Big Data-Not a Panacea (Englisch)
- Neue Suche nach: Riffat, M.
- Neue Suche nach: Riffat, M.
In:
ISACA JOURNAL
;
3
;
19-21
;
2014
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:Big Data-Not a Panacea
-
Beteiligte:Riffat, M. ( Autor:in )
-
Erschienen in:ISACA JOURNAL ; 3 ; 19-21
-
Verlag:
- Neue Suche nach: Information Systems Audit and Control Association
-
Erscheinungsdatum:01.01.2014
-
Format / Umfang:3 pages
-
ISSN:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 657.450285
- Weitere Informationen zu Dewey Decimal Classification
-
Klassifikation:
DDC: 657.450285 -
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis – Band 3
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Cyberrecovery PreparationRoss, S.J. et al. | 2014
- 3
-
Who Pays for Security?Ross, S.J. et al. | 2011
- 3
-
Letter From the Editor: From Print to Digital—The Journal TransformationHajigeorgiou, Jen et al. | 2018
- 4
-
Infomration Security Matters: Frameworkers of the World, Unite 2Ross, Steven J. et al. | 2015
- 4
-
Information Security Matters: Security in the Migration to a Multi-Modal EnvironmentRoss, Steven J. et al. | 2018
- 4
-
Information Security Matters: Challengeable TruthsRoss, Steven J. et al. | 2016
- 4
-
Information Security Matters: The End of the Beginning?Ross, Steven J. et al. | 2017
- 4
-
IS Security Matters: Recovery in the CloudRoss, S.J. et al. | 2010
- 4
-
Information Security Matters: Barbarians at the RampartsRoss, S.J. et al. | 2013
- 6
-
Understanding and Applying Benford's LawSingleton, T.W. et al. | 2011
- 6
-
Cloud Computing: The Arrival (Finally) of PCI Cloud GuidanceHay, A. et al. | 2013
- 6
-
IT Audit Basics: IT Audits of Cloud and SaaSSingleton, T.W. et al. | 2010
- 7
-
IS Audit Basics: The Soft Skills ChallengeGelbstein, Ed et al. | 2015
- 7
-
IS Audit Basics: Data Management Body of Knowledge: A Summary for AuditorsGelbstein, Ed et al. | 2017
- 7
-
IS Audit Basics: Auditing Data PrivacyCooke, Ian et al. | 2018
- 8
-
The NetworkJaved, Khawaja Faisal et al. | 2016
- 9
-
Five Questions WithKumar, C. et al. | 2010
- 9
-
Securing an Evolving Cloud EnvironmentNeely, M. et al. | 2014
- 10
-
IS Audit Basics: Auditing the IT AuditorsSingleton, T. et al. | 2013
- 10
-
IS Audit Basics: Auditing IS/IT Risk Management, Part 2Gelbstein, Ed et al. | 2016
- 12
-
Every Silver Cloud Has a Dark Lining: A Primer on Cloud Computing, Regulatory and Data Security RiskCadregari, C. / Cutaia, A. et al. | 2011
- 12
-
Cloud Computing: Software-defined WAN Changes Retail Security ParadigmWoo, Steve et al. | 2015
- 12
-
ISACA's Corporate Social ResponsibilityRaval, V. et al. | 2014
- 12
-
Numerous Opinions-Which Will Happen? A Review of 2010 IT Trends and Predictions| 2010
- 14
-
Information Ethics: The Limits of RulesRaval, Vasant et al. | 2015
- 14
-
Clash of the TitansEitan, Ofir et al. | 2018
- 14
-
Information Ethics: Moral Dialogue on the IT-leveraged EconomyRaval, Vasant et al. | 2016
- 14
-
The Practical Aspect: Mitigating the Risk Factors of IT Project FailureRaval, Vasant / Sharma, Rajesh et al. | 2017
- 15
-
Information Ethics: Why Do Corporate Frauds Occur?Raval, V. et al. | 2013
- 16
-
The Logical Reason for Consideration of ITSingleton, T. et al. | 2014
- 17
-
Questions That Must Be Addressed for a Successful IFRS ImplementationBrown, W.C. / Pike, B.J. et al. | 2011
- 17
-
Book Review: Security, Audit and Control Features Oracle® Database, 3^r^d EditionMookhey, K.K. et al. | 2010
- 17
-
Book Review: IT Security Governance Innovations—Theory and ResearchKivisild, A. Krista et al. | 2015
- 18
-
Business Skills for the IT Audit and Assurance ProfessionalParker, R.G. et al. | 2010
- 18
-
Healthcare Security—Three Paradoxes and the Need for a Paradigm ShiftPozza, Giuliano et al. | 2018
- 18
-
Book Review: Gray Hat Hacking: The Ethical Hacker's HandbookEtea, Ibe et al. | 2015
- 18
-
Book Review: Securing the Virtual Environment How to Defend the Enterprise Against AttackKivisild, A. Krista et al. | 2016
- 19
-
Big Data-Not a PanaceaRiffat, M. et al. | 2014
- 19
-
Managing the Risk of IoTAtluri, Indrajit et al. | 2017
- 19
-
The Complexity Is in the DetailsVanderpool, Michael et al. | 2016
- 19
-
How to Evaluate Knowledge and Knowledge Management in the Organization Using COBIT 5Delak, Bostjan et al. | 2015
- 19
-
SOC Progress ReportVazzana, B. et al. | 2012
- 20
-
Book Review: Official Certified Ethical Hacker Review Guide, Version 7.1Sule, D. et al. | 2013
- 21
-
Migrating From COBIT 4.1 to COBIT 5-Upgrading the Turkish Banking SystemKazmirci, K. et al. | 2013
- 22
-
Big Data Analytics for Sophisticated Attack DetectionVirvilis, N. / Serrano, O. / Dandurand, L. et al. | 2014
- 23
-
What Is Big Data and What Does It Have to Do With IT Audit?Setty, K. / Bakhshi, R. et al. | 2013
- 23
-
Encryption in the Hands of End UsersGoldman, Eric H. et al. | 2016
- 23
-
A Primer on Nonrelational, Distributed Databases for IS ProfessionalsMarkey, S. et al. | 2012
- 24
-
The Underestimated Social Engineering Threat in IT Security Governance and Management (Também disponível em português)Puricelli, Roberto et al. | 2015
- 25
-
Automated Audit Testing for SAP Data-Benefit or Just Another Black Box?Wenig, S. / Kim-Reinartz, K.-H.A. et al. | 2011
- 26
-
Building Your Bridge to the FutureReed, J. et al. | 2010
- 26
-
Considerations for Ensuring Security of Research Data in a Federally Regulated EnvironmentMedina, J. / Morrell, R. / Pickett, D. / Lumpkin, J. / McCain, T. / Pekelnicky, D.D. / Bengoa, A. / Songco, D. et al. | 2013
- 27
-
IoT Needs Better SecurityPatel, Hemant et al. | 2017
- 27
-
Data Privacy and Big Data-Compliance Issues and ConsiderationsYu, W.E. et al. | 2014
- 27
-
Communication-The Missing PieceGoldberg, D.M. et al. | 2012
- 27
-
Cybersecurity vs. Master Data ManagementJarnagin, Chip / Hammond, Sonja et al. | 2018
- 29
-
Can Elliptic Curve Cryptography Be Trusted?Stolbikova, Veronika et al. | 2016
- 29
-
The Time for Sustainable Business Is Now (Também disponível em português)Braga, Graciela et al. | 2015
- 31
-
The Assimilation of Marketing's Service Quality Principles and the IT Auditing Process: A Move Toward Quantifiable SAS 70 Auditing Service Quality, Part 1Bell, T.J. / Smith, T. et al. | 2011
- 31
-
Information Security Career Planning: Education, Training and the Role of Professional CertificationsNewman, K. et al. | 2010
- 31
-
Secure Elections in a Smart WorldMoyle, Ed et al. | 2018
- 31
-
Adopting Continuous Auditing/Continuous Monitoring in Internal AuditVasarhelyi, M.A. / Romero, S. / Kuenkaikaew, S. / Littley, J. et al. | 2012
- 32
-
Selecting the Right Cloud Operating ModelSchaefer, T. / Hofmann, M. / Loos, P. / Fettke, P. et al. | 2014
- 32
-
Security Assurance in the SDLC for the Internet of ThingsSubramanian, Sivarama / Balaji Swaminathan, M. et al. | 2017
- 33
-
Evaluating Cloud Automation as a ServiceEvers, Andrew et al. | 2015
- 34
-
IT Security Responsibilities Change When Moving to the CloudWlosinski, L.G. et al. | 2013
- 34
-
Protecting Information—Practical Strategies for CIOs and CISOsTharakan, Devassy Jose et al. | 2016
- 34
-
Building Bridges With the Board—Innovation in Information GovernanceKelly, T. Sean et al. | 2018
- 35
-
Audit Careers 2010: The Swing of the PendulumTuck, R. et al. | 2010
- 36
-
Audit Evidence RefresherKamau, O. et al. | 2012
- 36
-
General Auditing for IT AuditorsGoldberg, D.M. et al. | 2011
- 37
-
Going Beyond the Technical in SIEMKuznetcov, Aleksandr et al. | 2016
- 37
-
Navigating I/O Flows/Networks to Enhance the Governance Management CycleMiyazaki, Makoto et al. | 2015
- 38
-
Information Controls and Monitoring Framework for Health Care OrganizationsPatil, S. et al. | 2013
- 39
-
Intellectual Property Protection for High Tech's Crown JewelsCheung, Ray / Porter, Mike et al. | 2018
- 39
-
Electronic Documents Information Security ComplianceHamidovic, H. / Hamidovic, A. et al. | 2014
- 40
-
Math on Malwarevan der Molen, H.-J. et al. | 2011
- 40
-
It's Not Easy Being Green: How the Green IT Movement Is Impacting Careers in IT AuditJuergens, M. et al. | 2010
- 40
-
A Secure Data-gathering Approach in Wireless Sensor NetworksJuliana, Michael Roseline / Srinivasan, Subramaniam et al. | 2016
- 42
-
Writing Good Risk StatementsPower, B. et al. | 2014
- 43
-
Multiagent Model for System User Access Rights AuditMoturi, C.A. / Bitta, F.O. et al. | 2013
- 43
-
Safeguarding Mobile Applications With Secure Development Life Cycle ApproachRajendran, Sakthivel et al. | 2017
- 43
-
The Social Psychology of IT Security Auditing From the Auditee's Vantage Point: Avoiding Cognitive DissonanceBell, T.J. et al. | 2010
- 45
-
Security in DepthHale, Charles et al. | 2018
- 45
-
Audit-focused Mining-New Views on Integrating Process Mining and Internal ControlSchultz, M. / Ruehle, A. / Gehrke, N. et al. | 2014
- 45
-
Big Data—Hot Air or Hot Topic?Serrano, Angel et al. | 2016
- 46
-
Haruspex-Simulation-driven Risk Analysis for Complex SystemsBaiardi, F. / Telmon, C. / Sgandurra, D. et al. | 2012
- 46
-
Toward a Secure Data Center Modelvan Niekerk, Brett / Jacobs, Pierre et al. | 2015
- 48
-
IT Risk Analysis-The Missing ``A''Brown, E.J. / Yarberry, W.A. et al. | 2010
- 49
-
Pushing Back the Rain-How to Create Trustworthy Services in the CloudBogdanov, D. / Kalu, A. et al. | 2013
- 51
-
How Boards Realise IT Governance TransparencyDe Haes, Steven / Joshi, Anant / Huygh, Tim / Jansen, Salvi et al. | 2016
- 51
-
Internal Audit's Contribution to the Effectiveness of Information Security (Part 2)Steinbart, P.J. / Raschke, R. / Gal, G. / Dilla, W.N. et al. | 2014
- 52
-
Tools: Active DefenseMoyle, Ed et al. | 2018