Information Ethics: An Alchemy of C3: Character, College and Computers (English)
- New search for: Raval, Vasant
- New search for: Raval, Vasant
In:
ISACA journal
;
6
;
8-10
;
2014
-
ISSN:
- Article (Journal) / Print
-
Title:Information Ethics: An Alchemy of C3: Character, College and Computers
-
Contributors:Raval, Vasant ( author )
-
Published in:ISACA journal ; 6 ; 8-10
-
Publisher:
- New search for: Information Systems Audit and Control Association
-
Publication date:2014-01-01
-
Size:3 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 657.450285
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 657.450285 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 6
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Information Security Matters: How We Can SucceedRoss, Steven J. et al. | 2018
- 3
-
Information Security Matters: Information Security in ContextRoss, Steven J. et al. | 2017
- 3
-
Information Security Matters: Cybersecurity for a Simple'' AuditorRoss, Steven J. et al. | 2015
- 4
-
Information Security Matters: Service Availability and Disaster RecoveryRoss, S.J. et al. | 2010
- 4
-
Information Security Matters: Whiz Bang 2000Ross, Steven J. et al. | 2014
- 4
-
Information Security Matters: The Cost of CyberattacksRoss, S.J. et al. | 2012
- 4
-
Information Security Matters: The G7 and Cyber SecurityRoss, Steven J. et al. | 2016
- 4
-
Information Security Matters: A Tide in the AffairsRoss, S.J. et al. | 2013
- 5
-
IS Audit Basics: Auditors and Large Software Projects, Part 3Gelbstein, Ed et al. | 2015
- 6
-
The NetworkStetz, Kathleen M. et al. | 2014
- 6
-
IS Audit Basics: Affect What Is Next NowCooke, Ian / Belt, Green / Cullen, Martin et al. | 2018
- 6
-
Information Ethics: Character Traits of an IT ProfessionalRaval, V. et al. | 2013
- 6
-
Cloud Computing: Leveraging the Cloud for Added ValueMarkey, S.C. et al. | 2012
- 6
-
IS Audit Basics: Auditing Mobile DevicesCooke, Ian et al. | 2017
- 7
-
IS Audit Basics: The Soft Skills Challenge, Part 6Gelbstein, Ed / Baldi, Stefano et al. | 2016
- 8
-
Information Ethics: An Alchemy of C3: Character, College and ComputersRaval, Vasant et al. | 2014
- 8
-
Information Ethics: Risk and ResponsibilityRaval, V. et al. | 2012
- 10
-
Five Questions WithSebopeng, R.B. et al. | 2013
- 10
-
Information Ethics: Transparency and the IT ProfessionalRaval, Vasant et al. | 2015
- 10
-
The Practical Aspect: Why Worry About IoT?Raval, Vasant / Thaker, Ranjit D. et al. | 2018
- 11
-
IS Audit Basics: The Core of IT AuditingSingleton, Tommie et al. | 2014
- 12
-
IT Audit Basics: What Every IT Auditor Should Know About Data AnalyticsSingleton, T. et al. | 2013
- 12
-
Access Control, Security, and Trust: A Logical ApproachSpinelli, C. et al. | 2011
- 12
-
IT Audit Basics: What Every IT Auditor Should Know About Proper Segregation of Incompatible IT ActivitiesSingleton, T.W. et al. | 2012
- 13
-
Book Review: Security, Audit and Control Features Oracle E-Business Suite, 3^r^d EditionBenmahbous, M. et al. | 2010
- 13
-
Green IT in Practice: How One Company Is Approaching the Greening of its ITMunongwa, B. et al. | 2011
- 14
-
Criteria for Evaluating and Selecting Continuous Controls Monitoring SolutionsDutta, A. / Koritala, B. et al. | 2010
- 14
-
Information Ethics: Information Ethics in the Mid-21st CenturyRaval, Vasant et al. | 2016
- 14
-
The Practical Aspect: Challenges of Security Log ManagementRaval, Vasant / Verma, Saloni et al. | 2017
- 14
-
Cloud Computing: Cloud Computing as an Enabler of New Business Models and Start-upsSchouten, Angelique et al. | 2015
- 14
-
How Zero-trust Network Security Can Enable Recovery From CyberattacksBeck, Eric A. et al. | 2014
- 14
-
Persistent Cross-interface AttacksSood, A.K. / Enbody, R.J. et al. | 2011
- 15
-
Book Review: The Web Application Hacker's Handbook Finding and Exploiting Security Flaws, 2^n^d EditionParekh, U. et al. | 2013
- 16
-
Future-Proofing a Career in Cybersecurity ([non-Roman script word])Saurbaugh, Mike et al. | 2018
- 16
-
Information Insecurity-Motivator of Corporate Compliance PracticeCano, J.J. et al. | 2013
- 17
-
Data Governance for Privacy, Confidentiality and Compliance: A Holistic ApproachSalido, J. et al. | 2010
- 17
-
Book Review: Cybersecurity: Managing Systems, Conducting Testing, and Investigating IntrusionsRichardson, Andrew et al. | 2015
- 17
-
Demonstrating Due Diligence in the Management of Information SecurityGelbstein, E. et al. | 2012
- 18
-
The Criticality of Security in the Internet of ThingsHerold, Rebecca et al. | 2015
- 19
-
Digital Identity—Will the New Oil Create Fuel or Fire in Today's Economy?Blum, Dan et al. | 2017
- 19
-
Leveraging Industry Standards to Address Industrial Cybersecurity RiskAlcoforado, Ivan et al. | 2014
- 20
-
Is Artificial Intelligence a Career Path for You? ([non-Roman script word])Wlosinski, Larry G. et al. | 2018
- 20
-
Security Labeling of IT Services Using a Rating MethodologyRamos, A. et al. | 2013
- 20
-
Data Integrity-Information Security's Poor RelationGelbstein, E. et al. | 2011
- 21
-
Lack of Privacy Awareness in Social NetworksSrinivasan, S. et al. | 2012
- 21
-
Performance Measurement Metrics for IT GovernanceBakshi, Sunil et al. | 2016
- 22
-
Governance, Risk, Compliance and a Big Data Case StudyPearce, Guy et al. | 2017
- 24
-
An Integrated Risk Assessment Program-A Cliche or a Need?Azam, S.F. et al. | 2013
- 24
-
Show Me the Money! Three Ways to Better Partner With FinanceBarnier, B.G. et al. | 2010
- 25
-
Bridging the Gap Between Access and Security in Big DataMattsson, Ulf T. et al. | 2014
- 25
-
Back to the Future in Device SecurityRotman, Doron / Kypreos, Chris / Pipes, Sarah et al. | 2015
- 26
-
Preventive Technical Controls for Application SecuritySethi, R. / Foroughi, E. et al. | 2012
- 26
-
Technology Risk Measurement and ReportingPareek, M. et al. | 2011
- 27
-
Leading Information SecurityJulisch, K. et al. | 2013
- 28
-
Effective Strategies for Creating and Maintaining a Diverse and Inclusive IT Audit TeamBalderas, Julie / Fareeduddin, Asim / Richards, Femi / Sarmad, Ruwel / Wall, Jack et al. | 2018
- 29
-
Auditing Big Data in EnterprisesAl-Mansour, Abdullah et al. | 2017
- 29
-
The Changing Face of CybersecurityHayes, S. / Shore, M. / Jakeman, M. et al. | 2012
- 29
-
An Introduction to Digital Records ManagementHamidovic, H. et al. | 2010
- 29
-
Assessing Security ControlsDubsky, Lance et al. | 2016
- 30
-
Data Owners' Responsibilities When Migrating to the CloudGelbstein, Ed / Polic, Viktor et al. | 2014
- 31
-
Doing Business in India Requires Digital ComplianceVaidya, A. et al. | 2013
- 32
-
Choosing the Most Appropriate Data Security Solution for an OrganizationMattsson, U. et al. | 2011
- 33
-
A Risk-Based Management Approach to Third-Party Data Security, Risk and CompliancePutrus, Robert et al. | 2017
- 33
-
Internet of Things—The Fate We Make for OurselvesSeaman, Jim et al. | 2015
- 33
-
Delivering Personal Data Protection Compliance on a Global ScaleKabanov, Ilya et al. | 2016
- 35
-
Building a Business Case for Records ManagementStrait, C. et al. | 2010
- 36
-
From Here to Maturity—Managing the Information Security Life CycleAnderson, Kerry A. et al. | 2014
- 37
-
Growing a Cybersecurity CareerCasesa, Philip et al. | 2018
- 37
-
SME Cybersecurity and the Three Little PigsHan, D.R. et al. | 2012
- 37
-
Revisiting the Human Factor in Organizational Information Security ManagementGuo, K.H. et al. | 2013
- 38
-
Developing a Unified Approach to Information Security in Business Associate RelationshipsOverly, M.R. / Howell, C.T. / Scarano, R.M. et al. | 2011
- 38
-
Revising Cybersecurity Skills for EnterprisesIvanovs, Ivo / Deruma, Sintija et al. | 2015
- 38
-
IT Governance and Business-IT Alignment in SMEsDe Haes, S. / Haest, R. / Van Grembergen, W. et al. | 2010
- 39
-
Enhancing the Audit Follow-up Process Using COBIT 5Cooke, Ian et al. | 2016
- 41
-
Defining the Chief Digital Officer Using COBIT 5Catarino, João / Rosa, Isabel / da Silva, Miguel Mira et al. | 2018
- 42
-
A Sustainable and Efficient Way to Meet Client's Growing Security ExpectationsKulkami, B. et al. | 2013
- 42
-
A Business-Integrated Approach to Incident ResponseMukundhan, Hari et al. | 2015
- 42
-
Making the SoA an Information Security Governance ToolGnana, Daniel et al. | 2017
- 43
-
Using Scenario Analysis for Managing Technology RiskPareek, M. et al. | 2012
- 44
-
Auditing Oracle DatabaseRahman, Muhammad Mushfiqur et al. | 2014
- 45
-
A Higher Level of Governance-Monitoring IT Internal ControlsGarber, M. et al. | 2010
- 46
-
Auditing Global Compliance of Data Protection MechanismsLehmann, D. / van Vonderen, F. et al. | 2011
- 46
-
The Criticality of Mobile Device ManagementAhmed, A. et al. | 2013
- 47
-
Advanced Data Analytics for IT AuditorsAlexiou, Spiros et al. | 2016
- 47
-
Real-life Risk TheoryBrottmann, Mette / Agnoletti, Klaus / Pedersen, Morten Als / Madsen, Ronnie Lykke / Krumbak, Michael Rosendal / Ahrends, Thor et al. | 2015
- 48
-
Evasive Malware TricksKolbitsch, Clemens et al. | 2017
- 49
-
Preparing for HTML5 Capabilities and ThreatsZhang, H. et al. | 2012
- 49
-
A Heightened Sense of AwarenessCassels, Wade / Alvero, Kevin / Pierson, Randy et al. | 2018
- 50
-
Risk and Ethics in CyberspaceLee, Wanbil W. et al. | 2015
- 51
-
The Information Security FunctionCano, Jeimy J. et al. | 2014
- 52
-
The AICPA's New Cybersecurity Attestation Reporting Framework Will Benefit a Variety of Key StakeholdersHerrygers, Sandra / Kumar, Gaurav / Schaeffer, Jeff et al. | 2017
- 54
-
Tools: Skill Acquisition in a Rapidly Evolving WorkplaceLyons, Robin et al. | 2018