Thursday, April 16, 2026

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:
https://airccse.org/journal/ijnsa.html

Strategic Management of the Internal Audit Function in the Transition to a Realtime Mode
Eshan Nabeel, UAE

Abstract
Internal audit of digitally integrated business processes, transactional data flows, and related control environments is undergoing transformation from periodic review toward near real time assurance. Drawing on Agency Theory and Institutional Theory, the study is oriented toward managerial practice and is based on theoretical generalization and analytical interpretation of contemporary approaches to continuous auditing under accelerating digital business processes. The research addresses the critical intersection of data governance, information security, and assurance frameworks essential for organizations operating in digitally interconnected environments. The limitations of the traditional internal audit model based on periodic reviews and sample based testing are examined, and the need to move toward a more dynamic form of assurance that enables timely risk identification is substantiated. Central attention is given to the managerial dimension of internal audit transformation, including changes in the role of the function, revisions of the organizational model, data and technology governance frameworks, competency requirements, and safeguards for preserving independence. The study demonstrates that the practical effectiveness of near real time auditing is determined not by the level of analytical tool adoption, but by their integration into a reproducible control loop with formalized response and escalation conditions. From an operational perspective, such a control loop requires the integration of enterprise data infrastructures with automated monitoring mechanisms. In practice, this involves the use of enterprise resource planning (ERP) systems, security monitoring platforms, and data governance procedures that enable near real time access to transactional information while maintaining strict access controls. The effectiveness of this architecture depends on the coordination between internal audit, information security teams, and data governance structures. Particular emphasis is placed on the cybersecurity and data integrity prerequisites that must be established before continuous monitoring capabilities can be safely deployed. Managerial effects of the transformation related to expanded audit coverage and increased relevance of audit findings are analyzed. Institutional constraints on scaling are also considered, arising from requirements for data controllability and the preservation of the independent status of the internal audit function.

Keywords
internal audit, continuous auditing, strategic management, organizational model, audit independence
 

Wednesday, April 15, 2026

International Journal of Network Security & Its Applications (IJNSA)

#cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime



Over 63% of the IJNSA published articles cited.

International Journal of Network Security & Its Applications (IJNSA)

Tuesday, April 14, 2026

International Journal of Network Security & Its Applications (IJNSA)

#researchers #article #online #submissionsopen #RegisterNow #Register #Papersubmission #CallForPapers #callforsubmissions #submission #Submit #SubmitYourPaper #submitnow #deadline #phdstudent #phdresearch #research #ResearchScholar #researchpaper



Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Submission Deadline: April 18, 2026

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Monday, April 13, 2026

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy



Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Submission Deadline: April 18, 2026

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Friday, April 10, 2026

International Journal of Network Security & Its Applications (IJNSA)

#research #researchpaper #researchpublication #publication #Submission #submitnow #submissionsopen #SubmitYourPaper #SubmitYourAbstract #submityourwork #CallForPapers #CallForAbstracts #callforsubmissions #Papersubmission #deadline #online #article #articlesubmission #articlepublishing #papers



International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Call for papers
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.


Submission Deadline: April 11, 2026


For More Details, Please Visit: https://airccse.org/journal/ijnsa.html

Thursday, April 9, 2026

International Journal of Network Security & Its Applications (IJNSA)

#CallForPapers #CallForAbstracts #callforsubmissions #Papersubmission #deadline #online #article #articlesubmission #articlepublishing #papers #research #researchpaper #researchpublication #publication #Submission #submitnow #submissionsopen #SubmitYourPaper #SubmitYourAbstract #submityourwork



Submit Your Research Articles...!!!

International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, H Index - 52
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)



Submission Deadline: April 11, 2026

Contact us:
Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org (or) ijnsajournl@gmail.com


Wednesday, April 8, 2026

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)
ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)


Designing Disaster Recovery Framework for Globally Distributed Cloud Applications
Ronak Jani, Lead DBA, USA

Abstract
This article examines the design of disaster recovery frameworks for globally distributed cloud applications operating under heterogeneous consensus models. The relevance of the study arises from the rapid geographic expansion of cloud infrastructures and the growth of transactional workloads that expose limitations of traditional leader-based mirroring. The scientific novelty lies in the integrated interpretation of cross-cluster broadcast semantics, cumulative quorum acknowledgments, and stake-aware scheduling as components of a unified recovery coordination layer. The paper describes linear sender–receiver rotation mechanisms, probabilistic retransmission bounds, and WAN-aware scalability strategies. Special attention is paid to bandwidth asymmetry, Byzantine fault resilience, and adaptive recovery policies in multi-cloud environments. The goal of the study is to systematize architectural principles for communication-efficient and fault-resilient cross-regional synchronization. Comparative and structural analysis methods were applied. The conclusions formulate design conditions for scalable geo-replication under heterogeneous deployment constraints and highlight their relevance for resilient networked infrastructures and distributed cloud systems.

Keywords
Disaster Recovery, Geo-Replication, Replicated State Machines, Quorum Acknowledgment, Distributed Databases






International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA) ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print) Webpage URL: https...