Book Review: ISO 9001:2000-The Quality Management Process By Ray Tricker (English)
- New search for: Rafeq, A.
- New search for: Rafeq, A.
In:
INFORMATION SYSTEMS CONTROL JOURNAL
;
6
;
27-29
;
2007
-
ISSN:
- Article (Journal) / Print
-
Title:Book Review: ISO 9001:2000-The Quality Management Process By Ray Tricker
-
Contributors:Rafeq, A. ( author )
-
Published in:INFORMATION SYSTEMS CONTROL JOURNAL ; 6 ; 27-29
-
Publisher:
- New search for: INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION
-
Publication date:2007-01-01
-
Size:3 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 657.4550285
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 657.4550285 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 6
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 4
-
Information Security Matters: The Cost of CyberattacksRoss, Steven J et al. | 2012
- 4
-
Information Security Matters: A Tide in the AffairsRoss, Steven J et al. | 2013
- 4
-
Information Security Matters: Service Availability and Disaster RecoveryRoss, Steven J et al. | 2010
- 4
-
Information Security Matters: Eating Crow With a Tasty SauceRoss, Steven J et al. | 2011
- 5
-
The Law of Unintended Consequences? Assessing the Costs, Benefits and Outcomes of the Sarbanes-Oxley Act Excerpted and reprinted from IS Audit & Control Journal, volume 1, 2004| 2009
- 5
-
Editorial - Issues & CommentsCangemi, Michael et al. | 2006
- 5
-
Taking A Look Back: The Law of Unintended Consequences? Assessing the Costs, Benefits and Outcomes of the Sarbanes-Oxley Act - Excerpted and reprinted from IS Audit & Control Journal, volume 1-2004| 2009
- 5
-
Guest Editorial: You Can't Outsource ControlZarrella, Edge et al. | 2008
- 5
-
Issues&CommentsCangemi, Michael et al. | 2002
- 5
-
Guest Editorial: Breaking the CoconutPenri-Williams, Hugh H. et al. | 2007
- 5
-
Editorial - Issues & Comments - Examines the future of electronic commerce, calling it a bright future, despite the recent downturn in the IT industry. He goes on to call business professionals not to lose sight of the opportunities the Internet presents to reinvent business models.Cangemi, Chief Michael et al. | 2001
- 5
-
Editorial - Issues & Comments - Editor in Chief Michael P Cangemi, CISA, CPA, discusses the influence technology, the rise of Internet use and business changes in general have had on both fashion trends and web use by women. He also talks about the age-old scandals encountered by Wall Street.Cangemi, Michael P. et al. | 2000
- 6
-
IT Audit Basics: What Every IT Auditor Should Know About Backup and RecoverySingleton, Tommie W et al. | 2011
- 6
-
Information Ethics: Character Traits of an IT ProfessionalRaval, Vasant et al. | 2013
- 6
-
Cloud Computing: Leveraging the Cloud for Added ValueMarkey, Steven C et al. | 2012
- 7
-
Guest Editorial: Connections Galore!Sethuraman, Sekar et al. | 2009
- 7
-
Connections GalorelSethuraman, S. et al. | 2009
- 7
-
IT Audit Basics: Data Extraction, A Hindrance to Using CAATsSingleton, Tommie W et al. | 2010
- 8
-
Information Ethics: Risk and ResponsibilityRaval, Vasant et al. | 2012
- 8
-
IS Security Matters: There Oughta Be a LawRoss, S. J. et al. | 2006
- 9
-
IS Security Matters: Standard DeviationRoss, Steven J. et al. | 2006
- 9
-
IS Security Matters: Certification and the Disappearing PerimeterRoss, Steven J. et al. | 2008
- 9
-
Security Provisioning: Managing Access in Extended EnterpriseOliver, D. J. et al. | 2002
- 9
-
IS Security Matters - Eternal Truth and the Next New Thing - Steven J Ross, CISA, examines the security issues and practices that growing in complexity and importance as a result of the emergence of commerce. Specifically, he makes a case for basing information seen with change as its constant underpinning.Ross, Steven J. et al. | 2000
- 9
-
Book Review - Netspionage: The Global Threat to Information - This book raises the awareness of the issues surrounding Internet espionage and computer crime and offers a high-level view of protection, according to the reviewer, who goes on to detail the appropriate readership.Lambert, Michel et al. | 2001
- 9
-
Netspionage: The Global Threat to InformationLambert, M. et al. | 2001
- 9
-
IS Security Matters: I'm Not the SheriffRoss, Steven et al. | 2007
- 9
-
Who Needs Information Security?Ross, S. J. et al. | 2003
- 9
-
Book Reviews - Security Provisioning: Managing Access in Extended EnterpriseOliver, Derek J. et al. | 2002
- 9
-
Eternal Truth and the Next New Thing the security issues and practices that are growing in complexity and importance as a result of the emergence of ecommerce. Specifically, he makes a case for basing information security with change as its constant underpinningRoss, S. J. et al. | 2000
- 9
-
IS Security Matters - Who Needs Information Security?Ross, Steven J. et al. | 2003
- 9
-
Frameworkers of the World, UniteRoss, S. J. et al. | 2004
- 9
-
IS Security Matters - Frameworkers of the World, UniteRoss, Steven J. et al. | 2004
- 10
-
Book Reviews - Security Audit and Control Features SAP(R) R-3(R): A Technical and Risk Management Reference GuideChristodoulides, Michael et al. | 2002
- 10
-
Five Questions With...Luis Carrera Jr, Jose et al. | 2010
- 10
-
Data Plumbing?Ross, S.J. et al. | 2009
- 10
-
IS Security Matters: Data Plumbing?Ross, Steven J. et al. | 2009
- 10
-
Security Audit and Control Features SAP® R/3®: A Technical and Risk Management Reference GuideChristodoulides, M. et al. | 2002
- 12
-
IT Audit Basics: What Every IT Auditor Should Know About Auditing Virtual Machine TechnologySingleton, Tommie W. et al. | 2008
- 12
-
IT Audit Basics: What Every IT Auditor Should Know About Identity TheftSingleton, T. W. et al. | 2006
- 12
-
IT Audit Basics: What Every IT Auditor Should Know About Proper Segregation of Incompatible IT ActivitiesSingleton, Tommie W et al. | 2012
- 12
-
Book Review: Access Control, Security, and Trust: A Logical ApproachSpinelli, Connie et al. | 2011
- 12
-
IS Security Matters - Privacy PartsRoss, Steven et al. | 2002
- 12
-
Privacy PartsRoss, S. et al. | 2002
- 12
-
IT Audit Basics: What Every IT Auditor Should Know About Data AnalyticsSingleton, Tommie et al. | 2013
- 13
-
IT Audit Basics - Educating the Masses: Audit, Control and Security of Information Systems Today and TomorrowGallegos, Frederick et al. | 2004
- 13
-
Book Review: Security, Audit and Control Features Oracle E-Business Suite, 3rd EditionBenmahbous, Mustapha et al. | 2010
- 13
-
IS Security Matters - Virtual Private Infrastructure - Examines the security concerns that arise with the advent of the virtual private infrastructure the use of personal-home computers by employees for business purposes.Ross, Steven J. et al. | 2001
- 13
-
IT Audit Basics: Computer Forensics: An OverviewGallegos, Frederick et al. | 2005
- 13
-
IT Audit Basics: The COSO Model: How IT Auditors Can Use It to Evaluate the Effectiveness of Internal ControlsSingleton, Tommie et al. | 2007
- 13
-
Virtual Private InfrastructureRoss, S. J. et al. | 2001
- 13
-
Educating the Masses: Audit, Control and Security of Information Systems Today and TomorrowGallegos, F. et al. | 2004
- 13
-
Perspective - Management Guidelines for COBIT - This article describes what Management Guidelines provides the user: Guidelines that are critical in providing the tools for management to use in a focused manner to link IT governance to enterprise governance.Roussev, Robert S. et al. | 2000
- 13
-
Managing the Audit Function: A Corporate Audit Department Procedures Guide, 3^r^d EditionMcMinn, J. / Simon, M. et al. | 2003
- 13
-
Management Guidelines for COBIT what Management Guidelines provides the user: Guidelines that are critical in providing the tools for management to use in a focused manner to link IT governance to enterprise governanceRoussey, R. S. et al. | 2000
- 13
-
Book Review - Managing the Audit Function: A Corporate Audit Department Procedures Guide, 3rd EditionMcMinn, Janine et al. | 2003
- 13
-
Book Review: Green IT in Practice: How One Company Is Approaching the Greening of Its ITMunongwa, Bright et al. | 2011
- 14
-
Persistent Cross-interface AttacksSood, Aditya K et al. | 2011
- 14
-
Criteria for Evaluating and Selecting Continuous Controls Monitoring SolutionsDutta, Angsuman et al. | 2010
- 14
-
Standards, Statements, Guidelines - ISACA Member and CISA Compliance| 2002
- 15
-
Perspective - When IT Lets the Business Down - A summary of remarks made by ISACA-F International President Paul A. Williams at the International Conference 2000.Williams, Paul A. et al. | 2000
- 15
-
What Every IT Auditor Should Know About IT Risk AssessmentSingleton, T.W. et al. | 2009
- 15
-
When IT Lets the Business Down A summary of remarks made by ISACA/F International President Paul A. Williams at the International Conference 2000Williams, P. A. et al. | 2000
- 15
-
Book Review - Auditor's Risk Management Guide -- Integrating Auditing and ERMSarathy, Emani et al. | 2003
- 15
-
IT Audit Basics: What Every IT Auditor Should Know About IT Risk AssessmentSingleton, Tommie W. et al. | 2009
- 15
-
Book Review: The Web Application Hacker's Handbook Finding and Exploiting Security Flaws, 2nd EditionParekh, Upesh et al. | 2013
- 15
-
Auditor's Risk Management Guide-Integrating Auditing and ERMSarathy, E. et al. | 2003
- 16
-
Book Review: Phishing and Countermeasures: Understanding the Increasing Problem of Identity TheftKanhere, Vishnu et al. | 2008
- 16
-
Information Insecurity — Motivator of Corporate Compliance PracticeCano, Jeimy J et al. | 2013
- 17
-
"To Be, or Not To Be"-The Question of Runaway ProjectsSarup, D. et al. | 2003
- 17
-
Book Review: IT Risk: Turning Business Threats Into Competitive Advantagede la Fuente, Reynaldo J. et al. | 2008
- 17
-
Demonstrating Due Diligence in the Management of Information SecurityGelbstein, Ed et al. | 2012
- 17
-
Data Governance for Privacy, Confidentiality and Compliance: A Holistic ApproachSalido, Javier et al. | 2010
- 17
-
The IT Dimension of Basel IIGuldentops, E. et al. | 2004
- 17
-
Surfing @ the Razor's Edge: Governance and Managing ChangeSarup, D. et al. | 2002
- 17
-
IT Governance - "To Be, or Not To Be" -- The Question of Runaway ProjectsSarup, Deepak et al. | 2003
- 17
-
Book Review: Making IT Governance Work in a Sarbanes-Oxley World By Jaap Bloem, Menno Van Doorn and Piyush Mittalde la Fuente, R. J. et al. | 2006
- 17
-
IT Governance - Surfing (commat) the Razor's Edge: Governance and Managing ChangeSarup, Deepak et al. | 2002
- 17
-
IT Governance - The IT Dimension of Basel IIGuldentops, Erik et al. | 2004
- 17
-
Standards, Statements, Guidelines - Standards and guidelines for maintaining compliance for both ISACA" membership and the CISA" designation are outlined and the status of ISACA issuances noted.| 2001
- 18
-
IT Value: Practical Guidance on Establishing the Val IT Value Governance ProcessHarries, Sarah et al. | 2008
- 18
-
Standards, Statements, Guidelines - ISACA(R) Member and Certification Holder Compliance| 2007
- 18
-
Global Perspectives: Privacy for the Individual-A Reserve Bank of India InitiativeChaudhuri, A. P. / Sinha, A. et al. | 2006
- 19
-
Pius - HeIpSource Q & ALilly, Fred et al. | 2001
- 19
-
IT Governance: The Rule of Four of IT GovernanceGuldentops, Erik et al. | 2007
- 19
-
Book Review: Security, Audit and Control Features SAP® ERP, 3rd EditionKammermeier, Pam et al. | 2009
- 19
-
Global PerspectivesOng'ondt, Dismas et al. | 2005
- 19
-
Security, Audit and Control Features SAP® ERP, 3^r^d EditionKammermeier, P. et al. | 2009
- 19
-
Survivability Strategies for the Next Generation NetworkHuang, S. et al. | 2006
- 19
-
Plus - Technical Q & A, HelpsourceLilly, Fred L. et al. | 2000
- 20
-
Maintaining IT Audit Proficiency-The Role of Professional Development PlanningGallegos, F. et al. | 2002
- 20
-
IT Audit Basics - Maintaining IT Audit Proficiency -- The Role of Professional Development PlanningGallegos, Fred et al. | 2002
- 20
-
Security Labeling of IT Services Using a Rating MethodologyRamos, Antonio et al. | 2013
- 20
-
Data Integrity — Information Security's Poor RelationGelbstein, Ed et al. | 2011
- 20
-
Identify, Govern and Manage IT Risk Part 3: Techniques and Uses for Risk IT and Its Supporting MaterialsFischer, Urs et al. | 2009
- 21
-
COBIT Online Goes LiveGuldentops, Erik et al. | 2003
- 21
-
Lack of Privacy Awareness in Social NetworksSrinivasan, S et al. | 2012
- 21
-
Information Technology Auditing and Cybercommerce: A Risk PerspectivePathak, Jagdish et al. | 2004
- 22
-
IT Governance: Taking Governance ForwardStachtchenko, Patrick et al. | 2008
- 22
-
Expert Consensus on the Top IT Controls for a Small BusinessBusta, B. / Portz, K. / Strong, J. / Lewis, R. et al. | 2006
- 23
-
IT Governance Can Help Guide Business eCommerce Initiatives This article explains that with each technological advancement comes a corresponding vulnerability or security concern. Enterprise managers are called to the task to balance IT benefits, risks and controls. This article sheds light on how to create the balanceLainhart, J. W. et al. | 2000
- 23
-
IT Governance - Corporate Governance and ICT: A Marriage of Reason - Discusses the importance of viewing information and communication technologies as an integral part of the corporate strategy. Further, he describes what is necessary to apply the IT governance concept to the organization.Bourdariat, Jean et al. | 2001
- 23
-
IT Governance Perspective - IT Governance Can Help Guide Business eCommerce Initiatives - This article explains that with each technological advancement responding vulnerability or security concern. Enterprise managers are called to the task to balance IT benefits, risks and controls. This article sheds light on how to create the balance.Lainhart IV, John W. et al. | 2000
- 23
-
IT Value: New IT Is Not Just for ChristmasTiernan, Chris et al. | 2007
- 23
-
Corporate Governance and ICT: A Marriage of ReasonBourdariat, J. et al. | 2001
- 24
-
Show Me the Money! Three Ways to Better Partner With FinanceBarnier, Brian G et al. | 2010
- 24
-
Cloud Computing: An Auditor's PerspectiveGadia, Sailesh et al. | 2009
- 24
-
Accounting for Value and Uncertainty in Security MetricsAxelrod, C.Warren et al. | 2008
- 24
-
An Integrated Risk Assessment Program — A Cliché or a Need?Fahd Azam, Syed et al. | 2013
- 25
-
IT Value: The Birth of Val IT| 2006
- 25
-
Book Review: Managing Enterprise Information Integrity: Security, Control and Audit IssuesChuluunbaatar, Sod et al. | 2006
- 25
-
Commentaries - COBIT 3rd Edition Usage Survey: Growing Acceptance of COBITGuldentops, Erik et al. | 2002
- 25
-
COBIT 3^r^d Edition Usage Survey: Growing Acceptance of COBITGuldentops, E. / De Haes, S. et al. | 2002
- 25
-
Wise Wireless: Securing the WLANBindseil, J. et al. | 2003
- 25
-
Commentary - Wise Wireless: Securing the WLANBindseil, James et al. | 2003
- 25
-
Book Review: 7 Steps to Better Written Policies and ProceduresPage, Stephen et al. | 2007
- 25
-
Book Review: 7 Steps to Better Written Policies and Procedures By Stephen PageChatterjee, S. et al. | 2007
- 26
-
Technology Risk Measurement and ReportingPareek, Mukul et al. | 2011
- 26
-
Book Review: Essentials of Strategic Project ManagementChua, Joyce et al. | 2005
- 26
-
Preventive Technical Controls for Application SecuritySethi, Rohit et al. | 2012
- 27
-
Identity Theft and Corporations' Due DiligenceOlatilu, O. et al. | 2006
- 27
-
IT Governance: Enterprise Governance and the Role of ITHamaker, Stacey et al. | 2005
- 27
-
Perspective - XBRL -- How the West Was Won - The author discusses the role XBRL (Extensible Business Reporting Language) will play in the future of electronic business.Zonneveld, Paul A. et al. | 2001
- 27
-
Commentary - Investing in Security -- Do Not Rely on FUDTongia, Rahul et al. | 2003
- 27
-
An Exploration of Global Perceptions of Secutity and PrivacyGerdes, Michael et al. | 2002
- 27
-
Book Review: ISO 9001:2000 -- The Quality Management ProcessTricker, Ray et al. | 2007
- 27
-
XBRL-How the West Was WonZonneveld, P. A. et al. | 2001
- 27
-
Book Review: ISO 9001:2000-The Quality Management Process By Ray TrickerRafeq, A. et al. | 2007
- 27
-
On Security Education, Training and CertificationsRyan, Julie J.C.H. et al. | 2004
- 27
-
Leading Information SecurityJulisch, Klaus et al. | 2013
- 27
-
A Question of Value Determining the value of e-business in the banking sector. so that it can be a positive sum rather than a zero sum, often depends on an assessment and executive endorsement of the preliminary business modelSarup, D. et al. | 2000
- 27
-
An Exploration of Global Perceptions of Security and PrivacyGerdes, M. et al. | 2002
- 27
-
Investing in Security-Do Not Rely on FUDTongia, R. / Jain, K. et al. | 2003
- 27
-
Features - A Question of Value - Determining the value of e-business in the banking sector, so that it can be a positive sum rather than a zero sum, often depends on an assessment and executive endorsement of the preliminary business model. This article goes into further detail.Sarup, Deepak et al. | 2000
- 28
-
Y2K Silver Lining-Overblown or Extremely Well Managed?-Solving Year 2000Parker, R. G. et al. | 2000
- 28
-
Features - Y2K Silver Lining -- Overblown or Extremely Well Managed? -- Solving Year 2000 - This author discusses the value of added practices gleaned from the Y2K phenomenon and provides a roadmap to retain them.Parker, Robert G. et al. | 2000
- 29
-
An Introduction to Digital Records ManagementHamidovic, Haris et al. | 2010
- 29
-
How to Preserve Security and Autonomy While Meeting Information-sharing DirectivesSchumacher, Scott et al. | 2009
- 29
-
The Changing Face of CybersecurityHayes, Stewart et al. | 2012
- 30
-
Important, But Often Dismissed: Internal Control in a Microsoft Access DatabaseWhite, J. H. et al. | 2006
- 30
-
Implementing, Automating and Validating Controls for Privileged Users in Healthcare OrganizationsTraverse, Cheryl et al. | 2008
- 30
-
The New World of Risk-based Regulation (Part 1)Micallef, Mario et al. | 2007
- 30
-
Perspective - When Code Red Attacks: Addressing Real Vulnerabilities Behind Virus Hysteria - The attack of the Code Red worm demonstrates the vulnerability of the current Internet infrastructure. The authors discuss the big picture of malicious code and the vulnerabilities it exposes.Burnette, Mark et al. | 2001
- 30
-
When Code Red Attacks: Addressing Real Vulnerabilities Behind Virus HysteriaBurnette, M. / Gomez, C. et al. | 2001
- 31
-
IT Audit Independence: What Does It Mean?Gallegos, F. et al. | 2003
- 31
-
IT Audit Basics - IT Audit Independence: What Does It Mean?Gallegos, Fred et al. | 2003
- 31
-
Doing Business in India Requires Digital ComplianceVaidya, Anil et al. | 2013
- 32
-
Commentaries - Control and Governance Maturity Survey: Establishing a Reference Benchmark and a Self-assessment ToolGuldentops, Erik et al. | 2002
- 32
-
Best Practices for Establishing an Effective Workplace Policy for Acceptable Computer UsageNolan, John et al. | 2005
- 32
-
Choosing the Most Appropriate Data Security Solution for an OrganizationMattsson, Ulf et al. | 2011
- 32
-
Features - Improving the Cost-Effectiveness of a Test Suite for User Acceptance - The authors elucidate ways for improvement since user acceptance tests are often conducted using blind box methods because these are based on formal specifications when most commercial specifications are written in a information manner. The authors describe these pitfalls and suggest ways to avoid them.Yu, Yuen Tak et al. | 2000
- 32
-
Improving the Cost-Effectiveness of a Test Suite for User Acceptance TestsYu, Y. T. / Tang, S. F. / Poon, P. L. / Chen, T. Y. et al. | 2000
- 32
-
Control and Governance Maturity Survey: Establishing a Reference Benchmark and a Self-assessment ToolGuldentops, E. / Van Grembergen, W. / De Haes, S. et al. | 2002
- 32
-
Crossword PuzzleMellor, Myles et al. | 2009
- 33
-
Standards, Statements, Guidelines - ISACA® Member and Certification Holder Compliance| 2008
- 33
-
How Has Sarbanes-Oxiey Compliance Affected Information Security?Spears, J.L. et al. | 2009
- 33
-
COBIT: An Ideal Tool for Teaching Information Security ManagementPattinson, Malcolm et al. | 2004
- 33
-
How Has Sarbanes-Oxley Compliance Affected Information Security?Spears, Janine L. et al. | 2009
- 33
-
Patch Management: An Effective Line of Defense for UNIX and LimixAndrew, Chris et al. | 2003
- 33
-
Patch Management: An Effective Line of Defense for UNIX and LinuxAndrew, C. et al. | 2003
- 35
-
Is the IT Risk Worth a Control? Defining a Cost-value Proposition Paradigm for Managing IT RisksSathiyamurthy, Sudhakar et al. | 2008
- 35
-
Living With RiskPareek, M. et al. | 2006
- 35
-
COBIT 4.0: The New Face of COBITHardy, Gary et al. | 2005
- 35
-
The Center for Internet Security: Global Security Benchmarks for Computers Connected to the InternetKreitner, C. / Miuccio, B. et al. | 2001
- 35
-
Features The Center for Internet Security: Global Security Benchmarks for Computers Connected to the Internet - The members of the Center for Internet Security (CIS) develop technical security benchmarks through a global consensus process that brings together industry, government, academia and consultants. Their primary objective is widespread adoption of the benchmarks to improve Internet security worldwide.Kreitner, Clint et al. | 2001
- 35
-
Building a Business Case for Records ManagementStrait, Cheryl et al. | 2010
- 36
-
The Importance of Event Correlation for Effective Security ManagementCaldwell, Matthew et al. | 2002
- 36
-
Preparation Is the Key Ingredient to a Successful SIMEmmett, Mark D. et al. | 2007
- 37
-
Case Study - Getting Action on Audit ResultsSparks, Harry A. et al. | 2003
- 37
-
SME Cybersecurity and the Three Little PigsHan, David R et al. | 2012
- 37
-
Revisiting the Human Factor in Organizational Information Security ManagementGuo, Ken H et al. | 2013
- 37
-
Utilization of Generalized Audit Software in an Information Systems Auditing CourseMcCombs, Gary B. et al. | 2004
- 37
-
Achieving Continuous IT Auditing: RICAJohnstone, Dale et al. | 2009
- 37
-
Getting Action on Audit ResultsSparks, H. A. et al. | 2003
- 38
-
Features The State of Enterprise Security Management - In this interview, Reed Harrison, chief technology officer, e-Security, Inc., provides his understanding of enterprise security management and its importance.Judge, Joe et al. | 2001
- 38
-
The State of Enterprise Security ManagementJudge, J. et al. | 2001
- 38
-
IT Governance and Business-IT Alignment in SMEsDe Haes, Steven et al. | 2010
- 38
-
Developing a Unified Approach to Information Security in Business Associate RelationshipsOverly, Michael R et al. | 2011
- 39
-
Application Risk in a TCP-IP EnvironmentHarrison, Robert M. et al. | 2002
- 39
-
New Identity Theft RegulationsGonzalez, Silka et al. | 2008
- 39
-
Identity Theft: A New Frontier for Hackers and CybercrimeCilli, Claudio et al. | 2005
- 39
-
Features - Information Systems Auditing in Developing Economies -- The Bosnian Challenge - Written by an auditor in the US Federal Government, the author systematically describes firsthand the challenges of building information auditing functions in a war-torn country.Buxton, Brian M. et al. | 2000
- 39
-
ISACA Model Curriculum 2004: Continuing to Invest in the FutureLord, Alan T. et al. | 2004
- 39
-
From CSI to the Classroom: Developing A Computer Forensics Degree ProgramStaley, A. B. / Inch, S. / Shapeero, M. et al. | 2006
- 39
-
Information Systems Auditing in Developing Economies-The Bosnian ChallengeBuxton, B. M. et al. | 2000
- 41
-
Large-scale Biometric Management: A Centralized, Policy-based Approach to Reducing Organizational Identity ChaosByrne, Jim et al. | 2003
- 41
-
Assessing Data Authenticity with Benford's LawHasan, Bassam et al. | 2002
- 41
-
Security Within VoIP NetworksRamirez, David et al. | 2007
- 42
-
Understanding Virtual OrganizationsPang, L. et al. | 2001
- 42
-
A Sustainable and Efficient Way to Meet Client's Growing Security ExpectationsKulkarni, Buck et al. | 2013
- 42
-
Security and Privacy Trade-offs in RFID UseSrinivasan, S. et al. | 2009
- 42
-
Building an Educational Response to Terrorism: A Multifaceted Problem, A Multidimensional ResponseMaconachy, William V. et al. | 2004
- 42
-
Features Understanding Virtual Organizations - This article examines the concepts, technologies and issues surrounding virtual organizations (VO) with a knowledge management (KM) perspective. It identifies foundational concepts, surveys KM technologies that support VOs and looks at case studies of VOs in the private and public sector.Pang, Les et al. | 2001
- 42
-
Issues With Auditing the Systems Development ProcessHenderson, Dave et al. | 2008
- 43
-
Transitioning IT From a Compliance to a Value-driven Enterprise Using COBITLawton, Robert et al. | 2007
- 43
-
Using Scenario Analysis for Managing Technology RiskPareek, Mukul et al. | 2012
- 43
-
Procedure Guidelines and Controls Documentation: SDLC Controls in CobiT® 4.0Basham, R. et al. | 2006
- 44
-
Security and Ownership of Personal Electronic DevicesBassett, Richard A. et al. | 2005
- 44
-
Web Application SecurityStasiak, Ken et al. | 2002
- 44
-
Comercio Electronico-La Nueva Perspectiva de Los NegociosGonzalez, M. H. et al. | 2000
- 44
-
Features - Comercio Electronico -- La Nueva Perspectiva de Los Negocios - The companion piece to this article, printed in English, is posted ISACA web site.González, Marcelo Héctor et al. | 2000
- 45
-
How Does the Business Drive IT? Identifying, Prioritising and Linking Business and IT GoalsGrembergen, Wim Van et al. | 2007
- 45
-
A Higher Level of Governance — Monitoring IT Internal ControlsGarber, Mike et al. | 2010
- 46
-
Privacy Is in the Eye of the BeholderSchreider, Tari et al. | 2003
- 46
-
The Criticality of Mobile Device ManagementAhmed, Adesanya et al. | 2013
- 46
-
Monitoring Privileged Application Users in Oracle Applications EnvironmentHare, Jeffrey T. et al. | 2008
- 46
-
Auditing Global Compliance of Data Protection MechanismsLehmann, Dirk et al. | 2011
- 47
-
A Survey of Application Security in Current International StandardsGreene, Fredric et al. | 2002
- 47
-
The Rising Impact of Virtual Machine Hypervisor Technology on Digital Forensics InvestigationsBates, Patty et al. | 2009
- 48
-
A Wake Up Call to All Information Security and Audit Executives: Become Business-relevantTaylor, Patrick et al. | 2004
- 48
-
Features Risk Management for Internet Banking - Many banks have assumed that Internet banking primarily increases information security risks and have not sufficiently focused on the effect on other banking-specific risks. This article provides an overview of the various risks that are heightened with Internet banking and a holistic approach to managing these risks.Ramakrishnan, Ganesh et al. | 2001
- 48
-
Risk Management for Internet BankingRamakrishnan, G. et al. | 2001
- 49
-
Technology as the Relationship Doctor for Business: Understanding Business Relationships Within an Organizational Hierarchy FrameworkMoseley, Marty et al. | 2007
- 49
-
Preparing for HTML5 Capabilities and ThreatsZhang, Hongwen et al. | 2012
- 49
-
Features - Secure Electronic Transaction (SET) Protocol - SET, as the name implies, is a standard which ensures that credit card associated payment order information travel safely and securely among various parties on the Internet.Ramakrishnan, Ganesh et al. | 2000
- 49
-
Identity Management: A Business Strategy for Collaborative CommerceAhuja, Jay et al. | 2003
- 50
-
Applying Testing to Requirements Inspection for Software Quality AssuranceChen, T. Y. / Poon, P.-L. / Tang, S.-F. / Tse, T. H. / Yu, Y. T. et al. | 2006
- 50
-
Internal CyberforensicsBakshi, Sunil et al. | 2005
- 51
-
HelpSourceSubramaniam, Gan et al. | 2010
- 51
-
The Institutional Need for Comprehensive Auditing StrategiesMilus, Stu et al. | 2004
- 51
-
Business Process Management Systems: The Internal Control PerspectiveNatovich, Joseph et al. | 2009
- 51
-
Help Source Q&ASubramaniam, Gan et al. | 2011
- 52
-
Black Box Testing: Its Fundamental Concepts and ProblemsPoon, Pak-Lok et al. | 2008
- 52
-
Intrusion, Attack, Penetration-Some IssuesMahadevan, C. et al. | 2001
- 52
-
Analysis of FFIEC Guidance: Technologies and Decisions on AuthenticationFelker, Mikhael et al. | 2007
- 52
-
Plus - CPE Quiz #73. Based on Volume 4, 2000, Operating and Manufacturing SystemsOringel, Joey et al. | 2000
- 52
-
Features Intrusion, Attack, Penetration -- Some Issues - B2B, B2C and Internet-based e-commerce transactions, hosting vertical portals and Internet banking have come of age and are facing serious threats of attack, penetration or intrusion. What makes a system vulnerable to attack? What protective mechanisms can be built and put in place?Mahadevan, Chidambaram et al. | 2001
- 53
-
Quiz #151 - Based on Volume 4, 2013Khan, Kamal et al. | 2013
- 53
-
Quiz #133 Based on volume 4, 2010Khan, Kamal et al. | 2010
- 53
-
CPE Quiz #139 - Based on Volume 4, 2011Khan, Kamal et al. | 2011
- 53
-
CPE Quiz #145 - Based on Volume 4, 2012Khan, Kamal et al. | 2012
- 54
-
COBIT'S Management Guidelines Revisited: The KGIs-KPIs CascadeGrembergen, Wim Van et al. | 2005
- 54
-
An Introduction to CryptographyPiper, Fred et al. | 2003
- 54
-
Standards, Statements, Guidelines - Procedures to maintain compliance for both ISACA membership and CISA designation are outlined and the status of ISACA issuances is noted.| 2000
- 55
-
CPE Quiz #85, based on volume 4, 2002Oringel, Joey et al. | 2002
- 55
-
Standards, Guidelines, Tools and Techniques| 2010
- 56
-
Excerpt: IT Governance Roundtable: Unlocking Value| 2009
- 57
-
Help Source - Help Source Q&AGanapathi Subramaniam, B. et al. | 2004
- 58
-
Pius - CE Quiz #79, Based on Volume 4, 2001Oringel, Joey et al. | 2001
- 59
-
CPE Quiz #103 - Based on Volume 4, 2005Rafeq, A. et al. | 2006
- 59
-
CPE Quiz - CPE Quiz #97, based on volume 4, 2004Oringel, Joe et al. | 2004
- 59
-
CPE Quiz #121 - Based on Volume 4, 2008Khan, Kamal et al. | 2008
- 59
-
CPE Quiz #115 - Based on Volume 4, 2007Rafeq, A. et al. | 2007
- 59
-
CPE Quiz #127 - Based on Volume 4, 2009Khan, Kamal et al. | 2009
- 62
-
Security in the Land Down UnderFord, Stephen et al. | 2003
- 63
-
Standards, Guidelines, Tools and Techniques: ISACA Member and Certification Holder Compliance| 2009
- 67
-
CPE Quiz #91, based on volume 4, 2003Oringel, Joe et al. | 2003
-
Plus - ISACA Bookstore Price List Supplement| 2000
-
ISACA Bookstore Price List Supplement| 2003
-
ISACA Bookstore Supplement| 2011
-
ISACA Bookstore - ISACA Bookstore Price List Supplement| 2004
-
Pius - ISACA Bookstore Price List Supplement| 2001