Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 2489 dokumen yang sesuai dengan query
cover
Hoboken, NJ: John Wiley & Sons, 2012
363.259 FOR
Buku Teks  Universitas Indonesia Library
cover
Karyono A.K.
Yogyakarta: Andi, 2013
364.163 KAR f
Buku Teks  Universitas Indonesia Library
cover
Zimbelman, Mark F.,
"
"
Jakarta: Salemba Empat, 2014
364ZIMA002
Multimedia  Universitas Indonesia Library
cover
Zimbelman, Mark F.,
Jakarta: Salemba Empat, 2014
364ZIMA001
Multimedia  Universitas Indonesia Library
cover
Nigrini, Mark J
Hoboken: Wiley, 2011
363.259 63 NIG f
Buku Teks  Universitas Indonesia Library
cover
Dykeman, Francis C.
New York: John Wiley & Sons, 1982
347.736 7 DYK f
Buku Teks  Universitas Indonesia Library
cover
"Berbagai skandal akuntansi telah mendorong munculnya perdebatan yang menanyakan kemampuan akuntansi dalam menyediakan informasi keuangan yang bermanfaat....."
Artikel Jurnal  Universitas Indonesia Library
cover
Mamuaya, Tisha Velita
"Skandal WorldCom terkait pembukuan dan kepailitan perusahaan tersebut merupakan salah satu skandal terbesar sepanjang masa. Tesis ini membahas tentang bagaimana penipuan akuntansi oleh WorldCom, berdasarkan informasi yang tersedia dan standar dasar akuntansi yang berlaku di Amerika Serikat. Tesis ini akan menjelaskan bagaimana selama bertahuntahun, manajer senior di WorldCom dapat mengatur laba di laporan keuangan yang menyebabkan tindakan penipuan.

WorldComs scandal on its accounting and bankruptcies was one of the biggest in the history. As written in this assignment, I am going to discuss the accounting fraud at WorldCom based on the available information and relevant accounting standard in United States. This report will discuss how for years, the senior managers in WorldCom managed its earnings which led to fraudulent reporting."
Depok: Fakultas Ekonomi dan Bisnis Universitas Indonesia, 2019
TA-Pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
Andri Rivano
"[ABSTRAK
Pemanfaatan teknologi informasi (TI), selain membantu suatu instansi pemerintah dalam memotong rantai birokrasi dalam pelaksanaan tugas pokok dan fungsi instansi pemerintah, terkait reformasi birokrasi, juga dapat dimanfaatkan untuk pembenahan instansi pemerintah. Dalam studi kasus ini dimana sudah dicanangkan suatu kegiatan yang bertujuan membenahi organisasi di instansi pemerintah pusat XYZ, atas instruksi Komisi Pengawas XYZ Pada kegiatan pembenahan organisasi XYZ tersebut dilakukanlah penelaahan risiko dalam kegiatan fraud risk management dimana salah satu lingkup kerjanya adalah melakukan fraud risk assesment yang dilakukan dengan bantuan forensic technology. Tujuan menggunakan forensic technology adalah untuk menemukan bukti-bukti digital pada sistem komputer dengan mengandalkan kemampuan forensic technology dalam merekonstruksi data dan informasi dari file yang ada maupun yang sudah dihapus. Dengan demikian forensic technology merupakan alat yang tepat untuk membuktikan compliance (kepatuhan), baik kepatuhan terhadap hukum ataupun terhadap kode etik/norma perusahaan, khususnya korupsi. Pimpinan XYZ juga telah menyadari hal ini dan telah memerintahkan untuk menyusun prosedur penggunaan computer forensic sebagai alat audit internal. Pada karya akhir ini dilakukan uji coba untuk membuktikan (proof of concept) bahwa computer forensic yang telah dimiliki saat ini dapat membantu proses penemuan indikasi pelanggaran kode etik/norma, khususnya korupsi. Hasil dari penelitian ini adalah berupa model computer forensic dalam kegiatan fraud risk management pada proses bisnis XYZ beserta draft standard operating procedure (SOP) terkait pelaksanaan computer forensic.

ABSTRACT
Application of information technology (IT), instead of addition to helping a government agencies in steramlining the bureaucracy in the implementation of the basic tasks and roles of government agencies, relevant bureaucratic reform, also can be used for improvement of government agencies its self. In this case study where already launched an activity that aims to fixing up of government agency of Indonesia XYZ organization, on the instructions of XYZ?s regulatory commission.
In the fixing up the XYZ organization conducted review the risk in order to fraud risk management activity that one of scope of work is to do fraud risk assessment using forensic technology. The aim using forensic technolgy is to identify digital evidence on computer systems by relying on the ability of forensic technology in reconstructing the data and information from existing files or deleted. Thus forensic technology is a good tool for proving compliance (adherence), good adherence to the law or the code of ethics/norms of the company, particularly corruption. Chairs of XYZ has also been aware of this and has been ordered to draw up the use of computer forensic procedures as a tool of internal audit.
In this research conducted trials to prove (proof of concept) that computer forensic that has been held at this time can help the process of the invention indicated violations of the code of ethics/norms, particularly corruption. Results of this research is in the form of a model computer forensic in fraud risk management activity in the business process XYZ and draft of standard operating procedure (SOP) related to the implementation of computer forensic., Application of information technology (IT), instead of addition to helping a government agencies in steramlining the bureaucracy in the implementation of the basic tasks and roles of government agencies, relevant bureaucratic reform, also can be used for improvement of government agencies its self. In this case study where already launched an activity that aims to fixing up of government agency of Indonesia XYZ organization, on the instructions of XYZ’s regulatory commission.
In the fixing up the XYZ organization conducted review the risk in order to fraud risk management activity that one of scope of work is to do fraud risk assessment using forensic technology. The aim using forensic technolgy is to identify digital evidence on computer systems by relying on the ability of forensic technology in reconstructing the data and information from existing files or deleted. Thus forensic technology is a good tool for proving compliance (adherence), good adherence to the law or the code of ethics/norms of the company, particularly corruption. Chairs of XYZ has also been aware of this and has been ordered to draw up the use of computer forensic procedures as a tool of internal audit.
In this research conducted trials to prove (proof of concept) that computer forensic that has been held at this time can help the process of the invention indicated violations of the code of ethics/norms, particularly corruption. Results of this research is in the form of a model computer forensic in fraud risk management activity in the business process XYZ and draft of standard operating procedure (SOP) related to the implementation of computer forensic.]"
2015
TA-Pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
Raihan Sadila
"Consolidate Global Service is a financial advisory company that operates in Australia. This report will discuss how fraudulent activities conducted by executive management are exposed. Investigator gas identified several red flag symptoms and methodology to further investigate this case

Consolidated Global Service adalah perusahaan yang bergerak dalam bidang keuangan di Australia. Laporan ini akan membahas bagaimana penipuan dan kecurangan oleh manajemen eksekutif perusahaan dapat diungkap. Investigator telah mengidentifikasi indikasi dan metodologi untuk mendalami kasus tersebut."
Depok: Fakultas Ekonomi dan Bisnis Universitas Indonesia, 2021
MK-pdf
UI - Makalah dan Kertas Kerja  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>