The Year 2000 and ACL as Electronic Toolkit (Englisch)
- Neue Suche nach: Millar, Peter
- Neue Suche nach: Millar, Peter
In:
IS audit & control journal
;
5
; 11-13
;
1997
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:The Year 2000 and ACL as Electronic Toolkit
-
Beteiligte:Millar, Peter ( Autor:in )
-
Erschienen in:IS audit & control journal ; 5 ; 11-13
-
Erscheinungsort:Rolling Meadows, Ill.
-
Erscheinungsdatum:1997
-
ISSN:
-
ZDBID:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 85.00 / 54.00
- Weitere Informationen zu Basisklassifikation
- Neue Suche nach: 770/3155
-
Klassifikation:
-
Datenquelle:
Inhaltsverzeichnis – Band 5
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Issues & CommentsCangemi, Michael P. et al. | 1995
- 5
-
Issues & Comments - The Journal's Editor-in-Chiefm, Micheal P. Cangemi, decries the seemingly mandatory purchase of new, but not necessarily improved, software. Are still functional products forced into obsolescence?Cangemi, michael P. et al. | 1998
- 5
-
Reflecting on the international conference and finding time to catch up on business readingCangemi, Michael P. et al. | 1997
- 5
-
Editorial - Issues & comments - Editor-in-Chief Michael P Cangemi, CISA, CPA, recaps the first Journal-sponsored forum on IT governanceCangemi, Michael P. et al. | 1999
- 6
-
Information Protection and Security: A PerspectiveKlosky, J.Michael et al. | 1995
- 7
-
Flashback -- 25 Years of Journal History| 1997
- 8
-
Windows NT(R) Server 4 Security Handbook - The authors of Windows NT Server 4 Security Handbook have provided a document so valuable that the reviewer states it should be in every business reference library. Even though the book was written for the NT systems administrator, those with solid backgrounds in IS audit will find the book helpful.Hadfield, Lee et al. | 1998
- 9
-
IS Security Matters - IS Security Matters - Addressing differing personalities when determining security needs is the focus of this lively column in this issue titled Childproofing the TechnologyRoss, Steven J. et al. | 1999
- 9
-
Data Mining: A General Auditor's Dream Realized?| 1997
- 10
-
IT Project Review--A Strategy for Reducing Investment Risk - The author demonstrates through concrete examples how the IT Project Review can ensure efficiencies and reduce costs. This article explains that no longer can organizations rely on assumptions, but frequent, twoway communication has become essential. Staff development is also an imporant element.Swansan, Dan M. et al. | 1998
- 11
-
The Year 2000 and ACL as Electronic ToolkitMillar, Peter et al. | 1997
- 12
-
Accounting & Auditing in a New EnvironmentSchneider, Gary P. et al. | 1995
- 13
-
Practical Pointers - e-Copyrights -- A Light Approach to a Serious Subject - The author adapts the presentation he gave at North America CACS 99 which discusses patents, copyrights, trade secrets -- Their differences and similaritiesRedmon III, C.Gant et al. | 1999
- 14
-
HelpSource Q&ALilly, Fred et al. | 1995
- 14
-
Groupware as a System Implementation Audit Tool: A Lotus Notes ExperienceFilak, Alicia et al. | 1997
- 15
-
Co-sourcing: A Cooperative Solution to Outsourcing Related Risks - Co-sourcing pairs specialized technical professionals, many of whom are consultants, with traditional auditors who have in-depht knowledge of the company, its business, and its information technology controls. In this way, information is shared and ultimately, everyone becomes a partner. The author discusses how to know when a company is ready for co-sourcing and explains how to make it a productive experience.Scrudata, Micheel J. et al. | 1998
- 17
-
Features - Continuous Auditing and IT Developments - Networking, practically free computer cycles, cheap storage and the distribution of processing and communication capabilities across various devices are causing fundamental changes in the way business is conductedVasarhelyi, Miklos A. et al. | 1999
- 17
-
CISA Exam Mirrors Changes in ProfessionStachtchenko, Patrick et al. | 1995
- 19
-
The Audit of Anti-Virus Controls in a Netware Environment - There are defenses, even antidotes against viruses. Even though there are numerous routes for virus infection, there are bottlenecks in the process and where these occur, controls are most effective. The author presents many ways to stop a virus in its tracks.Nelms, Chris et al. | 1998
- 20
-
Overview of Computer Crime and SecurityMarro, Paul E. et al. | 1995
- 20
-
The reviewer describes Applied Cryptography as an unexpected, yet compelling read on how to keep keys in the right hands, yet keep the lock on computer crimeHaywood, Bill et al. | 1997
- 21
-
Standards, Statements and Guidelines - Compliance to maintain ISACA member status and compliance for the CISA designation are outlined and the status of ISACA issuances is noted| 1999
- 22
-
SQL Language for Accounting AuditorsHiggins, H.Ngo et al. | 1997
- 23
-
Focus on 1999 - Millennium Watch, edited for the International Federation of Accountants by Past International President, Deepak Sarup, CISA, FCA, addresses the issue of public confidence before the rollover and steps to take after 1 January 2000| 1999
- 24
-
Case Study - Automating Reviews in a Distributed Computing Environment - One cannot evaluate the operational adequacy of businesses without reviewing sensitive and mission-critical applications which support transaction processing, control, accounting, reporting and management of informationAgrawal, Prateek et al. | 1999
- 25
-
Neural Networks for Security in Electronic Banking - In this article, it is shown how non-traditional modeling techniques, specifically neural networks, are used to detect fraud in credit cards. The author purses the topic and evaluates the possibility of applying this technology to develop fraud prevention-detection tools for Internet electronic banking.Ageenko, Ilieva I. et al. | 1998
- 26
-
Photographic and Computerized Image ReproductionBoef, Anthonie den et al. | 1997
- 27
-
PC Security Criteria A to Z: The Why and What of Providing PC SecurityClay, Bruce M. et al. | 1995
- 28
-
Plus - Technical Q & A, HelpsourceLilly, Fred L. et al. | 1999
- 31
-
Electronic Document ManagementLucy, Richard F. et al. | 1997
- 31
-
A Systematit Method for Anditing User Aeceptance Tcsh The authors delve into a "black box" emd hclp rcedcrs by introducing tast cascs for user acceptence tests derived from specificaeions that cmploy knowledge of program coding, i.c. classification trees.Chen, Yueh et al. | 1998
- 33
-
Case Study - Continuous Auditing and Control Scripting at Banco Popolare de Brescia - Steps taken to become a leader in worldwide banking internal control system matters are illuminated as well as the process of integrating Accelerated SAPVasarhelyi, Miklos A. et al. | 1999
- 33
-
MVS Security Trends for the AuditorHenderson, Stuart C. et al. | 1995
- 38
-
Features - Online Monitoring of Software in LAN Environments - The unique concerns of auditors of online systems are discussed, specifically in relation to the impact on the integrity of these systemsRaval, Vasant et al. | 1999
- 38
-
Control, Auditability and Recoverability of Optical StorageRistuccia, Henry J. et al. | 1995
- 39
-
The Impact of Archiving and Imaging on the IS AuditorLeclerc, Michel et al. | 1997
- 40
-
Risk and Controls in an EDI Environment - EDI, which translates using an accepted standard, has changed the relationship among business. EDI enables a business processes of its trading partners. In this article, the author illuminates the risks and exposures to business incorporating EDI and examines controls to address these risks.Mahta, Raju Navin et al. | 1998
- 43
-
Using Data Mining Techniques in AuditingCasarin, Paul et al. | 1997
- 45
-
A Model for Disaster Recovery PlanningYiu, Kenneth et al. | 1995
- 45
-
Features - Qualitative Corporate Dashboards for Corporate Monitoring - This article advocates expanding the traditional financial audit framework by increasing the scope of evidence collection to cover online quantitative information, such as news about the organizationJia, Peng et al. | 1999
- 47
-
Auditors Add Value to the Business Continuity Program - This article had previously been printed in Contigency Planning & Management but is considered reinforcing about the not-always-recognized value of auditors in the BCP process. The authors recommend that this process be integrated since it embraces business, technology and operational issues.| 1998
- 50
-
Plus - CPE Quiz #66Oringel, Joey et al. | 1999
- 51
-
Turning Data Mining into ActionRosen, Cal et al. | 1997
- 52
-
CPE Quiz #44| 1995
- 53
-
Plus: The CPE Quiz #61, which is based on the e-Commerce issue| 1998
- 53
-
CPE Quiz #56| 1997
- 55
-
Bookstore Listing| 1997
- 61
-
Career Opportunities| 1997
-
Plus - ISACA Bookstore Offerings - Supplement| 1999
-
Plus - ISACA Bookstore Price List - Supplement| 1999