Editorial - Issues & Comments - Editor-in-Chief Michael P Cangemi, CISA, CPA, discusses biometrics, a futuristic approach to security. He also lists the AICPA Top Ten Technology Priorities (Unknown language)

, Rolling Meadows, Ill.; 1999
  • New search for:

Document information


Table of contents – Volume 3

Show all volumes and issues

Tables of content are generated automatically and are based on records of articles contained that are available in the TIB-Portal index. Due to missing records of articles, the volume display may be incomplete, even though the whole journal is available at TIB.

3
Issues & Comments
Cangemi, Michael P. | 1996
5
Issues & Comments: Discussions on GAO approving COSO, Privacy legislation, Top Ten Technologies, Computer Security Day, Automated Newspaper, DSS, and more
Cangemi, Michael P. | 1994
5
Editorial - Issues & Comments - Editor-in-Chief Michael P Cangemi, CISA, CPA, discusses biometrics, a futuristic approach to security. He also lists the AICPA Top Ten Technology Priorities
Cangemi, Michael P. | 1999
5
Manage your time, your projects, your staff and your future.
Cangemi, Michael P. | 1997
6
Information Technology: Opportunities are Accompanied by New Business Risks
Villegas, Miguel O. / Gates, J.Russell | 1996
8
Practical IT Auditing
Hernandez, Paul Q. | 1998
8
Information Systems Auditors. are Critical in Shaping Future Assurance Services - The authors explain how to monitor controls between the virtual and real worlds using the CoBIT Framework.
Holstrum, Gary L. / Hunton, James | 1997
9
IS Security Matters - Processor serial number technology and the dichotomy between security and privacy is discussed
Ross, Steven J. / Samsioe, Jonas | 1999
9
Our Opportunity to Strengthen the IS Audit Profession
Bloemker, Wesley | 1995
10
Computers, Privacy, and Citizens' Rights Revisited
Veeder, Robert N. | 1994
10
HelpSource Q& A
Lilly, Fred | 1996
11
Encryption Plus for Hard Disks(R) protects data on notebooks and PCs by encrypting the information on the local drives
| 1998
12
Standards, Statements and Guidelines - Compliance to maintain ISACA member status and compliance for the CISA(R) designation are outlined and the status of ISACA issuances is noted
| 1999
12
The Internet: Traffic Gridlock on the Information Superhighway
Kogan, Alexander / Sudit, Ephraim / Vasarhelyi, Miklos | 1996
14
Developing an IS Risk Assessment Process
McNamee, David | 1996
14
Using Internet in CIS Security and Audit Education to Examine a Business Problem
Mason, Ida W. / Guthrie, Ruth A. / Gallegos, Fred | 1994
14
The Use of Electronic Money in Electronic Commerce Transactions
Garceau, Linda / Matos, Victor / Misra, Santosh K. | 1998
14
Establishing a New IS Audit Function
Blackburn, Sarah | 1995
14
Automate, Automate, But Proceed with Caution
O'Keeffe, J. S. | 1993
15
Book Reviews - Two books, Establishing a System of Policies and Procedures by Stephen B Page and SAP R-3 Business Blueprint by Thomas Curran are briefly summarized
Page, Stephen B. | 1999
16
Perspective - A Third Way for Biometric Technology - Joe Rice describes from a personal perspective how necessity became the mother of invention. The result: The Biowatch
Rice, Joe | 1999
18
Disaster Recovery Planning - The reviewer, who has varied experience in disaster planning and recovery, describes how this book focuses on computers and communication resources to consider before disaster strikes.
Hernandez, Paul Q. | 1997
20
Product Overviews: Action Software International and Search Software America
| 1994
20
The Rise and Fall of Strategic Planning
Quick, Bob | 1995
20
Flashback to 1978-82 A look at history.
Ross, bv Steven J. | 1997
20
Bank Sweeps Up with RACF Administrative Tool
Hahn, Mark | 1996
20
Book Review: Security & Control in an Oracle(R) Environment
| 1994
21
Features - Successful Audits in New Situations - For the occasion when even technical auditors encounter an audit assignment that is outside their experience, Jennifer Bayuk, CISA, offers solutions to this challenging circumstance
Bayuk, Jennifer | 1999
21
Network Security: Data and Voice Communications
Chopra, Anu | 1996
22
Q & A Interview
Dahlberg, Patricia | 1996
22
Control Your Own Destiny or Someone Else Will
Goldman, Michael | 1995
24
Helpsource Q& A - Question and answer column offers a direct response to IS auditors' technical security, audit and control inquiries.
Lilly, Fred | 1997
25
Practical Pointers - Audit and Control of a Year 2000 Era E-mail System - The author discusses security measures for e-mail, the instant and at times, intrepid communication
Johnson, Rhett B. / Lilly, Fred L. | 1999
25
Information Protection and Business Process Reengineering
| 1995
26
Is the Virtual Corporation a Reality? The authors explore auditing situations in the realm between virtual and reality.
Gallegos, Frederick / Powell, Steven R. | 1997
28
Features - Java and ActiveX Security - Two examples of mobile code Java and ActiveX, and their attendant vulnerabilities are described in detail
Stearn, Jonathan / Ciurczak, Alex / Yu, Corwin | 1999
28
Add Value for Senior Management: Introduce a Business Risk Management Program
Palmer, Ian | 1996
28
CPE QUIZ
| 1994
29
What Should We Do About Spreadsheets?
Panko, Raymond R. | 1998
30
Auditing Windows NT - A step-by-step approach
Henderson, Stuart | 1997
32
Evolution of a UK-Sponsored Risk Analysis Methodology
McLean, Kevin / Watts, Len | 1996
33
The Impact of Computers on Privacy
Page, Tammy | 1994
35
International Aspects of the Internet
Davis, Dai | 1998
36
Radical vs. Incremental Improvement
| 1995
37
Control & Audit of SAP R-3 - IS auditors should be familiar with the way SAP R-3 logical access security has been set up. Insight and questions are addressed in detail in this article.
Haelst, Werner van / Jansen, Kees | 1997
38
A History of Accounting and Auditing Before EDP
Flesher, D. L. | 1993
38
Perceived Security Threats to Today's Accounting Information Systems: A Survey of CISAs
Davis, Charles E. | 1996
39
The Role of Information Systems Auditors in WebTrustSM Assurance
Hunton, James E. / Holstrum, Gary | 1998
40
Reengineering the Corporation
Thomas, Edwin E. | 1995
40
An Introduction to the Client-Server Environment
Crowell, David | 1994
42
On-Line Auditing and Cryptography
Kogan, Alexander / Sudit, Ephraim / Vasarhelyi, Miklos | 1996
43
Radical Reengineering for Internal Audit
Wescott, Ross | 1995
45
Features - Investigating Pornography on an Organization's Computers - With the rise in use of the Internet, so also has risen the incidence of employee use of the corporate computer for the viewing, or worse, trading of pornography. This article describes the careful steps that must be taken to uncover, and perhaps provide evidence in criminal court
Bigler, Mark | 1999
45
The Enemy Within -- Y2K Issues Below the Application Level
Baklarz Jr, Ronald R. | 1998
46
Workflow Management in SAP R-3 - The authors see an eventual reality in which the embedding of controls in the automated processes make use of all SAP capabilities in this area. Properly defined and designed, these controls can manage workflow through automation.
Helden, Peter van / Ligthart, Andre | 1997
48
Cryptographic Security: Origins, Development, and Applications
Jamieson, Rodger / Hayes, John | 1994
49
Reading List
| 1995
50
CPE Quiz #48
| 1996
50
Legal Ramifications of a Current Trend: Outsourcing the Internal Audit Function
Broderick, James P. | 1995
50
High-Tech Audits of LANS
Kimbrough Jr, Ralph B. | 1998
51
Features - Implementing and Enhancing Data Security in a PeopleSoft Environment - As companies have sharpened their competitive edges by migrating mission-critical software applications to client-server and intranet environments, security issues have become more complex. The author describes techniques to make the PeopleSoft environment a secure one
Turner, Tom | 1999
52
Resources Available on the Year 2000 A continuation of the listing from Vol. II.
| 1997
52
The Origins of EDP Auditing in North America
Singleton, T. / Flesher, D. L. / Cassidy, J. | 1993
54
Features - Mobile Code Security's Place in the Corporate Network - Mobile code, that which facilitates the use of applications across different computers using the Internet, unless protected, can make security a challenge. Ron Moritz, MBA, CISA, discusses historical attacks and offers solutions to prevent similar assaults in the future
Moritz, Ron | 1999
54
CPE Quiz #42
| 1995
56
Cerfing for Answers: Who is the Father of the Internet? Michael Jason Cangemi searches for information in the steps of his father.
| 1997
57
Security and Control Concerns: Digital Money
Gallegos, Frederick | 1998
57
Special Pull-Out Section -- CobiT Product Content Summary
| 1995
57
PLUS - ISACA Bookstore Offerings
| 1999
57
CPE Quiz #54 Test your knowledge and earn one (1) CPE hour by passing this quiz.
| 1997
60
Index of Journal Articles from 1989 to 1993
| 1994
61
PLUS - ISACA Bookstore Price List
| 1999
63
Career Opportunities - Current job openings
| 1997
64
Dynamic Handwritten Signature Verification System
Kang, Meng-Chow | 1998
64
Research
| 1996
66
Pioneers of EDP Auditing in North America
Singleton, T. / Flesher, D. L. / Cassidy, J. | 1993
71
#59 based on Volume I, the Healthcare Issue
| 1998
73
#60 based on Volume II, the Client-Server Issue
| 1998
75
The History of EDP Audit Literature
Singleton, T. / Flesher, D. L. / Cassidy, J. | 1993
75
Bookstore Listing
| 1998