Five Questions With (English)
- New search for: Schperberg, R.
- New search for: Schperberg, R.
In:
ISACA JOURNAL
;
5
;
11-12
;
2010
-
ISSN:
- Article (Journal) / Print
-
Title:Five Questions With
-
Contributors:Schperberg, R. ( author )
-
Published in:ISACA JOURNAL ; 5 ; 11-12
-
Publisher:
- New search for: Information Systems Audit and Control Association
-
Publication date:2010-01-01
-
Size:2 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 657.450285
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 657.450285 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 5
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Information Security Matters: Why We FailedRoss, Steven J. et al. | 2018
- 3
-
Information Security Matters: Are Software Flaws a Security Problem?Ross, Steven J. et al. | 2015
- 3
-
Information Security Matters: Information Security in the Multi-Modal EraRoss, Steven J. et al. | 2017
- 3
-
Information Security Matters: The Train of DangerRoss, S.J. et al. | 2011
- 4
-
Information Security Matters: Emo, Ergo SumRoss, S.J. et al. | 2013
- 4
-
CyberCERTRoss, S.J. et al. | 2014
- 4
-
Information Security Matters: Unsung Security HeroesRoss, Steven J. et al. | 2016
- 4
-
Information Security Matters: Is Security a Wall or a Door?Ross, S.J. et al. | 2012
- 4
-
Information Security Matters: The Mayor and the SheriffRoss, S.J. et al. | 2010
- 5
-
IS Audit Basics: Helping Auditees Prepare for an IS/IT AuditGelbstein, Ed et al. | 2015
- 6
-
IS Audit Basics: Doing More With LessCooke, Ian et al. | 2017
- 6
-
Cloud Computing: Managing Data With a Streamlined SolutionSelway, P. / Schulte, J. et al. | 2013
- 6
-
The NetworkMurphy, Kevin et al. | 2018
- 6
-
The Three Lines of Defence Related to Risk GovernanceDoughty, K. et al. | 2011
- 6
-
Cloud Computing: Cloud Storage-Bursting Through the HypeBarrasso, R. / Wallace, M. et al. | 2012
- 7
-
IT Audit Basics: Mitigating IT Risks for Logical AccessSingleton, T.W. et al. | 2010
- 7
-
IS Audit Basics: The Soft Skills Challenge, Part 4Gelbstein, Ed / Baldi, Stefano et al. | 2016
- 8
-
Machine EthicsRaval, V. et al. | 2014
- 8
-
IS Auditing Basics: Auditing the IoTCooke, Ian / Raghu, R. V. et al. | 2018
- 8
-
Information Ethics: Where the Rubber Meets the RoadRaval, V. et al. | 2013
- 9
-
Information Ethics: Ethics in COBIT 5Raval, V. et al. | 2012
- 9
-
Cloud Computing: Governance in the CloudKirkpatrick, J. et al. | 2011
- 10
-
Cloud Computing: Cloud Application Enables ViralMint to Turn Potential Disaster Into SuccessMandalam, Siva / Dighe, Rohan et al. | 2015
- 11
-
IT Audit Basics: Auditing IT Risk Associated With Change Management and Application DevelopmentSingleton, T.W. et al. | 2011
- 11
-
Five Questions WithSchperberg, R. et al. | 2010
- 11
-
What Every IT Auditor Should Know About Computer-generated ReportsSingleton, T. et al. | 2014
- 12
-
Book Review: The Lure: The True Story of How the Department of Justice Brought Down Two of the World's Most Dangerous Cyber CriminalsKivisild, A. Krista et al. | 2015
- 12
-
IT Audit Basics: What Every IT Auditor Should Know About Auditing Social MediaSingleton, T.W. et al. | 2012
- 12
-
IS Audit Basics: What Every IT Auditor Should Know About Transforming Data for CAATsSingleton, T. et al. | 2013
- 13
-
The Practical Aspect: Mergers and Acquisitions, Should Internal Audit Be Involved in Due Diligence?Raval, Vasant / Jalan, Chandni et al. | 2018
- 13
-
Book Review: Fraud 101: Techniques and Strategies for Understanding Fraud, 3^r^d EditionMichaelson, G. et al. | 2010
- 13
-
The Practicle Aspect: Blind Spots On The Cloud PlatformRaval, Vasant / Lux, Don et al. | 2017
- 13
-
Book Review: Smart Grid Security: An End-to-End View of Security in the New Electrical GridIppoliti, Dino et al. | 2015
- 14
-
Vendor Risk Management DemystifiedPatel, Dipti et al. | 2015
- 14
-
Information Ethics: The Challenge of Being ``Good''Raval, Vasant et al. | 2016
- 14
-
Book Review: Information Technology Risk Management in Enterprise EnvironmentsKanhere, V. et al. | 2010
- 15
-
An Approach Toward Sarbanes-Oxley ITGC Risk AssessmentMehta, A. et al. | 2010
- 15
-
Imperfect Technologies and Digital HygieneGelbstein, E. et al. | 2014
- 15
-
Understanding the Core Concepts in COBIT 5De Haes, S. / Debreceny, R. / Van Grembergen, W. et al. | 2013
- 17
-
Guest Editorial: Digital Transformation Insight for 21^s^t Century OrganizationsTouhill, Gregory J. et al. | 2018
- 17
-
Vendor Governance in the Age of Information SecurityHeald, Arian Eigen et al. | 2015
- 17
-
IT Governance and the Cloud: Principles and Practice for Governing Adoption of Cloud ComputingSpeed, R. et al. | 2011
- 17
-
Design With the End in MindSathiyamurthy, Sudhakar et al. | 2017
- 18
-
Book Review: Handbook for Internal AuditorsKarin, H. et al. | 2012
- 19
-
Social Networks and Privacy-Threats and ProtectionNdiandukue, G.-H.N. et al. | 2012
- 20
-
How to Audit the Human Element and Assess Your Organization's Security RiskPendergast, Tom et al. | 2016
- 20
-
Seven Ways SMEs Can Benefit From GRC SolutionsWilhelms, D. et al. | 2010
- 20
-
Sponsored Feature: Innovating Internal Audit to Unlock ValueYoung, Clay / Kiaer, Erik et al. | 2018
- 20
-
The Value of Big Data Analytics to the BusinessMohapatra, B. / Parisa, V. / Banerjee, J. et al. | 2014
- 22
-
A Case for a Process-based Approach to GRCRamanathan, S. et al. | 2010
- 22
-
Digital Transformation? Boards Are Not Ready for ItPearce, Guy et al. | 2018
- 23
-
Using COBIT 5 for Data Breach PreventionNicho, M. / Fakhry, H. et al. | 2013
- 23
-
IT General and Application Controls: The Model of InternalizationPalmas, E. et al. | 2011
- 24
-
Meeting PCI DSS When Using a Cloud Service ProviderAhmed, A. et al. | 2012
- 24
-
Blockchain: Identifying Risk on the Road to Distributed LedgersCaron, Filip et al. | 2017
- 24
-
Three Ways to Simplify Auditing Software Security Requirements and DesignSethi, Rohit / Foroughi, Ehsan et al. | 2015
- 25
-
Cyberinsurance: Value Generator or Cost Burden?Ishaq, Syed K. et al. | 2016
- 27
-
Analyzing IT Value Management at KLM Through the Lens of Val ITDe Haes, S. / Gemke, D. / Thorp, J. / Van Grembergen, W. et al. | 2011
- 27
-
Impacts of Blockchain on the Auditing ProfessionBrender, Nathalie / Gauthier, Marion et al. | 2018
- 27
-
The Price of MobilityYu, W.E. et al. | 2014
- 28
-
Risk-based Approach to IT Systems Life Cycle and Change ControlJegousse, L. et al. | 2010
- 29
-
Deep Web Data Extraction Based on URL and Domain ClassificationBanu, B. Aysha / Chitra, M. et al. | 2015
- 30
-
Instilling a Culture of Security Starts With Information GovernanceKelly, T. Sean et al. | 2017
- 31
-
A COBIT Approach to Regulatory Compliance and Defensible DisposalLuellig, L. / Frazier, J. et al. | 2013
- 31
-
Privacy Assurance for BYODChaudhary, A. et al. | 2014
- 31
-
Manage Requirements Volatility to Manage Risks in IS Development ProjectsSakthivel, S. et al. | 2010
- 31
-
Cloud Risk-10 Principles and a Framework for AssessmentVohradsky, D. et al. | 2012
- 32
-
An Integrated Approach for Cyberthreat Monitoring Using Open-source SoftwareCaliskan, Furkan et al. | 2016
- 33
-
Security and Privacy Challenges of IoT-enabled SolutionsSubramanian, Sivarama / Gopal, Varadarajan Vellore / Muthusamy, Marimuthu et al. | 2015
- 33
-
How Boards Engage in Digital Strategy and OversightDe Haes, Steven / Caluwe, Laura / Joshi, Anant / Huygh, Tim et al. | 2018
- 35
-
In-memory Computing-Evolution, Opportunity and RiskYu, W.E. et al. | 2013
- 35
-
The Impact of Governance on Identity Management ProgramsEtges, R. / Ruysam, A. et al. | 2011
- 35
-
FISMA 2010: What It Means for IT Security ProfessionalsModi, T. et al. | 2010
- 35
-
Beyond BYOD-Can I Connect My Body to Your Network?Pozza, G. et al. | 2014
- 35
-
Barriers and Enablers to Auditors Accepting Generalized Audit SoftwareBradford, Marianne / Henderson, Dave et al. | 2017
- 37
-
Balancing the Cybersecurity BattlefieldBhasker, Daksha et al. | 2016
- 37
-
Auditing Linux/Unix Server Operating SystemsRahman, Muhammad Mushfiqur et al. | 2015
- 39
-
A Framework for Estimating ROI of Automated Internal ControlsDutta, A. / Dopp, D. et al. | 2011
- 39
-
Manage What Is Known and What Is Not KnownFu, Z. / Lainhart, J.W. / Stubbs, A. et al. | 2014
- 40
-
Solving the Identity and Access Management ConundrumRavindran, S.T. et al. | 2013
- 41
-
Giving Sustainability to COBIT PO9Prisca, V. / Moreira, M. et al. | 2010
- 41
-
Planning for Information Security Testing—A Practical ApproachKorpela, Karina / Weatherhead, Paul et al. | 2016
- 42
-
How Strong Is Strong User Authentication?Campi, A. et al. | 2012
- 43
-
Bitcoin Boosting BusinessWardini, Josh et al. | 2018
- 43
-
Addressing Shared Risk in Product Application Vulnerability AssessmentsWerneburg, Michael et al. | 2017
- 44
-
How to Measure Security From a Governance PerspectiveVolchkov, A. et al. | 2013
- 44
-
State and impact of Governance of Enterprise IT in OrganizationsDe Haes, Steven / Joshi, Anant / Van Grembergen, Wim et al. | 2015
- 45
-
Use of the Balanced Scorecard for IT Risk ManagementKapur, R. et al. | 2010
- 45
-
The Significance of the Dodd-Frank ActMarks, L. et al. | 2011
- 46
-
A Little Bit of History Repeating Itself-Nolan's Stages Theory and the Modern IS AuditorHollyhead, A. / Robson, A. et al. | 2012
- 47
-
Anatomy of an IoT DDoS Attack and Potential Policy ResponsesMukundhan, Hari et al. | 2017
- 48
-
Speeding Up Software Delivery With Effective Change ManagementBass, Evan / Haskins-Hafer, W. Noel et al. | 2018
- 49
-
Leading Change and Transformation in Information SecurityMasika, J.S. et al. | 2014
- 50
-
Data Protection Act and GAPP AlignmentKhan, Mohammed J. et al. | 2015
- 51
-
A Critical Perspective on Safeguard Selection ProcessesBeissel, Stefan et al. | 2016
- 52
-
Assessing and Managing IT Operational and Service Delivery RiskCopley, J. / Parekh, U. et al. | 2014
- 54
-
Tools: Can Penetration Testing Tools Help an Audit?Moyle, Ed et al. | 2017