General controls in computer systems (Englisch)

In: Computers and Security   ;  4 ,  1  ;  33-45  ;  1985
  • ISSN:
  • Aufsatz (Zeitschrift)  /  Elektronische Ressource

Wie erhalte ich diesen Titel?


Download ist DRM geschützt.

Kommerziell Vergütung an den Verlag: 36,00 € Grundgebühr: 4,00 € Gesamtpreis: 40,00 €
Akademisch Vergütung an den Verlag: 36,00 € Grundgebühr: 2,00 € Gesamtpreis: 38,00 €

Abstract Because almost all business organizations own or will shortly own computer systems, auditors can no longer treat the computer as a “black box” to be ignored when attesting to the fairness with which financial statements present financial position and results of operations. This paper is primarily written for auditors who are becoming involved in auditing computerized accounting systems. It covers in detail general controls in computer systems, the first and most important category of controls evaluated by an auditor. General controls relate to all EDP activities; they span all jobs processed on the computer system. When they are weak or non-existing, the auditor must expand his testing of the entire computer system, often at considerable additional cost to the client.

Inhaltsverzeichnis – Band 4, Ausgabe 1

Zeige alle Jahrgänge und Ausgaben

Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.

Dr. Highland, Harold Joseph | 1985
New member of the International Board of Editors
| 1985
COSSAC: a framework for analyzing and configuring secure computer facilities
Carroll, John M. / Mac Iver, W.R. | 1985
A management view: computer security as a discretionary decision
Schweitzer, James A. | 1985
Specification of internal accounting controls in a database environment
Gal, Graham / McCarthy, William E. | 1985
General controls in computer systems
Cerullo, Michael J. | 1985
Cryptographic equipment security: a code of practice
Serpell, Stephen C. | 1985
The first national computer security conference
Highland, Harold Joseph | 1985
Data security and confidentiality
| 1985
Abstracts of recent articles and literature
| 1985
| 1985
Editorial Board
| 1985