51–100 of 1,515 hits
Sort by:
Sort by:
-
Perspectives - Your IT Applications Inventory is all in Your Head -- An Observation Related to IT Governance Tools - This article takes a concrete approach to IT governance and cites tangible examples to augment it with specific tools. Ms. Hamaker's article was inspired by her attendance at the first IT Governance Forum held in Denver, CO, USA in July of 1999
Online Contents | 2000| -
Case Study - The IT Balanced Scorecard - A Roadmap to Effective Governance of a Shared Services IT Organization - This article, written by Ronald Saull, MBA, CSP, Senior Vice President and Chief Information Officer of the Information Services division of Great-West Life, London Life and Investors Group, includes a discussion of the trend for consolidation and the consequent impact on IT operations
Online Contents | 2000| -
Features - The Impact of Higher Education and Professional Certification on the Careers of Information Systems and Non-Information Systems Auditors - Meeting changes in the audit profession requires preparation and this article examines some of the ways to achieve promotability within one's career track
Online Contents | 2000| -
Perspective - IT Governance Roundtables Spur Discussion - This article summarizes the lively and productive discussions that occurred in the UK. The article is sponsored by the IT Governance Institute and is written by an ISACA member who attended the first IT Governance Forum
Online Contents | 2000| -
IT Governance Perspective - IT Governance Can Help Guide Business eCommerce Initiatives - This article explains that with each technological advancement responding vulnerability or security concern. Enterprise managers are called to the task to balance IT benefits, risks and controls. This article sheds light on how to create the balance.
Online Contents | 2000| -
Plus - CPE Quiz #73. Based on Volume 4, 2000, Operating and Manufacturing Systems
Online Contents | 2000| -
Book Reviews - Review of ISACF publication: Control Objectives for Net Centric Technology - Peter Hill, CISA succinctly, yet thoroughly, describes what the potential readers of this four-volume set can expect and how the information imparted will help them in their profession
Online Contents | 2000| -
Book Review - Activity-Based Information Systems - This review, written by Rob G Berkhof, CPA, RI, describes one of the many new books offered through the ISACA Bookstore. This book describes the transformation activity-based costing management is undergoing and puts forth steps for the process of learning and implemention from phase to phase
Online Contents | 2000| -
IS Security Matters - "Fishy Stories" - Steve Ross, CISA, addresses the incongruities in reported figures citing dollar losses to Internet fraud and other crimes, such as violation of software licenses in relation to an auditor's need to use statistics to budget for security
Online Contents | 2000| -
IS Security Matters - Eternal Truth and the Next New Thing - Steven J Ross, CISA, examines the security issues and practices that growing in complexity and importance as a result of the emergence of commerce. Specifically, he makes a case for basing information seen with change as its constant underpinning.
Online Contents | 2000| -
Book Reviews - Investigating Computer-Related Crime - Also reviewed by Sarathy Emani, CISA, this book is described as being tailored specifically for corporate information systems professionals and investigators and offers a step-by-step approach to understanding and investigating security problems
Online Contents | 2000| -
Features - Securing Linux -- Is Open Source Too Open for Its Own Good? - Although Linux can be made to be far more secure than Windows, problems can arise when inexperienced end-users install the operating system and applications inside your organizational infrastructure. Pete Loshin explains the risks and the remedies for Linux security. The article also includes sidebars on the Bastille Linux Project, OpenBSD and Linux firewalls
Online Contents | 2000| -
Features - BSD -- The Other Open Source Unix - While Linux has been garnering media attention, another open source operating system has continued with its many tasks, including helping run many of the Internet's busiest sites. This article contains a brief summary of the history of BSD and its current place in the operating systems world
Online Contents | 2000 -
Features - Creating the Privacy Compilant Organization - The concept of personal information privacy, and the rights of citizens to protect themselves has caused governments to begin to consider enacting personal information privacy legislation. This article addresses the process under which a company can become privacy compliant, adhering to the specific requirements of the legislation under which it operates.
Online Contents | 2001| -
Presenting Penetration Test Results to Management - Management is routinely bombarded with reports, including penetration reports. Without clear directions and guidelines, a security report on the result of a penetration test may not get the attention it deserves. The article provides guidelines of how to best awaken management regarding the importance of the test and the consequences of not taking action.
Online Contents | 2001| -
Features - Cross-Border Privacy Impact Assessments: An Introduction - Organizations doing business in multiple jurisdictions are subject to regulatory and cultural variances on what data are protected, how the data must be protected, and what rights are afforded to the enterprise, the regulators and the individual. The author introduces a cross-border privacy impact assessment model.
Online Contents | 2001| -
Book Review - Claves Para El Gobierno de los Systemas de Informacion - Las notas a este libro presentan como los autores integran informacion sobre controles, planificacion de contingencias, mejora de procesos, tratamiento de recursos humanos, restricciones legales en las organizaciones y el marco de referencia COBIT(R).
Online Contents | 2001| -
Features - Erosion of Trust E-commerce and the Loss of Privacy - The author discusses the differences between personal information and sensitive information and the need to build a consumer s trust and confidence. Furthermore, the article addresses the actions taken by various governments and the e-commerce market itself to protect the consumer.
Online Contents | 2001| -
Features The Center for Internet Security: Global Security Benchmarks for Computers Connected to the Internet - The members of the Center for Internet Security (CIS) develop technical security benchmarks through a global consensus process that brings together industry, government, academia and consultants. Their primary objective is widespread adoption of the benchmarks to improve Internet security worldwide.
Online Contents | 2001|
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.