How to get this document?

Document information


Table of contents – Volume 5

Show all volumes and issues

Tables of content are generated automatically and are based on records of articles contained that are available in the TIB-Portal index. Due to missing records of articles, the volume display may be incomplete, even though the whole journal is available at TIB.

5
Taking A Look Back: Who Is Melissa Chernobyl and Why Is She Doing These Terrible Things? Excerpted and reprinted from IS Audit & Control Journal, volume IV, 1999
| 2009
5
Editorial - Issue & Comments
Cangemi, Michael | 2005
5
Editorial - Issues & Comments - Editor in Chief Michael Cangemi, CISA, CPA, gives his account of this year's Annual General Meeting and the ISACA International Conference, which was held in Paris, France, in June 2001, and included the IT Governance Forum. He goes on to discuss the importance of IT governance and customer relationship management.
| 2001
5
Guest Editorial: Extinction or Renewal -- The CIO at a Crossroad
Sarup, Deepak | 2007
5
Editorial - Issues & Comments
Cangemi, Michael | 2004
5
Guest Editorial: Running IT as a Business: IT Metrics Propel Transformation
Kress, Bob | 2008
5
Editorial - Issues & Comments - Editor-in-Chief Michael P Cangemi, CISA, CPA, discusses an acronym bandied about -- ASP. Application software providers base software utilization on usage, as opposed to wrestling with upgrades and new versions of software
Cangemi, Michael P. | 2000
7
Guest Editorial: The IT Security Professional: Bright Spot in a Dreary Economy
Foote, D. | 2009
8
Loose Lips Sink Chips
Ross, S. | 2002
8
IS Security Matters - The Vanished Perimeter
Ross, Steven J. | 2003
8
The Vanished Perimeter
Ross, S. J. | 2003
8
IS Security Matters - Loose Lips Sink Chips
Ross, Steven | 2002
9
IS Security Matters: Reliable Security
Ross, Steven J. | 2008
9
E-commerce Security-Public Key Infrastructure: Good Practices for Secure Communications
Bria, R. | 2001
9
IS Security Matters: Give 'em the New Razzle-Dazzle
Ross, S. J. | 2005
9
Instant Mess
Ross, S. J. | 2004
9
IS Security Matters: Give 'em the New Razlle-Dazzle
Ross, Steven J. | 2005
9
IS Security Matters: Automating Compliance
Ross, Steven J. | 2007
9
Book Review - E-Commerce Security -- Public Key Infrastructure: Good Practices for Secure Communications - The review discusses the concise and comprehensive manner in which book explains PKI, its relationship to e-commerce and its ability to mitigate certain risks.
Bria, Ricardo | 2001
9
IS Security Matters - Instant Mess
Ross, Steven J. | 2004
10
ISACA Member and CISA Compliance
| 2002
10
What's Your Sign?
Ross, S. J. | 2000
10
Standards, Statements, Guidelines - ISACA Member and CISA Compliance
| 2002
10
IS Security Matters - What's Your Sign? - Steven J Ross, CISA, delves into what a signature, digital or otherwise, actually denotes and-or obligates
Ross, Steven J. | 2000
11
Book Review - Virtual Private Networking -- New Issues For Network Security - The review breaks down the book chapter by chapter. The reviewer describes the book as a guide covering the pre-implementation, implementation and post-implementation phases of a VPN project.
Abdullah, Abdul Hamid Bin | 2001
11
IS Security Matters: Downtime and Data Loss
Ross, Steven J. | 2006
11
DB2 Audit Guideline
Hauck, J. / Likogiorgos, S. / Toth, L. / Wong, B. | 2003
11
Virtual Private Networking-New Issues For Network Security
Abdullah, A. H. B. | 2001
11
IT Audit Basics - Audit of Outsourcing
Sayana, S.Anantha | 2004
11
Audit of Outsourcing
Sayana, S. A. | 2004
12
IT Audit Basics: What Every IT Auditor Should Know About Frauds
Singleton, Tommie W. | 2008
12
IT Governance - Applying IT Governance at Home: Oversight of a Computer Acquisition
Lawton, Lynn | 2002
12
Risks of Customer Relationship Management: A Security, Control and Audit Approach
Ballance, C. | 2003
12
Applying IT Governance at Home: Oversight of a Computer Acquisition
Lawton, L. | 2002
12
IS Security Matters: People Impacting Events
Ross, S.J. | 2009
13
Report from the Year 2000: IS Audit Recruitment
Tuck, R. | 2000
13
IT Audit Basics: What Every IT Auditor Should Know About the New Risk Suite Standards
Singleton, Tommie W. | 2007
13
Perspectives - Report from the Year 2000: IS Audit Recruitment - The president and founder of the world's largest IS audit recruiting firm describes what he sees on the horizon both for auditors and the corporations and organizations that wish to hire them
Tuck, Richard | 2000
13
IT Audit Basics: Auditing IT Service Delivery
Sayana, S.Anantha | 2005
14
IT Governance - Statutory Audit and IT Governance
Guldentops, Erik | 2003
14
Statutory Audit and IT Governance
Guldentops, E. | 2003
14
IT Audit Basics: IT and Privacy Audits
Singleton, T.W. | 2009
15
The Audit Committee Handbook, Third Edition
Emani, S. | 2000
15
Book Reviews - The Audit Committee Handbook, Third Edition - Sarathy Emani, CISA, reviews this book which he describes as containing extensive coverage of statutory standards and guidelines designed for audit committees
Emani, Sarathy | 2000
15
Role-based Access Control (RBAC)
de la Fuente, R. J. | 2004
15
Standards, Statements, Guidelines - ISACA(R) Member and Certification Holder Compliance
| 2008
15
IS Security Matters - Doctor's Orders - Steven J. Ross, CISA, examines the information security architecture laid out in the US Health Insurance Portability and Accountability Act of 1996 (HIPAA) and its implications. He asks the question: Should government in the security architecture business at all? He points out that if the law can be applied to healthcare, it can be applied to any industry and, for that matter, to any country.
Ross, Steven J. | 2001
16
Auditing General and Application Controls
Sayana, S. A. | 2002
16
Investigating Computer-Related Crime
Emani, S. | 2000
16
IT Value: Val IT Framework 2.0 -- Adding Breadth and Depth to the Value Management Road Map
Thorp, John | 2008
16
IT Audit Basics - Auditing General and Application Controls
Sayana, S.Anantha | 2002
16
Book Reviews - Investigating Computer-Related Crime - Also reviewed by Sarathy Emani, CISA, this book is described as being tailored specifically for corporate information systems professionals and investigators and offers a step-by-step approach to understanding and investigating security problems
Emani, Sarathy | 2000
17
IT Audit Basics: What Every IT Auditor Should Know About Project Risk Management
Singleton, Tommie W. | 2006
17
IT Governance - IT Governance and Outsourcing
Parkes, Hugh | 2004
17
IT Governance and Outsourcing
Parkes, H. | 2004
18
ISACA® Member and Certification Holder Compliance
| 2003
18
IT Governance: Using COBIT for IT Control Health Check-up
Rafeq, A. | 2005
18
PLUS - Technical Q & A, Helpsource
Lilly, Fred L. | 2000
18
Standards, Statements, Guidelines - Standards and guidelines for maintaining compliance for both ISACA membership and the CISA(.) designation are outlined and the status of ISACA issuances noted.
| 2001
19
Five Questions With...
Gill, Tom | 2008
20
IT Governance: IS Auditing and Information Privacy Governance: A Natural Fit
Zoladz, Chris | 2008
20
Continuous Auditing and Reporting-The Fourth World Symposium
Williams, P. | 2002
20
Global Perspectives
Towfigh, Orang / Wong, Tom / Chiu, Susanna | 2005
20
Commentary - Continuous Auditing and Reporting -- The Fourth World Symposium
Williams, Paul | 2002
20
Helpsource Q & A
Lilly, Fred L. | 2001
20
IT Value: What Is in Our IT Portfolios?
Guldentops, Erik | 2007
21
IT Value: Value Management -- Responding to the Challenge of Value
Thorp, John | 2006
21
IT Audit Basics - Approach to Auditing Network Security
Sayana, S.Anantha | 2003
21
Perspectives - Your IT Applications Inventory is all in Your Head -- An Observation Related to IT Governance Tools - This article takes a concrete approach to IT governance and cites tangible examples to augment it with specific tools. Ms. Hamaker's article was inspired by her attendance at the first IT Governance Forum held in Denver, CO, USA in July of 1999
Hamaker, Stacey | 2000
21
Identify, Govern and Manage IT Risk, Part 2: Risk IT Framework Structure
Fischer, U. | 2009
21
Your IT Applications Inventory is all in Your Head-An Observation Related to IT Governance Tools
Hamaker, S. | 2000
21
Approach to Auditing Network Security
Sayana, S. A. | 2003
22
Book Review: Stepping Through the IS Audit, 2^n^d Edition By J. L. Bayuk, CISA, CISM
Axelrod, C. W. | 2005
22
Book Review: Stepping Through the IS Audit, 2nd Edition
Bayuk, J.L. / Axelrod, C.Warren | 2005
23
Book Review: Implementing Information Technology Governance: Models, Practices and Cases
Fuente, Reynaldo J.de la | 2008
23
Book Review: Surviving Security -- How to Integrate People, Process and Technology, 2nd Edition
Andress, Amanda / Tsang-Reveche, Christina | 2005
23
The Auditor's Role in IT Governance Daniel Ramos, CISA, CPA, discusses the evolution of the auditor s role and the key position which the auditor has in building a mature IT governance environment that is aligned with the business objectives and supportive of the stakeholders needs
| 2001
23
Book Review: Surviving Security-How to Integrate People, Process and Technology, 2^n^d Edition By Amanda Andress, CISA, CISSP, CPA, SSCP
Tsang-Reveche, C. | 2005
23
IT Governance - The Auditor's Role in IT Governance - Daniel Ramos, CISA, CPA, discusses the evolution of the auditor's role and the key position which the auditor has in building a mature IT governance environment that is aligned with the business objectives and supportive of the stakeholders needs.
Ramos, Daniel | 2001
24
Book Review: OS-390-z-OS: Security, Audit and Control Features
Thingsted, Peter / Villegas, Miguel O. | 2005
24
IT Governance Global Status Report
Steuperaert, Dirk | 2004
24
Global Perspectives: Recent Changes in the Roles of the Board and the C-suite -- An Oceania Perspective
Dodds, Rupert | 2006
24
The Global Status of Electronic Signature Legislation
Shue, Lily | 2002
24
Book Review: OS/390-z/OS: Security, Audit and Control Features By Peter Thingsted, CISA
Villegas, M. O. | 2005
24
Documentation Standards for E-commerce Organisations
Lubbe, Sam | 2003
25
IT Governance: Shifting Governance Roles and Responsibilities: Improving Management Reporting as Part of Corporate and IT Governance
Parkes, Hugh | 2006
25
Book Review: The Handbook of Fraud Deterrence
Kanhere, Vishnu | 2008
26
IT Governance: IT Governance -- Challenges in Implementation From an Asian Perspective
Ramanathan, S. | 2007
26
Perspective - Tackling the Subversive Spreadsheet - The author attempts to address the risks of errors in spreadsheets by providing one organization's experience. He discusses the benefits H.M. Customs & Excise realized after it developed the SPACE (Spreadsheet Auditing Customs & Excise) methodology for risk assessing and spreadsheet testing
Butler, Raymond J. | 2001
26
Tackling the Subversive Spreadsheet
Butler, R. J. | 2001
27
Case Study - Group-Wide Implementation of COBIT Framework - The author describes ways that his employer, the Swiss Life-Rentenanstalt, uses COBIT to achieve its corporate goals
Wiederkehr, Bruno J. | 2000
27
Group-Wide Implementation of CoBIT Framework
Widerkehr, B. J. | 2000
27
Secure and Practical Smart Card Applications
Srinivasan, S. / Levitan, Alan S. | 2003
27
Database Security, Compliance and Audit
Grand, Charles Le / Sarel, Dan | 2008
28
Book Review: Effective Project Management-Traditional, Adaptive, Extreme By Robert K. Wysocki
Rafeq, A. | 2007
28
Sarbanes-Oxley and IT Outsourcing
Shue, Lily | 2004
28
Auditing and Certification of a Public Key Infrastructure
Koorn, Ronald / Walsem, Peter van / Lundin, Mark | 2002
28
Book Review: Effective Project Management -- Traditional, Adaptive, Extreme
Wysocki, Robert K. / Rafeq, A. | 2007
28
Capability Maturity Models and Outsourcing: A Case for Sourcing Risk Management
McKinney, Charles | 2005
29
Demonstrating the Value of CobiT and Val IT IT Governance Practices
De Haes, S. / Van Grembergen, W. / Van Brempt, H. | 2009
31
Managing the Risks of Outsourcing in a Post-Sarbanes World
Benvenuto, Nick / Brand, David | 2004
31
Managing Data Integrity and Accuracy Effectively: The Case for Data Analysis Software
Lobb, R. | 2001
31
Perspective - Managing Data Integrity and Accuracy Effectively: The Case for Data Analysis Software - The author discusses the need for technology that bridges gaps and allows connections across business units and between disparate technologies. gives one organization's account of the use of ACL to help analyze its business practices.
Lobb, Rich | 2001
31
Standards, Statements, Guidelines - Procedures to maintain compliance for both ISACA membership and the CISA designation are outlined and the status of ISACA issuances is noted
| 2000
31
Empirical Research Into Val IT Supports the Use of COBIT
Schaafsma, Siep / Spangenberg, John / Williams, Paul | 2007
32
Audit Trails in an E-commerce Environment
Blanco, Luis | 2002
33
Features - The Changing Role of IS Audit Among the Big Five US-Based Accounting Firms - Survey results spur thought on the swift evolution of the IS audit profession
Bagranoff, Nancy A. / Vendrzyk, Valaria P. | 2000
33
The IT Balanced Scorecard Revisited
Cram, Alec | 2007
33
Assessing and Preventing Risks from E-mail System Use
Braswell, Daniel E. / Harmon, W.Ken | 2003
33
The Changing Role of IS Audit Among the Big Five US-Based Accounting Firms
Bagranoff, N. A. / Vendrzyk, V. P. | 2000
34
Case Study: Reducing the Cost of Sarbanes-Oxley Compliance Through Common Controls
Pfister, John J. | 2006
34
J-SOX Challenge: Efforts to Comply With the New Japanese Regulation
Uehara, Kazuhiro / Yamase, Megumi / Miura, Shun / Tsumakawa, Waka / Funaki, Kenjiro / Takaura, Koji / Ito, Akihiko | 2008
34
Ports and Port Scanning: An Introduction
Moody, B. | 2001
34
Eliminating Today's Costly Outsourcing Operations Challenges
Brasche, Randy | 2004
34
Ports and Port Scanning: An Introduction - An awareness of ports and their use is important to auditors, if they are understand and assist an organization in deploying and using an effective intrusion detection system. This article provides auditors an introduction to what ports are and how they are used to determine Internet connection nerabilities.
Moody, Bob | 2001
35
Outsourcing -- A Risk Management Perspective
Benvenuto, Nicholas A. / Brand, David | 2005
36
Risk Management Strategies for Offshore Application and Systems Development
Bakalov, Rudy | 2004
36
Do You Have a Departmental Writing Manual?
Feierman, J. / Steeves, S. | 2009
36
The Importance of Being Secure: The ROI of Web Site Security
Leonard, Ken | 2003
37
Commentary: Annus Horribilis 2005 -- The Year of Our Discontent: The Fall of the Imperial CEO
Sarup, Deepak | 2006
37
Risk Management in IT Projects
Gaulke, Markus | 2002
37
If Compliance Is So Critical, Why Are We Still Failing Audits? How to Minimize Failure and Make the Audit Process Easier
Bakman, Alex | 2007
38
Control Issues of Using Corporate Web Sites for Public Disclosure
Wong, Antonio / Poon, Pak-Lok | 2008
38
The Impact of Higher Education and Professional Certification on the Careers of Information Systems and Non-Information Systems Auditors
Wier, B. / Hunton, J. E. / Beeler, J. D. | 2000
38
Features - The Impact of Higher Education and Professional Certification on the Careers of Information Systems and Non-Information Systems Auditors - Meeting changes in the audit profession requires preparation and this article examines some of the ways to achieve promotability within one's career track
Wier, Benson / Hunton, James E. / Beeler, Jesse D. | 2000
39
Apache Security Controls and Auditing
Mookhey, K.K. | 2003
39
A Risk-based Approach to Segregation of Duties: Partnering IT and the Business to Meet the Challenges of Global Regulatory Compliance
Adolphson, M. / Greis, J. | 2009
40
Top Three Potential Risks With Outsourcing Information Systems
Wright, Catherine | 2004
41
The Technological Auditor: How Automation Is Changing Auditors' Roles
Kumar, Parimal | 2006
41
Solving the Puzzle of IT for Sarbanes-Oxley: IT's Role in Sarbanes-Oxley Compliance
Rozek, Paul | 2008
41
Presenting Penetration Test Results to Management
Leiman, A. | 2001
41
Auditor Due Care in E-commerce
Wakefield, Robin | 2002
41
Optimising Returns from IT-related Business Investments
Williams, Paul | 2005
41
Presenting Penetration Test Results to Management - Management is routinely bombarded with reports, including penetration reports. Without clear directions and guidelines, a security report on the result of a penetration test may not get the attention it deserves. The article provides guidelines of how to best awaken management regarding the importance of the test and the consequences of not taking action.
Leiman, Amin | 2001
42
Applying CobiT® Framework in Change Management
Kulkarni, M. | 2003
42
Tips and Strategies to Protect Laptops and the Sensitive Data They Contain
Livingston, John | 2007
42
Beyond the Looking Glass: IT Auditors and Client Communications
Ee, C. | 2009
42
Applying COBIT(R) Framework in Change Management
Kulkarni, Madhav | 2003
43
Continuous Auditing: Is It Fantasy or Reality?
ISACA Standards Board | 2002
43
Implementation of ERP Systems: Accounting and Auditing Implications
Bae, Benjamin B. / Ashcroft, Paul | 2004
43
Continuous Auditing: Is It Fantasy or Reality? ISACA Standards Board
| 2002
43
Features - What Recruiters and Staffing Agencies Say about Trends in IS Auditing - This feature comprises views garnered from the field and promotes thought to the question: "IS Auditing and the 21st Century: Are We Prepared?"
| 2000
43
What Recruiters and Staffing Agencies Say about Trends in IS Auditing
| 2000
43
Tools, Techniques and Tips for IT Auditors: Strategies for Complying With Section 404
Grenough, Jerry | 2006
44
Electronically Stored Information and Cyberforensics
Marcella Jr, Albert J. | 2008
45
Beyond Segregation of Duties: IT Audit's Role in Assessing User Access Control Risks
Hare, J.T. | 2009
45
A Hacker Breaks In -- Lessons Learned From a True Story
Wenming, Zhu / Hanhui, Hu / Hao, Wang | 2007
45
Harnessing IT for Secure, Profitable Use - The growing dependence of most organisations on their information systems, coupled with the risks, benefits and opportunities that IT carries, made IT governance an increasingly critical facet of overall governance. Within the IT governance debate, information security issues are taking prominent place.
Guldentops, Erik | 2001
45
Harnessing IT for Secure, Profitable Use
Guldentops, E. | 2001
46
Commentary - Building the IT Organization Balanced Scorecard
Gold, Robert S. | 2003
46
Building the IT Organization Balanced Scorecard
Gold, R. S. | 2003
46
PLUS - CPE Quiz #72
Oringel, Joey | 2000
47
Conflict Resolution
Musaji, Yusuf | 2002
47
Sarbanes-Oxley and Business Process Outsourcing Risk
Musaji, Yusuf | 2005
47
The Soul Searching That Comes With Sole-Sourcing
Bostick, John | 2007
48
SAS 70 for Sarbanes-Oxley Compliance
Coe, Martin | 2006
49
Help Source - Help Source Q&A
Subramaniam, B.Ganapathi | 2004
49
10 Things to Consider When Offshoring Operations
Trivedi, Tejus | 2007
49
Payment Card Industry Data Security Standard in the Real World
Drew, Doug / Nair, Sushila | 2008
49
Overview of Principal IT Evaluation Models: Tools For IT Auditors
Kimpton, C. / Martin, D. | 2001
50
IS Audit and Security Professionals: An Emerging Role in a Changing World Order
Kanhere, S. / Kanhere, V. | 2009
51
Merger and Acquisition: Effective Information Security Depends on Strategic Security Metrics
Gattiker, Urs E. | 2007
51
Overview of Principal IT Evaluation Models: Tools For IT Auditors - As part of a government-wide performance audit of activities related to electronic service delivery in Quebec, research was conducted to identify and analyze evaluation tools used in Canada and in other countries for evaluating and auditing the activities in various areas of information technology. This paper provides a summary of the, surveys's results.
Kimpton, Clarence / Martin, Denys | 2001
51
Streamline ISO 27001 Implementation: Reducing the Time and Effort Required for Compliance
Ramirez, David | 2006
51
CPE Quiz #90, based on volume 3, 2003
Oringel, Joe | 2003
51
CPE Quiz - CPE Quiz #96, based on volume 3, 2004
Oringel, Joe | 2004
51
CPE Quiz #84, Based on Volume 3, 2002
Oringel, Joey | 2002
52
Offshore Application Development Done Right
Bakalov, Rudy / Nanji, Feisal | 2005
53
The Top 10 Compliance Project Challenges and Opportunities
Chandola, Tarun | 2008
53
Embedding Policy Governance Within Business Processes
Mohanty, Bapi | 2006
54
CE Quiz # 78, Based on Volume 3, 2001
Oringel, Joey | 2001
54
Revised ISACA Model Curriculum for IS Audit and Control
Summers, S. | 2009
59
CPE Quiz #107 - Based on Volume 2, 2006
Khan, Kamal | 2006
59
CPE Quiz #120 - Based on Volume 3, 2008
Rafeq, A. | 2008
59
CPE Quiz #102 - Based on Volume 3, 2005
Khan, Kamal | 2005
59
CPE Quiz #114 - Based on Volume 3, 2007
Chan, Sally | 2007
ISACA Bookstore Price List Supplement
| 2005
PLUS - ISACA Bookstare Offerings
| 2000
ISACA Bookstore - ISACA Bookstore Price List Supplement
| 2004
PLUS - ISACA Bookstore Price List
| 2000

Similar titles