Expert Consensus on the Top IT Controls for a Small Business (Englisch)
- Neue Suche nach: Busta, B.
- Neue Suche nach: Portz, K.
- Neue Suche nach: Strong, J.
- Neue Suche nach: Lewis, R.
- Neue Suche nach: Busta, B.
- Neue Suche nach: Portz, K.
- Neue Suche nach: Strong, J.
- Neue Suche nach: Lewis, R.
In:
INFORMATION SYSTEMS CONTROL JOURNAL
;
6
;
22-24
;
2006
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:Expert Consensus on the Top IT Controls for a Small Business
-
Beteiligte:
-
Erschienen in:INFORMATION SYSTEMS CONTROL JOURNAL ; 6 ; 22-24
-
Verlag:
- Neue Suche nach: INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION
-
Erscheinungsdatum:01.01.2006
-
Format / Umfang:3 pages
-
ISSN:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 657.4550285
- Weitere Informationen zu Dewey Decimal Classification
-
Klassifikation:
DDC: 657.4550285 -
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis – Band 6
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 4
-
Information Security Matters: The Cost of CyberattacksRoss, Steven J et al. | 2012
- 4
-
Information Security Matters: Service Availability and Disaster RecoveryRoss, Steven J et al. | 2010
- 4
-
Information Security Matters: Eating Crow With a Tasty SauceRoss, Steven J et al. | 2011
- 4
-
Information Security Matters: A Tide in the AffairsRoss, Steven J et al. | 2013
- 5
-
The Law of Unintended Consequences? Assessing the Costs, Benefits and Outcomes of the Sarbanes-Oxley Act Excerpted and reprinted from IS Audit & Control Journal, volume 1, 2004| 2009
- 5
-
Editorial - Issues & CommentsCangemi, Michael et al. | 2006
- 5
-
Taking A Look Back: The Law of Unintended Consequences? Assessing the Costs, Benefits and Outcomes of the Sarbanes-Oxley Act - Excerpted and reprinted from IS Audit & Control Journal, volume 1-2004| 2009
- 5
-
Issues&CommentsCangemi, Michael et al. | 2002
- 5
-
Guest Editorial: Breaking the CoconutPenri-Williams, Hugh H. et al. | 2007
- 5
-
Guest Editorial: You Can't Outsource ControlZarrella, Edge et al. | 2008
- 5
-
Editorial - Issues & Comments - Examines the future of electronic commerce, calling it a bright future, despite the recent downturn in the IT industry. He goes on to call business professionals not to lose sight of the opportunities the Internet presents to reinvent business models.Cangemi, Chief Michael et al. | 2001
- 5
-
Editorial - Issues & Comments - Editor in Chief Michael P Cangemi, CISA, CPA, discusses the influence technology, the rise of Internet use and business changes in general have had on both fashion trends and web use by women. He also talks about the age-old scandals encountered by Wall Street.Cangemi, Michael P. et al. | 2000
- 6
-
IT Audit Basics: What Every IT Auditor Should Know About Backup and RecoverySingleton, Tommie W et al. | 2011
- 6
-
Information Ethics: Character Traits of an IT ProfessionalRaval, Vasant et al. | 2013
- 6
-
Cloud Computing: Leveraging the Cloud for Added ValueMarkey, Steven C et al. | 2012
- 7
-
Connections GalorelSethuraman, S. et al. | 2009
- 7
-
Guest Editorial: Connections Galore!Sethuraman, Sekar et al. | 2009
- 7
-
IT Audit Basics: Data Extraction, A Hindrance to Using CAATsSingleton, Tommie W et al. | 2010
- 8
-
IS Security Matters: There Oughta Be a LawRoss, S. J. et al. | 2006
- 8
-
Information Ethics: Risk and ResponsibilityRaval, Vasant et al. | 2012
- 9
-
Who Needs Information Security?Ross, S. J. et al. | 2003
- 9
-
IS Security Matters - Eternal Truth and the Next New Thing - Steven J Ross, CISA, examines the security issues and practices that growing in complexity and importance as a result of the emergence of commerce. Specifically, he makes a case for basing information seen with change as its constant underpinning.Ross, Steven J. et al. | 2000
- 9
-
Book Review - Netspionage: The Global Threat to Information - This book raises the awareness of the issues surrounding Internet espionage and computer crime and offers a high-level view of protection, according to the reviewer, who goes on to detail the appropriate readership.Lambert, Michel et al. | 2001
- 9
-
Netspionage: The Global Threat to InformationLambert, M. et al. | 2001
- 9
-
IS Security Matters: I'm Not the SheriffRoss, Steven et al. | 2007
- 9
-
Frameworkers of the World, UniteRoss, S. J. et al. | 2004
- 9
-
Security Provisioning: Managing Access in Extended EnterpriseOliver, D. J. et al. | 2002
- 9
-
IS Security Matters - Frameworkers of the World, UniteRoss, Steven J. et al. | 2004
- 9
-
Book Reviews - Security Provisioning: Managing Access in Extended EnterpriseOliver, Derek J. et al. | 2002
- 9
-
IS Security Matters: Certification and the Disappearing PerimeterRoss, Steven J. et al. | 2008
- 9
-
IS Security Matters: Standard DeviationRoss, Steven J. et al. | 2005
- 9
-
Eternal Truth and the Next New Thing the security issues and practices that are growing in complexity and importance as a result of the emergence of ecommerce. Specifically, he makes a case for basing information security with change as its constant underpinningRoss, S. J. et al. | 2000
- 9
-
IS Security Matters - Who Needs Information Security?Ross, Steven J. et al. | 2003
- 10
-
Five Questions With...Luis Carrera Jr, Jose et al. | 2010
- 10
-
Data Plumbing?Ross, S.J. et al. | 2009
- 10
-
Book Reviews - Security Audit and Control Features SAP(R) R-3(R): A Technical and Risk Management Reference GuideChristodoulides, Michael et al. | 2002
- 10
-
IS Security Matters: Data Plumbing?Ross, Steven J. et al. | 2009
- 10
-
Security Audit and Control Features SAP® R/3®: A Technical and Risk Management Reference GuideChristodoulides, M. et al. | 2002
- 12
-
IT Audit Basics: What Every IT Auditor Should Know About Auditing Virtual Machine TechnologySingleton, Tommie W. et al. | 2008
- 12
-
Book Review: Access Control, Security, and Trust: A Logical ApproachSpinelli, Connie et al. | 2011
- 12
-
IS Security Matters - Privacy PartsRoss, Steven et al. | 2002
- 12
-
IT Audit Basics: What Every IT Auditor Should Know About Identity TheftSingleton, T. W. et al. | 2006
- 12
-
IT Audit Basics: What Every IT Auditor Should Know About Proper Segregation of Incompatible IT ActivitiesSingleton, Tommie W et al. | 2012
- 12
-
IT Audit Basics: What Every IT Auditor Should Know About Data AnalyticsSingleton, Tommie et al. | 2013
- 12
-
Privacy PartsRoss, S. et al. | 2002
- 13
-
IT Audit Basics - Educating the Masses: Audit, Control and Security of Information Systems Today and TomorrowGallegos, Frederick et al. | 2004
- 13
-
Book Review: Security, Audit and Control Features Oracle E-Business Suite, 3rd EditionBenmahbous, Mustapha et al. | 2010
- 13
-
Educating the Masses: Audit, Control and Security of Information Systems Today and TomorrowGallegos, F. et al. | 2004
- 13
-
IT Audit Basics: Computer Forensics: An OverviewGallegos, Frederick et al. | 2005
- 13
-
IT Audit Basics: The COSO Model: How IT Auditors Can Use It to Evaluate the Effectiveness of Internal ControlsSingleton, Tommie et al. | 2007
- 13
-
Virtual Private InfrastructureRoss, S. J. et al. | 2001
- 13
-
IS Security Matters - Virtual Private Infrastructure - Examines the security concerns that arise with the advent of the virtual private infrastructure the use of personal-home computers by employees for business purposes.Ross, Steven J. et al. | 2001
- 13
-
Book Review - Managing the Audit Function: A Corporate Audit Department Procedures Guide, 3rd EditionMcMinn, Janine et al. | 2003
- 13
-
Perspective - Management Guidelines for COBIT - This article describes what Management Guidelines provides the user: Guidelines that are critical in providing the tools for management to use in a focused manner to link IT governance to enterprise governance.Roussev, Robert S. et al. | 2000
- 13
-
Managing the Audit Function: A Corporate Audit Department Procedures Guide, 3^r^d EditionMcMinn, J. / Simon, M. et al. | 2003
- 13
-
Book Review: Green IT in Practice: How One Company Is Approaching the Greening of Its ITMunongwa, Bright et al. | 2011
- 13
-
Management Guidelines for COBIT what Management Guidelines provides the user: Guidelines that are critical in providing the tools for management to use in a focused manner to link IT governance to enterprise governanceRoussey, R. S. et al. | 2000
- 14
-
Criteria for Evaluating and Selecting Continuous Controls Monitoring SolutionsDutta, Angsuman et al. | 2010
- 14
-
Standards, Statements, Guidelines - ISACA Member and CISA Compliance| 2002
- 14
-
Persistent Cross-interface AttacksSood, Aditya K et al. | 2011
- 15
-
Perspective - When IT Lets the Business Down - A summary of remarks made by ISACA-F International President Paul A. Williams at the International Conference 2000.Williams, Paul A. et al. | 2000
- 15
-
IT Audit Basics: What Every IT Auditor Should Know About IT Risk AssessmentSingleton, Tommie W. et al. | 2009
- 15
-
What Every IT Auditor Should Know About IT Risk AssessmentSingleton, T.W. et al. | 2009
- 15
-
Book Review: The Web Application Hacker's Handbook Finding and Exploiting Security Flaws, 2nd EditionParekh, Upesh et al. | 2013
- 15
-
Auditor's Risk Management Guide-Integrating Auditing and ERMSarathy, E. et al. | 2003
- 15
-
When IT Lets the Business Down A summary of remarks made by ISACA/F International President Paul A. Williams at the International Conference 2000Williams, P. A. et al. | 2000
- 15
-
Book Review - Auditor's Risk Management Guide -- Integrating Auditing and ERMSarathy, Emani et al. | 2003
- 16
-
Book Review: Phishing and Countermeasures: Understanding the Increasing Problem of Identity TheftKanhere, Vishnu et al. | 2008
- 16
-
Information Insecurity — Motivator of Corporate Compliance PracticeCano, Jeimy J et al. | 2013
- 17
-
The IT Dimension of Basel IIGuldentops, E. et al. | 2004
- 17
-
Data Governance for Privacy, Confidentiality and Compliance: A Holistic ApproachSalido, Javier et al. | 2010
- 17
-
Book Review: IT Risk: Turning Business Threats Into Competitive Advantagede la Fuente, Reynaldo J. et al. | 2008
- 17
-
Demonstrating Due Diligence in the Management of Information SecurityGelbstein, Ed et al. | 2012
- 17
-
IT Governance - Surfing (commat) the Razor's Edge: Governance and Managing ChangeSarup, Deepak et al. | 2002
- 17
-
IT Governance - "To Be, or Not To Be" -- The Question of Runaway ProjectsSarup, Deepak et al. | 2003
- 17
-
Book Review: Making IT Governance Work in a Sarbanes-Oxley World By Jaap Bloem, Menno Van Doorn and Piyush Mittalde la Fuente, R. J. et al. | 2006
- 17
-
Surfing @ the Razor's Edge: Governance and Managing ChangeSarup, D. et al. | 2002
- 17
-
"To Be, or Not To Be"-The Question of Runaway ProjectsSarup, D. et al. | 2003
- 17
-
IT Governance - The IT Dimension of Basel IIGuldentops, Erik et al. | 2004
- 17
-
Standards, Statements, Guidelines - Standards and guidelines for maintaining compliance for both ISACA" membership and the CISA" designation are outlined and the status of ISACA issuances noted.| 2001
- 18
-
IT Value: Practical Guidance on Establishing the Val IT Value Governance ProcessHarries, Sarah et al. | 2008
- 18
-
Standards, Statements, Guidelines - ISACA(R) Member and Certification Holder Compliance| 2007
- 18
-
Global Perspectives: Privacy for the Individual-A Reserve Bank of India InitiativeChaudhuri, A. P. / Sinha, A. et al. | 2006
- 19
-
IT Governance: The Rule of Four of IT GovernanceGuldentops, Erik et al. | 2007
- 19
-
Security, Audit and Control Features SAP® ERP, 3^r^d EditionKammermeier, P. et al. | 2009
- 19
-
Survivability Strategies for the Next Generation NetworkHuang, S. et al. | 2006
- 19
-
Global PerspectivesOng'ondi, Dismas et al. | 2006
- 19
-
Book Review: Security, Audit and Control Features SAP® ERP, 3rd EditionKammermeier, Pam et al. | 2009
- 19
-
Pius - HeIpSource Q & ALilly, Fred et al. | 2001
- 19
-
Plus - Technical Q & A, HelpsourceLilly, Fred L. et al. | 2000
- 20
-
IT Audit Basics - Maintaining IT Audit Proficiency -- The Role of Professional Development PlanningGallegos, Fred et al. | 2002
- 20
-
Identify, Govern and Manage IT Risk Part 3: Techniques and Uses for Risk IT and Its Supporting MaterialsFischer, Urs et al. | 2009
- 20
-
Security Labeling of IT Services Using a Rating MethodologyRamos, Antonio et al. | 2013
- 20
-
Data Integrity — Information Security's Poor RelationGelbstein, Ed et al. | 2011
- 20
-
Maintaining IT Audit Proficiency-The Role of Professional Development PlanningGallegos, F. et al. | 2002
- 21
-
Lack of Privacy Awareness in Social NetworksSrinivasan, S et al. | 2012
- 21
-
COBIT Online Goes LiveGuldentops, Erik et al. | 2003
- 21
-
Information Technology Auditing and Cybercommerce: A Risk PerspectivePathak, Jagdish et al. | 2004
- 22
-
IT Governance: Taking Governance ForwardStachtchenko, Patrick et al. | 2008
- 22
-
Expert Consensus on the Top IT Controls for a Small BusinessBusta, B. / Portz, K. / Strong, J. / Lewis, R. et al. | 2006
- 23
-
IT Governance - Corporate Governance and ICT: A Marriage of Reason - Discusses the importance of viewing information and communication technologies as an integral part of the corporate strategy. Further, he describes what is necessary to apply the IT governance concept to the organization.Bourdariat, Jean et al. | 2001
- 23
-
Corporate Governance and ICT: A Marriage of ReasonBourdariat, J. et al. | 2001
- 23
-
IT Value: New IT Is Not Just for ChristmasTiernan, Chris et al. | 2007
- 23
-
IT Governance Perspective - IT Governance Can Help Guide Business eCommerce Initiatives - This article explains that with each technological advancement responding vulnerability or security concern. Enterprise managers are called to the task to balance IT benefits, risks and controls. This article sheds light on how to create the balance.Lainhart IV, John W. et al. | 2000
- 23
-
IT Governance Can Help Guide Business eCommerce Initiatives This article explains that with each technological advancement comes a corresponding vulnerability or security concern. Enterprise managers are called to the task to balance IT benefits, risks and controls. This article sheds light on how to create the balanceLainhart, J. W. et al. | 2000
- 24
-
Cloud Computing: An Auditor's PerspectiveGadia, Sailesh et al. | 2009
- 24
-
Show Me the Money! Three Ways to Better Partner With FinanceBarnier, Brian G et al. | 2010
- 24
-
Accounting for Value and Uncertainty in Security MetricsAxelrod, C.Warren et al. | 2008
- 24
-
An Integrated Risk Assessment Program — A Cliché or a Need?Fahd Azam, Syed et al. | 2013
- 25
-
Commentaries - COBIT 3rd Edition Usage Survey: Growing Acceptance of COBITGuldentops, Erik et al. | 2002
- 25
-
COBIT 3^r^d Edition Usage Survey: Growing Acceptance of COBITGuldentops, E. / De Haes, S. et al. | 2002
- 25
-
Commentary - Wise Wireless: Securing the WLANBindseil, James et al. | 2003
- 25
-
Book Review: Managing Enterprise Information Integrity: Security, Control and Audit IssuesChuluunbaatar, Sod et al. | 2006
- 25
-
Book Review: 7 Steps to Better Written Policies and ProceduresPage, Stephen et al. | 2007
- 25
-
Wise Wireless: Securing the WLANBindseil, J. et al. | 2003
- 25
-
IT Value: The Birth of Val IT| 2006
- 25
-
Book Review: 7 Steps to Better Written Policies and Procedures By Stephen PageChatterjee, S. et al. | 2007
- 26
-
Technology Risk Measurement and ReportingPareek, Mukul et al. | 2011
- 26
-
Book Review: Essentials of Strategic Project ManagementChua, Joyce et al. | 2005
- 26
-
Preventive Technical Controls for Application SecuritySethi, Rohit et al. | 2012
- 27
-
Identity Theft and Corporations' Due DiligenceOlatilu, O. et al. | 2006
- 27
-
IT Governance: Enterprise Governance and the Role of ITHamaker, Stacey et al. | 2005
- 27
-
Book Review: ISO 9001:2000-The Quality Management Process By Ray TrickerRafeq, A. et al. | 2007
- 27
-
An Exploration of Global Perceptions of Secutity and PrivacyGerdes, Michael et al. | 2002
- 27
-
Book Review: ISO 9001:2000 -- The Quality Management ProcessTricker, Ray et al. | 2007
- 27
-
XBRL-How the West Was WonZonneveld, P. A. et al. | 2001
- 27
-
On Security Education, Training and CertificationsRyan, Julie J.C.H. et al. | 2004
- 27
-
A Question of Value Determining the value of e-business in the banking sector. so that it can be a positive sum rather than a zero sum, often depends on an assessment and executive endorsement of the preliminary business modelSarup, D. et al. | 2000
- 27
-
An Exploration of Global Perceptions of Security and PrivacyGerdes, M. et al. | 2002
- 27
-
Leading Information SecurityJulisch, Klaus et al. | 2013
- 27
-
Perspective - XBRL -- How the West Was Won - The author discusses the role XBRL (Extensible Business Reporting Language) will play in the future of electronic business.Zonneveld, Paul A. et al. | 2001
- 27
-
Commentary - Investing in Security -- Do Not Rely on FUDTongia, Rahul et al. | 2003
- 27
-
Features - A Question of Value - Determining the value of e-business in the banking sector, so that it can be a positive sum rather than a zero sum, often depends on an assessment and executive endorsement of the preliminary business model. This article goes into further detail.Sarup, Deepak et al. | 2000
- 27
-
Investing in Security-Do Not Rely on FUDTongia, R. / Jain, K. et al. | 2003
- 28
-
Y2K Silver Lining-Overblown or Extremely Well Managed?-Solving Year 2000Parker, R. G. et al. | 2000
- 28
-
Features - Y2K Silver Lining -- Overblown or Extremely Well Managed? -- Solving Year 2000 - This author discusses the value of added practices gleaned from the Y2K phenomenon and provides a roadmap to retain them.Parker, Robert G. et al. | 2000
- 29
-
How to Preserve Security and Autonomy While Meeting Information-sharing DirectivesSchumacher, Scott et al. | 2009
- 29
-
The Changing Face of CybersecurityHayes, Stewart et al. | 2012
- 29
-
An Introduction to Digital Records ManagementHamidovic, Haris et al. | 2010
- 30
-
Perspective - When Code Red Attacks: Addressing Real Vulnerabilities Behind Virus Hysteria - The attack of the Code Red worm demonstrates the vulnerability of the current Internet infrastructure. The authors discuss the big picture of malicious code and the vulnerabilities it exposes.Burnette, Mark et al. | 2001
- 30
-
The New World of Risk-based Regulation (Part 1)Micallef, Mario et al. | 2007
- 30
-
Important, But Often Dismissed: Internal Control in a Microsoft Access DatabaseWhite, J. H. et al. | 2006
- 30
-
Implementing, Automating and Validating Controls for Privileged Users in Healthcare OrganizationsTraverse, Cheryl et al. | 2008
- 30
-
When Code Red Attacks: Addressing Real Vulnerabilities Behind Virus HysteriaBurnette, M. / Gomez, C. et al. | 2001
- 31
-
IT Audit Basics - IT Audit Independence: What Does It Mean?Gallegos, Fred et al. | 2003
- 31
-
IT Audit Independence: What Does It Mean?Gallegos, F. et al. | 2003
- 31
-
Doing Business in India Requires Digital ComplianceVaidya, Anil et al. | 2013
- 32
-
Features - Improving the Cost-Effectiveness of a Test Suite for User Acceptance - The authors elucidate ways for improvement since user acceptance tests are often conducted using blind box methods because these are based on formal specifications when most commercial specifications are written in a information manner. The authors describe these pitfalls and suggest ways to avoid them.Yu, Yuen Tak et al. | 2000
- 32
-
Commentaries - Control and Governance Maturity Survey: Establishing a Reference Benchmark and a Self-assessment ToolGuldentops, Erik et al. | 2002
- 32
-
Improving the Cost-Effectiveness of a Test Suite for User Acceptance TestsYu, Y. T. / Tang, S. F. / Poon, P. L. / Chen, T. Y. et al. | 2000
- 32
-
Control and Governance Maturity Survey: Establishing a Reference Benchmark and a Self-assessment ToolGuldentops, E. / Van Grembergen, W. / De Haes, S. et al. | 2002
- 32
-
Best Practices for Establishing an Effective Workplace Policy for Acceptable Computer UsageNolan, John et al. | 2005
- 32
-
Choosing the Most Appropriate Data Security Solution for an OrganizationMattsson, Ulf et al. | 2011
- 32
-
Crossword PuzzleMellor, Myles et al. | 2009
- 33
-
How Has Sarbanes-Oxley Compliance Affected Information Security?Spears, Janine L. et al. | 2009
- 33
-
COBIT: An Ideal Tool for Teaching Information Security ManagementPattinson, Malcolm et al. | 2004
- 33
-
How Has Sarbanes-Oxiey Compliance Affected Information Security?Spears, J.L. et al. | 2009
- 33
-
Patch Management: An Effective Line of Defense for UNIX and LinuxAndrew, C. et al. | 2003
- 33
-
Patch Management: An Effective Line of Defense for UNIX and LimixAndrew, Chris et al. | 2003
- 33
-
Standards, Statements, Guidelines - ISACA® Member and Certification Holder Compliance| 2008
- 35
-
Is the IT Risk Worth a Control? Defining a Cost-value Proposition Paradigm for Managing IT RisksSathiyamurthy, Sudhakar et al. | 2008
- 35
-
COBIT 4.0: The New Face of COBITHardy, Gary et al. | 2005
- 35
-
The Center for Internet Security: Global Security Benchmarks for Computers Connected to the InternetKreitner, C. / Miuccio, B. et al. | 2001
- 35
-
Features The Center for Internet Security: Global Security Benchmarks for Computers Connected to the Internet - The members of the Center for Internet Security (CIS) develop technical security benchmarks through a global consensus process that brings together industry, government, academia and consultants. Their primary objective is widespread adoption of the benchmarks to improve Internet security worldwide.Kreitner, Clint et al. | 2001
- 35
-
Living With RiskPareek, M. et al. | 2006
- 35
-
Building a Business Case for Records ManagementStrait, Cheryl et al. | 2010
- 36
-
Preparation Is the Key Ingredient to a Successful SIMEmmett, Mark D. et al. | 2007
- 36
-
The Importance of Event Correlation for Effective Security ManagementCaldwell, Matthew et al. | 2002
- 37
-
Case Study - Getting Action on Audit ResultsSparks, Harry A. et al. | 2003
- 37
-
Revisiting the Human Factor in Organizational Information Security ManagementGuo, Ken H et al. | 2013
- 37
-
SME Cybersecurity and the Three Little PigsHan, David R et al. | 2012
- 37
-
Utilization of Generalized Audit Software in an Information Systems Auditing CourseMcCombs, Gary B. et al. | 2004
- 37
-
Achieving Continuous IT Auditing: RICAJohnstone, Dale et al. | 2009
- 37
-
Getting Action on Audit ResultsSparks, H. A. et al. | 2003
- 38
-
Features The State of Enterprise Security Management - In this interview, Reed Harrison, chief technology officer, e-Security, Inc., provides his understanding of enterprise security management and its importance.Judge, Joe et al. | 2001
- 38
-
The State of Enterprise Security ManagementJudge, J. et al. | 2001
- 38
-
IT Governance and Business-IT Alignment in SMEsDe Haes, Steven et al. | 2010
- 38
-
Developing a Unified Approach to Information Security in Business Associate RelationshipsOverly, Michael R et al. | 2011
- 39
-
Application Risk in a TCP-IP EnvironmentHarrison, Robert M. et al. | 2002
- 39
-
Features - Information Systems Auditing in Developing Economies -- The Bosnian Challenge - Written by an auditor in the US Federal Government, the author systematically describes firsthand the challenges of building information auditing functions in a war-torn country.Buxton, Brian M. et al. | 2000
- 39
-
Identity Theft: A New Frontier for Hackers and CybercrimeCilli, Claudio et al. | 2006
- 39
-
ISACA Model Curriculum 2004: Continuing to Invest in the FutureLord, Alan T. et al. | 2004
- 39
-
Information Systems Auditing in Developing Economies-The Bosnian ChallengeBuxton, B. M. et al. | 2000
- 39
-
New Identity Theft RegulationsGonzalez, Silka et al. | 2008
- 39
-
From CSI to the Classroom: Developing A Computer Forensics Degree ProgramStaley, A. B. / Inch, S. / Shapeero, M. et al. | 2006
- 41
-
Security Within VoIP NetworksRamirez, David et al. | 2007
- 41
-
Assessing Data Authenticity with Benford's LawHasan, Bassam et al. | 2002
- 41
-
Large-scale Biometric Management: A Centralized, Policy-based Approach to Reducing Organizational Identity ChaosByrne, Jim et al. | 2003
- 42
-
Understanding Virtual OrganizationsPang, L. et al. | 2001
- 42
-
Security and Privacy Trade-offs in RFID UseSrinivasan, S. et al. | 2009
- 42
-
Building an Educational Response to Terrorism: A Multifaceted Problem, A Multidimensional ResponseMaconachy, William V. et al. | 2004
- 42
-
Features Understanding Virtual Organizations - This article examines the concepts, technologies and issues surrounding virtual organizations (VO) with a knowledge management (KM) perspective. It identifies foundational concepts, surveys KM technologies that support VOs and looks at case studies of VOs in the private and public sector.Pang, Les et al. | 2001
- 42
-
Issues With Auditing the Systems Development ProcessHenderson, Dave et al. | 2008
- 42
-
A Sustainable and Efficient Way to Meet Client's Growing Security ExpectationsKulkarni, Buck et al. | 2013
- 43
-
Transitioning IT From a Compliance to a Value-driven Enterprise Using COBITLawton, Robert et al. | 2007
- 43
-
Using Scenario Analysis for Managing Technology RiskPareek, Mukul et al. | 2012
- 43
-
Procedure Guidelines and Controls Documentation: SDLC Controls in CobiT® 4.0Basham, R. et al. | 2006
- 44
-
Security and Ownership of Personal Electronic DevicesBassett, Richard A. et al. | 2006
- 44
-
Web Application SecurityStasiak, Ken et al. | 2002
- 44
-
Comercio Electronico-La Nueva Perspectiva de Los NegociosGonzalez, M. H. et al. | 2000
- 44
-
Features - Comercio Electronico -- La Nueva Perspectiva de Los Negocios - The companion piece to this article, printed in English, is posted ISACA web site.González, Marcelo Héctor et al. | 2000
- 45
-
How Does the Business Drive IT? Identifying, Prioritising and Linking Business and IT GoalsGrembergen, Wim Van et al. | 2007
- 45
-
A Higher Level of Governance — Monitoring IT Internal ControlsGarber, Mike et al. | 2010
- 46
-
Privacy Is in the Eye of the BeholderSchreider, Tari et al. | 2003
- 46
-
The Criticality of Mobile Device ManagementAhmed, Adesanya et al. | 2013
- 46
-
Monitoring Privileged Application Users in Oracle Applications EnvironmentHare, Jeffrey T. et al. | 2008
- 46
-
Auditing Global Compliance of Data Protection MechanismsLehmann, Dirk et al. | 2011
- 47
-
The Rising Impact of Virtual Machine Hypervisor Technology on Digital Forensics InvestigationsBates, Patty et al. | 2009
- 47
-
A Survey of Application Security in Current International StandardsGreene, Fredric et al. | 2002
- 48
-
Risk Management for Internet BankingRamakrishnan, G. et al. | 2001
- 48
-
A Wake Up Call to All Information Security and Audit Executives: Become Business-relevantTaylor, Patrick et al. | 2004
- 48
-
Features Risk Management for Internet Banking - Many banks have assumed that Internet banking primarily increases information security risks and have not sufficiently focused on the effect on other banking-specific risks. This article provides an overview of the various risks that are heightened with Internet banking and a holistic approach to managing these risks.Ramakrishnan, Ganesh et al. | 2001
- 49
-
Technology as the Relationship Doctor for Business: Understanding Business Relationships Within an Organizational Hierarchy FrameworkMoseley, Marty et al. | 2007
- 49
-
Preparing for HTML5 Capabilities and ThreatsZhang, Hongwen et al. | 2012
- 49
-
Identity Management: A Business Strategy for Collaborative CommerceAhuja, Jay et al. | 2003
- 49
-
Features - Secure Electronic Transaction (SET) Protocol - SET, as the name implies, is a standard which ensures that credit card associated payment order information travel safely and securely among various parties on the Internet.Ramakrishnan, Ganesh et al. | 2000
- 50
-
Internal CyberforensicsBakshi, Sunil et al. | 2005
- 50
-
Applying Testing to Requirements Inspection for Software Quality AssuranceChen, T. Y. / Poon, P.-L. / Tang, S.-F. / Tse, T. H. / Yu, Y. T. et al. | 2006
- 51
-
Business Process Management Systems: The Internal Control PerspectiveNatovich, Joseph et al. | 2009
- 51
-
The Institutional Need for Comprehensive Auditing StrategiesMilus, Stu et al. | 2004
- 51
-
HelpSourceSubramaniam, Gan et al. | 2010
- 51
-
Help Source Q&ASubramaniam, Gan et al. | 2011
- 52
-
Analysis of FFIEC Guidance: Technologies and Decisions on AuthenticationFelker, Mikhael et al. | 2007
- 52
-
Black Box Testing: Its Fundamental Concepts and ProblemsPoon, Pak-Lok et al. | 2008
- 52
-
Intrusion, Attack, Penetration-Some IssuesMahadevan, C. et al. | 2001
- 52
-
Features Intrusion, Attack, Penetration -- Some Issues - B2B, B2C and Internet-based e-commerce transactions, hosting vertical portals and Internet banking have come of age and are facing serious threats of attack, penetration or intrusion. What makes a system vulnerable to attack? What protective mechanisms can be built and put in place?Mahadevan, Chidambaram et al. | 2001
- 52
-
Plus - CPE Quiz #73. Based on Volume 4, 2000, Operating and Manufacturing SystemsOringel, Joey et al. | 2000
- 53
-
Quiz #151 - Based on Volume 4, 2013Khan, Kamal et al. | 2013
- 53
-
CPE Quiz #139 - Based on Volume 4, 2011Khan, Kamal et al. | 2011
- 53
-
CPE Quiz #145 - Based on Volume 4, 2012Khan, Kamal et al. | 2012
- 53
-
Quiz #133 Based on volume 4, 2010Khan, Kamal et al. | 2010
- 54
-
An Introduction to CryptographyPiper, Fred et al. | 2003
- 54
-
COBIT'S Management Guidelines Revisited: The KGIs-KPIs CascadeGrembergen, Wim Van et al. | 2005
- 54
-
Standards, Statements, Guidelines - Procedures to maintain compliance for both ISACA membership and CISA designation are outlined and the status of ISACA issuances is noted.| 2000
- 55
-
CPE Quiz #85, based on volume 4, 2002Oringel, Joey et al. | 2002
- 55
-
Standards, Guidelines, Tools and Techniques| 2010
- 56
-
Excerpt: IT Governance Roundtable: Unlocking Value| 2009
- 57
-
Help Source - Help Source Q&AGanapathi Subramaniam, B. et al. | 2004
- 58
-
Pius - CE Quiz #79, Based on Volume 4, 2001Oringel, Joey et al. | 2001
- 59
-
CPE Quiz #103 - Based on Volume 4, 2005Rafeq, A. et al. | 2006
- 59
-
CPE Quiz #115 - Based on Volume 4, 2007Rafeq, A. et al. | 2007
- 59
-
CPE Quiz #127 - Based on Volume 4, 2009Khan, Kamal et al. | 2009
- 59
-
CPE Quiz - CPE Quiz #97, based on volume 4, 2004Oringel, Joe et al. | 2004
- 59
-
CPE Quiz #121 - Based on Volume 4, 2008Khan, Kamal et al. | 2008
- 62
-
Security in the Land Down UnderFord, Stephen et al. | 2003
- 63
-
Standards, Guidelines, Tools and Techniques: ISACA Member and Certification Holder Compliance| 2009
- 67
-
CPE Quiz #91, based on volume 4, 2003Oringel, Joe et al. | 2003
-
Plus - ISACA Bookstore Price List Supplement| 2000
-
ISACA Bookstore Supplement| 2011
-
ISACA Bookstore Price List Supplement| 2007
-
Pius - ISACA Bookstore Price List Supplement| 2001
-
ISACA Bookstore - ISACA Bookstore Price List Supplement| 2004