More Than a Specialized Concern:Survey of Public Sector Board Members Has Implications for IT Governance (Englisch)
- Neue Suche nach: Capozzi, M.
- Neue Suche nach: Singleton, J.
- Neue Suche nach: Capozzi, M.
- Neue Suche nach: Singleton, J.
In:
INFORMATION SYSTEMS CONTROL JOURNAL
;
1
;
15-19
;
2002
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:More Than a Specialized Concern:Survey of Public Sector Board Members Has Implications for IT Governance
-
Beteiligte:Capozzi, M. ( Autor:in ) / Singleton, J. ( Autor:in )
-
Erschienen in:INFORMATION SYSTEMS CONTROL JOURNAL ; 1 ; 15-19
-
Verlag:
- Neue Suche nach: INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION
-
Erscheinungsdatum:01.01.2002
-
Format / Umfang:5 pages
-
ISSN:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 657.4550285
- Weitere Informationen zu Dewey Decimal Classification
-
Klassifikation:
DDC: 657.4550285 -
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis – Band 1
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Information Security Matters: Extra, Extra, Read All About ItRoss, Steven J et al. | 2014
- 4
-
Guest Editorial: Forget the Governance! What to Do When the CEO Says 'Get It Done!'Guldentops, Erik et al. | 2013
- 4
-
Information Security Matters: A Room With MachinesRoss, Steven J et al. | 2012
- 4
-
Taking a Look Back: The EDP Auditor — Success or Famine - Excerpted and reprinted from The EDP Auditor Journal, Winter 1975| 2009
- 4
-
IS Security Matters: Cloudy DazeKostic, Linda et al. | 2010
- 4
-
Information Security Matters: A Fundamental QuestionRoss, Steven J et al. | 2011
- 5
-
Editorial - Issues & Comments - Editor-in-Chief Michael P Cangemi, CISA, CPA addresses one of the greatest threats to a business or company: Misuse of e-mail. Among other topics, he also addresses corporate governance and accounting for earnings in the United StatesCangemi, Michael P. et al. | 2000
- 5
-
Editodal - Issues & CommentsCangemi, Michael et al. | 2005
- 5
-
Dysfunctional IT-A Business IssueNicholson, H. et al. | 2008
- 5
-
Editorial - Issues & Comments - Editor in Chief Michael P. Cangemi, CISA, CPA, discusses the role of the board in information security, IT governance and the foundation's 25th anniversary, then proudly declares himself an IT optimist.Cangemi, Michael P. et al. | 2001
- 5
-
Editorial - Issues & CommentsCangemi, Michael et al. | 2004
- 5
-
Information Security Matters: Mean TimesRoss, Steven J et al. | 2013
- 5
-
Cloud Computing: Process Automation From the CloudRauscher, Jeff et al. | 2014
- 5
-
Issues&CommentsCangemi, M. et al. | 2003
- 5
-
Guest Editorial: Dysfunctional IT -- A Business IssueNicholson, Howard et al. | 2008
- 5
-
The Reality We Can All Agree OnBostick, J. et al. | 2009
- 5
-
Editorial - Issues & Comments - Editor in Chief Michael Cangemi, CISA, CPA, discusses the new and more vigorous importance placed on disaster recovery plans in light of the recent terror attacks in the United States.Cangemi, Michael et al. | 2002
- 5
-
Guest Editorial: The Reality We Can All Agree OnBostick, John et al. | 2009
- 5
-
The new and more vigorous importance placed on disaster recovery plans in light of the recent terror attacks in the United StatesCangemi, M. et al. | 2002
- 6
-
IT Audit Basics: The Minimum IT Controls to Assess in a Financial Audit (Part I)Rafeq, A et al. | 2010
- 6
-
Cloud Computing: Securing Cloud-based ApplicationsMendelsohn, Michael et al. | 2012
- 7
-
Cloud Computing: Shifting the Focus to Long-term, Value-add Projects With a Cloud EnvironmentPirooz, Shahin et al. | 2013
- 7
-
IT Audit Basics: How the IT Auditor Can Make Substantive Contributions to a Financial AuditSingleton, Tommie W et al. | 2011
- 7
-
IS Audit Basics: Understanding the Cybercrime WaveSingleton, Tommie et al. | 2014
- 7
-
IS Security Matters: Dumb Luck, Smart RiskRoss, Steven et al. | 2008
- 8
-
IS Security Matters: Is Information Security a Threat to Resilience?Ross, Steven J. et al. | 2005
- 8
-
IS Security Matters: Contents and ContextRoss, Steven J. et al. | 2006
- 8
-
IS Security Matters: Professor Watts Explains It AllRoss, Steven J. et al. | 2007
- 9
-
IS Security Matters - "Fishy Stories" - Steve Ross, CISA, addresses the incongruities in reported figures citing dollar losses to Internet fraud and other crimes, such as violation of software licenses in relation to an auditor's need to use statistics to budget for securityRoss, Steve et al. | 2000
- 9
-
Book Review - COBIT(R) Management Guidelines - The review describes the Guidelines' components, maturity models, critical success factors, key goal indicators and key performance indicators, and outlines their use in the business environment.Elysée, Michael et al. | 2001
- 9
-
Book Review - Intrusion Signatures and Analysis - The authors have produced a book that holds a wealth of knowledge, which can be used as an in-depth learning tool to help the reader pick out an intrusion signature from amongst the general noise of a system or network log.Jelleyman, Ashley et al. | 2002
- 9
-
IT Audit Basics: The COSO Model: How IT Audtiors Can Use IT to Measure the Effectiveness on Internal Controls (Part 2)Singleton, Tommie W. et al. | 2008
- 9
-
IT Audit Basics: Evaluating Access Controls Over DataSingleton, Tommie W et al. | 2012
- 9
-
Intrusion Signatures and AnalysisJelleyman, A. et al. | 2002
- 9
-
Lessons from Tragedy, RevisitedRoss, S. et al. | 2003
- 9
-
IS Security Matters: Four Little WordsRoss, Steven J. et al. | 2009
- 9
-
Maybe We Have WonRoss, S. J. et al. | 2004
- 9
-
"Fishy Stories" Steve Ross, CISA, addresses the incongruities in reported figures citing dollar losses to Internet fraud and other crimes| 2000
- 9
-
IS Security Matters - Maybe We Have WonRoss, Steven J. et al. | 2004
- 9
-
COBIT® Management GuidelinesElysee, M. et al. | 2001
- 9
-
IS Security Matters - Lessons from Tragedy, RevisitedRoss, Steven et al. | 2003
- 10
-
Five Questions With...Kanhere, Vishnu et al. | 2010
- 10
-
IT Audit Basics: How to Properly Audit a Client Who Uses a Service Organization — SOC Report or No SOC ReportSingleton, Tommie W et al. | 2013
- 11
-
Is Security Matters - Lessons from Tragedy - Steven J. Ross, CISA, provides his perspective of the recent terrorist attacks and examines the valuable lessons that businesses can learn from the events as they, the US and the world recover and prepare for the future.Ross, Steven J. et al. | 2002
- 11
-
IT Audit Basics - Strategy Issues: Sarbanes-Oxley Is Only Part of the SolutionGallegos, Frederick et al. | 2004
- 11
-
Lessons from TragedyRoss, S. J. et al. | 2002
- 11
-
Standards, Statements, Guidelines - ISACA(R) Member and CISA(R) Compliance| 2003
- 11
-
IT Audit Basics: Auditing Business ContinuitySayana, S.Anantha et al. | 2005
- 11
-
IT Audit Basics: COBIT -- A Key to Success as an IT AuditorSingleton, Tommie W. et al. | 2006
- 11
-
IT Value: Value Management PrinciplesGuldentops, Erik et al. | 2007
- 11
-
Book Review - The Definitive Handbook of Business Continuity Management - The review outlines the book's structure and notes its 20-plus case studies, how-to guide and certification standards for business continuity practitioners.Hiles, Andrew et al. | 2001
- 11
-
The Definitive Handbook of Business Continuity Management, by Andrew Hiles and Peter BarnesSarathy, E. et al. | 2001
- 11
-
Strategy Issues: Sarbanes-Oxley Is Only Part of the SolutionGallegos, F. et al. | 2004
- 11
-
ISACA® Member and CISA® Compliance| 2003
- 12
-
The Definitive Handbook of Business Continuity Management, 2^n^d EditionRafeq, A. et al. | 2010
- 12
-
Book Review: IT Governance for CEOs and Members of the BoardEtea, Ibe Kalu et al. | 2014
- 12
-
Book Review: The Definitive Handbook of Business Continuity Management, 2nd Editionde la Fuente, Reynaldo J et al. | 2010
- 13
-
Book Review - Activity-Based Information Systems - This review, written by Rob G Berkhof, CPA, RI, describes one of the many new books offered through the ISACA Bookstore. This book describes the transformation activity-based costing management is undergoing and puts forth steps for the process of learning and implemention from phase to phaseNair, Mohan et al. | 2000
- 13
-
IT Governance: Dysfunctional Operations in ITAnderson, Kent et al. | 2008
- 13
-
Book Reviews - e-Commerce Security -- Network Perimeter SecurityDeloitte et al. | 2003
- 13
-
Standards, Statements, Guidelines - Standards and guidelines for maintaining compliance for both ISACATM membership and the CISAx designation are outlined and the status of ISACA issuances noted.| 2002
- 13
-
Book Review: Applied Oracle SecurityKarin, Horst et al. | 2011
- 13
-
IT Audit Basics: What Every IT Auditor Should Know About SamplingSingleton, Tommie W. et al. | 2009
- 13
-
Standards and guidelines for maintaining compliance for both ISACA™ membership and the CISA designation are outlined and the status of ISACA issuances noted| 2002
- 13
-
e-Commerce Security-Network Perimeter Security By Deloitte & ToucheMansour, C. et al. | 2003
- 13
-
Why Passwords Persist Steven J. Ross, CISA, examines the myths and realities surrounding the effectiveness of passwords as security measures| 2001
- 13
-
Book Review: Emerging Topics and Technologies in Information SystemsSuan, Bok Hai et al. | 2010
- 13
-
Emerging Topics and Technologies in Information SystemsKanhere, V. et al. | 2010
- 13
-
Activity-Based Information SystemsNair, M. et al. | 2000
- 13
-
IS Security Matters - Why Passwords Persist - Steven J Ross, CISA, examines the myths and realities surrounding the effectiveness of passwords as security measures.Ross, Steven J. et al. | 2001
- 13
-
Book Review: Big Data: A Revolution That Will Transform How We Live, Work, and ThinkParekh, Upesh et al. | 2014
- 14
-
The Many Faces of IT Governance: Crafting an IT Governance ArchitectureRobinson, Nick et al. | 2007
- 14
-
Standards, Statements, Guidelines - ISACA(R) Member and Certification Holder Compliance| 2004
- 14
-
The Business Value of ITde la Fuente, R.J. et al. | 2010
- 14
-
ISACA® Member and Certification Holder Compliance| 2004
- 14
-
Book Review: The Business Value of ITSchmittling, Ron et al. | 2010
- 14
-
IT Governance: Security Folklore, Facts and the FutureSouthgate, Roger et al. | 2005
- 14
-
SCADA Cybersecurity FrameworkMalaviya, Samir et al. | 2014
- 14
-
Book Review: Hacking Exposed: Malware and RootkitsKanhere, Vishnu et al. | 2011
- 14
-
Database Backup and Recovery Best PracticesNavid Akhtar, Ali et al. | 2012
- 15
-
IT Governance - Spotlight on GovernanceHamaker, Stacey et al. | 2003
- 15
-
Stepping Through the IS AuditBayuk, J. et al. | 2000
- 15
-
IT Governance - More Than a Specialized Concern:Survey of public Sector Board Members Has Implications for IT Governance - Maria Capozzi, MPA, BA, and Jon Singleton, CISA, CA, explore a recent study that examines the board governance practices of various public sector boards within the government reporting entity, completed by Canada's Provincial Auditor's Office, and how the results can be considered in the context of IT governance.Capozzi, Maria et al. | 2002
- 15
-
Spotlight on GovernanceHamaker, S. et al. | 2003
- 15
-
Book Review - Stepping Through the IS Audit This book shifts perspective and shows the auditee what to expect when this may be a first-time occurrence. The reviewer, Bob Darlington, CISA, CIA, recommends purchasing this book for new auditors beginning in the profession and for auditeesBayuk, Jennifer et al. | 2000
- 15
-
More Than a Specialized Concern:Survey of Public Sector Board Members Has Implications for IT GovernanceCapozzi, M. / Singleton, J. et al. | 2002
- 15
-
Did We Hear the Warning Shot?Raval, Vasant et al. | 2010
- 16
-
Case Study: IT Security Governance -- A Slow Start to a High maturity LevelBitterli, Peter R. et al. | 2005
- 16
-
Auditing Security Risks in Virtual IT SystemsChaudhuri, Abhik et al. | 2011
- 16
-
Book Review: IT Governance: A Pocket GuideSule, Dauda et al. | 2013
- 17
-
Global Perspectives: IT GovernanceFonseca, Dante Ferrini et al. | 2006
- 17
-
IT Governance: The Role of the IT Auditor in IT GovernanceHardy, Gary et al. | 2009
- 17
-
Standards, Statements, Guidelines - Procedures to maintain compliance for both ISACA membership and the CISA designation are outlined and the status of ISACA issuances is noted| 2000
- 17
-
The Law of Unintended Consequences? Assessing the Costs, Benefits and Outcomes of the Sarbanes-Oxley ActAlles, M. / Kogan, A. / Vasarhelyi, M. et al. | 2004
- 17
-
Procedures to maintain compliance for both ISACA membership and the CISA designation are outlined and the status of ISACA issuances is noted| 2000
- 17
-
Standards, Statements, Guidelines - Standards and guidelines for maintaining compliance for both ISACA membership and the CISA designation are outlined and the status of ISACA issuances noted.| 2001
- 17
-
Commentary - The Law of Unintended Consequences? Assessing the Costs, Benefits and Outcomes of the Sarbanes-Oxley ActAlles, Michael et al. | 2004
- 17
-
Governance Implementation — COBIT 5 and ISOMarks, Larry et al. | 2013
- 18
-
Performing a Security Risk AssessmentSingh, Anand et al. | 2010
- 18
-
IT Governance - Businesses Today Are Undergoing a Chemical Change - John W Lainhart IV, CISA, reports on the changes impacting businesses today in the wake of the e-commerce revolution and points out the need for IT governance to keep control over the enterprise's investment.Lainhart IV, John W. et al. | 2001
- 18
-
IT Value: IT Project Cancellations: Pay Now or Pay LaterThorp, John et al. | 2008
- 18
-
Businesses Today Are Undergoing a Chemical ChangeLainhart, J. W. et al. | 2001
- 19
-
Plus - Technical Q & A, HelpsourceLilly, Fred L. et al. | 2000
- 19
-
Key Considerations in Protecting Sensitive Data Leakage Using Data Loss Prevention ToolsKumaresan, Nageswaran et al. | 2014
- 19
-
Standards, Statements, Guidelines ISACA® Member and Certification Holder Compliance| 2009
- 20
-
IT Audit Basics - The IS Audit Process - S. Anantha Sayana, CISA, CIA, writing the first of the Journal's new column, focuses on the audit process -- What it is and what it involves.Sayana, S.Anantha et al. | 2002
- 20
-
CobiT 4.0 By IT Governance InstituteSingh-Latulipe, R. et al. | 2006
- 20
-
The IS Audit ProcessSayana, S. A. et al. | 2002
- 20
-
Features - Virtual Private Networking -- New issues for Network Security - Enterprises today recognize the need for global outreach to ensure success. Providing network connectivity through VPNs answers the need for worldwide access, but raises new security issues as well. A preview of the upcoming information Systems Audit and Control Foundation research publication.Shue, Lily et al. | 2001
- 20
-
Val IT: From the Vantage Point of the COBIT 4.0 Pentagon Model for IT GovernanceSingh-Latulipe, Rob et al. | 2007
- 20
-
Key Issues, Challenges and Resolutions in Implementing Business Continuity ProjectsSatyanarayana Tammineedi, Rama Lingeswara et al. | 2012
- 20
-
Book Review: Oracle Security Privacy AuditingNanda, Arup et al. | 2005
- 20
-
Book Review: COBIT 4.0 - IT Governance InstituteSingh-Latulipe, Rob et al. | 2006
- 20
-
Virtual Private Networking-New Issues for Network SecurityShue, L. et al. | 2001
- 21
-
Outsourcing Information Security By C. Warren AxelrodEmani, S. et al. | 2006
- 21
-
Standards, Statements and Guidelines - ISACA(R) Member and Certification Holder Compliance| 2005
- 21
-
Using CAATs to Support IS AuditSayana, S. A. et al. | 2003
- 21
-
IT Audit Basics - Using CAATs to Support IS AuditSayana, S.Anantha et al. | 2003
- 21
-
Book Review: Outsourcing Information SecurityAxelrod, C.Warren et al. | 2006
- 22
-
Book Review: Essentials of Knowledge ManagementBergeron, Bryan et al. | 2006
- 22
-
IT Value: The Challenges of Implementing Portfolio ManagementHarries, Sarah et al. | 2009
- 22
-
Essentials of Knowledge Management By Bryan BergeronKanhere, V. et al. | 2006
- 22
-
Book Review: Auditor's Guide to Information Systems AuditingRafeq, A. et al. | 2008
- 23
-
New Book Addresses Online Signature Authentication| 2000
- 23
-
Perspective - The Y2K Bug -- A Vaccine Against Terror Attacks? - The author examines the significance and value of Y2K preparations in light of recent terror attacks.Paliotta, Allan R. et al. | 2002
- 23
-
IT Governance: Why Information Security Governance Is Critical to Wider Corporate Governance Demands -- A European PerspectivePoole, Vernon et al. | 2006
- 23
-
Features - Helping Businesses Safeguard Information and Networks - Companies face increasing financial risk due to online fraud and other threats to their e-business systems. Managed intrusion detection and authentication services are being launched as a way to render networks and data more secure.Hale, Ron et al. | 2001
- 23
-
The Y2K Bug-A Vaccine Against Terror Attacks?Paliotta, A. R. et al. | 2002
- 23
-
Commentary - Watchdog or Bloodhound? The Push and Pull Toward a New Audit ModelSarup, Deepak et al. | 2004
- 23
-
Key Elements of an Information Security ProgramPironti, John P. et al. | 2005
- 23
-
Features - New Book Addresses Online Signature Authentication - Excerpts from a new ISACF book Digital Signatures- Security and Controls that complement additional articles on e-mail security are presented here| 2000
- 23
-
Helping Businesses Safeguard Information and NetworksHale, R. et al. | 2001
- 23
-
Watchdog or Bloodhound? The Push and Pull Toward a New Audit ModelSarup, D. et al. | 2004
- 24
-
Business Risks and Security Assessment for Mobile DevicesMilligan, Patricia Mayer et al. | 2008
- 24
-
Commentaries - Security Architecture: One Practitioner's ViewScammell, Tim et al. | 2003
- 24
-
Effective IT Governance Through the Three Lines of Defense, Risk IT and COBITOyemade, Ronke et al. | 2012
- 24
-
Security Architecture: One Practitioner's ViewScammell, T. et al. | 2003
- 24
-
IT Audit Basics: Systems Development Life Cycle and IT AuditsSingleton, Tommie W. et al. | 2007
- 24
-
IT Policy Framework Based on COBIT 5Carrillo, Jorge et al. | 2013
- 24
-
Challenges and Benefits of Migrating to COBIT 5 in the Strongly Regulated Environment of EU Agricultural Paying AgenciesArcidiacono, Giuseppe et al. | 2014
- 25
-
Features - Analysis Software for Auditors and Management - The author makes a case for auditors including data mining software such as WizRule in their regular audit "survival kits."Denker, Bob et al. | 2001
- 25
-
Analysis Software for Auditors and ManagementDenker, B. et al. | 2001
- 26
-
Book Review: Wireless Crime and Forensic InvestigationKanhere, Vishnu et al. | 2009
- 26
-
A Young Professional's Guide to Career Success Using Soft SkillsKandra, Mark et al. | 2011
- 26
-
Risk Landscape of Cloud ComputingHariharan et al. | 2010
- 27
-
Features - Are E-mails Boon or Bane for Organisations? - This timely article investigates corporate liabilities such as documents that leave an organization without management approval and offers safeguardsPathak, J.P. et al. | 2000
- 27
-
Commentary: Preparing for the CISA or CISM Examination: A Brief, Hands-on Supplement for CandidatesOliver, Derek J. et al. | 2006
- 27
-
IT Governance - IT Governance and Its MechanismsHaes, Steven De et al. | 2004
- 27
-
Auditing for PII Security ComplianceMohammed, Derek et al. | 2014
- 27
-
Preparing for the CISA or CISM Examination: A Brief, Hands-on Supplement for CandidatesOliver, D. J. / Shanahan, M. et al. | 2006
- 27
-
IT Governance and Its MechanismsDe Haes, S. / Van Grembergen, W. et al. | 2004
- 27
-
Are E-mails Boon or Bane for Organisations?Pathak, J. P. et al. | 2000
- 28
-
Business Continuity: A Business Survival StrategyDoughty, K. et al. | 2002
- 28
-
Using COBIT as a Tool to Lead Enterprise IT OrganizationsLambeth, John et al. | 2007
- 28
-
Features - Risk and Control Self-Assessment (RCSA): A Useful Complement to Information Systems Audits at Stanford University - The Stanford University Internal Audit Department uses risk and control self-assessment to complement its audit services. The authors describe the purpose of RCSA, how the sessions are conducted, in what contexts and the useful information they glean from them.Chakravarty, Ranjira et al. | 2001
- 28
-
In Summary: The Taking Governance Forward Mapping Initiative| 2009
- 28
-
Risk and Control Self-Assessment (RCSA): A Useful Complement to Information Systems Audits at Stanford UniversityChakravarty, R. / Topper, F. et al. | 2001
- 28
-
Features - Business Continuity: A Business Survival Strategy - Business continuity plans (BCP) are no longer a luxury, but an essential element of an organisation's risk management programme. The emphasis for business continuity today is on the organisation's critical business processes that need to be recovered in the event of a disaster for the survival of the organisation.Doughty, Ken et al. | 2002
- 28
-
Influence of International Best Practices on the South African Public Service's Corporate Governance of ICTvan der Walt, T et al. | 2013
- 29
-
Practicing Information Technology Auditing for FraudJohnstone, Dale et al. | 2008
- 30
-
Information Risk Management for Supporting a Basel II InitiativeDutta, Angsuman et al. | 2012
- 30
-
Continuous Assurance: We Are Way OverdueKneer, D. C. et al. | 2003
- 30
-
Why Companies Are Not Implementing Audit, Antifraud and Assurance Software...and How to Fix ItBrooks, D. / Lanza, R. et al. | 2006
- 30
-
Commentary: Why Companies Are Not Implementing Audit, Antifraud and Assurance Software...and How to Fix ItBrooks, Dean et al. | 2006
- 30
-
Commentaries - Continuous Assurance: We Are Way OverdueKneer, Dan C. et al. | 2003
- 30
-
Common Criteria: An OverviewMookhey, K.K. et al. | 2005
- 31
-
Chain Exploitation — Social Networks MalwareSood, Aditya K et al. | 2011
- 31
-
Risk Management in 4G LTEBhasker, Daksha et al. | 2014
- 32
-
Criteria and Methodology for GRC Platform SelectionRameshkumar, A V et al. | 2010
- 32
-
Getting Buy-in — An Easier WayKonrad, Chris et al. | 2009
- 32
-
IT Governance: Interdependence of COBIT and ITILFabian, Robert et al. | 2007
- 32
-
Features - Secure E-Business - In this article the author describes the many risks and concerns for conducting electronic business and makes comparisons among the several methods to make business transactions more secureMehta, Raj et al. | 2000
- 32
-
Secure E-BusinessMehta, R. et al. | 2000
- 32
-
Guidance on Aligning COBIT, ITIL and ISO 17799Hardy, Gary et al. | 2006
- 33
-
Electronic Commerce System Sophistication and the Audit Process: Insights from Information Systems AuditorsStein, D. M. / Arunachalam, V. / Rittenberg, L. E. et al. | 2001
- 33
-
Implications for the Future of COBIT Systems in Higher Education: Putting Critical Research and Theory Into PracticeCouncil, Claude L. et al. | 2007
- 33
-
Is Your Printer Betraying Your Business?Farao, Esteban et al. | 2008
- 33
-
Creating the Business Case for ERP System Acquisitions Using GEITZoughbi, Gregory et al. | 2013
- 33
-
Features - Electronic Commerce System Sophistication and the Audit Process: Insights from Information Systems Auditors - The authors relate the results of a survey on the sophistication of implementation strategies and overall control concerns of electronic commerce systems, conducted among the members of the Chicago Chapter of the Information Systems Audit and Control Association.Stein, Douglas M. et al. | 2001
- 34
-
ZFPAudit: A Computer-assisted Audit Tool for Evaluation of Microsoft Operating SystemsBek, J. et al. | 2004
- 34
-
ISO 17799: Then, Now and in the FutureSweren, Scott H. et al. | 2006
- 34
-
Case Study - ZFPAudit: A Computer-assisted Audit Tool for Evaluation of Microsoft Operating SystemsBek, Jon et al. | 2004
- 35
-
Green SecurityJones, Ashley et al. | 2009
- 35
-
The Unconquered Monitoring Frontier: Time for a Real-time Command CenterUnwala, Huzeifa et al. | 2008
- 35
-
Threat Assessment and Security Measures Justification for Advanced IT NetworksCerullo, Michael J. et al. | 2005
- 35
-
Continuous Audits: Taking the PlungeNehmer, Robert et al. | 2003
- 36
-
Meeting Security and Compliance Requirements Efficiently With TokenizationBeissel, Stefan et al. | 2014
- 37
-
Compliance Audit — A Process of Optimization, Not an ObligationMehta, Arvind et al. | 2009
- 37
-
Case Study: A Cosmological Approach to IT Governance: Val IT and COBIT Lessons Learned at the United NationsBellone, Jason et al. | 2007
- 37
-
New Basel Accord: Operational Risk Management-Emerging Frontiers for the ProfessionBhatia, M. et al. | 2002
- 37
-
Black Box Logging and Tertiary Monitoring of Continuous Assurance SystemsAlles, Michael et al. | 2003
- 37
-
Features - New Basel Accord: Operational Risk Management -- Emerging Frontiers for the Profession - The new Basel Accord is attempting to sensitize banks towards the risks they undertake in carrying out business. This article outlines the nature of operational risk management and explains how IS audit and control professionals can contribute to this emerging area.Bhatia, Mohan et al. | 2002
- 38
-
ITIL in a Complex World: Focusing on Success in a Multisourced EnvironmentLonsdale, Derek et al. | 2006
- 38
-
The Devil's in the DetailsDavis, Seth et al. | 2012
- 38
-
Managing the Insider Threat: Data SurveillanceMoynihan, John et al. | 2008
- 38
-
Availability Risk Assessment — A Quantitative ApproachSollis, Dan et al. | 2010
- 38
-
Simplify and Layer Your Security Approach to Protect Card DataHorton, Tim et al. | 2011
- 39
-
Open Source Tools for Security and Control AssessmentMookhey, K.K. et al. | 2004
- 39
-
Security Issues in a Continuous Reporting EnvironmentGal, Graham et al. | 2009
- 39
-
BYOD Security Considerations of Full Mobility and Third-party Cloud ComputingEmmanuel Yu, William et al. | 2013
- 40
-
Audit and Assurance of Information Systems and Business Processes: A Foundation for Providing Sound Governance Decision MakingFinne, Thomas et al. | 2006
- 40
-
Features - OS-390...But Why? Background to the Reliability and Availability of OS-390 Mainframes - Why is OS-390 generally considered so reliable, well controlled and manageable, especially suited for business-critical applications? Why is it considered a serious candidate for UNIX applications and web servers? The author examines the internal structure and security of OS-390.Mienes, Peter et al. | 2001
- 40
-
Measuring the Readability of Software Requirement Specifications: An Empirical StudyKanter, Howard A. et al. | 2008
- 40
-
OS/390...But Why? Background to the Reliability and Availability of OS/390 MainframesMienes, P. et al. | 2001
- 41
-
Features - Intellectual Property and the Internet: Who Owns the Information? - One cannot think about e-mail and Internet security without keeping a watchful eye on the dynamic questions and answers regarding intellectual property. This article explores the current nuancesParkes, Hugh et al. | 2000
- 41
-
Intellectual Property and the Internet: Who Owns the Information?Parkes, H. et al. | 2000
- 42
-
Internet Financial ReportingPoon, Pak-Lok et al. | 2003
- 42
-
Looking at IT Risk DifferentlySimkin, Mark G et al. | 2010
- 42
-
Company Perspectives on Business Value of IT Investments in Sarbanes-Oxley ComplianceVelichety, Swapna et al. | 2007
- 42
-
Incorporating COBIT Best Practices in PCI DSS V2.0 for Effective ComplianceNicho, Mathew et al. | 2012
- 42
-
Privacy Audit — Methodology and Related ConsiderationsRiffat, Muzamil et al. | 2014
- 43
-
The New Compliance BackgroundMehdizadeh, Yahya et al. | 2006
- 43
-
Information Security From a Business Perspective: A Lottery Sector Case StudyDimitriadis, Christos K et al. | 2011
- 43
-
IT Governance Implementation — Formulating and Presenting Practical Business CasesBhatia, Rajesh et al. | 2013
- 44
-
Database Activity Monitoring: An Emerging Technology for Audit and CompliancePinch, Mike et al. | 2009
- 44
-
Features - Insuring Information Security: Commercial Insurance as an Information Security Driver - This article examines how the insurance market addresses risks resulting from failures of information security practices and how the insurance industry's goal of seeking maximum profit while minimizing risk may drive the evolution of information security standards.Pollitt, Mark M. et al. | 2002
- 44
-
Compliance for Compliance's Sake?Mellor, Myles et al. | 2010
- 44
-
Insuring Information Security: Commercial Insurance as an Information Security DriverPollitt, M. M. et al. | 2002
- 45
-
Automating System Security AuditsPinkett, Fred et al. | 2004
- 45
-
Web Services SecurityBhatia, Mohan et al. | 2005
- 46
-
Insider Threat -- The Fraud That Puts Companies at RiskTaylor, Patrick et al. | 2008
- 46
-
Plus - CPE Quiz #68Oringel, Joey et al. | 2000
- 46
-
IT Merger Due Diligence: A BlueprintBhatia, Mohan et al. | 2007
- 46
-
Unlocking Hidden Value in ERP System Acquisitions Using Risk ManagementZoughbi, Gregory et al. | 2014
- 46
-
Building and Maintaining Effective Mechanisms for Implementing IT GovernanceRobinson, Ingrid et al. | 2013
- 47
-
Employee Monitoring and Surveillance -- The Growing TrendWakefield, Robin L. et al. | 2004
- 47
-
Making CA Work in a Globally Critical Bank SystemHessler, Ralph et al. | 2003
- 47
-
Using Spreadsheets and Benford's Law to Test Accounting DataWesterman, George et al. | 2010
- 48
-
Overview of Mobile TechnologySmith, Matt et al. | 2006
- 48
-
Nuevas Tecnologías Desplegadas con Inteligencia, ?Serán las Aliadas de los Profesionales de Auditoría de TI en las Grandes Corporaciones?Soria, Diego Martín et al. | 2008
- 48
-
Nuevas Tecnologias Desplegadas con Inteligencia, ¿Seran las Aliadas de los Profesionales de Auditoria de TI en las Grandes Corporaciones?Soria, D.M. et al. | 2008
- 49
-
Cost-effective Implementation of Identity ManagementSarva, Srinivas et al. | 2005
- 49
-
Auditing Employee Use of E-mailMoody, Robert et al. | 2003
- 49
-
Features - Disaster Recovery and Business Continuity Planning: Testing an Organization's Plans - Putting the pieces together following a disaster is not just dependent on technology but involves people and communication and the recognition that any problems can be solved only through superior personal leadership skills combined with positive, strategic communication and in trouble-shooting tough, touchy, sensitive corporate communications issues.Musaji, Yusufali F. et al. | 2002
- 49
-
Disaster Recovery and Business Continuity Planning: Testing an Organization's PlansMusaji, Y. F. et al. | 2002
- 49
-
The Modernization Problem, Part 1Henry, Kirk et al. | 2013
- 49
-
Risk Associated With Web Application VulnerabilitiesFath, Kim et al. | 2009
- 49
-
Crossword PuzzleMellor, Myles et al. | 2011
- 50
-
Case Study: Continuous Auditing Comes of AgeBrennan, Gerard et al. | 2008
- 50
-
Road Map to XBRL Adoption as New Reporting ModelSrinivas, Sarva et al. | 2004
- 51
-
The Dynamics of Privacy RiskAxelrod, C.Warren et al. | 2007
- 51
-
Help Source Q&ASubramaniam, Gan et al. | 2012
- 51
-
The Role of Attack Simulation in Automating Security Risk ManagementCohen, Gidi et al. | 2005
- 52
-
Sarbanes-Oxley -- Considerations for a Framework for IT Financial Reporting ControlsFox, Christopher et al. | 2004
- 52
-
The New World of Risk-based Regulation (Part 2)Micallef, Mario et al. | 2008
- 53
-
The Future of Key ManagementMartin, Luther et al. | 2009
- 53
-
CPE Quiz #146 - Based on Volume 5, 2012 - Prepared by Sally Chan, CGEIT, CMA, ACIS| 2013
- 53
-
Impact of SAS No. 94 on Computer Audit TechniquesCerullo, M.Virginia et al. | 2003
- 53
-
CPE Quiz #134 Based on Volume 5, 2010Chan, Sally et al. | 2011
- 53
-
CPE Quiz #140Chan, Sally et al. | 2012
- 53
-
Driving New Value From IT Risk ManagementChan, Sally et al. | 2010
- 55
-
Control Self-assessment for Information and Related TechnologyBakshi, Sunil et al. | 2004
- 55
-
Standards, Guidelines, Tools and Techniques: ISACA Member and Certification Holder Compliance| 2011
- 55
-
Standards, Guidelines, Tools and Techniques| 2012
- 56
-
Plus - CE Quiz #80, Based on Volume 5, 2001Oringel, Joey et al. | 2002
- 57
-
CPE Quiz #152 - Based on Volume 5, 2013 — Integrated Business SolutionsChan, Sally et al. | 2014
- 57
-
Excerpt: IT Governance Roundtable| 2008
- 58
-
Preserving Electronically Encoded EvidenceDavis, Robert E. et al. | 2009
- 59
-
CPE Quiz #110 - Based on Volume 5, 2006Rafeq, A. et al. | 2007
- 59
-
CPE Quiz #86, based on volume 5, 2002Oringel, Joey et al. | 2003
- 59
-
CPE Quiz #104 - Based on Volume 5,2005Chan, Sally et al. | 2006
- 59
-
CPE Quiz #97 - Based on volume 4, 2004Chan, Sally et al. | 2005
- 61
-
CPE Quiz #128 - Based on Volume 5, 2009| 2010
- 62
-
Plus - CE Quiz #74, Based on Volume 5, 2000, IS Auditing and the 21st Century: Are We Prepared?Oringel, Joey et al. | 2001
- 63
-
How to Use a New Computer Audit Fraud Prevention and Detection ToolLanza, Richard B. et al. | 2004
- 63
-
CPE Quiz #122 - Based on Volume 5, 2008Chan, Sally et al. | 2009
- 63
-
CPE Quiz #116 - Based on Volume 5, 2007Chan, Sally et al. | 2008
- 67
-
CPE Quiz #91, based on volume 4, 2003Oringel, Joe et al. | 2004
-
Plus - ISACA Bookstore Price List - Supplement| 2000
-
ISACA Bookstore Price List Supplement| 2011
-
S1 ISACA Bookstore Supplement| 2013
-
ISACA Bookstore Supplement| 2012
-
Plus - ISACATM Bookstore Price Last Supplement| 2001
-
Plus - ISACA Bookstore Offerings - Supplement| 2000