Author of the publication

Continuous Auditing and Continuous Monitoring in ERP Environments: Case Studies of Application Implementations.

, , , and . J. Inf. Syst., 28 (1): 287-310 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automating Vendor Fraud Detection in Enterprise Systems., , and . J. Digit. Forensics Secur. Law, 8 (2): 7-40 (2013)Continuous Auditing and Continuous Monitoring in ERP Environments: Case Studies of Application Implementations., , , and . J. Inf. Syst., 28 (1): 287-310 (2014)Evaluating the impact of online discussion boards on student engagement with group work., , and . Br. J. Educ. Technol., 50 (2): 902-920 (2019)Anti-Money Laundering: Using data visualization to identify suspicious activity., and . Int. J. Account. Inf. Syst., (2019)Provider-customer coalitional games., , and . GAMENETS, page 180-189. IEEE, (2009)Cooperative Profit Sharing in Coalition-Based Resource Allocation in Wireless Networks., , , and . IEEE/ACM Trans. Netw., 20 (1): 69-83 (2012)Spatial SINR games of base station placement and mobile association., , , and . IEEE/ACM Trans. Netw., 20 (6): 1856-1869 (2012)Optimal Forwarding in Delay-Tolerant Networks With Multiple Destinations., , , and . IEEE/ACM Trans. Netw., 21 (6): 1812-1826 (2013)Spatial SINR Games Combining Base Station Placement and Mobile Association., , , and . INFOCOM, page 1629-1637. IEEE, (2009)Neighbor oblivious and finite-state algorithms for circumventing local minima in geographic forwarding., , , , , and . Ad Hoc Networks, (2016)