IT Value: Five Critical Success Factors for Introducing Val IT (Englisch)
- Neue Suche nach: Harries, S.
- Neue Suche nach: Harrison, P.
- Neue Suche nach: Harries, S.
- Neue Suche nach: Harrison, P.
In:
INFORMATION SYSTEMS CONTROL JOURNAL
;
3
;
15-16
;
2009
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:IT Value: Five Critical Success Factors for Introducing Val IT
-
Beteiligte:Harries, S. ( Autor:in ) / Harrison, P. ( Autor:in )
-
Erschienen in:INFORMATION SYSTEMS CONTROL JOURNAL ; 3 ; 15-16
-
Verlag:
- Neue Suche nach: INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION
-
Erscheinungsdatum:01.01.2009
-
Format / Umfang:2 pages
-
ISSN:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 657.4550285
- Weitere Informationen zu Dewey Decimal Classification
-
Klassifikation:
DDC: 657.4550285 -
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis – Band 3
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Information Security Matters: Who Pays for Security?Ross, Steven J et al. | 2011
- 3
-
Information Security Matters: Cyberrecovery PreparationRoss, Steven J et al. | 2014
- 4
-
Information Security Matters: Barbarians at the RampartsRoss, Steven J et al. | 2013
- 4
-
Information Security Matters: This Should Not Be HappeningRoss, Steven J et al. | 2012
- 4
-
IS Security Matters: Recovery in the CloudRoss, Steven J et al. | 2010
- 5
-
Editorial - Issues & Comments - Editor in Chief Michael Cangemi, CISA, CPA, discusses the issue of privacy and government intervention, technology and central banking and the new US Independence Rules. He also notes the importance of future donations to the foundation.Cangemi, Michael et al. | 2001
- 5
-
Editorial - Issues & CommentsCangemi, Michael et al. | 2004
- 5
-
Guest Editorial: Mobility Changes (Almost) Everything!Boni, William C. et al. | 2008
- 5
-
Taking A Look Back: Will EDP Auditors be an Extinct Species by 2000 A.D.? Excerpted and reprinted from - The EDP Auditor Journal, volume III, 1986| 2009
- 5
-
Editorial - Issues & Comments - Editor-in-Chief Michael P Cangemi, CISA, CPA, presents the annually popular AICPA Top Technology PrioritiesCangemi, Michael P. et al. | 2000
- 5
-
Editorial - Issues & Comments - Editor in Chief Michael Cangemi, CISA, CPA discusses corporate governance and lessons learned in regard to Enron. He also discusses the role of corporate governance in preventing cybercrime.Cangemi, Michael et al. | 2002
- 5
-
Taking A Look Back: Will EDP Auditors be an Extinct Species by 2000 A.D.?| 2009
- 6
-
Cloud Computing: The Arrival (Finally) of PCI Cloud GuidanceHay, Andrew et al. | 2013
- 6
-
Guest Editorial: Building Bridges: IT as an Enabler of GRC ConvergenceAnand, Sanjay et al. | 2009
- 6
-
Cloud Computing: Cloud Computing as an Integral Part of a Modern IT StrategyRuhse, Kai-Uwe et al. | 2012
- 6
-
IT Audit Basics: Understanding and Applying Benford's LawSingleton, Tommie W et al. | 2011
- 6
-
The NetworkAmato, Rosemary M et al. | 2014
- 6
-
IT Audit Basics: IT Audits of Cloud and SaaSSingleton, Tommie W et al. | 2010
- 8
-
IS Security Matters - Identifier ManagementRoss, Steven J. et al. | 2003
- 8
-
Identifier ManagementRoss, S. J. et al. | 2003
- 8
-
IS Security Matters: Paris Hilton's PrivacyRoss, Steven J. et al. | 2005
- 8
-
Paris Hilton's PrivacyRoss, S. J. et al. | 2005
- 9
-
IS Security Matters: Resilience TransformationRoss, Steven J. et al. | 2008
- 9
-
IS Security Matters: Falling Off the TruckRoss, Steven J. et al. | 2006
- 9
-
the advantages of designing security into systems from their inception, as opposed to adding security later. He proposes looking at return on security investment (ROSI) in a way that provides a guide for investmentRoss, S. J. et al. | 2002
- 9
-
Cloud Computing: Securing an Evolving Cloud EnvironmentNeely, Matthew et al. | 2014
- 9
-
Five Questions With...Kumar, Charan et al. | 2010
- 9
-
IT Security Matters: Mail Call IIIRoss, Steven J. et al. | 2007
- 9
-
IS Security Matters - Mahogany Row Mail Call - While acknowledging that most often information security focuses on the unknown person doing unauthorized things, Steven J. Ross considers the risks that arise from known people doing things they are allowed to do but should not be doing.Ross, Steven J. et al. | 2001
- 9
-
IS Security Matters - ROSI Scenarios - Steven J. Ross, CISA, discusses the advantages of designing security into systems from their inception, as opposed to adding security later. He proposes looking at return on security investment (ROSI) in a way that provides a guide for investment.Ross, Steven J. et al. | 2002
- 9
-
Book Review - Strategies for Information Technology GovernanceTsang-Reveche, Christina et al. | 2004
- 9
-
Strategies for Information Technology GovernanceTsang-Reveche, C. et al. | 2004
- 9
-
Mahogany Row Mail Call While acknowledging that most often information security focuses on the unknown person doing unauthorized things, Steven J. Ross considers the risks that arise from known people doing things they are allowed to do but should not be doing| 2001
- 9
-
IS Security Matters - Steve Ross, CISA, approaches DDoS from the prevention of the outages in the first place. To illustrate his points, he sets forth conceptual specifications for this architectureRoss, Steve et al. | 2000
- 9
-
IS Security Matters: Gang Aft AgleyRoss, Steven J. et al. | 2009
- 10
-
Information Ethics: Policy VacuumsRaval, Vasant et al. | 2012
- 10
-
IS Audit Basics: Auditing the IT AuditorsSingleton, Tommie et al. | 2013
- 11
-
IT Audit Basics: Beyond the IT in IT AuditSingleton, Tommie et al. | 2008
- 11
-
Network Security: The Complete ReferenceParmar, K. et al. | 2004
- 11
-
Book Review - Network Security: The Complete ReferenceParmar, Kamal et al. | 2004
- 11
-
Commentary - The Ramifications of Sarbanes-OxleySingleton, Tommie et al. | 2003
- 11
-
The Ramifications of Sarbanes-OxleySingleton, T. et al. | 2003
- 11
-
IT Audit Basics: Auditing Realization of Benefits from ITSayana, S.Anantha et al. | 2005
- 11
-
Auditing Realization of Benefits from ITSayana, S. A. et al. | 2005
- 12
-
Every Silver Cloud Has a Dark Lining: A Primer on Cloud Computing, Regulatory and Data Security RiskCadregari, Carl et al. | 2011
- 12
-
Numerous Opinions — Which Will Happen? A Review of 2010 IT Trends and Predictions| 2010
- 12
-
Information Ethics: ISACA's Corporate Social ResponsibilityRaval, Vasant et al. | 2014
- 12
-
IT Audit Basics: Auditing Applications, Part 1Singleton, Tommie W et al. | 2012
- 12
-
Standards, Statements, Guidelines - Standards and guidelines for maintaining compliance for ISACATM membership and the CISAa designation are outlined and the status of ISACA issuances noted.| 2002
- 13
-
COBIT Advisor 2nd Edition| 2000
- 13
-
Standards, Statements, Guideliness - Standard, and guidelines for maintaining compliance for both ISACA" membership and the CISAe designation are outlined and the status of ISACA issuances noted.| 2001
- 13
-
Modeling ResiliencyRoss, S. J. et al. | 2004
- 13
-
IT Audit Basics: What Every IT Auditor Should Know About Controls: The CDLCSingleton, Tommie W. et al. | 2009
- 13
-
IS Security Matters - Modeling ResiliencyRoss, Steven J. et al. | 2004
- 13
-
Book Reviews - COBIT Advisor 2nd Edition - Although there are two book reviews by two different authors for this book, the editors believed both to be of value. One focuses on what a person needs to know about COBIT to use COBIT Advisor. The other review walks the reader through practical applications of COBIT Advisor in one's work world| 2000
- 13
-
Global Perspectives: The View of and Approach Toward CybercrimeCilli, Claudio et al. | 2006
- 13
-
IT Audit Basics: IT Audit Education and Professional DevelopmentSingleton, Tommie et al. | 2007
- 13
-
Standards and guidelines for maintaining compliance for both ISACA" membership and the CISA^o designation are outlined and the status of ISACA issuances noted| 2001
- 14
-
IT Governance: IT Governance Global Status Report 2008: An ExcerptSteuperaert, Dirk et al. | 2008
- 14
-
Make Sure Management and IT Are on the Same Page: Implementing an IT Governance FrameworkHardy, G. et al. | 2002
- 14
-
IT Governance - Make Sure Management and IT Are on the Same Page: Implementing an IT Governance Framework - Gary Hardy examines the management of IT through an IT governance framework. To govern IT effectively, it is important to appreciate the activities and risks within IT that need to be managed. Using the CoBiT Framework's four domains and the IT processes, he breaks this down -- Looking at it logically from a top management perspective.Hardy, Gary et al. | 2002
- 15
-
IT Value: Five Critical Success Factors for Introducing Val ITHarries, Sarah et al. | 2009
- 15
-
Information Ethics: Why Do Corporate Frauds Occur?Raval, Vasant et al. | 2013
- 15
-
Plus - HelpSource Q & ALilly, Fred L. et al. | 2001
- 15
-
Standards, Statements, Guidelines - ISACA(R) Member and Certification Holder Compliance| 2005
- 16
-
IS Audit Basics: The Logical Reason for Consideration of ITSingleton, Tommie et al. | 2014
- 17
-
Book Review: Security, Audit and Control Features Oracle® Database, 3rd EditionMookhey, K K et al. | 2010
- 17
-
Questions That Must Be Addressed for a Successful IFRS ImplementationBrown, William C et al. | 2011
- 17
-
IT Governance - IT Governance Putting It in Perspective - Hugh Parkes, CISA, FCA, attempts to put IT governance into perspective. He discusses several domains that could possibly be considered to comprise IT governance and the goals of IT governance both inward and outward.| 2001
- 17
-
IT Governance - Effective Information Technology Governance Will Improve Returns to ShareholdersDodds, Rupert et al. | 2004
- 17
-
IT Governance Putting It in Perspective Hugh Parkes, CISA, FCA, attempts to put IT governance into perspective. He discusses several domains that could possibly be considered to comprise IT governance and the goals of IT governance both inward and outward| 2001
- 17
-
IT Governance: IT and Enterprise GovernanceParkinson, Michael J.A. et al. | 2005
- 17
-
IT Audit Basics: What Every IT Auditor Should Know About CyberforensicsSingleton, Tommie W. et al. | 2006
- 17
-
Effective Information Technology Governance Will Improve Returns to ShareholdersDodds, R. et al. | 2004
- 17
-
IT Governance: Bridging Business and IT Strategies With Enterprise Architecture: Realising the Real Value of Business-IT AlignmentChatterji, Sushil et al. | 2007
- 17
-
IT and Enterprise GovernanceParkinson, M. J. A. / Baker, N. J. et al. | 2005
- 18
-
IT Value: Recognising the Need for Val IT: Identifying Tipping Points for Value ManagementHarries, Sarah et al. | 2008
- 18
-
IT Audit Basics - The Necessity for Documentation - S. Anantha Sayana, CISA, CIA, discusses the importance of IS auditors' work and observations in the course of an audit.Sayana, S.Anantha et al. | 2002
- 18
-
Information Technology Control & Audit| 2000
- 18
-
Business Skills for the IT Audit and Assurance ProfessionalParker, Robert G et al. | 2010
- 18
-
The Necessity for DocumentationSayana, S. A. et al. | 2002
- 18
-
Book Reviews - Information Technology Control & Audit - Reprinted by permission from EDPAC's| 2000
- 19
-
IT Audit Basics - Auditing Wireless Telecommunications: An Issue of StandardsGallegos, Frederick et al. | 2004
- 19
-
Big Data — Not a PanaceaRiffat, Muzamil et al. | 2014
- 19
-
SOC Progress ReportVazzana, Brian et al. | 2012
- 19
-
IT Audit Basics - Auditing OS and Database ControlsSayana, S.Anantha et al. | 2003
- 19
-
Book Review: Cyber Forensics: A Field Manual for Collecting, Examining and Preserving Evidence of Computer Crime, 2nd EditionRafeq, A. et al. | 2009
- 19
-
Auditing Wireless Telecommunications: An Issue of StandardsGallegos, F. et al. | 2004
- 19
-
Auditing OS and Database ControlsSayana, S. A. et al. | 2003
- 20
-
Standards, Statements, Guidelines ISACA® Member and Certification Holder Compliance| 2009
- 20
-
Plus - Technical Q & A, HelpsourceLilly, Fred L. et al. | 2000
- 20
-
IT value: Program Management: Seeing Both the Forest and the TreesThorp, John et al. | 2007
- 20
-
Book Review: Official Certified Ethical Hacker Review Guide, Version 7.1Sule, Dauda et al. | 2013
- 21
-
IT Governance: Moving From IT Governance to Enterprise Governance of ITDe Haes, Steven et al. | 2009
- 21
-
Migrating From COBIT 4.1 to COBIT 5 — Upgrading the Turkish Banking SystemKazmirci, Kaya et al. | 2013
- 22
-
Big Data Analytics for Sophisticated Attack DetectionVirvilis, Nikos et al. | 2014
- 22
-
Global Perspectives: The Changing Role of the IT AuditorMansour, Charles et al. | 2005
- 22
-
ISACA® Member and Certification Holder Compliance| 2004
- 22
-
IT Governance: Why a Guideline?Cilli, C. et al. | 2003
- 22
-
IT Governance - IT Governance: Why a Guideline?Cilli, Claudio et al. | 2003
- 23
-
Partnership for Critical Infrastructure SecurityLainhart, J. W. et al. | 2000
- 23
-
Features - Virtual Private Networking: Confidentiality on Public Networks - As workplaces become increasingly remote-bascd, enterprises need to identify possible solutions to provide the desired confidentiality, availability and public network connectivity. The concept of a virtual private networking is to create a private network over the public network, or the Internet, by using encryption, authentication and tunneling to allow data to travel securely.Norris Jr, Robert C. et al. | 2001
- 23
-
A Primer on Nonrelational, Distributed Databases for IS ProfessionalsMarkey, Steve et al. | 2012
- 23
-
What Is Big Data and What Does It Have to Do With IT Audit?Setty, Kumar et al. | 2013
- 23
-
An E-citadel for Securing Credit Card and Consumer Data: A New Application for an Old Approach to Security - Businesses suffer threats to security from different types of attacks. Unfortunately, many of today's e-businesses implement security programs that bear far more resemblance to an eggshell than a citadel. The author outlines 10 suggestions that can help an organization change its security model from an easily cracked eggshell to a more advanced, defensive model.Arnold, Tom et al. | 2002
- 23
-
Virtual Private Networking: Confidentiality on Public Networks As workplaces become increasingly remote-based, enterprises need to identify possible solutions to provide the desired confidentiality, availability and public network connectivity. The concept of a virtual private networking is to create a private network over the public network, or the Internet, by using encryption, authentication and tunneling to allow data to travel securelyNorris, R. C. et al. | 2001
- 23
-
IT Governance: Information Security GovernanceMalik, William J. et al. | 2006
- 23
-
An E-citadel for Securing Credit Card and Consumer Data: A New Application for an Old Approach to SecurityArnold, T. et al. | 2002
- 23
-
Security, Audit and Control Issues for Managing Risk in the Wireless LAN EnvironmentStanley, Richard A. et al. | 2004
- 23
-
Perspective - Partnership for Critical Infrastructure Security - Critical infrastructure, the backbone of the American economy, faces insidious and potentially destructive threats such as cyber strikes and acts of violence. Learn what ISACA's role is in addressing these problemsLainhart IV, John W. et al. | 2000
- 24
-
Cybersecurity and the Critical Infrastructure: Looking Beyond the PerimeterAxelrod, C.Warren et al. | 2006
- 24
-
Book Review: Stepping Through the InfoSec ProgramAxelrod, C.Warren et al. | 2008
- 24
-
Crossword PuzzleMellor, Myles et al. | 2009
- 25
-
Book Reviews - From Business Strategy to IT ActionBenson, Robert J. et al. | 2005
- 25
-
Book Reviews: From Business Strategy to IT Action By Robert J. Benson, Thomas L. Bugnitz and William B. WaltonTsang-Reveche, C. et al. | 2005
- 25
-
Computer Forensics Emerges as an Integral Component of an Enterprise Information Assurance ProgramBarbin, D. / Patzakis, J. et al. | 2002
- 25
-
Book Reviews - Integrated Auditing of ERP SystemsMusaji, Yusufali F. et al. | 2005
- 25
-
Book Review: Information Development: Managing Your Documentation Projects, Portfolio, and PeopleChatterjee, Soumen et al. | 2008
- 25
-
Is Your Business Continuity Plan a Paper Tiger?Kothari, Priyank et al. | 2007
- 25
-
Computer Forensics Emerges as an Integral Component of an Enterprise Information Assurance Program - Computer forensics is the collection, preservation, analysis and court presentation of computer-related evidence. The proper collection and analysis of computer evidence through accepted computer forensic protocols is a critical component to any internal investigation or audit where the results have at least the potential to be presented in a legal proceeding.Barbin, Douglas et al. | 2002
- 25
-
Excerpt: IT Governance Roundtable: Brisbane September 2008| 2009
- 25
-
Automated Audit Testing for SAP Data — Benefit or Just Another Black Box?Wenig, Stefan et al. | 2011
- 26
-
The COBIT® Maturity Model in a Vendor Evaluation CasePederiva, A. et al. | 2003
- 26
-
Perspective - IT Governance Roundtables Spur Discussion - This article summarizes the lively and productive discussions that occurred in the UK. The article is sponsored by the IT Governance Institute and is written by an ISACA member who attended the first IT Governance ForumPoole, Vernon et al. | 2000
- 26
-
Considerations for Ensuring Security of Research Data in a Federally Regulated EnvironmentMedina, Jacqueline et al. | 2013
- 26
-
Case Study - The COBIT Maturity Model in a Vendor Evaluation CasePederiva, Andrea et al. | 2003
- 26
-
Building Your Bridge to the FutureReed, James et al. | 2010
- 26
-
IT Governance Roundtables Spur DiscussionPoole, V. et al. | 2000
- 27
-
Securing the Wireless NetworkNelson, William F. et al. | 2004
- 27
-
IT Risk Exploration: The IT Risk Management Taxonomy and EvolutionSchlarman, Steve et al. | 2009
- 27
-
A Prelude to IT Assurance FrameworkMuthukrishnan, Ravi et al. | 2008
- 27
-
Communication — The Missing PieceGoldberg, Danny M et al. | 2012
- 27
-
Data Privacy and Big Data — Compliance Issues and ConsiderationsEmmanuel Yu, William et al. | 2014
- 28
-
Data Hiding - This article examines techniques that a slightly more sophisticated end user might employ to hide data rather than trying to erase them, including renaming files, changing file extensions, turning on the hidden attribute function and concealing information in a part of the disk where data would not normally exist.Hoskinson, Clayton et al. | 2002
- 28
-
Control Considerations in Object-oriented SystemsCobb, Andrew T. et al. | 2007
- 28
-
examines techniques that a slightly more sophisticated end user might employ to hide data rather than trying to erase them, including renaming files, changing file extensions, turning on the hidden attribute function and concealing information in a part of the disk where data would not normally existHoskinson, C. / Sleezer, J. et al. | 2002
- 28
-
IT Does Not Matter...Or, Does IT? Has IT Moved From a Strategic to a Purely Tactical Function?Sarup, Deepak et al. | 2005
- 29
-
Critical Elements of Information Security Program SuccessO'Bryan, Sharon K. et al. | 2006
- 29
-
Features - Top US Privacy Stories of 2000 - The phenomenal rise and technological sophistication of workplace surveillance leads the list of the Top 10 US privacy stories of the year 2000, according to a Privacy Foundation analysis.Keating, Stephen et al. | 2001
- 29
-
Top US Privacy Stories of 2000 The phenomenal rise and technological sophistication of workplace surveillance leads the list of the Top 10 US privacy stories of the year 2000, according to a Privacy Foundation analysisKeating, S. / Smith, R. M. et al. | 2001
- 29
-
Standards, Statements, Guidelines - Procedures to maintain compliance for both ISACA membership and the CISA designation are outlined and the status of ISACA issuances is noted| 2000
- 30
-
Implementing COBIT in New South Wales HealthTyler, R. et al. | 2000
- 30
-
What Auditors Should Know About EncryptionChan, David et al. | 2004
- 30
-
IT Security Awareness ProgrammeWiederkehr, B. et al. | 2003
- 30
-
Case Study - Implementing COBIT in New South Wales Health - Using a model called the Systems Audit Life Cycle, the health institution developed six internal audits for a large systems implementation process. Healthcare executives advocate planning the use Of COBIT as they would any other large project. This article gives the specificsTyler, Ross et al. | 2000
- 30
-
Case Study - IT Security Awareness ProgrammeWiederkehr, Bruno et al. | 2003
- 31
-
Excerpt: ITGI Enables ISO-IEC 38500:2008 AdoptionHardy, Gary et al. | 2009
- 31
-
Information Security Career Planning: Education, Training and the Role of Professional CertificationsNewman, Kenneth et al. | 2010
- 31
-
The Assimilation of Marketing's Service Quality Principles and the IT Auditing Process: A Move Toward Quantifiable SAS 70 Auditing Service Quality, Part 1Bell III, Thomas J et al. | 2011
- 31
-
Using CoBIT 4.1 to Guide the Adoption and Implementation of Open Source SoftwareHaes, Steven De et al. | 2008
- 31
-
Adopting Continuous Auditing/Continuous Monitoring in Internal AuditVasarhelyi, Miklos A et al. | 2012
- 32
-
Selecting the Right Cloud Operating ModelSchaefer, Thomas et al. | 2014
- 32
-
The Asian Tsunami: A Wake-up Call for Traditional Disaster Recovery PlanningBakshi, Sunil et al. | 2005
- 33
-
Features - Choosing the Best Solution for Your Network Security: Secure Shell, TLS or IPSec - The increase in computer security breaches has fostered the public s awareness of the critical need for data security to continue the successful growth of a business. The author discusses possible solutions, including Secure Shell, Transport Layer Security and Internet Protocol Security.Carasik, Anne et al. | 2001
- 33
-
The Val ITTM StoryThorp, John et al. | 2006
- 33
-
Practical Pointers - Providing Continuous Audit to Oracle Applications - For anyone who has ever done it, documentation and change tracking of Oracle Applications Setup Values are challenging, manual-labor-intensive tasks. Even though this is so, ERP software packages are designed so that customers can tailor the software, often through complex setup steps. The author explains how, when and why Tickmark Setup Reporter works, shaving hours and even days off an auditor's jobNelson, Mark L. et al. | 2000
- 33
-
Choosing the Best Solution for Your Network Security: Secure Shell, TLS or IPSec The increase in computer security breaches has fostered the publics awareness of the critical need for data security to continue the successful growth of a business. The author discusses possible solutions, including Secure Shell, Transport Layer Security and Internet Protocol SecurityCarasik, A. et al. | 2001
- 33
-
Providing Continuous Audit to Oracle ApplicationsNelson, M. L. et al. | 2000
- 33
-
The Val IT™ StoryThorp, J. et al. | 2006
- 34
-
IT Security Responsibilities Change When Moving to the CloudWlosinski, Larry G et al. | 2013
- 34
-
Vendor Due DiligenceBayuk, Jennifer et al. | 2009
- 34
-
Case Study - A Selective Approach to COBIT: A Top-down ApproachOliver, Derek J. et al. | 2003
- 34
-
Avoiding Tainted TestimonySterneckert, A. B. et al. | 2002
- 34
-
Analyzing the Security of Internet Banking Authentication MechanismsDimitriadis, Christos K. et al. | 2007
- 34
-
A Selective Approach to COBIT: A Top-down ApproachOliver, D. J. et al. | 2003
- 34
-
Avoiding Tainted Testimony - The author provides a sample study of an internal investigation to illustrate the effects testimony and evidence can have on a legal case. Business and government professionals frequently do not comprehend how their words and actions impact their ability to deliver credible witness testimony.Sterneckert, Alan B. et al. | 2002
- 35
-
Audit Careers 2010: The Swing of the PendulumTuck, Richard et al. | 2010
- 35
-
The Value to IT of Using International StandardsOud, Ernst Jan et al. | 2005
- 36
-
General Auditing for IT AuditorsGoldberg, Danny M et al. | 2011
- 36
-
A New Approach for Assessing the Maturity of Information SecurityAlAboodi, Saad Saleh et al. | 2006
- 36
-
Best Practices for Wireless Network SecurityKennedy, Susan et al. | 2004
- 36
-
Audit Evidence RefresherKamau, Ookeditse et al. | 2012
- 37
-
COBIT: A Tool To Manage Information EcologyMartin, Joseph et al. | 2003
- 37
-
Keys to Data Governance Success: Teamwork and an Iterative ApproachMoseley, Marty et al. | 2008
- 38
-
Information Controls and Monitoring Framework for Health Care OrganizationsPatil, Santhosh et al. | 2013
- 38
-
Combating Cyberthreats -- Partnership Between Public and Private Entities - The article examines the basic elements of cyberthreats, looks at government initiatives to promote the public-private partnership and discusses key steps organizations can take to prevent, detect and recover from cyberthreats.Lee, Elsa et al. | 2002
- 38
-
Combating Cyberthreats-Partnership Between Public and Private EntitiesLee, E. et al. | 2002
- 39
-
Tone at the Top Is Vital! A Delphi StudyBruinsma, Christine et al. | 2009
- 39
-
Using Wireless Network Audit TechniquesHoesing, Michael T. et al. | 2004
- 39
-
Electronic Documents Information Security ComplianceHamidovic, Haris et al. | 2014
- 40
-
It's Not Easy Being Green: How the Green IT Movement Is Impacting Careers in IT AuditJuergens, Michael et al. | 2010
- 40
-
Project Portfolio ManagementHeiskanen, Aarni et al. | 2012
- 40
-
Assessing the Value of IT: Understanding and Measuring the Link Between IT and StrategyBurg, William D. et al. | 2005
- 40
-
Case Study: Auditor Ethics for Continuous Auditing and Continuous MonitoringDaigle, Jill Joseph et al. | 2008
- 40
-
IT Auditor Careers: IT Governance Provides New Roles and OpportunitiesGallegos, Frederick et al. | 2003
- 40
-
HIPAA Preparation Begins and Y2K EndsLandreth, J. / Ledman, M. C. et al. | 2000
- 40
-
Features - HIPAA Preparation Begins and Y2K Ends - For the first time, there is a governmental mandate on information security requirements. New regulations in the United States regarding the portability and accountability of health insurance will generate significant changes in security policies and procedures, security tools and communications standardsLandreth, John et al. | 2000
- 40
-
Math on Malwarevan der Molen, Henk-Jan et al. | 2011
- 41
-
Features - Creating the Privacy Compilant Organization - The concept of personal information privacy, and the rights of citizens to protect themselves has caused governments to begin to consider enacting personal information privacy legislation. This article addresses the process under which a company can become privacy compliant, adhering to the specific requirements of the legislation under which it operates.Parker, Robert G. et al. | 2001
- 41
-
Creating the Privacy Complaint Organization The concept of personal information privacy, and the rights of citizens to protect themselves has caused governments to begin to consider enacting personal information privacy legislation. This article addresses the process under which a company can become privacy complaint, adhering to the specific requirements of the legislation under which it operatesParker, R. G. et al. | 2001
- 42
-
Writing Good Risk StatementsPower, Benjamin et al. | 2014
- 42
-
Maximizing Backup and Recovery of Data and SystemsWandrei, Philip L. et al. | 2007
- 43
-
A Guide to Wireless Network SecurityAshley, Mitchell et al. | 2004
- 43
-
A Holistic Definiton of IT Security -- Part 1Musaji, Yusuf et al. | 2006
- 43
-
The Social Psychology of IT Security Auditing From the Auditee's Vantage Point: Avoiding Cognitive DissonanceBell III, Thomas J et al. | 2010
- 43
-
Multiagent Model for System User Access Rights AuditMoturi, Christopher A et al. | 2013
- 43
-
IT Governance and Process MaturityDebreceny, Roger et al. | 2009
- 43
-
A Holistic Definition of IT Security-Part 1Musaji, Y. et al. | 2006
- 44
-
Principles of GovernanceHamaker, Stacey et al. | 2003
- 44
-
Auditing and Business Controls: Coming of Age in the Healthcare IndustryJust, G. R. / Fabrizius, M. P. et al. | 2000
- 44
-
Features - Auditing and Business Controls: Coming of Age in the Healthcare Industry - Meeting changes in the healthcare industry, specifically on the delivery side, requires a broadened, updated concept of internal controls and access to expert resources to do the job. Learn how providing these can add value to organizationsJust, G.Randolph et al. | 2000
- 45
-
Computer-assisted Audit Techniques: Value of Data Mining for Corporate AuditorsOtt, John et al. | 2008
- 45
-
Automating ControlsPareek, Mukul et al. | 2007
- 45
-
New Opportunities for Information Systems Auditors: Linking SysTrustSM to COBIT - This is the third in a series of articles linking new types of assurance services suggested by the American Institute of Certified Public Accountants (AICPA) and Canadian Institute of Chartered Accountants (CICA) to COBIT. This article addresses how information system auditors can play a lead role in providing SysTrust assurance services to internal and external constituents.Frownfelter-Lohrke, Cynthia et al. | 2002
- 45
-
New Opportunities for Information Systems Auditors: Linking SysTrust^S^A^I to COBITFrownfelter-Lohrke, C. / Hunton, J. E. et al. | 2002
- 45
-
Audit-focused Mining — New Views on Integrating Process Mining and Internal ControlSchultz, Martin et al. | 2014
- 46
-
Features - Erosion of Trust E-commerce and the Loss of Privacy - The author discusses the differences between personal information and sensitive information and the need to build a consumer s trust and confidence. Furthermore, the article addresses the actions taken by various governments and the e-commerce market itself to protect the consumer.Andrews, Jonathan D. et al. | 2001
- 46
-
Haruspex — Simulation-driven Risk Analysis for Complex SystemsBaiardi, Fabrizio et al. | 2012
- 46
-
IT Performance Improvement With COBIT and the SEI CMMMallette, Debra et al. | 2005
- 46
-
Erosion of Trust E-commerce and the Loss of Privacy The author discusses the differences between personal information and sensitive information and the need to build a consumers trust and confidence. Furthermore, the article addresses the actions taken by various governments and the e-commerce market itself to protect the consumerAndrews, J. D. et al. | 2001
- 47
-
Introduction to Forensic ComputingCurtin, C.Matthew et al. | 2006
- 47
-
An Investigation of Computer ForensicsPidanick, Ryan et al. | 2004
- 48
-
IT Risk Analysis — The Missing "A"Brown, Eric J et al. | 2010
- 49
-
Pushing Back the Rain — How to Create Trustworthy Services in the CloudBogdanov, Dan et al. | 2013
- 49
-
Key Considerations for Business ResiliencyPironti, John P. et al. | 2009
- 49
-
The Why and How of Leveraging Synergies Across Sarbanes-Oxley and Other RegulationsAnand, Sanjay et al. | 2007
- 49
-
Pay Today or Pay Later -- Calculating ROI to Justify Information Security and Compliance BudgetsSingh, Jaspreet et al. | 2008
- 49
-
Features - Defeating the Cyber Criminal: Defense Tactics for Denial of Service Attacks - The letters DDoS are anathema to almost anyone who conducts or offers business on the Internet. The author describes how these attacks could create legal implications for everyone in the chain and describes intrusion detection controls and disaster recovery methods in depthBigler, Mark et al. | 2000
- 49
-
Defeating the Cyber Criminal: Defense Tactics for Denial of Service AttacksBigler, M. et al. | 2000
- 50
-
Fighting Internal Crime Before It Happens - Some of the most potentially crippling crimes against an enterprise are committed by the organization's own employees. To wage a battle against an enemy, it is necessary to first identify that enemy.Lux, Allen G. et al. | 2002
- 50
-
Help Source Q&ASubramaniam, Gan et al. | 2011
- 50
-
Cross-Border Privacy Impact Assessments: An Introduction Organizations doing business in multiple jurisdictions are subject to regulatory and cultural variances on what data are protected, how the data must be protected, and what rights are afforded to the enterprise, the regulators and the individual. The author introduces a cross-border privacy impact assessment modelKarol, T. J. et al. | 2001
- 50
-
Fighting Internal Crime Before It HappensLux, A. G. / Fitiani, S. et al. | 2002
- 50
-
Features - Cross-Border Privacy Impact Assessments: An Introduction - Organizations doing business in multiple jurisdictions are subject to regulatory and cultural variances on what data are protected, how the data must be protected, and what rights are afforded to the enterprise, the regulators and the individual. The author introduces a cross-border privacy impact assessment model.Karol, Thomas J. et al. | 2001
- 50
-
The Second Edition of the European Survey on the Economic Value of Information Technology: Inventory of Practices Concerning IT GovernanceLegrenzi, Christophe et al. | 2003
- 51
-
Refining IT Processes Using COBITReingold, Stephen et al. | 2005
- 51
-
New Rules Regarding E-discoveryGonzalez, Silka Maria et al. | 2007
- 51
-
Internal Audit's Contribution to the Effectiveness of Information Security (Part 2)John Steinbart, Paul et al. | 2014
- 51
-
A Business Model for Information SecurityAnderson, Kent et al. | 2008
- 52
-
Key Elements of a Threat and Vulnerability Management ProgramPironti, John P. et al. | 2006
- 52
-
Plus - CE Quiz #82, Based on Volume 1, 2002Oringel, Joey et al. | 2002
- 52
-
Plus - CPE Quiz #70Oringel, Joey et al. | 2000
- 53
-
Features - CPO Position Joins Executive Ranks - As increased importance is placed on privacy and the ethical issues surrounding privacy, many companies have created a new executive-level position called chief privacy officer (CPO). The author discusses the role of the CPO in today s corporate environment.Parkinson, Michael et al. | 2001
- 53
-
Help Source - Help Source Q&ASubramaniam, B.Ganapathi et al. | 2004
- 53
-
Virtual Appliances -- The Evolution of a Gold StandardKavanagh, Ronan et al. | 2008
- 53
-
CPE Quiz #136 - Based on Volume 1, 2011Khan, Kamal et al. | 2011
- 53
-
After Year One -- Automating IT Controls for Sarbanes-Oxley ComplianceDietrich, Robert J. et al. | 2005
- 53
-
Influencer Analysis: A Perspective on Reducing Audit RiskDeshmukh, Meera et al. | 2007
- 53
-
CPE Quiz#148 - Based on Volumel, 2013Khan, Kamal et al. | 2013
- 53
-
CPO Position Joins Executive Ranks As increased importance is placed on privacy and the ethical issues surrounding privacy, many companies have created a new executive-level position called chief privacy officer (CPO). The author discusses the role of the CPO in todays corporate environmentParkinson, M. et al. | 2001
- 53
-
CPE Quiz #142 - Based on Volume 1, 2012 Prepared by Kamal Khan, CISA, CISSP, CITP, MBCS| 2012
- 55
-
Standards, Guidelines, Tools and Techniques| 2011
- 55
-
CPE Quiz #94, based on volume 1, 2004Oringel, Joe et al. | 2004
- 56
-
The IS Auditor's Consideration of Irregularities and Illegal ActsNihlett, Peter et al. | 2003
- 57
-
Features - E-commerce and Smart Cards - The author discusses the smart card with a C-SET protocol for online authentication as a solution to online security concerns. With smart cards, it is possible to accomplish a complete authentication process, through the use of a personal identification number known only by the owner.Hector Ganzalez, Marcelo et al. | 2001
- 57
-
CPE Quiz #130 - Based on Volume 1, 2010Khan, Kamal et al. | 2010
- 57
-
E-commerce and Smart Cards The author discusses the smart card with a C-SET protocol for online authentication as a solution to online security concerns. With smart cards, it is possible to accomplish a complete authentication process, through the use of a personal identification number known only by the ownerGonzlez, M. H. et al. | 2001
- 57
-
CPE Quiz #112 - Based on Volume 1, 2007Chan, Sally et al. | 2007
- 57
-
CPE Quiz #154 - Based on Volume 1, 2014 — Data Privacy Prepared by Kamal Khan, CISA, CISSP, CITP, MBCS| 2014
- 59
-
CPE Quiz #106 - Based on Volume 1, 2006Rateq, A. et al. | 2006
- 59
-
CPE Quiz #124 - Based on Volume 1, 2009Khan, Kamal et al. | 2009
- 59
-
CPE Quiz #118 - Based on Volume 1, 2008Khan, Kamal et al. | 2008
- 59
-
CPE Quiz #100 - Based on volume 1, 2005Khan, Kamal et al. | 2005
- 59
-
Standards, Guidelines, Tools and Techniques: ISACA Member and Certification Holder Compliance| 2010
- 60
-
Implementing Enterprise Security: A Case Study (Part 2)Doughty, Ken et al. | 2003
- 62
-
Plus - CE Quiz #76, Based on Volume 1, 2001Oringel, Joey et al. | 2001
- 67
-
CPE Quiz #87, based on volume 6, 2002Oringel, Joe et al. | 2003
-
ISACA Bookstore Price List Supplement| 2006
-
ISACA Bookstore Supplement| 2014
-
Plus - ISACA Bookstore Offerings - Supplement| 2000
-
Plus - ISACA Bookstore Price List Supplement| 2002