General controls in computer systems (Englisch)

Nationallizenz
In: Computers and Security   ;  4 ,  1  ;  33-45  ;  1985
  • ISSN:
  • Aufsatz (Zeitschrift)  /  Elektronische Ressource

Wie erhalte ich diesen Titel?

Download

Download ist DRM geschützt.


Kommerziell Vergütung an den Verlag: 36,00 € Grundgebühr: 4,00 € Gesamtpreis: 40,00 €
Akademisch Vergütung an den Verlag: 36,00 € Grundgebühr: 2,00 € Gesamtpreis: 38,00 €

Abstract Because almost all business organizations own or will shortly own computer systems, auditors can no longer treat the computer as a “black box” to be ignored when attesting to the fairness with which financial statements present financial position and results of operations. This paper is primarily written for auditors who are becoming involved in auditing computerized accounting systems. It covers in detail general controls in computer systems, the first and most important category of controls evaluated by an auditor. General controls relate to all EDP activities; they span all jobs processed on the computer system. When they are weak or non-existing, the auditor must expand his testing of the entire computer system, often at considerable additional cost to the client.

Inhaltsverzeichnis – Band 4, Ausgabe 1

Zeige alle Jahrgänge und Ausgaben

Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.

1
Editorial
Dr. Highland, Harold Joseph | 1985
3
New member of the International Board of Editors
| 1985
5
COSSAC: a framework for analyzing and configuring secure computer facilities
Carroll, John M. / Mac Iver, W.R. | 1985
13
A management view: computer security as a discretionary decision
Schweitzer, James A. | 1985
23
Specification of internal accounting controls in a database environment
Gal, Graham / McCarthy, William E. | 1985
33
General controls in computer systems
Cerullo, Michael J. | 1985
47
Cryptographic equipment security: a code of practice
Serpell, Stephen C. | 1985
65
The first national computer security conference
Highland, Harold Joseph | 1985
75
Data security and confidentiality
| 1985
83
Abstracts of recent articles and literature
| 1985
97
Calendar
| 1985
CO2
Editorial Board
| 1985