Verified Document

Annotated Bibliography It Auditing Annotated Bibliography

¶ … US General Accounting Office & National State Auditors Association. "Management Planning Guide for Information Systems Security Auditing." Issued 10 December 2011. Retrieved from http://www.gao.gov/special.pubs/managementpln.pdf This source is a useful reference that can help determine the history and background of IT security and federal government regulation. This report is the first of its kind and can help provide deep background information on the topic at hand.

Spremic, M., Ivanov, M., Jackovic, B. (2012). IT Governance and information system auditing practice in credit institutions in the Republic of Croatia. International Journal of Applied Mathematics and Informatics, 2(6), 2012: 101,109. Retrieved from http://naun.org/multimedia/UPress/ami/16-201.pdf

This source provides a study to base the effectiveness of IT governance. Despite a question of relevance due to the geographical location of the study, the information still holds value because of the questions the article essentially asked. The study focused on financial institutions performance and actions and their reliance on IT governance.

Bekezhanova, A. & Atymaryeva, L. (2011). Development of Database For Expert Systems of Information Security Auditing. Computer Modeling and New Technologies, 2011, 15(4), 52-57. Retrieved from http://www.tsi.lv/RSR/vol15_4/15_4-8.pdf

This source...

The article also discussed how the language of queries Transact SQL is a useful tool.
Baskerville, R. (1993). Information Systems Security Design Methods: Implications for Information Systems Development. ACM Computing Surveys, 25(4), December 1993. Retrieved from http://www.paul- hadrien.info/backup/LSE/IS%20490/baskerville%20risk%20management.pdf

Although this source is twenty years old, there is still some valuable information contained within the pages of this article. The article discussed how the security of information systems is a serious issue because of the rise of computer abuse. The article makes a call for designers to be more security orientated in the design process.

Breisbois, R., Boyd, G., Shadid, Z. (ND). What is IT Governance? And why is it important for the IS auditor. Office of the Auditor General of Canada. Retrieved from http://www.intosaiitaudit.org/intoit_articles/25_p30top35.pdf

This article looks at IT governance from the Canadian Government point-of-view. This article makes national implications for the correct practices of IT security within the Canadian borders. Eventually the article concluded that there are specific steps that need…

Sources used in this document:
This source examines auditing practices from a different type of academic source. This article argued that internal audit activity must be staffed with competent members dedicated to achieving goals. The article claimed that the internal audit activity must assess whether the information technology governance of the organization supports the strategies and objectives.

Melville, N. (2010). Information Systems Innovation for Environmental Sustainability. MIS Quarterly 34(1), March 2010: 1-21. Retrieved from http://www.misq.org/downloadable/download/linkSample/link_id/838/In

This source makes a plea that information systems integration and innovation is essential to the life of any and every organization. The article introduced the Belief action outcome (BAO) framework as an acceptable means to introduce the information technology systems into the larger environment.
Cite this Document:
Copy Bibliography Citation

Related Documents

Curriculum Annotated Bibliography Fullan, Michael
Words: 1824 Length: 7 Document Type: Term Paper

This, in a sense, will be a return to the original set-up of education in the United States. Originally, each school district was given the responsibility of implementing the needed educational reforms to meet their individual and unique needs. However, as the nation grew and became less and less agricultural based, the need for a national protocol became necessary. Yet, today our society is less similar than it was before.

CPA V MBA Annotated Bibliography
Words: 2170 Length: 8 Document Type: Thesis

The article also focuses on the differences in decision making of senior accountants based on the type of education they received vs. The amount of practical experience they had. The article focuses on these issues as it pertained to the value of accounting education and experience in the stock market. Overall this resource is well written and seeks to provide a point-of-view from the epicenter of the finance world

ERP Systems Bibliography Bendoly, E.,
Words: 2900 Length: 10 Document Type: Annotated Bibliography

Ge, L., & Voss, S.. (2009). ERP application in China: An overview. International Journal of Production Economics, 122(1), 501. Of the many challenges of planning, implementing and using ERP systems in China, the two greatest unmet needs of these systems on a consistent basis is business intelligence and data analytics. This analysis evaluates these two unmet needs from the standpoint of their use in supply chains. Included in the analysis is

Scientology Introducing a New Religious Movement, One
Words: 3731 Length: 12 Document Type: Research Paper

Scientology Introducing a New Religious Movement, one must be as objective as possible. I, for instance, could choose to tell you that L. Ron Hubbard founded the Church of Scientology in 1954 and marketed it as an organization for social reform that essentially became the global force it is today, with (young, professional, stylish, racially-diverse) adherents providing positive sound bites on Scientology.org that promote (in naturalistic, community-oriented settings) the religion as

Intelligence Reform Following the Terrorist
Words: 4027 Length: 15 Document Type: Essay

Instead, by transferring budgetary control to the Director of National Intelligence, IRTPA forced the various intelligence agencies to unite under a single, coherent leadership, if only to ensure the continued flow of funds towards their respective projects. As with any government endeavor, the inertia of the Intelligence Community is maintained only so long as ample funds are continually available, so by tethering intelligence agencies' funding to inter-agency cooperation coordination,

International Cooperative Healthcare Model Please Write the
Words: 2419 Length: 6 Document Type: Research Paper

International Cooperative Healthcare Model PLEASE WRITE THE SPEAKERS NOTES. I WILL DEVELOP THE 15 SLIDES FROM THOSE NOTES. THE NOTES MUST SUPPORT THE 15 SLIDES. PLEASE USE MY PREVIOUS PAPERS AS RESOURCES IN ADDITION TO THE BOOKS I HAVE ATTACHED. If you are unsure, please contact me. Resources: Cooperative Delivery Model and Annotated Bibliography assignments; course readings Address potential challenges to your model in the presentation and the feasibility of using your model

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now