CobiT Online Goes Live (Englisch)
- Neue Suche nach: Guldentops, E.
- Neue Suche nach: Guldentops, E.
In:
INFORMATION SYSTEMS CONTROL JOURNAL
;
6
;
21-24
;
2003
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:CobiT Online Goes Live
-
Beteiligte:Guldentops, E. ( Autor:in )
-
Erschienen in:INFORMATION SYSTEMS CONTROL JOURNAL ; 6 ; 21-24
-
Verlag:
- Neue Suche nach: INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION
-
Erscheinungsdatum:01.01.2003
-
Format / Umfang:4 pages
-
ISSN:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 657.4550285
- Weitere Informationen zu Dewey Decimal Classification
-
Klassifikation:
DDC: 657.4550285 -
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis – Band 6
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 4
-
Information Security Matters: The Cost of CyberattacksRoss, Steven J et al. | 2012
- 4
-
Information Security Matters: A Tide in the AffairsRoss, Steven J et al. | 2013
- 4
-
Information Security Matters: Service Availability and Disaster RecoveryRoss, Steven J et al. | 2010
- 4
-
Information Security Matters: Eating Crow With a Tasty SauceRoss, Steven J et al. | 2011
- 5
-
Editorial - Issues & Comments - Examines the future of electronic commerce, calling it a bright future, despite the recent downturn in the IT industry. He goes on to call business professionals not to lose sight of the opportunities the Internet presents to reinvent business models.Cangemi, Chief Michael et al. | 2001
- 5
-
Editorial - Issues & CommentsCangemi, Michael et al. | 2003
- 5
-
The Law of Unintended Consequences? Assessing the Costs, Benefits and Outcomes of the Sarbanes-Oxley Act Excerpted and reprinted from IS Audit & Control Journal, volume 1, 2004| 2009
- 5
-
Taking A Look Back: The Law of Unintended Consequences? Assessing the Costs, Benefits and Outcomes of the Sarbanes-Oxley Act - Excerpted and reprinted from IS Audit & Control Journal, volume 1-2004| 2009
- 5
-
Guest Editorial: You Can't Outsource ControlZarrella, Edge et al. | 2008
- 5
-
Guest Editorial: Breaking the CoconutPenri-Williams, Hugh H. et al. | 2007
- 5
-
Editorial - Issues & Comments - Editor in Chief Michael P Cangemi, CISA, CPA, discusses the influence technology, the rise of Internet use and business changes in general have had on both fashion trends and web use by women. He also talks about the age-old scandals encountered by Wall Street.Cangemi, Michael P. et al. | 2000
- 5
-
Issues&CommentsCangemi, Michael et al. | 2002
- 6
-
IT Audit Basics: What Every IT Auditor Should Know About Backup and RecoverySingleton, Tommie W et al. | 2011
- 6
-
Cloud Computing: Leveraging the Cloud for Added ValueMarkey, Steven C et al. | 2012
- 6
-
Information Ethics: Character Traits of an IT ProfessionalRaval, Vasant et al. | 2013
- 7
-
Guest Editorial: Connections Galore!Sethuraman, Sekar et al. | 2009
- 7
-
Connections GalorelSethuraman, S. et al. | 2009
- 7
-
IT Audit Basics: Data Extraction, A Hindrance to Using CAATsSingleton, Tommie W et al. | 2010
- 8
-
Information Ethics: Risk and ResponsibilityRaval, Vasant et al. | 2012
- 8
-
IS Security Matters: There Oughta Be a LawRoss, S. J. et al. | 2006
- 9
-
Book Reviews - Security Provisioning: Managing Access in Extended EnterpriseOliver, Derek J. et al. | 2002
- 9
-
IS Security Matters: Certification and the Disappearing PerimeterRoss, Steven J. et al. | 2008
- 9
-
Security Provisioning: Managing Access in Extended EnterpriseOliver, D. J. et al. | 2002
- 9
-
Who Needs Information Security?Ross, S. J. et al. | 2003
- 9
-
Frameworkers of the World, UniteRoss, S. J. et al. | 2004
- 9
-
IS Security Matters - Who Needs Information Security?Ross, Steven J. et al. | 2003
- 9
-
IS Security Matters: Standard DeviationRoss, Steven J. et al. | 2006
- 9
-
Eternal Truth and the Next New Thing the security issues and practices that are growing in complexity and importance as a result of the emergence of ecommerce. Specifically, he makes a case for basing information security with change as its constant underpinningRoss, S. J. et al. | 2000
- 9
-
IS Security Matters - Frameworkers of the World, UniteRoss, Steven J. et al. | 2004
- 9
-
IS Security Matters - Eternal Truth and the Next New Thing - Steven J Ross, CISA, examines the security issues and practices that growing in complexity and importance as a result of the emergence of commerce. Specifically, he makes a case for basing information seen with change as its constant underpinning.Ross, Steven J. et al. | 2000
- 9
-
Book Review - Netspionage: The Global Threat to Information - This book raises the awareness of the issues surrounding Internet espionage and computer crime and offers a high-level view of protection, according to the reviewer, who goes on to detail the appropriate readership.Lambert, Michel et al. | 2001
- 9
-
IS Security Matters: I'm Not the SheriffRoss, Steven et al. | 2007
- 9
-
Netspionage: The Global Threat to InformationLambert, M. et al. | 2001
- 10
-
Five Questions With...Luis Carrera Jr, Jose et al. | 2010
- 10
-
Data Plumbing?Ross, S.J. et al. | 2009
- 10
-
IS Security Matters: Data Plumbing?Ross, Steven J. et al. | 2009
- 10
-
Book Reviews - Security Audit and Control Features SAP(R) R-3(R): A Technical and Risk Management Reference GuideChristodoulides, Michael et al. | 2002
- 10
-
Security Audit and Control Features SAP® R/3®: A Technical and Risk Management Reference GuideChristodoulides, M. et al. | 2002
- 12
-
IT Audit Basics: What Every IT Auditor Should Know About Identity TheftSingleton, T. W. et al. | 2006
- 12
-
IT Audit Basics: What Every IT Auditor Should Know About Auditing Virtual Machine TechnologySingleton, Tommie W. et al. | 2008
- 12
-
Book Review: Access Control, Security, and Trust: A Logical ApproachSpinelli, Connie et al. | 2011
- 12
-
IT Audit Basics: What Every IT Auditor Should Know About Proper Segregation of Incompatible IT ActivitiesSingleton, Tommie W et al. | 2012
- 12
-
IS Security Matters - Privacy PartsRoss, Steven et al. | 2002
- 12
-
Privacy PartsRoss, S. et al. | 2002
- 12
-
IT Audit Basics: What Every IT Auditor Should Know About Data AnalyticsSingleton, Tommie et al. | 2013
- 13
-
Management Guidelines for COBIT what Management Guidelines provides the user: Guidelines that are critical in providing the tools for management to use in a focused manner to link IT governance to enterprise governanceRoussey, R. S. et al. | 2000
- 13
-
IT Audit Basics - Educating the Masses: Audit, Control and Security of Information Systems Today and TomorrowGallegos, Frederick et al. | 2004
- 13
-
Book Review: Security, Audit and Control Features Oracle E-Business Suite, 3rd EditionBenmahbous, Mustapha et al. | 2010
- 13
-
IT Audit Basics: Computer Forensics: An OverviewGallegos, Frederick et al. | 2005
- 13
-
IT Audit Basics: The COSO Model: How IT Auditors Can Use It to Evaluate the Effectiveness of Internal ControlsSingleton, Tommie et al. | 2007
- 13
-
Virtual Private InfrastructureRoss, S. J. et al. | 2001
- 13
-
Educating the Masses: Audit, Control and Security of Information Systems Today and TomorrowGallegos, F. et al. | 2004
- 13
-
Book Review - Managing the Audit Function: A Corporate Audit Department Procedures Guide, 3rd EditionMcMinn, Janine et al. | 2003
- 13
-
Perspective - Management Guidelines for COBIT - This article describes what Management Guidelines provides the user: Guidelines that are critical in providing the tools for management to use in a focused manner to link IT governance to enterprise governance.Roussev, Robert S. et al. | 2000
- 13
-
Managing the Audit Function: A Corporate Audit Department Procedures Guide, 3^r^d EditionMcMinn, J. / Simon, M. et al. | 2003
- 13
-
Book Review: Green IT in Practice: How One Company Is Approaching the Greening of Its ITMunongwa, Bright et al. | 2011
- 13
-
IS Security Matters - Virtual Private Infrastructure - Examines the security concerns that arise with the advent of the virtual private infrastructure the use of personal-home computers by employees for business purposes.Ross, Steven J. et al. | 2001
- 14
-
Criteria for Evaluating and Selecting Continuous Controls Monitoring SolutionsDutta, Angsuman et al. | 2010
- 14
-
Standards, Statements, Guidelines - ISACA Member and CISA Compliance| 2002
- 14
-
Persistent Cross-interface AttacksSood, Aditya K et al. | 2011
- 15
-
IT Audit Basics: What Every IT Auditor Should Know About IT Risk AssessmentSingleton, Tommie W. et al. | 2009
- 15
-
Book Review - Auditor's Risk Management Guide -- Integrating Auditing and ERMSarathy, Emani et al. | 2003
- 15
-
When IT Lets the Business Down A summary of remarks made by ISACA/F International President Paul A. Williams at the International Conference 2000Williams, P. A. et al. | 2000
- 15
-
What Every IT Auditor Should Know About IT Risk AssessmentSingleton, T.W. et al. | 2009
- 15
-
Book Review: The Web Application Hacker's Handbook Finding and Exploiting Security Flaws, 2nd EditionParekh, Upesh et al. | 2013
- 15
-
Auditor's Risk Management Guide-Integrating Auditing and ERMSarathy, E. et al. | 2003
- 15
-
Perspective - When IT Lets the Business Down - A summary of remarks made by ISACA-F International President Paul A. Williams at the International Conference 2000.Williams, Paul A. et al. | 2000
- 16
-
Book Review: Phishing and Countermeasures: Understanding the Increasing Problem of Identity TheftKanhere, Vishnu et al. | 2008
- 16
-
Information Insecurity — Motivator of Corporate Compliance PracticeCano, Jeimy J et al. | 2013
- 17
-
Book Review: IT Risk: Turning Business Threats Into Competitive Advantagede la Fuente, Reynaldo J. et al. | 2008
- 17
-
Demonstrating Due Diligence in the Management of Information SecurityGelbstein, Ed et al. | 2012
- 17
-
The IT Dimension of Basel IIGuldentops, E. et al. | 2004
- 17
-
Surfing @ the Razor's Edge: Governance and Managing ChangeSarup, D. et al. | 2002
- 17
-
IT Governance - "To Be, or Not To Be" -- The Question of Runaway ProjectsSarup, Deepak et al. | 2003
- 17
-
Book Review: Making IT Governance Work in a Sarbanes-Oxley World By Jaap Bloem, Menno Van Doorn and Piyush Mittalde la Fuente, R. J. et al. | 2006
- 17
-
"To Be, or Not To Be"-The Question of Runaway ProjectsSarup, D. et al. | 2003
- 17
-
IT Governance - Surfing (commat) the Razor's Edge: Governance and Managing ChangeSarup, Deepak et al. | 2002
- 17
-
Data Governance for Privacy, Confidentiality and Compliance: A Holistic ApproachSalido, Javier et al. | 2010
- 17
-
IT Governance - The IT Dimension of Basel IIGuldentops, Erik et al. | 2004
- 17
-
Standards, Statements, Guidelines - Standards and guidelines for maintaining compliance for both ISACA" membership and the CISA" designation are outlined and the status of ISACA issuances noted.| 2001
- 18
-
IT Value: Practical Guidance on Establishing the Val IT Value Governance ProcessHarries, Sarah et al. | 2008
- 18
-
Standards, Statements, Guidelines - ISACA(R) Member and Certification Holder Compliance| 2007
- 18
-
Global Perspectives: Privacy for the Individual-A Reserve Bank of India InitiativeChaudhuri, A. P. / Sinha, A. et al. | 2006
- 19
-
Book Review: Security, Audit and Control Features SAP® ERP, 3rd EditionKammermeier, Pam et al. | 2009
- 19
-
IT Governance: The Rule of Four of IT GovernanceGuldentops, Erik et al. | 2007
- 19
-
Security, Audit and Control Features SAP® ERP, 3^r^d EditionKammermeier, P. et al. | 2009
- 19
-
Global PerspectivesOng'ondt, Dismas et al. | 2005
- 19
-
Pius - HeIpSource Q & ALilly, Fred et al. | 2001
- 19
-
Survivability Strategies for the Next Generation NetworkHuang, S. et al. | 2006
- 19
-
Plus - Technical Q & A, HelpsourceLilly, Fred L. et al. | 2000
- 20
-
Data Integrity — Information Security's Poor RelationGelbstein, Ed et al. | 2011
- 20
-
Identify, Govern and Manage IT Risk Part 3: Techniques and Uses for Risk IT and Its Supporting MaterialsFischer, Urs et al. | 2009
- 20
-
Security Labeling of IT Services Using a Rating MethodologyRamos, Antonio et al. | 2013
- 20
-
Maintaining IT Audit Proficiency-The Role of Professional Development PlanningGallegos, F. et al. | 2002
- 20
-
IT Audit Basics - Maintaining IT Audit Proficiency -- The Role of Professional Development PlanningGallegos, Fred et al. | 2002
- 21
-
COBIT Online Goes LiveGuldentops, Erik et al. | 2003
- 21
-
Lack of Privacy Awareness in Social NetworksSrinivasan, S et al. | 2012
- 21
-
Information Technology Auditing and Cybercommerce: A Risk PerspectivePathak, Jagdish et al. | 2004
- 22
-
IT Governance: Taking Governance ForwardStachtchenko, Patrick et al. | 2008
- 22
-
Expert Consensus on the Top IT Controls for a Small BusinessBusta, B. / Portz, K. / Strong, J. / Lewis, R. et al. | 2006
- 23
-
IT Governance Perspective - IT Governance Can Help Guide Business eCommerce Initiatives - This article explains that with each technological advancement responding vulnerability or security concern. Enterprise managers are called to the task to balance IT benefits, risks and controls. This article sheds light on how to create the balance.Lainhart IV, John W. et al. | 2000
- 23
-
IT Governance - Corporate Governance and ICT: A Marriage of Reason - Discusses the importance of viewing information and communication technologies as an integral part of the corporate strategy. Further, he describes what is necessary to apply the IT governance concept to the organization.Bourdariat, Jean et al. | 2001
- 23
-
IT Value: New IT Is Not Just for ChristmasTiernan, Chris et al. | 2007
- 23
-
IT Governance Can Help Guide Business eCommerce Initiatives This article explains that with each technological advancement comes a corresponding vulnerability or security concern. Enterprise managers are called to the task to balance IT benefits, risks and controls. This article sheds light on how to create the balanceLainhart, J. W. et al. | 2000
- 23
-
Corporate Governance and ICT: A Marriage of ReasonBourdariat, J. et al. | 2001
- 24
-
Show Me the Money! Three Ways to Better Partner With FinanceBarnier, Brian G et al. | 2010
- 24
-
Cloud Computing: An Auditor's PerspectiveGadia, Sailesh et al. | 2009
- 24
-
Accounting for Value and Uncertainty in Security MetricsAxelrod, C.Warren et al. | 2008
- 24
-
An Integrated Risk Assessment Program — A Cliché or a Need?Fahd Azam, Syed et al. | 2013
- 25
-
Wise Wireless: Securing the WLANBindseil, J. et al. | 2003
- 25
-
Book Review: Managing Enterprise Information Integrity: Security, Control and Audit IssuesChuluunbaatar, Sod et al. | 2006
- 25
-
Commentaries - COBIT 3rd Edition Usage Survey: Growing Acceptance of COBITGuldentops, Erik et al. | 2002
- 25
-
COBIT 3^r^d Edition Usage Survey: Growing Acceptance of COBITGuldentops, E. / De Haes, S. et al. | 2002
- 25
-
Commentary - Wise Wireless: Securing the WLANBindseil, James et al. | 2003
- 25
-
IT Value: The Birth of Val IT| 2006
- 25
-
Book Review: 7 Steps to Better Written Policies and ProceduresPage, Stephen et al. | 2007
- 25
-
Book Review: 7 Steps to Better Written Policies and Procedures By Stephen PageChatterjee, S. et al. | 2007
- 26
-
Technology Risk Measurement and ReportingPareek, Mukul et al. | 2011
- 26
-
Preventive Technical Controls for Application SecuritySethi, Rohit et al. | 2012
- 26
-
Book Review: Essentials of Strategic Project ManagementChua, Joyce et al. | 2005
- 27
-
Identity Theft and Corporations' Due DiligenceOlatilu, O. et al. | 2006
- 27
-
IT Governance: Enterprise Governance and the Role of ITHamaker, Stacey et al. | 2005
- 27
-
Book Review: ISO 9001:2000-The Quality Management Process By Ray TrickerRafeq, A. et al. | 2007
- 27
-
On Security Education, Training and CertificationsRyan, Julie J.C.H. et al. | 2004
- 27
-
Leading Information SecurityJulisch, Klaus et al. | 2013
- 27
-
Perspective - XBRL -- How the West Was Won - The author discusses the role XBRL (Extensible Business Reporting Language) will play in the future of electronic business.Zonneveld, Paul A. et al. | 2001
- 27
-
Commentary - Investing in Security -- Do Not Rely on FUDTongia, Rahul et al. | 2003
- 27
-
A Question of Value Determining the value of e-business in the banking sector. so that it can be a positive sum rather than a zero sum, often depends on an assessment and executive endorsement of the preliminary business modelSarup, D. et al. | 2000
- 27
-
An Exploration of Global Perceptions of Security and PrivacyGerdes, M. et al. | 2002
- 27
-
An Exploration of Global Perceptions of Secutity and PrivacyGerdes, Michael et al. | 2002
- 27
-
Book Review: ISO 9001:2000 -- The Quality Management ProcessTricker, Ray et al. | 2007
- 27
-
XBRL-How the West Was WonZonneveld, P. A. et al. | 2001
- 27
-
Investing in Security-Do Not Rely on FUDTongia, R. / Jain, K. et al. | 2003
- 27
-
Features - A Question of Value - Determining the value of e-business in the banking sector, so that it can be a positive sum rather than a zero sum, often depends on an assessment and executive endorsement of the preliminary business model. This article goes into further detail.Sarup, Deepak et al. | 2000
- 28
-
Y2K Silver Lining-Overblown or Extremely Well Managed?-Solving Year 2000Parker, R. G. et al. | 2000
- 28
-
Features - Y2K Silver Lining -- Overblown or Extremely Well Managed? -- Solving Year 2000 - This author discusses the value of added practices gleaned from the Y2K phenomenon and provides a roadmap to retain them.Parker, Robert G. et al. | 2000
- 29
-
How to Preserve Security and Autonomy While Meeting Information-sharing DirectivesSchumacher, Scott et al. | 2009
- 29
-
The Changing Face of CybersecurityHayes, Stewart et al. | 2012
- 29
-
An Introduction to Digital Records ManagementHamidovic, Haris et al. | 2010
- 30
-
Implementing, Automating and Validating Controls for Privileged Users in Healthcare OrganizationsTraverse, Cheryl et al. | 2008
- 30
-
Perspective - When Code Red Attacks: Addressing Real Vulnerabilities Behind Virus Hysteria - The attack of the Code Red worm demonstrates the vulnerability of the current Internet infrastructure. The authors discuss the big picture of malicious code and the vulnerabilities it exposes.Burnette, Mark et al. | 2001
- 30
-
The New World of Risk-based Regulation (Part 1)Micallef, Mario et al. | 2007
- 30
-
Important, But Often Dismissed: Internal Control in a Microsoft Access DatabaseWhite, J. H. et al. | 2006
- 30
-
When Code Red Attacks: Addressing Real Vulnerabilities Behind Virus HysteriaBurnette, M. / Gomez, C. et al. | 2001
- 31
-
IT Audit Independence: What Does It Mean?Gallegos, F. et al. | 2003
- 31
-
Doing Business in India Requires Digital ComplianceVaidya, Anil et al. | 2013
- 31
-
IT Audit Basics - IT Audit Independence: What Does It Mean?Gallegos, Fred et al. | 2003
- 32
-
Best Practices for Establishing an Effective Workplace Policy for Acceptable Computer UsageNolan, John et al. | 2005
- 32
-
Choosing the Most Appropriate Data Security Solution for an OrganizationMattsson, Ulf et al. | 2011
- 32
-
Commentaries - Control and Governance Maturity Survey: Establishing a Reference Benchmark and a Self-assessment ToolGuldentops, Erik et al. | 2002
- 32
-
Features - Improving the Cost-Effectiveness of a Test Suite for User Acceptance - The authors elucidate ways for improvement since user acceptance tests are often conducted using blind box methods because these are based on formal specifications when most commercial specifications are written in a information manner. The authors describe these pitfalls and suggest ways to avoid them.Yu, Yuen Tak et al. | 2000
- 32
-
Improving the Cost-Effectiveness of a Test Suite for User Acceptance TestsYu, Y. T. / Tang, S. F. / Poon, P. L. / Chen, T. Y. et al. | 2000
- 32
-
Control and Governance Maturity Survey: Establishing a Reference Benchmark and a Self-assessment ToolGuldentops, E. / Van Grembergen, W. / De Haes, S. et al. | 2002
- 32
-
Crossword PuzzleMellor, Myles et al. | 2009
- 33
-
Patch Management: An Effective Line of Defense for UNIX and LimixAndrew, Chris et al. | 2003
- 33
-
How Has Sarbanes-Oxiey Compliance Affected Information Security?Spears, J.L. et al. | 2009
- 33
-
How Has Sarbanes-Oxley Compliance Affected Information Security?Spears, Janine L. et al. | 2009
- 33
-
Standards, Statements, Guidelines - ISACA® Member and Certification Holder Compliance| 2008
- 33
-
Patch Management: An Effective Line of Defense for UNIX and LinuxAndrew, C. et al. | 2003
- 33
-
COBIT: An Ideal Tool for Teaching Information Security ManagementPattinson, Malcolm et al. | 2004
- 35
-
Is the IT Risk Worth a Control? Defining a Cost-value Proposition Paradigm for Managing IT RisksSathiyamurthy, Sudhakar et al. | 2008
- 35
-
Living With RiskPareek, M. et al. | 2006
- 35
-
COBIT 4.0: The New Face of COBITHardy, Gary et al. | 2005
- 35
-
The Center for Internet Security: Global Security Benchmarks for Computers Connected to the InternetKreitner, C. / Miuccio, B. et al. | 2001
- 35
-
Features The Center for Internet Security: Global Security Benchmarks for Computers Connected to the Internet - The members of the Center for Internet Security (CIS) develop technical security benchmarks through a global consensus process that brings together industry, government, academia and consultants. Their primary objective is widespread adoption of the benchmarks to improve Internet security worldwide.Kreitner, Clint et al. | 2001
- 35
-
Building a Business Case for Records ManagementStrait, Cheryl et al. | 2010
- 36
-
The Importance of Event Correlation for Effective Security ManagementCaldwell, Matthew et al. | 2002
- 36
-
Preparation Is the Key Ingredient to a Successful SIMEmmett, Mark D. et al. | 2007
- 37
-
Utilization of Generalized Audit Software in an Information Systems Auditing CourseMcCombs, Gary B. et al. | 2004
- 37
-
Case Study - Getting Action on Audit ResultsSparks, Harry A. et al. | 2003
- 37
-
SME Cybersecurity and the Three Little PigsHan, David R et al. | 2012
- 37
-
Revisiting the Human Factor in Organizational Information Security ManagementGuo, Ken H et al. | 2013
- 37
-
Achieving Continuous IT Auditing: RICAJohnstone, Dale et al. | 2009
- 37
-
Getting Action on Audit ResultsSparks, H. A. et al. | 2003
- 38
-
IT Governance and Business-IT Alignment in SMEsDe Haes, Steven et al. | 2010
- 38
-
Features The State of Enterprise Security Management - In this interview, Reed Harrison, chief technology officer, e-Security, Inc., provides his understanding of enterprise security management and its importance.Judge, Joe et al. | 2001
- 38
-
Developing a Unified Approach to Information Security in Business Associate RelationshipsOverly, Michael R et al. | 2011
- 38
-
The State of Enterprise Security ManagementJudge, J. et al. | 2001
- 39
-
From CSI to the Classroom: Developing A Computer Forensics Degree ProgramStaley, A. B. / Inch, S. / Shapeero, M. et al. | 2006
- 39
-
ISACA Model Curriculum 2004: Continuing to Invest in the FutureLord, Alan T. et al. | 2004
- 39
-
Application Risk in a TCP-IP EnvironmentHarrison, Robert M. et al. | 2002
- 39
-
Identity Theft: A New Frontier for Hackers and CybercrimeCilli, Claudio et al. | 2005
- 39
-
New Identity Theft RegulationsGonzalez, Silka et al. | 2008
- 39
-
Information Systems Auditing in Developing Economies-The Bosnian ChallengeBuxton, B. M. et al. | 2000
- 39
-
Features - Information Systems Auditing in Developing Economies -- The Bosnian Challenge - Written by an auditor in the US Federal Government, the author systematically describes firsthand the challenges of building information auditing functions in a war-torn country.Buxton, Brian M. et al. | 2000
- 41
-
Assessing Data Authenticity with Benford's LawHasan, Bassam et al. | 2002
- 41
-
Security Within VoIP NetworksRamirez, David et al. | 2007
- 41
-
Large-scale Biometric Management: A Centralized, Policy-based Approach to Reducing Organizational Identity ChaosByrne, Jim et al. | 2003
- 42
-
Features Understanding Virtual Organizations - This article examines the concepts, technologies and issues surrounding virtual organizations (VO) with a knowledge management (KM) perspective. It identifies foundational concepts, surveys KM technologies that support VOs and looks at case studies of VOs in the private and public sector.Pang, Les et al. | 2001
- 42
-
Building an Educational Response to Terrorism: A Multifaceted Problem, A Multidimensional ResponseMaconachy, William V. et al. | 2004
- 42
-
Understanding Virtual OrganizationsPang, L. et al. | 2001
- 42
-
Security and Privacy Trade-offs in RFID UseSrinivasan, S. et al. | 2009
- 42
-
Issues With Auditing the Systems Development ProcessHenderson, Dave et al. | 2008
- 42
-
A Sustainable and Efficient Way to Meet Client's Growing Security ExpectationsKulkarni, Buck et al. | 2013
- 43
-
Transitioning IT From a Compliance to a Value-driven Enterprise Using COBITLawton, Robert et al. | 2007
- 43
-
Using Scenario Analysis for Managing Technology RiskPareek, Mukul et al. | 2012
- 43
-
Procedure Guidelines and Controls Documentation: SDLC Controls in CobiT® 4.0Basham, R. et al. | 2006
- 44
-
Security and Ownership of Personal Electronic DevicesBassett, Richard A. et al. | 2005
- 44
-
Web Application SecurityStasiak, Ken et al. | 2002
- 44
-
Comercio Electronico-La Nueva Perspectiva de Los NegociosGonzalez, M. H. et al. | 2000
- 44
-
Features - Comercio Electronico -- La Nueva Perspectiva de Los Negocios - The companion piece to this article, printed in English, is posted ISACA web site.González, Marcelo Héctor et al. | 2000
- 45
-
How Does the Business Drive IT? Identifying, Prioritising and Linking Business and IT GoalsGrembergen, Wim Van et al. | 2007
- 45
-
A Higher Level of Governance — Monitoring IT Internal ControlsGarber, Mike et al. | 2010
- 46
-
Privacy Is in the Eye of the BeholderSchreider, Tari et al. | 2003
- 46
-
The Criticality of Mobile Device ManagementAhmed, Adesanya et al. | 2013
- 46
-
Monitoring Privileged Application Users in Oracle Applications EnvironmentHare, Jeffrey T. et al. | 2008
- 46
-
Auditing Global Compliance of Data Protection MechanismsLehmann, Dirk et al. | 2011
- 47
-
A Survey of Application Security in Current International StandardsGreene, Fredric et al. | 2002
- 47
-
The Rising Impact of Virtual Machine Hypervisor Technology on Digital Forensics InvestigationsBates, Patty et al. | 2009
- 48
-
Features Risk Management for Internet Banking - Many banks have assumed that Internet banking primarily increases information security risks and have not sufficiently focused on the effect on other banking-specific risks. This article provides an overview of the various risks that are heightened with Internet banking and a holistic approach to managing these risks.Ramakrishnan, Ganesh et al. | 2001
- 48
-
Risk Management for Internet BankingRamakrishnan, G. et al. | 2001
- 48
-
A Wake Up Call to All Information Security and Audit Executives: Become Business-relevantTaylor, Patrick et al. | 2004
- 49
-
Technology as the Relationship Doctor for Business: Understanding Business Relationships Within an Organizational Hierarchy FrameworkMoseley, Marty et al. | 2007
- 49
-
Preparing for HTML5 Capabilities and ThreatsZhang, Hongwen et al. | 2012
- 49
-
Identity Management: A Business Strategy for Collaborative CommerceAhuja, Jay et al. | 2003
- 49
-
Features - Secure Electronic Transaction (SET) Protocol - SET, as the name implies, is a standard which ensures that credit card associated payment order information travel safely and securely among various parties on the Internet.Ramakrishnan, Ganesh et al. | 2000
- 50
-
Internal CyberforensicsBakshi, Sunil et al. | 2005
- 50
-
Applying Testing to Requirements Inspection for Software Quality AssuranceChen, T. Y. / Poon, P.-L. / Tang, S.-F. / Tse, T. H. / Yu, Y. T. et al. | 2006
- 51
-
The Institutional Need for Comprehensive Auditing StrategiesMilus, Stu et al. | 2004
- 51
-
HelpSourceSubramaniam, Gan et al. | 2010
- 51
-
Business Process Management Systems: The Internal Control PerspectiveNatovich, Joseph et al. | 2009
- 51
-
Help Source Q&ASubramaniam, Gan et al. | 2011
- 52
-
Plus - CPE Quiz #73. Based on Volume 4, 2000, Operating and Manufacturing SystemsOringel, Joey et al. | 2000
- 52
-
Black Box Testing: Its Fundamental Concepts and ProblemsPoon, Pak-Lok et al. | 2008
- 52
-
Analysis of FFIEC Guidance: Technologies and Decisions on AuthenticationFelker, Mikhael et al. | 2007
- 52
-
Features Intrusion, Attack, Penetration -- Some Issues - B2B, B2C and Internet-based e-commerce transactions, hosting vertical portals and Internet banking have come of age and are facing serious threats of attack, penetration or intrusion. What makes a system vulnerable to attack? What protective mechanisms can be built and put in place?Mahadevan, Chidambaram et al. | 2001
- 52
-
Intrusion, Attack, Penetration-Some IssuesMahadevan, C. et al. | 2001
- 53
-
Quiz #151 - Based on Volume 4, 2013Khan, Kamal et al. | 2013
- 53
-
CPE Quiz #139 - Based on Volume 4, 2011Khan, Kamal et al. | 2011
- 53
-
Quiz #133 Based on volume 4, 2010Khan, Kamal et al. | 2010
- 53
-
CPE Quiz #145 - Based on Volume 4, 2012Khan, Kamal et al. | 2012
- 54
-
COBIT'S Management Guidelines Revisited: The KGIs-KPIs CascadeGrembergen, Wim Van et al. | 2006
- 54
-
An Introduction to CryptographyPiper, Fred et al. | 2003
- 54
-
Standards, Statements, Guidelines - Procedures to maintain compliance for both ISACA membership and CISA designation are outlined and the status of ISACA issuances is noted.| 2000
- 55
-
Standards, Guidelines, Tools and Techniques| 2010
- 55
-
CPE Quiz #85, based on volume 4, 2002Oringel, Joey et al. | 2002
- 56
-
Excerpt: IT Governance Roundtable: Unlocking Value| 2009
- 57
-
Help Source - Help Source Q&AGanapathi Subramaniam, B. et al. | 2004
- 58
-
Pius - CE Quiz #79, Based on Volume 4, 2001Oringel, Joey et al. | 2001
- 59
-
CPE Quiz #103 - Based on Volume 4, 2005Rafeq, A. et al. | 2006
- 59
-
CPE Quiz #127 - Based on Volume 4, 2009Khan, Kamal et al. | 2009
- 59
-
CPE Quiz - CPE Quiz #97, based on volume 4, 2004Oringel, Joe et al. | 2004
- 59
-
CPE Quiz #121 - Based on Volume 4, 2008Khan, Kamal et al. | 2008
- 59
-
CPE Quiz #115 - Based on Volume 4, 2007Rafeq, A. et al. | 2007
- 62
-
Security in the Land Down UnderFord, Stephen et al. | 2003
- 63
-
Standards, Guidelines, Tools and Techniques: ISACA Member and Certification Holder Compliance| 2009
- 67
-
CPE Quiz #91, based on volume 4, 2003Oringel, Joe et al. | 2003
-
Plus - ISACA Bookstore Price List Supplement| 2000
-
ISACA Bookstore - Price List Supplement| 2009
-
ISACA Bookstore Supplement| 2011
-
Pius - ISACA Bookstore Price List Supplement| 2001
-
ISACA Bookstore - ISACA Bookstore Price List Supplement| 2004