Establishing a New IS Audit Function (English)
- New search for: Blackburn, Sarah
- New search for: Blackburn, Sarah
In:
IS audit & control journal
;
3
; 14-19
;
1995
-
ISSN:
- Article (Journal) / Print
-
Title:Establishing a New IS Audit Function
-
Contributors:Blackburn, Sarah ( author )
-
Published in:IS audit & control journal ; 3 ; 14-19
-
Place of publication:Rolling Meadows, Ill.
-
Publication date:1995
-
ISSN:
-
ZDBID:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 85.00 / 54.00
- Further information on Basic classification
- New search for: 770/3155
-
Classification:
-
Source:
Table of contents – Volume 3
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Issues & CommentsCangemi, Michael P. et al. | 1995
- 5
-
Issues & Comments: Discussions on GAO approving COSO, Privacy legislation, Top Ten Technologies, Computer Security Day, Automated Newspaper, DSS, and moreCangemi, Michael P. et al. | 1994
- 5
-
Manage your time, your projects, your staff and your future.Cangemi, Michael P. et al. | 1997
- 5
-
Editorial - Issues & Comments - Editor-in-Chief Michael P Cangemi, CISA, CPA, discusses biometrics, a futuristic approach to security. He also lists the AICPA Top Ten Technology PrioritiesCangemi, Michael P. et al. | 1999
- 6
-
Information Technology: Opportunities are Accompanied by New Business RisksVillegas, Miguel O. et al. | 1996
- 7
-
Guest EditorialDeMaio, Harry et al. | 1995
- 8
-
Practical IT AuditingHernandez, Paul Q. et al. | 1998
- 8
-
Information Systems Auditors. are Critical in Shaping Future Assurance Services - The authors explain how to monitor controls between the virtual and real worlds using the CoBIT Framework.Holstrum, Gary L. et al. | 1997
- 9
-
Our Opportunity to Strengthen the IS Audit ProfessionBloemker, Wesley et al. | 1995
- 9
-
IS Security Matters - Processor serial number technology and the dichotomy between security and privacy is discussedRoss, Steven J. et al. | 1999
- 10
-
Computers, Privacy, and Citizens' Rights RevisitedVeeder, Robert N. et al. | 1994
- 10
-
HelpSource Q& ALilly, Fred et al. | 1996
- 11
-
Encryption Plus for Hard Disks(R) protects data on notebooks and PCs by encrypting the information on the local drives| 1998
- 12
-
The Internet: Traffic Gridlock on the Information SuperhighwayKogan, Alexander et al. | 1996
- 12
-
Standards, Statements and Guidelines - Compliance to maintain ISACA member status and compliance for the CISA(R) designation are outlined and the status of ISACA issuances is noted| 1999
- 14
-
Using Internet in CIS Security and Audit Education to Examine a Business ProblemMason, Ida W. et al. | 1994
- 14
-
The Use of Electronic Money in Electronic Commerce TransactionsGarceau, Linda et al. | 1998
- 14
-
Establishing a New IS Audit FunctionBlackburn, Sarah et al. | 1995
- 14
-
Developing an IS Risk Assessment ProcessMcNamee, David et al. | 1996
- 14
-
Automate, Automate, But Proceed with CautionO'Keeffe, J. S. et al. | 1993
- 15
-
Book Reviews - Two books, Establishing a System of Policies and Procedures by Stephen B Page and SAP R-3 Business Blueprint by Thomas Curran are briefly summarizedPage, Stephen B. et al. | 1999
- 16
-
Perspective - A Third Way for Biometric Technology - Joe Rice describes from a personal perspective how necessity became the mother of invention. The result: The BiowatchRice, Joe et al. | 1999
- 18
-
Disaster Recovery Planning - The reviewer, who has varied experience in disaster planning and recovery, describes how this book focuses on computers and communication resources to consider before disaster strikes.Hernandez, Paul Q. et al. | 1997
- 20
-
The Rise and Fall of Strategic PlanningQuick, Bob et al. | 1995
- 20
-
Book Review: Security & Control in an Oracle(R) Environment| 1994
- 20
-
Product Overviews: Action Software International and Search Software America| 1994
- 20
-
Bank Sweeps Up with RACF Administrative ToolHahn, Mark et al. | 1996
- 20
-
Flashback to 1978-82 A look at history.Ross, bv Steven J. et al. | 1997
- 21
-
Features - Successful Audits in New Situations - For the occasion when even technical auditors encounter an audit assignment that is outside their experience, Jennifer Bayuk, CISA, offers solutions to this challenging circumstanceBayuk, Jennifer et al. | 1999
- 21
-
Network Security: Data and Voice CommunicationsChopra, Anu et al. | 1996
- 22
-
Q & A InterviewDahlberg, Patricia et al. | 1996
- 22
-
Control Your Own Destiny or Someone Else WillGoldman, Michael et al. | 1995
- 24
-
Helpsource Q& A - Question and answer column offers a direct response to IS auditors' technical security, audit and control inquiries.Lilly, Fred et al. | 1997
- 25
-
Practical Pointers - Audit and Control of a Year 2000 Era E-mail System - The author discusses security measures for e-mail, the instant and at times, intrepid communicationJohnson, Rhett B. et al. | 1999
- 25
-
Information Protection and Business Process Reengineering| 1995
- 26
-
Is the Virtual Corporation a Reality? The authors explore auditing situations in the realm between virtual and reality.Gallegos, Frederick et al. | 1997
- 28
-
Features - Java and ActiveX Security - Two examples of mobile code Java and ActiveX, and their attendant vulnerabilities are described in detailStearn, Jonathan et al. | 1999
- 28
-
Add Value for Senior Management: Introduce a Business Risk Management ProgramPalmer, Ian et al. | 1996
- 28
-
CPE QUIZ| 1994
- 29
-
What Should We Do About Spreadsheets?Panko, Raymond R. et al. | 1998
- 30
-
Auditing Windows NT - A step-by-step approachHenderson, Stuart et al. | 1997
- 32
-
Evolution of a UK-Sponsored Risk Analysis MethodologyMcLean, Kevin et al. | 1996
- 33
-
The Impact of Computers on PrivacyPage, Tammy et al. | 1994
- 35
-
International Aspects of the InternetDavis, Dai et al. | 1998
- 36
-
Radical vs. Incremental Improvement| 1995
- 37
-
Control & Audit of SAP R-3 - IS auditors should be familiar with the way SAP R-3 logical access security has been set up. Insight and questions are addressed in detail in this article.Haelst, Werner van et al. | 1997
- 38
-
A History of Accounting and Auditing Before EDPFlesher, D. L. et al. | 1993
- 38
-
Perceived Security Threats to Today's Accounting Information Systems: A Survey of CISAsDavis, Charles E. et al. | 1996
- 39
-
The Role of Information Systems Auditors in WebTrustSM AssuranceHunton, James E. et al. | 1998
- 40
-
Reengineering the CorporationThomas, Edwin E. et al. | 1995
- 40
-
An Introduction to the Client-Server EnvironmentCrowell, David et al. | 1994
- 42
-
On-Line Auditing and CryptographyKogan, Alexander et al. | 1996
- 43
-
Radical Reengineering for Internal AuditWescott, Ross et al. | 1995
- 45
-
The Enemy Within -- Y2K Issues Below the Application LevelBaklarz Jr, Ronald R. et al. | 1998
- 45
-
Features - Investigating Pornography on an Organization's Computers - With the rise in use of the Internet, so also has risen the incidence of employee use of the corporate computer for the viewing, or worse, trading of pornography. This article describes the careful steps that must be taken to uncover, and perhaps provide evidence in criminal courtBigler, Mark et al. | 1999
- 46
-
Workflow Management in SAP R-3 - The authors see an eventual reality in which the embedding of controls in the automated processes make use of all SAP capabilities in this area. Properly defined and designed, these controls can manage workflow through automation.Helden, Peter van et al. | 1997
- 48
-
Cryptographic Security: Origins, Development, and ApplicationsJamieson, Rodger et al. | 1994
- 49
-
Reading List| 1995
- 50
-
High-Tech Audits of LANSKimbrough Jr, Ralph B. et al. | 1998
- 50
-
CPE Quiz #48| 1996
- 50
-
Legal Ramifications of a Current Trend: Outsourcing the Internal Audit FunctionBroderick, James P. et al. | 1995
- 51
-
Features - Implementing and Enhancing Data Security in a PeopleSoft Environment - As companies have sharpened their competitive edges by migrating mission-critical software applications to client-server and intranet environments, security issues have become more complex. The author describes techniques to make the PeopleSoft environment a secure oneTurner, Tom et al. | 1999
- 52
-
The Origins of EDP Auditing in North AmericaSingleton, T. / Flesher, D. L. / Cassidy, J. et al. | 1993
- 52
-
Resources Available on the Year 2000 A continuation of the listing from Vol. II.| 1997
- 54
-
CPE Quiz #42| 1995
- 54
-
Features - Mobile Code Security's Place in the Corporate Network - Mobile code, that which facilitates the use of applications across different computers using the Internet, unless protected, can make security a challenge. Ron Moritz, MBA, CISA, discusses historical attacks and offers solutions to prevent similar assaults in the futureMoritz, Ron et al. | 1999
- 56
-
Cerfing for Answers: Who is the Father of the Internet? Michael Jason Cangemi searches for information in the steps of his father.| 1997
- 57
-
Security and Control Concerns: Digital MoneyGallegos, Frederick et al. | 1998
- 57
-
Special Pull-Out Section -- CobiT Product Content Summary| 1995
- 57
-
CPE Quiz #54 Test your knowledge and earn one (1) CPE hour by passing this quiz.| 1997
- 57
-
PLUS - ISACA Bookstore Offerings| 1999
- 60
-
Index of Journal Articles from 1989 to 1993| 1994
- 61
-
Bookstore Listing| 1997
- 61
-
PLUS - ISACA Bookstore Price List| 1999
- 63
-
Career Opportunities - Current job openings| 1997
- 64
-
Dynamic Handwritten Signature Verification SystemKang, Meng-Chow et al. | 1998
- 64
-
Research| 1996
- 66
-
Pioneers of EDP Auditing in North AmericaSingleton, T. / Flesher, D. L. / Cassidy, J. et al. | 1993
- 71
-
#59 based on Volume I, the Healthcare Issue| 1998
- 73
-
#60 based on Volume II, the Client-Server Issue| 1998
- 75
-
The History of EDP Audit LiteratureSingleton, T. / Flesher, D. L. / Cassidy, J. et al. | 1993