Bitcoin Boosting Business (Englisch)
- Neue Suche nach: Wardini, Josh
- Neue Suche nach: Wardini, Josh
In:
ISACA journal
;
5
;
43-47
;
2018
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:Bitcoin Boosting Business
-
Beteiligte:Wardini, Josh ( Autor:in )
-
Erschienen in:ISACA journal ; 5 ; 43-47
-
Verlag:
- Neue Suche nach: Information Systems Audit and Control Association
-
Erscheinungsdatum:01.01.2018
-
Format / Umfang:5 pages
-
ISSN:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 657.450285
- Weitere Informationen zu Dewey Decimal Classification
-
Klassifikation:
DDC: 657.450285 -
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis – Band 5
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Information Security Matters: Why We FailedRoss, Steven J. et al. | 2018
- 3
-
Information Security Matters: Are Software Flaws a Security Problem?Ross, Steven J. et al. | 2015
- 3
-
Information Security Matters: Information Security in the Multi-Modal EraRoss, Steven J. et al. | 2017
- 3
-
Information Security Matters: The Train of DangerRoss, S.J. et al. | 2011
- 4
-
Information Security Matters: Unsung Security HeroesRoss, Steven J. et al. | 2016
- 4
-
Information Security Matters: Is Security a Wall or a Door?Ross, S.J. et al. | 2012
- 4
-
Information Security Matters: The Mayor and the SheriffRoss, S.J. et al. | 2010
- 4
-
Information Security Matters: Emo, Ergo SumRoss, S.J. et al. | 2013
- 4
-
CyberCERTRoss, S.J. et al. | 2014
- 5
-
IS Audit Basics: Helping Auditees Prepare for an IS/IT AuditGelbstein, Ed et al. | 2015
- 6
-
Cloud Computing: Managing Data With a Streamlined SolutionSelway, P. / Schulte, J. et al. | 2013
- 6
-
The NetworkMurphy, Kevin et al. | 2018
- 6
-
The Three Lines of Defence Related to Risk GovernanceDoughty, K. et al. | 2011
- 6
-
IS Audit Basics: Doing More With LessCooke, Ian et al. | 2017
- 6
-
Cloud Computing: Cloud Storage-Bursting Through the HypeBarrasso, R. / Wallace, M. et al. | 2012
- 7
-
IT Audit Basics: Mitigating IT Risks for Logical AccessSingleton, T.W. et al. | 2010
- 7
-
IS Audit Basics: The Soft Skills Challenge, Part 4Gelbstein, Ed / Baldi, Stefano et al. | 2016
- 8
-
IS Auditing Basics: Auditing the IoTCooke, Ian / Raghu, R. V. et al. | 2018
- 8
-
Information Ethics: Where the Rubber Meets the RoadRaval, V. et al. | 2013
- 8
-
Machine EthicsRaval, V. et al. | 2014
- 9
-
Information Ethics: Ethics in COBIT 5Raval, V. et al. | 2012
- 9
-
Cloud Computing: Governance in the CloudKirkpatrick, J. et al. | 2011
- 10
-
Cloud Computing: Cloud Application Enables ViralMint to Turn Potential Disaster Into SuccessMandalam, Siva / Dighe, Rohan et al. | 2015
- 11
-
Five Questions WithSchperberg, R. et al. | 2010
- 11
-
IT Audit Basics: Auditing IT Risk Associated With Change Management and Application DevelopmentSingleton, T.W. et al. | 2011
- 11
-
What Every IT Auditor Should Know About Computer-generated ReportsSingleton, T. et al. | 2014
- 12
-
IS Audit Basics: What Every IT Auditor Should Know About Transforming Data for CAATsSingleton, T. et al. | 2013
- 12
-
Book Review: The Lure: The True Story of How the Department of Justice Brought Down Two of the World's Most Dangerous Cyber CriminalsKivisild, A. Krista et al. | 2015
- 12
-
IT Audit Basics: What Every IT Auditor Should Know About Auditing Social MediaSingleton, T.W. et al. | 2012
- 13
-
The Practical Aspect: Mergers and Acquisitions, Should Internal Audit Be Involved in Due Diligence?Raval, Vasant / Jalan, Chandni et al. | 2018
- 13
-
The Practicle Aspect: Blind Spots On The Cloud PlatformRaval, Vasant / Lux, Don et al. | 2017
- 13
-
Book Review: Smart Grid Security: An End-to-End View of Security in the New Electrical GridIppoliti, Dino et al. | 2015
- 13
-
Book Review: Fraud 101: Techniques and Strategies for Understanding Fraud, 3^r^d EditionMichaelson, G. et al. | 2010
- 14
-
Vendor Risk Management DemystifiedPatel, Dipti et al. | 2015
- 14
-
Book Review: Information Technology Risk Management in Enterprise EnvironmentsKanhere, V. et al. | 2010
- 14
-
Information Ethics: The Challenge of Being ``Good''Raval, Vasant et al. | 2016
- 15
-
Imperfect Technologies and Digital HygieneGelbstein, E. et al. | 2014
- 15
-
Understanding the Core Concepts in COBIT 5De Haes, S. / Debreceny, R. / Van Grembergen, W. et al. | 2013
- 15
-
An Approach Toward Sarbanes-Oxley ITGC Risk AssessmentMehta, A. et al. | 2010
- 17
-
Vendor Governance in the Age of Information SecurityHeald, Arian Eigen et al. | 2015
- 17
-
IT Governance and the Cloud: Principles and Practice for Governing Adoption of Cloud ComputingSpeed, R. et al. | 2011
- 17
-
Design With the End in MindSathiyamurthy, Sudhakar et al. | 2017
- 17
-
Guest Editorial: Digital Transformation Insight for 21^s^t Century OrganizationsTouhill, Gregory J. et al. | 2018
- 18
-
Book Review: Handbook for Internal AuditorsKarin, H. et al. | 2012
- 19
-
Social Networks and Privacy-Threats and ProtectionNdiandukue, G.-H.N. et al. | 2012
- 20
-
Seven Ways SMEs Can Benefit From GRC SolutionsWilhelms, D. et al. | 2010
- 20
-
Sponsored Feature: Innovating Internal Audit to Unlock ValueYoung, Clay / Kiaer, Erik et al. | 2018
- 20
-
The Value of Big Data Analytics to the BusinessMohapatra, B. / Parisa, V. / Banerjee, J. et al. | 2014
- 20
-
How to Audit the Human Element and Assess Your Organization's Security RiskPendergast, Tom et al. | 2016
- 22
-
Digital Transformation? Boards Are Not Ready for ItPearce, Guy et al. | 2018
- 22
-
A Case for a Process-based Approach to GRCRamanathan, S. et al. | 2010
- 23
-
IT General and Application Controls: The Model of InternalizationPalmas, E. et al. | 2011
- 23
-
Using COBIT 5 for Data Breach PreventionNicho, M. / Fakhry, H. et al. | 2013
- 24
-
Blockchain: Identifying Risk on the Road to Distributed LedgersCaron, Filip et al. | 2017
- 24
-
Three Ways to Simplify Auditing Software Security Requirements and DesignSethi, Rohit / Foroughi, Ehsan et al. | 2015
- 24
-
Meeting PCI DSS When Using a Cloud Service ProviderAhmed, A. et al. | 2012
- 25
-
Cyberinsurance: Value Generator or Cost Burden?Ishaq, Syed K. et al. | 2016
- 27
-
Impacts of Blockchain on the Auditing ProfessionBrender, Nathalie / Gauthier, Marion et al. | 2018
- 27
-
The Price of MobilityYu, W.E. et al. | 2014
- 27
-
Analyzing IT Value Management at KLM Through the Lens of Val ITDe Haes, S. / Gemke, D. / Thorp, J. / Van Grembergen, W. et al. | 2011
- 28
-
Risk-based Approach to IT Systems Life Cycle and Change ControlJegousse, L. et al. | 2010
- 29
-
Deep Web Data Extraction Based on URL and Domain ClassificationBanu, B. Aysha / Chitra, M. et al. | 2015
- 30
-
Instilling a Culture of Security Starts With Information GovernanceKelly, T. Sean et al. | 2017
- 31
-
Manage Requirements Volatility to Manage Risks in IS Development ProjectsSakthivel, S. et al. | 2010
- 31
-
Privacy Assurance for BYODChaudhary, A. et al. | 2014
- 31
-
Cloud Risk-10 Principles and a Framework for AssessmentVohradsky, D. et al. | 2012
- 31
-
A COBIT Approach to Regulatory Compliance and Defensible DisposalLuellig, L. / Frazier, J. et al. | 2013
- 32
-
An Integrated Approach for Cyberthreat Monitoring Using Open-source SoftwareCaliskan, Furkan et al. | 2016
- 33
-
How Boards Engage in Digital Strategy and OversightDe Haes, Steven / Caluwe, Laura / Joshi, Anant / Huygh, Tim et al. | 2018
- 33
-
Security and Privacy Challenges of IoT-enabled SolutionsSubramanian, Sivarama / Gopal, Varadarajan Vellore / Muthusamy, Marimuthu et al. | 2015
- 35
-
In-memory Computing-Evolution, Opportunity and RiskYu, W.E. et al. | 2013
- 35
-
FISMA 2010: What It Means for IT Security ProfessionalsModi, T. et al. | 2010
- 35
-
Beyond BYOD-Can I Connect My Body to Your Network?Pozza, G. et al. | 2014
- 35
-
Barriers and Enablers to Auditors Accepting Generalized Audit SoftwareBradford, Marianne / Henderson, Dave et al. | 2017
- 35
-
The Impact of Governance on Identity Management ProgramsEtges, R. / Ruysam, A. et al. | 2011
- 37
-
Balancing the Cybersecurity BattlefieldBhasker, Daksha et al. | 2016
- 37
-
Auditing Linux/Unix Server Operating SystemsRahman, Muhammad Mushfiqur et al. | 2015
- 39
-
Manage What Is Known and What Is Not KnownFu, Z. / Lainhart, J.W. / Stubbs, A. et al. | 2014
- 39
-
A Framework for Estimating ROI of Automated Internal ControlsDutta, A. / Dopp, D. et al. | 2011
- 40
-
Solving the Identity and Access Management ConundrumRavindran, S.T. et al. | 2013
- 41
-
Planning for Information Security Testing—A Practical ApproachKorpela, Karina / Weatherhead, Paul et al. | 2016
- 41
-
Giving Sustainability to COBIT PO9Prisca, V. / Moreira, M. et al. | 2010
- 42
-
How Strong Is Strong User Authentication?Campi, A. et al. | 2012
- 43
-
Bitcoin Boosting BusinessWardini, Josh et al. | 2018
- 43
-
Addressing Shared Risk in Product Application Vulnerability AssessmentsWerneburg, Michael et al. | 2017
- 44
-
How to Measure Security From a Governance PerspectiveVolchkov, A. et al. | 2013
- 44
-
State and impact of Governance of Enterprise IT in OrganizationsDe Haes, Steven / Joshi, Anant / Van Grembergen, Wim et al. | 2015
- 45
-
Use of the Balanced Scorecard for IT Risk ManagementKapur, R. et al. | 2010
- 45
-
The Significance of the Dodd-Frank ActMarks, L. et al. | 2011
- 46
-
A Little Bit of History Repeating Itself-Nolan's Stages Theory and the Modern IS AuditorHollyhead, A. / Robson, A. et al. | 2012
- 47
-
Anatomy of an IoT DDoS Attack and Potential Policy ResponsesMukundhan, Hari et al. | 2017
- 48
-
Speeding Up Software Delivery With Effective Change ManagementBass, Evan / Haskins-Hafer, W. Noel et al. | 2018
- 49
-
Leading Change and Transformation in Information SecurityMasika, J.S. et al. | 2014
- 50
-
Data Protection Act and GAPP AlignmentKhan, Mohammed J. et al. | 2015
- 51
-
A Critical Perspective on Safeguard Selection ProcessesBeissel, Stefan et al. | 2016
- 52
-
Assessing and Managing IT Operational and Service Delivery RiskCopley, J. / Parekh, U. et al. | 2014
- 54
-
Tools: Can Penetration Testing Tools Help an Audit?Moyle, Ed et al. | 2017