about
Audit Risk, Complex Technology, and Auditing ProcessesWhat’s the Big Deal About Big Data Loss (Actually Theft)?Why We Need Better Reporters to Solve Our Security ProblemsAvoid Critical Audit Errors: Secrets Revealed in Radar and Kids’ Toys—and a Bagel HelpsWhatever Happened to Ipv6?Is Internal Audit the Next Blackberry?Addressing the C-Level Question: How Effectively are Assurance Functions Contributing and Using Automated Analytics?Understanding and Applying Data Mining and Data Analysis TechniquesWhy Risk Assessments FailPhilosophical Dimensions of Information and Ethics in the Internet of Things (IoT) TechnologyTime Is Ripe to Revolutionize the AuditWork, Life, and The ProfessionalAre Boards Flying Blind When it Comes to Enterprise Technology Governance?Governance, Strategic Risk, Internal Audit: What Auditors Need to KnowData Analytics to Assess SAP Financial Business ProcessesIT Governance Assurance and Consulting: A Compelling Need for Today’s IT AuditorsPerforming a Strategic Risk-Based Assessment: Integrating Data Analytics into the Audit UniverseProcurement Fraud Vulnerability: A Case StudyVendor Risk Management Using COBIT 5Are All of Your Customers Profitable and Valuable to You?Demystifying Disclosure Controls: Understanding Them to Effectively Leverage Toward ObjectivesGovernance: The Board and the CIOUnleashing the Power of an Operational AuditThe Culture of Auditing Departments: A Research into the Cultural Characteristics of Different Types of Internal Auditing Departments in the NetherlandsIntegrating Information Security through Total Quality ManagementThe Impact of Hobby Lobby on Compliance EvaluationsApproaching Internal Audits from an Enterprise Risk Management PerspectiveQuantitative Key Risk Indicators: Developing Data-Driven Indicators of Risk to Support the Ongoing Assessment of RiskA Lesson From HIPAA: Adequate Policies and Procedures are Equally as Important for Foreign Corrupt Practices Act ComplianceBoard and C-Suite Driven Assurance: The Dawn of a New EraInternal Auditing in a Culture of AvoidanceWhy Controls Have Become Wasteful, A False Sense of Security, and Dangerously Distracting—and How to Fix itCrafting Board and Committee Agendas: What’s on Your Agenda?The NICE Framework: Why You Need to Understand This Important InitiativeExecutive Perspectives on Top Risks for 2015Building the Foundation for Data AnalyticsBig Data Initiatives: Minimizing Risk and Maximizing Value with GovernanceReducing Identity Theft Using One-Time Passwords and SMSSoftware Quality PerspectivesA Barista, A Shot, and Better Security
P1433
Q55887111-56706C1F-1D1D-4D36-B5ED-B711FBBC6390Q57680122-5C6DF4C7-722C-4704-8F37-98A8096B1C05Q57680126-7385E4F9-8CF6-473D-9877-0FF28B8BDEF8Q57680131-F555334E-1A36-4C60-822A-78859970BC70Q57680135-CADDC432-82F7-475E-BFEA-46A3C8C0349AQ57680139-AF71B25C-0441-453C-91E3-A2963281B418Q57680143-530586C1-F279-494A-BC9F-C97E1E9C2020Q57680147-7B8FC152-6D80-45E0-AD44-0D26CBB8247CQ57680151-412D601A-9735-4C92-9ADE-3465CCE3DE3EQ57680155-7CCD3322-AF9C-4871-9F80-4F35A05F42C5Q57680158-08902A2A-2460-4BF7-B327-EFE42770B3E4Q57680561-EA470362-67DC-47BE-A969-26AB3C9AE12AQ57680564-BA065877-6A65-4E94-B00D-5F11E041A32DQ57680568-10F8B9ED-EA43-4065-BFBA-C430F20B6CE3Q57680572-A7B4DB9A-7A2A-4182-AC79-9A3E5AF36DD0Q57680576-3B47D240-F00C-47C1-94DE-937783B4C5AEQ57680580-F04256A7-C972-4403-ABA3-0048810591BDQ57680584-CB1DF877-7BB3-4EC9-B265-911478A1B871Q57680588-08907DBA-688E-4DD8-A9EB-A649A1CB2D35Q57680592-D060ACFD-5F18-45E3-870A-0E1B340D730CQ57680595-1F63DFF7-8293-42A2-B222-AE55BE0B16D5Q57680599-1D4C4459-8F61-4D29-9F01-B5ADA6F85620Q57680603-EB0F22D8-1F54-4E38-B22F-3DFA459CAE48Q57680606-412B9162-235C-4974-A345-16D98591335EQ57680611-D72CC6C6-C3EF-470F-B88A-D9D9E08F9589Q57680615-6F427ABB-7A89-4B75-AB8E-3C053C96FF92Q57682408-324FC65B-99E0-4AD0-B3DF-64282843DE91Q57682415-6A33103E-BE39-4451-908C-12C188E3F12FQ57682419-74F01765-9867-46D6-93B8-CBD87E30D70CQ57682426-87E56B5C-1B59-449C-A8BC-C16658985F84Q57682430-804E7FE2-F6BD-4CF0-BCAE-FA986ED9F0D8Q57682435-02DAECB8-4FEC-48FE-A94E-5B7B5F1C1505Q57682439-DEDE6040-8697-4166-91CE-B9798777B71EQ57682443-12008CA4-3419-44BA-8846-8FD57B35400EQ57682448-D4F6BF72-55DE-4334-9B59-CD7C19DFD9FAQ57682452-1A6429E3-8DD4-48EA-895F-AF8567D1B9CBQ57682457-8107943B-1C21-4C3E-99D8-B879B07A250FQ57682462-AF3D9DDF-B745-4C53-A3C4-EA360FF2286DQ57682467-EE6EBB48-DEAF-45F0-AC05-595602961B2DQ57682472-2CB920A3-65CB-45FF-99B7-0207D0AC5882
P1433
description
journal
@en
revista científica
@es
rivista scientifica
@it
wetenschappelijk tijdschrift van Taylor & Francis
@nl
wissenschaftliche Fachzeitschrift
@de
name
EDPACS: the EDP audit, control and security newsletter
@ast
EDPACS: the EDP audit, control and security newsletter
@en
EDPACS: the EDP audit, control and security newsletter
@es
EDPACS: the EDP audit, control and security newsletter
@it
EDPACS: the EDP audit, control and security newsletter
@nl
type
label
EDPACS: the EDP audit, control and security newsletter
@ast
EDPACS: the EDP audit, control and security newsletter
@en
EDPACS: the EDP audit, control and security newsletter
@es
EDPACS: the EDP audit, control and security newsletter
@it
EDPACS: the EDP audit, control and security newsletter
@nl
prefLabel
EDPACS: the EDP audit, control and security newsletter
@ast
EDPACS: the EDP audit, control and security newsletter
@en
EDPACS: the EDP audit, control and security newsletter
@es
EDPACS: the EDP audit, control and security newsletter
@it
EDPACS: the EDP audit, control and security newsletter
@nl
P1058
P1156
19700190343
P123
P1476
EDPACS: the EDP audit, control and security newsletter
@en