Auditing Governance in ERP Projects (Englisch)
- Neue Suche nach: Sayana, S. A.
- Neue Suche nach: Sayana, S. A.
In:
INFORMATION SYSTEMS CONTROL JOURNAL
;
2
;
19-21
;
2004
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:Auditing Governance in ERP Projects
-
Beteiligte:Sayana, S. A. ( Autor:in )
-
Erschienen in:INFORMATION SYSTEMS CONTROL JOURNAL ; 2 ; 19-21
-
Verlag:
- Neue Suche nach: INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION
-
Erscheinungsdatum:01.01.2004
-
Format / Umfang:3 pages
-
ISSN:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 657.4550285
- Weitere Informationen zu Dewey Decimal Classification
-
Klassifikation:
DDC: 657.4550285 -
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis – Band 2
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 4
-
Information Security Matters: What Is the Value of Security?Ross, Steven J et al. | 2011
- 4
-
Guest Editorial: Looking Back: Information Security MattersRoss, Steven J et al. | 2014
- 4
-
IS Security Matters: IS Security Matters?Singleton, Tommie W et al. | 2010
- 4
-
Information Security Matters: Just Okay PracticeRoss, Steven J et al. | 2013
- 4
-
Information Security Matters: Making Preparedness PayRoss, Steven J et al. | 2012
- 5
-
Editorial - Issues & CommentsCangemi, Michael et al. | 2004
- 5
-
Taking a Look Back: Data Security - Excerpted and reprinted from - The EDP Auditor Journal, Winter 1980| 2009
- 5
-
Issues&CommentsCangemi, M. P. et al. | 2007
- 5
-
Editorial - Issues & Comments - Editor in Chief Michael P Cangemi, CISA, CK discusses biometrics, the joy of book collecting and e-business, and notes the passing of an IS audit pioneer. A list of biometrics vendors accompanies the column.Cangemi, Michael P. et al. | 2001
- 5
-
Editorial - Issues & Comments - Editor in Chief Michael Cangemi, CISA, CPA, discusses how terrorist attacks will cause companies and governments to increase their investments in biometrics.Cangemi, Michael et al. | 2002
- 5
-
Guest Editorial: IT Governance Comes of AgeHolt, Alison et al. | 2008
- 5
-
Editorial - Issues & Comments - Editor-in-Chief Michael P Cangemi, CISA, CPA, announces a unique issue of the Information Systems Control Journal, one devoted to IT governance and lends his thoughts on how the topic is aligned with the ISACA vision statementCangemi, Michael P. et al. | 2000
- 6
-
Guest Editorial: Business Reform and Change Enabled by IT — An Alternative PerspectiveHayes, Tony et al. | 2009
- 6
-
Cloud Computing: Gates Corporation Makes Sales a Companywide Effort in the CloudBerridge, Eric et al. | 2012
- 6
-
Cloud Computing: Aspirations to Reality — Filling the Cloud Computing Performance GapGatewood, Vicki et al. | 2013
- 6
-
Information Security Matters: Shedding TiersRoss, Steven J et al. | 2014
- 6
-
IT Audit Basics: The Minimum IT Controls to Assess in a Financial Audit (Part II)Clyde, Rob et al. | 2010
- 6
-
IT Audit Basics: Understanding the New SOC ReportsSingleton, Tommie W et al. | 2011
- 8
-
Book Review - Auditing and Security: AS-400, NT, UNIX, Networks and Disaster Recovery Plans - This book is an excellent text on the issues that IT auditors need to concentrate on to successfully audit the more common operating systems of AS-400, NT and UNIX, as well as networks.McMinn, Janine et al. | 2002
- 8
-
IS Security Matters: Converging Need, Diverging ResponseRoss, Steven J. et al. | 2006
- 8
-
No Harm, No FoulRoss, S. J. et al. | 2003
- 8
-
IT Security Matters: Alerts, Alarms and TriggersRoss, Steven J. et al. | 2007
- 8
-
IS Security Matters: Information Security and the Resilient EnterpriseRoss, Steven J. et al. | 2005
- 8
-
Information Ethics: Changing Times and the Eternality of EthicsRaval, Vasant et al. | 2012
- 8
-
IS Security Matters - No Harm, No FoulRoss, Steven J. et al. | 2003
- 8
-
Information Security and the Resilient EnterpriseRoss, S. J. et al. | 2005
- 8
-
Auditing and Security: AS/400, NT, UNIX, Networks and Disaster Recovery PlansMcMinn, J. et al. | 2002
- 8
-
The NetworkDholakia, Ketan et al. | 2014
- 9
-
Book Review - Digital Signatures Security and Control - The review notes the book's aim of providing clarity on the central issues surrounding the safe use of the web for normal business and commercial activities and describes the content of each of its seven chapters.Backhouse, James et al. | 2001
- 9
-
IS Security Matters: The Resilient ToothbrushRoss, Steven J. et al. | 2008
- 9
-
Digital Signatures Security and ControlBackhouse, J. et al. | 2001
- 9
-
IS Security Matters: Reliable Security, RevisitedRoss, Steven et al. | 2009
- 9
-
IS Security Matters - "Lingering Doubt" - Steve Ross, CISA, addresses the puzzlement when survey respondents answer questions one way, yet hold opinions in another directionRoss, Steve et al. | 2000
- 9
-
"Lingering Doubt"Ross, S. et al. | 2000
- 9
-
The Art of Deception: Controlling the Human Element of SecurityMcMinn, J. et al. | 2004
- 9
-
Five Questions With...Baron, Scott M et al. | 2011
- 9
-
Book Review - The Art of Deception: Controlling the Human Element of SecurityMcMinn, Janine et al. | 2004
- 10
-
IT Audit Basics: How to Properly Audit a ClientSingleton, Tommie W et al. | 2013
- 10
-
Standards. Statements, Guidelines - ISACA(R) Member and CISA(R) Compliance| 2003
- 10
-
IT Audit Basics: Testing Controls Associated With Data TransfersSingleton, Tommie W et al. | 2012
- 49
-
HelpSource Q& ALilly, Fred et al. | 2003
- 10
-
IS Security Matters - Vive le ROI - Steven J. Ross, CISA, discusses the return on investment conundrum that exists when investing in security. Investing in security is not like investing in stocks and bonds. One cannot put money in and simply wait for dividends and growth.Ross, Steven J. et al. | 2002
- 10
-
Vive le ROIRoss, S. J. et al. | 2002
- 10
-
Help Source - Help Source Q & ALilly, Fred et al. | 2004
- 11
-
IS Security Matters - Standard Questions - Steven J Ross, CISA, calls for differing, demand-driven international standards developed and disseminated after the market has decided which is best, not before.Ross, Steven J. et al. | 2001
- 11
-
IT Audit Basics: Sarbanes-Oxley StatusGallegos, Frederick et al. | 2005
- 11
-
IT Audit Basics: Generalized Audit Software: Effective and Efficient Tool for Today's IT AuditsSingleton, Tommie et al. | 2006
- 11
-
Information Ethics: The Piracy of PrivacyRaval, Vasant et al. | 2014
- 11
-
IT Value: Securing Value: Treasure Buried in Business CasesTieman, Chris et al. | 2007
- 11
-
Book Review: Enterprise Security for the Executive: Setting the Tone From the TopAxelrod, C W et al. | 2011
- 11
-
differing, demand-driven international standards developed and disseminated after the market has decided which is best, not beforeRoss, S. J. et al. | 2001
- 11
-
Sarbanes-Oxley StatusGallegos, F. et al. | 2005
- 12
-
Risk-aware Decision Making for New IT InvestmentsAtaya, G. et al. | 2003
- 12
-
IT Governance - Risk-aware Decision Making for New IT InvestmentsAtaya, Georges et al. | 2003
- 12
-
IT Audit Basics: What Every IT Auditor Should Know About IT Audits and DataSingleton, Tommie W. et al. | 2009
- 12
-
Standards, Statements, Guidelines - Standards and guidelines for maintaining compliance for both ISACATM membership and the CISA(R) designation are outlined and the status of ISACA issuances noted.| 2002
- 12
-
Book Review: Mobile Application SecurityCano, Jeimy J et al. | 2011
- 12
-
Standards and guidelines for maintaining compliance for both ISACA™ membership and the CISA® designation are outlined and the status of ISACA issuances noted| 2002
- 13
-
A Cost-effective Approach for Sarbanes-Oxley-regulated Application Systems With Minimal IT Control AssuranceJegousse, Loic et al. | 2011
- 13
-
Changing the Mind-set — Creating a Risk-conscious and Security-aware CulturePironti, John P et al. | 2012
- 13
-
IT Audit Basics: What Every IT Auditor Should Know About CybercrimesSingleton, Tommie W. et al. | 2008
- 13
-
Effective Use of Teams for IT AuditsKrist, M. A. et al. | 2000
- 13
-
Book Reviews - Effective Use of Teams for IT AuditsKrist, Martin A. et al. | 2000
- 13
-
IT Governance: Information Security Governance: Who Needs It?Brotby, Krag et al. | 2007
- 14
-
Standards, Statements, Guidelines - ISACA(R) Member and Certification Holder Compliance| 2006
- 14
-
IS Audit Basics: Risk to Entities Regarding Data BreachesSingleton, Tommie et al. | 2014
- 14
-
Information Ethics: Trust in Information SystemsRaval, Vasant et al. | 2013
- 15
-
Book Reviews - The Vest-Pocket Guide to Information Technology - Both of these books, reviewed by Sarathy Emani, CISA, received high marks from the reviewer. Both contain the promised information their titles indicateShim, Jae K. et al. | 2000
- 15
-
IT Governance: Driving Value From Information Security: A Governance PerspectiveKanhere, Vishnu et al. | 2009
- 15
-
The Vest-Pocket Guide to Information TechnologyShim, J. K. / Siegel, J. G. / Chi, R. et al. | 2000
- 15
-
Guest Editorial: Insights From Nature — An Alternate Approach to Information SecurityVazzari, Davide et al. | 2010
- 15
-
ISecurity Matters - Is the Future Unpredictable?Ross, Steven J. et al. | 2004
- 15
-
Is the Future Unpredictable?Ross, S. J. et al. | 2004
- 15
-
IT Value: The Drive for Value ManagementThorp, John et al. | 2008
- 16
-
How Safe Is Your Private Information?Joseph, Joanne et al. | 2013
- 16
-
IT Audit Basics - IT Audit Career Development PlanGallegos, Frederick et al. | 2003
- 16
-
IT Audit Career Development PlanGallegos, F. et al. | 2003
- 17
-
IT Governance: New Players, Challenges and OpportunitiesJohnson, Everett C. et al. | 2005
- 17
-
Assessing the European IT Governance ClimatePoole, V. et al. | 2001
- 17
-
IT Scenario Analysis in Enterprise Risk ManagementFischer, Urs et al. | 2011
- 17
-
Global Perspectives: IT Audit EducationRosenthal-Sabroux, Camille et al. | 2006
- 17
-
IT Governance - Assessing the European IT Governance Climate - Vernon Poole reports on the status of IT governance in Europe in the wake of increasing security attacks and the adoption of BS 7799 as an ISO standard in September 2000.Poole, Vernon et al. | 2001
- 17
-
Book Reviews - Review of ISACF publication: Control Objectives for Net Centric Technology - Peter Hill, CISA succinctly, yet thoroughly, describes what the potential readers of this four-volume set can expect and how the information imparted will help them in their professionHill, Peter et al. | 2000
- 17
-
Book Review: Fraud Analysis Technique Using ACLGumus, Tansu et al. | 2010
- 17
-
Book Review: IT Strategic and Operational ControlsPatricia Prandini, Maria et al. | 2014
- 17
-
Review of ISACF publication: Control Objectives for Net Centric TechnologyHill, P. et al. | 2000
- 17
-
Fraud Analysis Technique Using ACLVazzari, D. et al. | 2010
- 18
-
Book Review: Security MonitoringKanhere, Vishnu et al. | 2010
- 18
-
Security MonitoringGumus, T. et al. | 2010
- 18
-
IT Governance - The Role of the Auditor in IT Governance - Alex Woda discusses the importance, now more than ever, of the auditor's involvement in supporting and helping implement corporate governance in IT and management.Woda, Alex et al. | 2002
- 18
-
Plus - HelpSource Q & ALilly, Fred L. et al. | 2001
- 18
-
R&D Collaboration: The Process, Risks and CheckpointsFinne, Thomas et al. | 2003
- 18
-
COBIT 5 Processes From a Systems Management PerspectiveSuer, Myles et al. | 2014
- 18
-
The Role of the Auditor in IT GovernanceWoda, A. et al. | 2002
- 19
-
Computer Aided Fraud Prevention and Detection-A Step-by-step GuideKanhere, V. et al. | 2010
- 19
-
Standards, Statements, Guidelines - Procedures to maintain compliance for both ISACA membership and the CISA designation are outlined and the status of ISACA issuances is noted| 2000
- 19
-
Auditing Governance in ERP ProjectsSayana, S. A. et al. | 2004
- 19
-
IT Audit Basics - Auditing Governance in ERP ProjectsSayana, S.Anantha et al. | 2004
- 19
-
Book Review: Computer Aided Fraud Prevention and Detection — A Step-by-step GuideRai, Sajay et al. | 2010
- 19
-
Principles of Fraud Examination By Joseph T. WellsKanhere, V. et al. | 2006
- 19
-
Book Review: Principles of Fraud ExaminationWells, Joseph T. et al. | 2006
- 20
-
Global PerspectivesJones, Wayne et al. | 2005
- 20
-
IT Audit Basics: What Every IT Auditor Should Know About Auditing Information SecuritySingleton, Tommie W. et al. | 2007
- 20
-
Security Through Effective Penetration TestingTrull, Jonathan et al. | 2012
- 20
-
Top 10 Security and Privacy Topics for IT AuditorsNayyer, Shahab et al. | 2010
- 21
-
IT Governance: Containing Corporate Governance Costs: The Role of TechnologyJamal, Nazam et al. | 2006
- 21
-
Key Considerations When Evaluating ISRM Programs and CapabilitiesPironti, John P et al. | 2011
- 21
-
Automated User Authentication: The Final Frontier of Information SecurityWilloughby, M. K. et al. | 2001
- 21
-
Is the TJ Hooper Case Relevant for Today's Information Security Environment?Tester, Darlene et al. | 2013
- 21
-
Features - Automated User Authentication: The Final Frontier of Information Security - New forms of user authentication are required in the face of increasingly apparent password weaknesses. Only stronger user authentication can mount a frontal assault on the chief method information criminals use to gain unauthorized access: Masquerading as an authorized user.Willoughby, Mark K. et al. | 2001
- 21
-
Plus - Technical Q & A, HelpsourceLilly, Fred L. et al. | 2000
- 22
-
IT Governance - Boards and IT -- Unleash the Value, Put a Leash on the Risks - Erik Guldentops, CISA, discusses the need for boards and executives to put IT firmly onto their organization's governance agenda. Complexity, speed, interconnectivity and globalization make IT strategic to enterprise growth and render it essential for enterprise survival.Guldentops, Erik et al. | 2002
- 22
-
Boards and IT-Unleash the Value, Put a Leash on the RisksGuldentops, E. et al. | 2002
- 22
-
IT Governance - Key Success Factors for Implementing IT GovernanceGuldentops, Erik et al. | 2004
- 22
-
Key Success Factors for Implementing IT GovernanceGuldentops, E. et al. | 2004
- 23
-
Case Study: Building Acceptance and Adoption of COBIT at Sun MicrosystemsFrelinger, Bob et al. | 2005
- 23
-
Risk Assessment Tools: A PrimerSchreider, Tari et al. | 2003
- 23
-
IT Governance: Practices in IT Governance and Business-IT AlignmentHaes, Steven De et al. | 2008
- 23
-
Building Acceptance and Adoption of CobiT at Sun MicrosystemsFrelinger, B. et al. | 2005
- 24
-
Improving Regulatory Compliance: How to Make Content Protection Controls EffectiveMoeller, Robert et al. | 2007
- 24
-
Using Standards to Create Effect in the BoardroomKoning, Evert et al. | 2013
- 25
-
Auditing a Security Information Management SystemPironti, John P et al. | 2010
- 25
-
Managed Risk, Enhanced ResponseAdee, S. et al. | 2000
- 25
-
Computer Forensics-From Cottage Industry to Standard PracticePatzakis, J. M. et al. | 2001
- 25
-
Strengthening Information Security GovernanceGelbstein, Ed et al. | 2012
- 25
-
Practical Pointers - Managed Risk, Enhanced Response - Sean Adee, CISA, discusses how the next generation of security provides for real-time, consolidated, security-driven event monitoring for devices such as IDS and firewall products and the ability to monitor information from other resources such as operating systems and ERPSAdee, Sean et al. | 2000
- 25
-
When Chaos Rules, Only the Fittest Survive: The Impact of Disruptive Technologies on Organizational SurvivalSarup, Deepak et al. | 2006
- 25
-
IT Audit Basics - Due Professional Care - Frederick Gallegos, CISA, CGFM, CDE, focuses on the importance and process of due professional care, in this second installment of the Journal's newest column.Gallegos, Frederick et al. | 2002
- 25
-
Features - Computer Forensics -- From Cottage Industry to Standard Practice - Computer forensics is the collection, preservation, analysis and court presentation of computer-related evidence. The proper seizure and analysis of this evidence is important in any investigation where a computer is the means or an instrument of a crime or other offense or may contain evidence relevant to an investigation.Patzakis, John M. et al. | 2001
- 25
-
Standards, Statements, Guidelines ISACA® Member and Certification Holder Compliance| 2009
- 25
-
Due Professional CareGallegos, F. et al. | 2002
- 25
-
Auditing Oracle Databases Using CAATsCooke, Ian et al. | 2014
- 26
-
Business Continuity Management Standards -- A Side-by-side ComparisonZawada, Brian et al. | 2003
- 26
-
Case Study - IT Governance and Corporate Governance at INGRinnooy Kan, A.H.G. et al. | 2004
- 26
-
IT Value: Benefits Realisation and Programme Management: Beyond the Business CaseHarries, Sarah et al. | 2009
- 26
-
IT Governance and Corporate Governance at INGKan, A. H. G. R. et al. | 2004
- 27
-
The Struggle for Privacy and the Survival of the Secured in the IT EcosystemSathiyamurthy, Sudhakar et al. | 2011
- 28
-
Governance, Risk and Compliance — Tying It All TogetherPierre-Louis, Samuel et al. | 2013
- 28
-
The Unique Benefits and Risks of USB Mass Storage DevicesTharp, Tom et al. | 2007
- 28
-
Benefits of Year 2000 Work This feature-length article is a compilation of some of the lessons learned that were results of the extensive planning and alterations that occurred in preparation for Y2K. The comments were gleaned from the contingency planning listserv| 2000
- 28
-
Developing an Information Security and Risk Management StrategySivasubramanian, Vinoth et al. | 2010
- 28
-
Features - Benefits of Year 2000 Work - This feature-length article is a compilation of some of the lessons learned that were results of the extensive planning and alterations that occurred in preparation for Y2K. The comments were gleaned from the contingency planning listserv| 2000
- 29
-
Cybersecurity and the Future of E-commerce: The Role of the Audit CommunityPaliotta, A. R. et al. | 2001
- 29
-
Auditing Cyberinsurance PolicyOlakunle, Jide et al. | 2014
- 29
-
COBIT Control and Governance Maturity Survey - Participate in the COBIT Control and Governance Maturity Survey. The information gained as a result of the survey will be useful and beneficial to all who aspire to more effective IT governance.| 2002
- 29
-
Case Study: Assessing IT Security Governance Through a Maturity Model and the Definition of a Governance ProfileCarbonel, Jean-Christophe et al. | 2008
- 29
-
Crossword PuzzleMellor, Myles et al. | 2009
- 29
-
Features - Cybersecurity and the Future of E-commerce: The Role of the Audit Community - The author opines that a major attack now, if successful, could significantly influence the future development of the e-commerce business model and have severe ramifications for the victimized organization(s). The article advocates the need to continue and expand the auditing community's move toward a full partnership role with management.Paliotta, Allan R. et al. | 2001
- 29
-
COBIT Control and Governance Maturity Survey| 2002
- 30
-
The Changing Realities of RecoveryBrassil, Regina A. et al. | 2003
- 30
-
IT Governance and Post-merger Systems IntegrationPareek, Mukul et al. | 2005
- 31
-
Sharing or Controlling? Examining the Decision to Segregate Information Within the OrganizationFoerster, Carl A et al. | 2012
- 31
-
The IT Balanced Scorecard-A Roadmap to Effective Governance of a Shared Services IT OrganizationSaull, R. et al. | 2000
- 31
-
Justifying IT Projects: Connecting the Dots From Systems to Business ValueDutta, Amitava et al. | 2009
- 31
-
Case Study - The IT Balanced Scorecard - A Roadmap to Effective Governance of a Shared Services IT Organization - This article, written by Ronald Saull, MBA, CSP, Senior Vice President and Chief Information Officer of the Information Services division of Great-West Life, London Life and Investors Group, includes a discussion of the trend for consolidation and the consequent impact on IT operationsSaull, Ronald et al. | 2000
- 31
-
Guidance on Tax Compliance for Business and Accounting Software and SAF-TShue, Lily et al. | 2006
- 31
-
A Beginner's Guide to Auditing the AS-400 Operating System - This article provides the novice auditor, IT or otherwise, with an overview of how to perform an AS-400 operating system review.Bines, Judith S. et al. | 2002
- 31
-
A Beginner's Guide to Auditing the AS/400 Operating SystemBines, J. S. et al. | 2002
- 32
-
Mathematical Proofs of Mayfield's Paradox: A Fundamental Principle of Information Security| 2001
- 32
-
Features - Mathematical Proofs of Mayfield's Paradox: A Fundamental Principle of Information Security - The authors provide two mathematical proofs of Mayfield's Paradox, which states that keeping everyone out of an information system requires an infinite amount of money and getting everyone onto an information system requires an infinite amount of money, but the costs between these extremes are relatively low. By The University of New Haven Center for Cybercrime and Forensic Computer Investigation and The University of Southern California Department of Mathematics| 2001
- 33
-
Critical Information Systems ProcessesYildirim, Tugba et al. | 2014
- 33
-
What Is Your Risk Appetite? The Risk-IT ModelBooker, S. / Gardner, J. R. / Steelhammer, L. / Zumbakyte, I. et al. | 2004
- 33
-
Using Neural Network Software as a Forensic Accounting ToolCerullo, Michael J. et al. | 2006
- 33
-
Developing Metrics for Effective Information Security GovernancePironti, John P. et al. | 2007
- 33
-
Case Study - What Is Your Risk Appetite? The Risk-IT ModelBooker, Shirley et al. | 2004
- 33
-
End Point SecurityLeo, Martin et al. | 2008
- 34
-
Implementing Enterprise Security: A Case Study (Part 1)Doughty, Ken et al. | 2003
- 34
-
Common Myths of Service Organization Controls (SOC) ReportsSeshadri, Deepa et al. | 2013
- 35
-
Value Assessment Tool for ICT Projects at the European CommissionDzhumalieva, Stefka et al. | 2011
- 35
-
Measuring and Improving IT Governance Through the Balanced ScorecardGrembergen, Wim Van et al. | 2005
- 35
-
Increasing Security Levels - The increasing use of technology has exposed individuals to security issues. As biometric devices become more widely used to protect valuable assets and minimize unauthorized access, the accounting profession must prepare for the impact that this is likely to have on audits.Alga, Nadia et al. | 2002
- 35
-
Increasing Security LevelsAlga, N. et al. | 2002
- 36
-
Delivering Higher-quality Security Service Using Asset Identification in Resource-constrained EnvironmentsSavoy, Kevin et al. | 2010
- 36
-
People, Portfolios and Processes: The 3P Model of IT GovernanceSandrino-Arndt, Bop et al. | 2008
- 36
-
Mitigating the Risk of OSS-based DevelopmentGold, Charles et al. | 2012
- 36
-
Securing Emerging Internet ApplicationsNorifusa, M. et al. | 2001
- 36
-
Features - Securing Emerging Internet Applications - As the Internet has become more popular, the fundamental infrastructure of a seamless network no longer exists and no longer guarantees widely available and transparent communication. Using standard protocols requires coordination among multiple Internet administration points. Understanding these changes is the starting point to using the new Internet.Norifusa, Masaya et al. | 2001
- 37
-
The Effect of the COSO 2013 Update on IS ProfessionalsWhite, John H et al. | 2014
- 37
-
ISO/IEC 27001:2005 Implementation and Certification — Doing It Again and AgainOdeshina, Nurudeen et al. | 2013
- 37
-
Driving Value From Nonrevenue-generating Activities: Myths and Misunderstandings of Governance and Risk ManagementBarnier, Brian et al. | 2009
- 39
-
Auditing Printer SecurityMellor, Myles et al. | 2010
- 39
-
IT Governance Hands-on: Using COBIT to Implement IT GovernanceKordel, Luc et al. | 2004
- 39
-
Optimizing Controls to Test as Part of a Risk-based Audit StrategyPareek, Mukul et al. | 2006
- 39
-
Dispelling and Construction of Social Accounting in View of Social AuditShaikh, Junaid M. et al. | 2007
- 39
-
Corporate Responsibility, Retaining Top Management CommitmentDubey, Nikesh et al. | 2013
- 40
-
Features - The Balanced Scorecard and IT Governance - This article reflects research and observation by Wim Van Grembergen, PhD, a prolific writer on this topic. This article, as will be others in the future, emanated from workings of the ISACA IT Governance InstituteGrembergen, Wim Van et al. | 2000
- 40
-
A Case for a Partnership Between Information Security and Records Information ManagementAnderson, Kerry A et al. | 2012
- 40
-
The Balanced Scorecard and IT Governance This article reflects research and observation by Wim Van Grembergen, Ph.D., a prolific writer on this topic. This article, as will be others in the future, emanated from workings of the ISACA IT Governance Institute| 2000
- 41
-
Fighting Security Breaches and Cyberattacks with Two-Factor Authentication TechnologyWalker, T. et al. | 2001
- 41
-
The Computer Forensics and Cybersecurity Governance ModelBrancik, Kenneth C. et al. | 2003
- 41
-
Features - Fighting Security Breaches and Cyberattacks with Two-Factor Authentication Technology - In response to increasing attacks, companies should spend time planning a strategic layered defense that uses overlapping computer technologies to detect, react to and deter would-be hackers. The author recommends two-factor authentication, which matches who the user is with what the user has to ensure valid, reliable identification.Walker, Tony et al. | 2001
- 42
-
Key Elements of an Information Risk Management Program: Transforming Information Security Into Information Risk ManagementPironti, John P. et al. | 2008
- 42
-
Internal Audit's Contribution to the Effectiveness of Information Security (Part 1)John Steinbart, Paul et al. | 2014
- 43
-
Siebel's eBusiness Application and Controls - This article will focus on the Siebel eBusiness application architecture and the control considerations related to the quality aspects security, integrity, auditability and controllability.Jansen, Kees et al. | 2002
- 43
-
How Can Security Be Measured?Chapin, David A. et al. | 2005
- 43
-
Siebel's eBusiness Application and ControlsJansen, K. et al. | 2002
- 43
-
Plus - CE Quiz #75, Based on Volume 6, 2000, E-commerce -- The Next PermutationOringel, Joey et al. | 2001
- 43
-
Mac OS X: A Secure Platform and a Valuable Security Tool in a Distributed Network EnvironmentHumphrey Jr, Robert B. et al. | 2006
- 43
-
Securing Merchant Environments Is Good, Securing the Credit Card Itself Is BetterAlaswad, Ali et al. | 2013
- 44
-
Computer Forensics Technologies for Personally Identifiable Information Detection and AuditsSubramaniam, Gan et al. | 2010
- 44
-
Features - Enhancing IT Governance Through Enterprise Management Software Solutions - Taking a different tack from the other articles, this one is centered on key features in most enterprise management software and vendors who offer these as specific products or in suitesAyers, Susan et al. | 2000
- 44
-
Enhancing IT Governance Through Enterprise Management Software SolutionsAyers, S. / Fentress, D. et al. | 2000
- 45
-
Fundamental Concepts of IT Security AssuranceHamidovic, Haris et al. | 2012
- 45
-
Value of IT: Beyond the TheoreticalUcedaVelez, Tony et al. | 2009
- 45
-
An Introduction to ICT Continuity Based on BS 25777Hamidovic, Haris et al. | 2011
- 46
-
ERP Security and Segregation of Duties Audit: A Framework for Building an Automated SolutionHendrawirawan, David et al. | 2007
- 47
-
Continuous Auditing Through Leveraging TechnologySarva, Stinivas et al. | 2006
- 47
-
Principles of IT GovernanceHamaker, Stacey et al. | 2004
- 47
-
Why Should Organizations Care About Professional Certifications?Smart, Bob et al. | 2013
- 48
-
Usefulness of an Information Security Management Maturity ModelCanal, Vicente Aceituno et al. | 2008
- 48
-
Why Computer Ethics Matters to Computer AuditingLee, Wanbil W et al. | 2014
- 49
-
Choosing and Using Sarbanes-Oxley SoftwareBagranoff, Nancy A. et al. | 2005
- 49
-
Plus - CPE Quiz #69Oringel, Joey et al. | 2000
- 51
-
Social Engineering: A Tip of the Iceberg - With the evolution of information technology towards constructive causes, antisocial elements have quickly followed and today one of the biggest problems faced by IT is hacking. Social engineering involves gaining sensitive information or unauthorized access privileges by building inappropriate trust relationships with insiders.Damle, Pramod et al. | 2002
- 51
-
Continuous Auditing From a Practical PerspectiveHandscombe, Kevin et al. | 2007
- 51
-
CPE Quiz #87, based on volume 6, 2002Oringel, Joe et al. | 2003
- 51
-
Return on Information TechnologyUnwala, Huzeifa et al. | 2004
- 51
-
Social Engineering: A Tip of the IcebergDamle, P. et al. | 2002
- 51
-
Red Teams: An Audit Tool, Technique and Methodology for Information AssuranceGallegos, Frederick et al. | 2006
- 52
-
The Hidden Values of IT Risk ManagementAbram, Timothy et al. | 2009
- 52
-
Benchmark Yourself Against the Best in the WorldKent, Ben et al. | 2005
- 52
-
CISAs and CISMs Working in Sync: How Their Individual Contributions Together Can Achieve Effective IT Risk ManagementSardanopoli, Vito et al. | 2008
- 53
-
CPE Quiz #135 - Based on Volume 6, 2010Totade, Smita et al. | 2011
- 53
-
CPE Quiz #141 - Based on Volume 6, 2011Totade, Smita et al. | 2012
- 53
-
Aligning Information Security With Enterprise Risk Management Using ISO/IEC 27001:2013Mani, Vimal et al. | 2014
- 53
-
Deploying Wireless Technology -- A Case for IT Governance - The success of a wireless deployment depends on the appropriateness of the components selected from each of these categories. Furthermore, the mere investment in new technologies is not enough. Its success is reliant on its deployment through such frameworks as IT governance.Oak, Pratap et al. | 2002
- 53
-
CPE Quiz #129 - Based on Volume 6, 2009| 2010
- 53
-
CPE Quiz #147 - Based on Volume 6, 2012Totade, Smita et al. | 2013
- 53
-
Deploying Wireless Technology-A Case for IT GovernanceOak, P. et al. | 2002
- 54
-
Information Security Policies and Controls for a Trusted EnvironmentSrinivasan, S. et al. | 2008
- 54
-
The Auditor's Prerogative to Review Internal ControlsMuthukrishnan, Ravi et al. | 2004
- 54
-
Introduction to Voice-over IP TechnologyKhan, Kamal et al. | 2005
- 55
-
Standards, Guidelines, Tools and Techniques| 2012
- 55
-
Standards, Guidelines, Tools and Techniques: ISACA Member and Certification Holder Compliance| 2010
- 56
-
Achieving Privacy Through Security MeasuresAxelrod, C.Warren et al. | 2007
- 57
-
Wireless LAN Risks and Vulnerabilities - This article provides an overview of how wireless LANs work, while reviewing the risks, vulnerabilities and threats that affect wireless networks differently from their wired brethren.Stanley, Richard A. et al. | 2002
- 57
-
Value Chain Control -- An IT Control Approach That Puts Business in the CentreHuijgens, Hennie et al. | 2004
- 57
-
CPE Quiz #99 - Based on volume 6, 2004Khan, Kamal et al. | 2005
- 57
-
Wireless LAN Risks and VulnerabilitiesStanley, R. A. et al. | 2002
- 57
-
CPE Quiz #153 - Based on Volume 6, 2013 — Security and ComplianceTotade, Smita et al. | 2014
- 59
-
CPE Quiz #117 - Based on Volume 6, 2007Rafeq, A. et al. | 2008
- 59
-
CPE Quiz #106 - Based on Volume 6, 2005Khan, Kamal et al. | 2006
- 59
-
CPE Quiz #123 - Based on Volume 6, 2008Rafeq, A. et al. | 2009
- 63
-
CPE Quiz #93, based on volume 6, 2003Oringel, Joe et al. | 2004
- 63
-
CPE Quiz #111 - Based on Volume 6, 2006Khan, Kamal et al. | 2007
-
ISACA Bookstore Price List Supplement| 2006
-
Plus - ISACA Bookstore Price List - Supplement| 2000
-
ISACA Bookstore Supplement| 2012
-
Plus - ISACA Bookstore Offerings - Supplement| 2000