方法可

中小企业内部审计外文翻译文献

文献信息: 文献标题:A Theoretical Discussion of Internal Audit Effectiveness in Kuwaiti Industrial SMEs(科威特工业中小企业内部审计有效性的理论探讨)国外作者:Awn Metlib AL-SHBAIL,Turki A.A.TURKI 文献出处:《International Journal of Academic Research in Accounting, Finance and Management Sciences》, 2017,1(7):107-116 字数统计:英文2221单词,12805字符;中文4184汉字 外文文献: A Theoretical Discussion of Internal Audit Effectiveness in Kuwaiti Industrial SMEs Abstract This paper aims to scrutinise the association between the internal audit effectiveness and the four factors associated with International Standards for Professional Practice of Internal Auditing (ISPPIA): independence of internal auditors, scope of internal auditors, management support, and audited cooperation. The relationship between these factors and Satisfaction of internal auditors is also examined. Further, the moderating effect on the relationship between these factors (if present) and the effectiveness of IA among industrial SMEs in Kuwait are investigated through satisfaction of internal auditors. By ascertaining the effectiveness of IA at the industrial firms via theories as well as variables, this paper broadens the available literature on the effectiveness of IA. Key words:Internal audit effectiveness, satisfaction of internal auditors, Kuwaiti Industrial SMEs 1.Introduction Within the past few decades, internal audit departments have significantly contributed to organizational structure through value added services and thus, it has

企业数据建模外文翻译文献

企业数据建模外文翻译文献 (文档含中英文对照即英文原文和中文翻译) 翻译: 信息系统开发和数据库开发 在许多组织中,数据库开发是从企业数据建模开始的,企业数据建模确定了组织数据库的范围和一般内容。这一步骤通常发生在一个组织进行信息系统规划的过程中,它的目的是为组织数据创建一个整体的描述或解释,而不是设计一个特定的数据库。一个特定的数据库为一个或多个信息系统提供数据,而企业数据模型(可能包含许多数据库)描述了由组织维护的数据的范围。在企业数据建模时,你审查当前的系统,分析需要支持的业务领域的本质,描述需要进一步抽象的数据,并且规划一个或多个数据库开发项目。图1显示松谷家具公司的企业数据模型的一个部分。 1.1 信息系统体系结构 如图1所示,高级的数据模型仅仅是总体信息系统体系结构(ISA)一个部分或一个组

织信息系统的蓝图。在信息系统规划期间,你可以建立一个企业数据模型作为整个信息系统体系结构的一部分。根据Zachman(1987)、Sowa和Zachman(1992)的观点,一个信息系统体系结构由以下6个关键部分组成: 数据(如图1所示,但是也有其他的表示方法)。 操纵数据的处理(着系可以用数据流图、带方法的对象模型或者其他符号表示)。 网络,它在组织内并在组织与它的主要业务伙伴之间传输数据(它可以通过网络连接和拓扑图来显示)。 人,人执行处理并且是数据和信息的来源和接收者(人在过程模型中显示为数据的发送者和接收者)。 执行过程的事件和时间点(它们可以用状态转换图和其他的方式来显示)。 事件的原因和数据处理的规则(经常以文本形式显示,但是也存在一些用于规划的图表工具,如决策表)。 1.2 信息工程 信息系统的规划者按照信息系统规划的特定方法开发出信息系统的体系结构。信息工程是一种正式的和流行的方法。信息工程是一种面向数据的创建和维护信息系统的方法。因为信息工程是面向数据的,所以当你开始理解数据库是怎样被标识和定义时,信息工程的一种简洁的解释是非常有帮助的。信息工程遵循自顶向下规划的方法,其中,特定的信息系统从对信息需求的广泛理解中推导出来(例如,我们需要关于顾客、产品、供应商、销售员和加工中心的数据),而不是合并许多详尽的信息请求(如一个订单输入屏幕或按照地域报告的销售汇总)。自顶向下规划可使开发人员更全面地规划信息系统,提供一种考虑系统组件集成的方法,增进对信息系统与业务目标的关系的理解,加深对信息系统在整个组织中的影响的理解。 信息工程包括四个步骤:规划、分析、设计和实现。信息工程的规划阶段产生信息系统体系结构,包括企业数据模型。 1.3 信息系统规划 信息系统规划的目标是使信息技术与组织的业务策略紧密结合,这种结合对于从信息系统和技术的投资中获取最大利益是非常重要的。正如表1所描述的那样,信息工程方法的规划阶段包括3个步骤,我们在后续的3个小节中讨论它们。 1.确定关键性的规划因素

最新云计算中侧信道攻击的防御-毕业论文外文翻译整理

附录一英文文献 Security against Side Channel Attack in Cloud Computing Bhrugu Sevak Abstract--Cloud computing is a word that delivering hosted service over the internet. Cloud computing has been ideate as the next generation architecture of IT enterprise ecause of it’s provides ubiquitous network, cost reducing, flexibility and scalability to users. Now days with the fast growing of cloud computing technology introduces new more vulnerabilities so security is considered to be one of the most critical aspect in clod computing environment due to the confidential and important information stored in the cloud. As per AMAZONE EC2 service case study it is possible to identify the particular target VM(virtual machine) in internal cloud infrastructure and then placed new VM with targeted VM and extract confidential information from targeted VM on same physical machine called as simple side channel attack. This paper introduces how to avert the side channel attack in cloud computing. This is accomplished by using combination of Virtual firewall appliance and randomly encryption decryption (using concept of confusion diffusion) and provide RAS (Reliability, Availability, and Security) of client’s data or information. Keywords--Cloud computing, side channel attack, Amazon EC2 service case study, virtual firewall appliance, randomly encryption decryption. I. INTRODUCTION Cloud computing is a word that delivering hosted service over the internet.

信息系统和数据库中英文对照外文翻译文献

中英文对照翻译 信息系统开发和数据库开发 在许多组织中,数据库开发是从企业数据建模开始的,企业数据建模确定了组织数据库的范围和一般内容。这一步骤通常发生在一个组织进行信息系统规划的过程中,它的目的是为组织数据创建一个整体的描述或解释,而不是设计一个特定的数据库。一个特定的数据库为一个或多个信息系统提供数据,而企业数据模型(可能包含许多数据库)描述了由组织维护的数据的范围。在企业数据建模时,你审查当前的系统,分析需要支持的业务领域的本质,描述需要进一步抽象的数据,并且规划一个或多个数据库开发项目。图1显示松谷家具公司的企业数据模型的一个部分。 1.1 信息系统体系结构 如图1所示,高级的数据模型仅仅是总体信息系统体系结构(ISA)一个部分或一个组织信息系统的蓝图。在信息系统规划期间,你可以建立一个企业数据模型作为整个信息系统体系结构的一部分。根据Zachman(1987)、Sowa和Zachman (1992)的观点,一个信息系统体系结构由以下6个关键部分组成: 数据(如图1所示,但是也有其他的表示方法)。 操纵数据的处理(着系可以用数据流图、带方法的对象模型或者其他符号表示)。 网络,它在组织内并在组织与它的主要业务伙伴之间传输数据(它可以通过网络连接和拓扑图来显示)。 人,人执行处理并且是数据和信息的来源和接收者(人在过程模型中显示为数据的发送者和接收者)。 执行过程的事件和时间点(它们可以用状态转换图和其他的方式来显示)。 事件的原因和数据处理的规则(经常以文本形式显示,但是也存在一些用于规划的图表工具,如决策表)。 1.2 信息工程 信息系统的规划者按照信息系统规划的特定方法开发出信息系统的体系结构。信息工程是一种正式的和流行的方法。信息工程是一种面向数据的创建和维护信息系统的方法。因为信息工程是面向数据的,所以当你开始理解数据库是怎样被标识和定义时,信息工程的一种简洁的解释是非常有帮助的。信息工程遵循自顶向下规划的方法,其中,特定的信息系统从对信息需求的广泛理解中推导出来(例如,我们需要关于顾客、产品、供应商、销售员和加工中心的数据),而不是合并许多详尽的信息请求(如一个订单输入屏幕或按照地域报告的销售汇总)。自顶向下规划可使开发人员更全面地规划信息系统,提供一种考虑系统组件集成的方法,增进对信息系统与业务目标的关系的理解,加深对信息系统在整个组织中的影响的理解。 信息工程包括四个步骤:规划、分析、设计和实现。信息工程的规划阶段产

审计学内部控制中英文对照外文翻译文献

中英文翻译 内部控制爆炸① 摘要:Power的1997版书以审计社会为主题的探讨使得审计活动在联合王国(英国)和北美得到扩散。由审计爆炸一同带动的是内部控制制度的兴起。审计已经从审计结果转向审计制度和内部控制,它已然成为公众对公司治理和审计监管政策的辩论主题。Power表示对什么是有效的内部控制各方说法不一。本人对内部控制研究方面有一个合理的解释。内部控制对非常不同概念的各个领域的会计进行探究,并研究如何控制不同水平的组织。因此,内部控制研究的各类之间的交叉影响是有限的,而且,许多内部会计控制是研究是再更宽广的公司治理问题的背景下进行的。所以,许多有关内部控制制度对公司治理的价值观点扔需要进行研究。 关键词:机构理论;公司治理;外部审计;内部审计;内部控制制度;管理控制 1 概述 Power的1997版书以审计社会为主题的探讨使得审计活动在联合王国(英国)和北美得到扩散。由审计爆炸一同带动的是内部控制制度的兴起。审计已经从审计结果转向审 ①Maastricht Accounting and Auditing Research and Education Center (MARC), Faculty of Economics and Business Administration, Universiteit Maastricht, P.O. Box 616, 6200 MD Maastricht, The Netherlands s.maijoor@marc.unimaas.nl Fax: 31-43-3884876 Tel: 31-43-3883783

计制度和内部控制,它已然成为公众对公司治理和审计监管政策的辩论主题。例如,在最近的对于欧洲联盟内外部审计服务的内部市场形成的辩论中,监管建议建立关于内部控制和内部审计制度。虽然对有关内部控制的价值期望高,但Power表示对什么是有效的内部控制各方说法不一。本人对内部控制研究方面有一个合理的解释。内部控制是对非常不同概念的各个领域的会计进行探究,并研究如何控制不同水平的组织。因此,内部控制研究的各类之间的交叉影响是有限的,而且,许多内部会计控制是研究是再更宽广的公司治理问题的背景下进行的。所以,许多有关内部控制制度对公司治理的价值观点扔需要进行研究。 在审计和公司治理的公共政策辩论中,内部控制的概念越来越得到重视。公共越来越关注内部控制,令人对power在1997年英国和北美的书中的审计社会的现状有所信服。此书的主题是在Anglo-Saxon经济体的审计活动:审计爆炸的扩散。Power表示,联合开发与审计爆炸带动了内部控制制度兴起。增加监管问责制是公众对审计和公司治理政策辩论机构内部控制系统的一部分。然而Power注意到,尽管公众对内部控制的关注度迅速增加,内部控制的概念还是很模糊。他支出,内部控制是什么,内部控制的有效性的界定是内部控制的最基本问题。 本文讨论研究内部控制的兴起,认为内部控制的研究也有一些潜在的问题。首先,在以往的研究中,长期的内部控制涵盖完全不同的概念。其次,有关的内部控制研究机构的规模是有限的,要从孤立的学科进行交叉使用得到结果很难。因此,内部控制是尚未独立的研究范畴。最后,以往的对内部控制的研究没有彻底解决在审计和公司治理的公共政策辩论中谈到的内部控制有关问题。假设的内部控制、财务报告和公司治理的基本关系也没有被证实。 本文解构如下:在开始对内部控制进行研究和讨论之前,先介绍了两个主要的,在Power1997的书中所提出的发展:第一部分讨论了审计爆炸,第二部分讨论了内部控制的崛起。两者也讲被从欧盟的角度评论。第三部分讨论了什么是内部控制,并从会计研究的三个主要观点出发,研究内部控制制度。第四部分确定了内部控制和公司治理的公共政策辩论所承担的四个基本关系,并讨论之前的相关研究。最后一节提供了一个总结和结论。 2 内部控制的崛起 不论是否存在审计爆炸,Power1997和1998在审计中变得越来越重要。根据Power (1997年83爷),因为内部控制系统的可审计假设使得审计爆炸成为可能。根据更具体

大数据外文翻译参考文献综述

大数据外文翻译参考文献综述 (文档含中英文对照即英文原文和中文翻译) 原文: Data Mining and Data Publishing Data mining is the extraction of vast interesting patterns or knowledge from huge amount of data. The initial idea of privacy-preserving data mining PPDM was to extend traditional data mining techniques to work with the data modified to mask sensitive information. The key issues were how to modify the data and how to recover the data mining result from the modified data. Privacy-preserving data mining considers the problem of running data mining algorithms on confidential data that is not supposed to be revealed even to the party

running the algorithm. In contrast, privacy-preserving data publishing (PPDP) may not necessarily be tied to a specific data mining task, and the data mining task may be unknown at the time of data publishing. PPDP studies how to transform raw data into a version that is immunized against privacy attacks but that still supports effective data mining tasks. Privacy-preserving for both data mining (PPDM) and data publishing (PPDP) has become increasingly popular because it allows sharing of privacy sensitive data for analysis purposes. One well studied approach is the k-anonymity model [1] which in turn led to other models such as confidence bounding, l-diversity, t-closeness, (α,k)-anonymity, etc. In particular, all known mechanisms try to minimize information loss and such an attempt provides a loophole for attacks. The aim of this paper is to present a survey for most of the common attacks techniques for anonymization-based PPDM & PPDP and explain their effects on Data Privacy. Although data mining is potentially useful, many data holders are reluctant to provide their data for data mining for the fear of violating individual privacy. In recent years, study has been made to ensure that the sensitive information of individuals cannot be identified easily. Anonymity Models, k-anonymization techniques have been the focus of intense research in the last few years. In order to ensure anonymization of data while at the same time minimizing the information

Hadoop云计算外文翻译文献

Hadoop云计算外文翻译文献 (文档含中英文对照即英文原文和中文翻译) 原文: Meet Hadoop In pioneer days they used oxen for heavy pulling, and when one ox couldn’t budge a log, they didn’t try to grow a larger ox. We shouldn’t be trying for bigger computers, but for more systems of computers. —Grace Hopper Data! We live in the data age. It’s not easy to measure the total volume of data stored electronically, but an IDC estimate put the size of the “digital universe” at 0.18 zettabytes in

2006, and is forecasting a tenfold growth by 2011 to 1.8 zettabytes. A zettabyte is 1021 bytes, or equivalently one thousand exabytes, one million petabytes, or one billion terabytes. That’s roughly the same order of magnitude as one disk drive for every person in the world. This flood of data is coming from many sources. Consider the following: ? The New York Stock Exchange generates about one terabyte of new trade data per day. ? Facebook hosts approximately 10 billion photos, taking up one petabyte of storage. ? https://www.360docs.net/doc/627357205.html,, the genealogy site, stores around 2.5 petabytes of data. ? The Internet Archive stores around 2 petabytes of data, and is growing at a rate of 20 terabytes per month. ? The Large Hadron Collider near Geneva, Switzerland, will produce about 15 petabytes of data per year. So there’s a lot of data out there. But you are probably wondering how it affects you. Most of the data is locked up in the largest web properties (like search engines), or scientific or financial institutions, isn’t it? Does the advent of “Big Data,” as it is being called, affect smaller organizations or individuals? I argue that it does. Take photos, for example. My wife’s grandfather was an avid photographer, and took photographs throughout his adult life. His entire corpus of medium format, slide, and 35mm film, when scanned in at high-resolution, occupies around 10 gigabytes. Compare this to the digital photos that my family took last year,which take up about 5 gigabytes of space. My family is producing photographic data at 35 times the rate my wife’s grandfather’s did, and the rate is increasing every year as it becomes easier to take more and more photos. More generally, the digital streams that individuals are producing are growing apace. Microsoft Research’s MyLifeBits project gives a glimpse of archiving of pe rsonal information that may become commonplace in the near future. MyLifeBits was an experiment where an individual’s interactions—phone calls, emails, documents were captured electronically and stored for later access. The data gathered included a photo taken every minute, which resulted in an overall data volume of one gigabyte a month. When storage costs come down enough to make it feasible to store continuous audio and video, the data volume for a future MyLifeBits service will be many times that.

相关文档
最新文档