Annotated Bibliography It Auditing Annotated Bibliography

PAGES
3
WORDS
739
Cite

¶ … US General Accounting Office & National State Auditors Association. "Management Planning Guide for Information Systems Security Auditing." Issued 10 December 2011. Retrieved from http://www.gao.gov/special.pubs/managementpln.pdf This source is a useful reference that can help determine the history and background of IT security and federal government regulation. This report is the first of its kind and can help provide deep background information on the topic at hand.

Spremic, M., Ivanov, M., Jackovic, B. (2012). IT Governance and information system auditing practice in credit institutions in the Republic of Croatia. International Journal of Applied Mathematics and Informatics, 2(6), 2012: 101,109. Retrieved from http://naun.org/multimedia/UPress/ami/16-201.pdf

This source provides a study to base the effectiveness of IT governance. Despite a question of relevance due to the geographical location of the study, the information still holds value because of the questions the article essentially asked. The study focused on financial institutions performance and actions and their reliance on IT governance.

Bekezhanova, A. & Atymaryeva, L. (2011). Development of Database For Expert Systems of Information Security Auditing. Computer Modeling and New Technologies, 2011, 15(4), 52-57. Retrieved from http://www.tsi.lv/RSR/vol15_4/15_4-8.pdf

This source...

...

The article also discussed how the language of queries Transact SQL is a useful tool.
Baskerville, R. (1993). Information Systems Security Design Methods: Implications for Information Systems Development. ACM Computing Surveys, 25(4), December 1993. Retrieved from http://www.paul- hadrien.info/backup/LSE/IS%20490/baskerville%20risk%20management.pdf

Although this source is twenty years old, there is still some valuable information contained within the pages of this article. The article discussed how the security of information systems is a serious issue because of the rise of computer abuse. The article makes a call for designers to be more security orientated in the design process.

Breisbois, R., Boyd, G., Shadid, Z. (ND). What is IT Governance? And why is it important for the IS auditor. Office of the Auditor General of Canada. Retrieved from http://www.intosaiitaudit.org/intoit_articles/25_p30top35.pdf

This article looks at IT governance from the Canadian Government point-of-view. This article makes national implications for the correct practices of IT security within the Canadian borders. Eventually the article concluded that there are specific steps that need…

Sources Used in Documents:

This source examines auditing practices from a different type of academic source. This article argued that internal audit activity must be staffed with competent members dedicated to achieving goals. The article claimed that the internal audit activity must assess whether the information technology governance of the organization supports the strategies and objectives.

Melville, N. (2010). Information Systems Innovation for Environmental Sustainability. MIS Quarterly 34(1), March 2010: 1-21. Retrieved from http://www.misq.org/downloadable/download/linkSample/link_id/838/In

This source makes a plea that information systems integration and innovation is essential to the life of any and every organization. The article introduced the Belief action outcome (BAO) framework as an acceptable means to introduce the information technology systems into the larger environment.


Cite this Document:

"Annotated Bibliography It Auditing" (2013, September 06) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/annotated-bibliography-it-auditing-95703

"Annotated Bibliography It Auditing" 06 September 2013. Web.25 April. 2024. <
https://www.paperdue.com/essay/annotated-bibliography-it-auditing-95703>

"Annotated Bibliography It Auditing", 06 September 2013, Accessed.25 April. 2024,
https://www.paperdue.com/essay/annotated-bibliography-it-auditing-95703

Related Documents

Authors Note: Rosenbaum is technology and retail analysts. She writes articles for the New York Times and Forbes. Saikali, A. (2013, December 30). The Target Data Breach Lawsuits: Why every Company Should Care. Data Security Law Journal. Retrieved from: http://www.datasecuritylawjournal.com/2013/12/30/the-target-data-breach-lawsuits-why-every-company-should-care/ The article provides insight on the number of lawsuits filed against different organizations and strengthens the need for the companies to protect their information from data breach. The article shows the significant

This, in a sense, will be a return to the original set-up of education in the United States. Originally, each school district was given the responsibility of implementing the needed educational reforms to meet their individual and unique needs. However, as the nation grew and became less and less agricultural based, the need for a national protocol became necessary. Yet, today our society is less similar than it was before.

The article also focuses on the differences in decision making of senior accountants based on the type of education they received vs. The amount of practical experience they had. The article focuses on these issues as it pertained to the value of accounting education and experience in the stock market. Overall this resource is well written and seeks to provide a point-of-view from the epicenter of the finance world

Diversity Audit Proposal
PAGES 2 WORDS 580

Diversity Employment at IBM Proposal Diversity at IBM Selection of Corporation to Research Diversity, Inc. recognizes corporations with awards for workplace diversity, where diversity is defined by a number of characteristics describing employment for all demographics not included in the group with the highest absolute employment and highest earnings (DiversityInc, 2011a). The fifty top companies for employment, earnings, retention and seniority among other categories are compared across demographic characteristics like race and ethnicity;

Ge, L., & Voss, S.. (2009). ERP application in China: An overview. International Journal of Production Economics, 122(1), 501. Of the many challenges of planning, implementing and using ERP systems in China, the two greatest unmet needs of these systems on a consistent basis is business intelligence and data analytics. This analysis evaluates these two unmet needs from the standpoint of their use in supply chains. Included in the analysis is

awarding audit contracts by U.S. government departments and agencies Audit Management Red Rationale for and Objectives of the project main and secondary Desktop or literature search Rationale for Search Methodology LITERATURE/DESKTOP RESEARCH Authoritative sources Desktop Findings Justification for audits Evolving role of auditors Types of audit contracts Understanding the Audit Process Best practices and benchmarking Terminology Case Studies Audit management is a fundamental element in government accountability, control and performance management. Certainly there is justification within the Federal government to conduct audits of contracts for the