Book Description
A technical guide to performing systematic experiments that create more transparency for corporate surveillance and its algorithms.
Author : Isabel Wagner
Publisher : Cambridge University Press
Page : 349 pages
File Size : 22,60 MB
Release : 2022-03-31
Category : Business & Economics
ISBN : 1108837662
A technical guide to performing systematic experiments that create more transparency for corporate surveillance and its algorithms.
Author : Harvey Cardwell
Publisher : R.T. Edwards, Inc.
Page : 384 pages
File Size : 36,21 MB
Release : 2005
Category : Business & Economics
ISBN : 9781930217133
The logic and language of auditing for fraud. This book is a revised and condensed version of the groundbreaking classic in which Cardwell introduces a comprehensive system for detection and deterrence of "inside theft." Inside theft is the fraudulent transfer of value from owners, undertaken by employees for their own benefit or that of their accomplices. Audit surveillance, but one component of this system, is a strategy centered on the books and records of the firm that uses incisive tests of limited scope to detect the evidences of inside theft. In short, it is a risk-based application of the common sense notion that to detect something, one must test for it. Includes both broad accounting theory on employee fraud as well as procedures used by auditors in the detection of complements, fraudulent credits, and certain forms of conversions; such as tests of reasonableness, verification methods (corroborative procedures), conversion surveillance, and oral inquiry.
Author : Jack J. Champlain
Publisher : John Wiley & Sons
Page : 450 pages
File Size : 47,3 MB
Release : 2003-04-01
Category : Business & Economics
ISBN : 0471466298
Have you been asked to perform an information systems audit and don't know where to start? Examine a company's hardware, software, and data organization and processing methods to ensure quality control and security with this easy, practical guide to auditing computer systems--the tools necessary to implement an effective IS audit. In nontechnical language and following the format of an IS audit program, you'll gain insight into new types of security certifications (e.g., TruSecure, CAP SysTrust, CPA WebTrust) as well as the importance of physical security controls, adequate insurance, and digital surveillance systems. Order your copy today!
Author : Robert E. Davis
Publisher : CRC Press
Page : 298 pages
File Size : 19,75 MB
Release : 2021-09-22
Category : Business & Economics
ISBN : 1000416089
"A much-needed service for society today. I hope this book reaches information managers in the organization now vulnerable to hacks that are stealing corporate information and even holding it hostage for ransom." – Ronald W. Hull, author, poet, and former professor and university administrator A comprehensive entity security program deploys information asset protection through stratified technological and non-technological controls. Controls are necessary for counteracting threats, opportunities, and vulnerabilities risks in a manner that reduces potential adverse effects to defined, acceptable levels. This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines. Normative decision theory attempts to establish a rational framework for choosing between alternative courses of action when the outcomes resulting from the selection are uncertain. Through the methodological application, decision theory techniques can provide objectives determination, interaction assessments, performance estimates, and organizational analysis. A normative model prescribes what should exist according to an assumption or rule.
Author : Jack Champlain
Publisher :
Page : 430 pages
File Size : 18,15 MB
Release : 2003
Category : Computer networks
ISBN :
Have you been asked to perform an information systems audit and don't know where to start? Examine a company's hardware, software, and data organization and processing methods to ensure quality control and security with this easy, practical guide to auditing computer systems--the tools necessary to implement an effective IS audit. In nontechnical language and following the format of an IS audit program, you'll gain insight into new types of security certifications (e.g., TruSecure, CAP SysTrust, CPA WebTrust) as well as the importance of physical security controls, adequate insurance, and digital surveillance systems. Order your copy today!
Author : Robert R. Moeller
Publisher : John Wiley & Sons
Page : 696 pages
File Size : 10,56 MB
Release : 2011-04-12
Category : Business & Economics
ISBN : 1118035763
This section discusses IT audit cybersecurity and privacy control activities from two focus areas. First is focus on some of the many cybersecurity and privacy concerns that auditors should consider in their reviews of IT-based systems and processes. Second focus area includes IT Audit internal procedures. IT audit functions sometimes fail to implement appropriate security and privacy protection controls over their own IT audit processes, such as audit evidence materials, IT audit workpapers, auditor laptop computer resources, and many others. Although every audit department is different, this section suggests best practices for an IT audit function and concludes with a discussion on the payment card industry data security standard data security standards (PCI-DSS), a guideline that has been developed by major credit card companies to help enterprises that process card payments prevent credit card fraud and to provide some protection from various credit security vulnerabilities and threats. IT auditors should understand the high-level key elements of this standard and incorporate it in their review where appropriate.
Author : Zella G. Ruthberg
Publisher :
Page : 268 pages
File Size : 19,10 MB
Release : 1977
Category : Auditing
ISBN :
Author : Zella G. Ruthberg
Publisher :
Page : 220 pages
File Size : 13,60 MB
Release : 1980
Category : Computer crimes
ISBN :
Author : Robert F. Dacey
Publisher : DIANE Publishing
Page : 601 pages
File Size : 17,34 MB
Release : 2010-11
Category : Business & Economics
ISBN : 1437914063
FISCAM presents a methodology for performing info. system (IS) control audits of governmental entities in accordance with professional standards. FISCAM is designed to be used on financial and performance audits and attestation engagements. The methodology in the FISCAM incorp. the following: (1) A top-down, risk-based approach that considers materiality and significance in determining audit procedures; (2) Evaluation of entitywide controls and their effect on audit risk; (3) Evaluation of general controls and their pervasive impact on bus. process controls; (4) Evaluation of security mgmt. at all levels; (5) Control hierarchy to evaluate IS control weaknesses; (6) Groupings of control categories consistent with the nature of the risk. Illus.
Author : Robert R. Moeller
Publisher :
Page : 616 pages
File Size : 43,42 MB
Release : 1989-09-06
Category : Business & Economics
ISBN :
Offers comprehensive, up-to-date guidance on new and evolving computer audit, control, and security issues. Each chapter contains both background discussions and sets of control objectives and audit procedures useful for the auditor in performing actual reviews. Since every organization is unique, these objectives and procedures are also included in diskette format so that auditors can tailor them to specific and individual audit projects.