Journal article Open Access
Taufik Hidayat*; Amir Indra Budiman
<?xml version='1.0' encoding='UTF-8'?> <record xmlns="http://www.loc.gov/MARC21/slim"> <leader>00000nam##2200000uu#4500</leader> <datafield tag="653" ind1=" " ind2=" "> <subfield code="a">Benford law, Fraud, Audit, Financial Statement.</subfield> </datafield> <controlfield tag="005">20200120144657.0</controlfield> <controlfield tag="001">48844</controlfield> <datafield tag="700" ind1=" " ind2=" "> <subfield code="a">Amir Indra Budiman</subfield> </datafield> <datafield tag="856" ind1="4" ind2=" "> <subfield code="s">320777</subfield> <subfield code="z">md5:63fb95956629e485cbdefbcda8199d17</subfield> <subfield code="u">https://zenodo.org/record/48844/files/17.pdf</subfield> </datafield> <datafield tag="542" ind1=" " ind2=" "> <subfield code="l">open</subfield> </datafield> <datafield tag="260" ind1=" " ind2=" "> <subfield code="c">2016-04-05</subfield> </datafield> <datafield tag="909" ind1="C" ind2="O"> <subfield code="p">openaire</subfield> <subfield code="o">oai:zenodo.org:48844</subfield> </datafield> <datafield tag="909" ind1="C" ind2="4"> <subfield code="c">123-129</subfield> <subfield code="n">4</subfield> <subfield code="p">INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY</subfield> <subfield code="v">5</subfield> <subfield code="y">2016</subfield> </datafield> <datafield tag="100" ind1=" " ind2=" "> <subfield code="a">Taufik Hidayat*</subfield> </datafield> <datafield tag="245" ind1=" " ind2=" "> <subfield code="a">ANALISYS BENFORD LAW FOR COMPANY EVIDANCE FROM INDONESIA</subfield> </datafield> <datafield tag="540" ind1=" " ind2=" "> <subfield code="u">https://creativecommons.org/licenses/by/4.0/legalcode</subfield> <subfield code="a">Creative Commons Attribution 4.0 International</subfield> </datafield> <datafield tag="650" ind1="1" ind2="7"> <subfield code="a">cc-by</subfield> <subfield code="2">opendefinition.org</subfield> </datafield> <datafield tag="520" ind1=" " ind2=" "> <subfield code="a"><p>This study aims to see how the auditors in accounting and IT must apply to the various procedures in the audit of financial statements with IT-assisted. When viewed as a whole all the computer-assisted audit tools (CAATs) has its own command as an example of this Benford law. The aim of this study was to try to describe how exactly the Benford&#39;s Law, when the Benford law can apply and what constraints should be considered before applying the financial audit of companies with IT-assisted. However, in this study the authors used a model for large-scale data analysis of financial statements.</p></subfield> </datafield> <datafield tag="024" ind1=" " ind2=" "> <subfield code="a">10.5281/zenodo.48844</subfield> <subfield code="2">doi</subfield> </datafield> <datafield tag="980" ind1=" " ind2=" "> <subfield code="a">publication</subfield> <subfield code="b">article</subfield> </datafield> </record>
All versions | This version | |
---|---|---|
Views | 83 | 83 |
Downloads | 51 | 51 |
Data volume | 16.4 MB | 16.4 MB |
Unique views | 76 | 76 |
Unique downloads | 47 | 47 |