Editorial - Issues & Comments - Editor-in-Chief Michael P Cangemi, CISA, CPA, discusses IS corporate governance as the infant segment of an emerging standard among IT control community constituencies (Unknown language)

, Rolling Meadows, Ill.; 1999
  • New search for:

Document information


Table of contents – Volume 4

Show all volumes and issues

Tables of content are generated automatically and are based on records of articles contained that are available in the TIB-Portal index. Due to missing records of articles, the volume display may be incomplete, even though the whole journal is available at TIB.

3
Issues & Comments
Cangemi, Michael P. | 1995
5
Editorial - Issues & Comments - Editor-in-Chief Michael P Cangemi, CISA, CPA, discusses IS corporate governance as the infant segment of an emerging standard among IT control community constituencies
| 1999
5
EDITORIAL: Issues & Comments
Cangemi, Michael P. | 1994
6
How to Keep IT Under Control in Today's Business and Technology Environment
Guldentops, Erik | 1996
7
Making Effective Oral Presentations
Golen, S. / Scott, H. | 1992
7
The use of CobiT as a framework and CobiT Advisor
Clifford, Alan P. | 1998
8
Security in the Data Warehouse-Internet Environment
Inmon, William H. | 1997
8
GUEST EDITORIAL: EDP Auditing: The Heights Still Have Not Been Reached
Parker, Robert G. | 1994
9
How IS Internal Controls Contribute to Total Quality Management
Capuder, Lawrence F. / Siegel, Morton T. | 1998
9
IS Security Matters - Who is Melissa Chernobyl and Why is She Doing These Terrible Things? - Lessons learned and questions still unanswered are presented as well as ways to avoid infestation
Ross, Steven J. / Ouah, Emily L. | 1999
9
Use Application Program Change Control to Reduce Your Risks
Dykes Jr, Wyndell C. | 1995
10
HelpSource Q& A
Lilly, Fred | 1996
12
Implications of the Information Age
Walz, A. | 1993
12
Control Objectives for Information and related Technology COBIT
Makosz, Paul / Gelinas, Ulrich | 1996
13
PERSPECTIVES: Information Systems Audit Education
Kneer, Dan / Vyskoc, Jozef / Manson, Dan / Gallegos, Frederick | 1994
13
Case Study - VASCO Data Security Enables Secure Communications Over the Internet - How to balance responsibility to secure data against consumer desire for easy access is the focus of this article
Hoornaert, Frank | 1999
14
The Law of Computer Technology: Rights - Licenses - Liabilities (2nd Edition)
Fordham, Thomas | 1996
14
Internet and EDI in Effective Accounting
Boef, Anthonie den | 1997
15
Using Oracle Tools to Audit Oracle Logical Security
Crider, Wilson | 1998
17
The Internet: Exploring Advertising Opportunities Using the Internet
Kogan, Alexander / Sudit, Ephraim / Vasarhelyi, Miklos | 1996
17
Standards, Statements and Guidelines - Compliance to maintain ISACA member status and compliance for the CISA designation are outlined and the status of ISACA issuances is noted
| 1999
17
Utilizing CAATs to Determine Input Errors
Gillevet, Joe | 1995
19
Flashback to the years 1980 to 1985
Perry, William E. | 1997
20
Plus - Technical Q & A, Helpsource
Lilly, Fred L. | 1999
20
LANs Are Not As Secure As You Think
Glassman, H. N. | 1993
23
Taking the Lead in the Management of Information Systems
Sarup, Deepak | 1997
23
CASE HISTORY: Auditing the Purchase of End-User Computing
Blackburn, Sarah | 1994
24
Security Considerations for E-Mail
Martell, S. | 1993
24
Point of Failure Recovery Plan
Blatnik, Gregory J. | 1998
25
Perspective - What is so Special about Y2K Projects? - The author purports that there has been constant bandying of the Y2K phenomenon, yet makes his case that it should be handled as any other audit project. He also discusses one key difference: An inflexible implementation date
Oliver, Derek J. | 1999
26
A Comparison of Internal Control: COBIT, SAC, COSO and SAS
Colbert, Janet L. / Bowen, Paul | 1996
26
Windows NT 3.5: Guidelines for Security, Audit and Control
Kazin, Joel S. | 1995
27
Separating IT Resources Using CobiT as a Guideline
Taylor, Don | 1997
28
Control and Audit Guidelines for the Millennium Conversion: An Application of the CobiT Model
Grembergen, Wim Van | 1998
28
Managing Data Quality in Client-Server Environments
Bowen, Paul L. / Schneider, Gary P. / Fields, Kent T. | 1995
30
BOOKS, TAPES, AND NEW PRODUCTS
| 1994
31
Techniques for Auditing Novell's NetWare
Crowell, D. A. | 1992
31
Book Reviews - Two books, Corporate Information Management Systems Windows 95 in a Nutshell
Applegate, Lynda M. / McFarlan, F.Warren / McKenney, James L. / O'Reilly, Tim / Mott, Troy | 1999
34
The Evolution of the Internet in Peru
Jáuregui, Kety Lourdes | 1998
34
Features - Middleware Security: CORBA or DCOM? - How security and control are implemented in two competing information systems architectures is the focus of this article
Garceau, Linda R. / Schoeffler, James D. / Fazio, Anthony | 1999
35
Protecting Excel Worksheets
McFadden, Patrick J. | 1997
36
CPE QUIZ
| 1994
36
The Law of Electronic Commerce: EDI, Fax, and E-Mail
| 1993
36
Controlling EDI Environments Consistent with COBIT and COSO
Joseph, Gilbert W. / Engle, Terry J. | 1996
36
Targeting Potential Audit Risk Areas on Radar Graphs
Hunton, James E. / Beeler, Jesse D. | 1995
38
FEATURE ARTICLES: The Evolution of EDP Auditing in North America: 1977 to 1994
Singleton, Tommie / Flesher, Dale L. | 1994
42
Windows NT Security and Auditing
Gauntt, Ann | 1995
42
Eggs in a Basket: Distributing the Risks of Electronic Signatures
Wright, Benjamin | 1996
44
Microcomputer Security - Is Your Organization at Risk?
West, O. D. / Zoladz, C. | 1993
44
Features - Is Auditing: The State of the Profession Going Into the 21st Century - The author provides insights based on a survey and offers additional perspective
Lucy, Richard F. | 1999
47
A Top-Down Approach to Auditing the Management of the Information Systems Function
Capuder, L. F. / Thomas, T. C. | 1992
48
Security in Client-Server: Authentication Issues
Cairo, Lori / Friedberg, Alan | 1995
50
CPE Quiz #49
| 1996
50
Viruses and UNIX - What Computer Viruses Are - And Are Not
Conorich, D. G. | 1993
51
Developments in EDP Audit Education, Research and Literature in North America: 1977 to 1994
Singleton, Tommie / Flesher, Dale L. | 1994
52
Features - The Year 2000 and the Small Business El Año 2000 y Los Pequeños Negocios - This article, presented in both English and Spanish, is a Journal debut and reflects a commitment to run articles in languages other than English
Rodriguez, German | 1999
55
The Israeli "Internal Auditing Act, 1992"
Sebban, Y. E. | 1992
55
CPE Quiz #43
| 1995
56
CPE Quiz #55
| 1997
56
An Analysis of Software Management Controls for Client-Server Architectures
Butler, C. W. / Richardson, G. L. | 1993
58
Features - How to Keep a Private Branch Exchange Safe PBX switches are a favorite target of unscrupulous people. This article presents what can be done to prevent PBX fraud or disruption
Harvel, Murray | 1999
58
Bookstore Listing
| 1997
61
Surrogate and Corresponding File Viruses
Magruder, S. / Lewis, S. X. | 1992
62
Looking Ahead: The Future of the IS Audit and Control Profession
OWen, Laura | 1994
62
Career Opportunities
| 1997
63
Plus - CPE Quiz #65
Oringel, Joey | 1999
64
Research
Erickson, John | 1996
65
Features - New Assurance Service Opportunities for Information Systems Auditors - COBIT 2nd Edition is cited as an important tool for the design and delivery of risk assessment assurance and other critical assurance services
Hunton, James / Holstrum, Gary L. / Frownfelter-Lohrke, Cynthia | 1999
69
How Do Expert and Novice Information Systems Auditors Differ in Domain Knowledge?
Wu, R. C. | 1992
69
ISACA Bookstore Offerings
| 1999
69
Index of Journal Articles in 1994
| 1994
72
The Possible Impact of the COSO Report on an Entity's Internal Audit Function
Rezaee, Z. | 1993
73
ISACA Bookstore Price List
| 1999
Focus on 1999 - Millennium Watch, edited for the International Federation of Accountants by Past International President, Deepak Sarup, will return in a subsequent issue
| 1999