Governance and Internal Controls for Cutting Edge IT


Book Description

This title explains strategies and techniques to guide IT managers as they implement cutting edge solutions for their business needs. Based on practical experience and real-life models, the author covers key principles and processes for the introduction of new technologies, and examines how to establish an appropriate standard of security and control, particularly in the context of the COBIT(r)5 framework and affiliated standards.




Cutting Edge Internal Auditing


Book Description

Cutting Edge Internal Auditing provides guidance and knowledge for every internal auditor, encouraging each to pioneer new ground in the development of their professional practices in all risk management, control and governance processes. Serving as an excellent reference guide that develops a pattern of internal auditing now and for the future, this book explores the concept of 'cutting edge' internal auditing as an imaginative adventure: demonstrating how this has influenced and will continue to influence the development of professionalism in internal auditing. Built on the foundations of Jeffrey Ridley's extensive internal auditing experience across the public and private sectors, the author uses his articles and research to explore and develop the motivations, goals and categories of innovation in internal auditing today. It develops and brings up to date an imaginative internal auditing model, created and used by the author in the early 1980s, drawing on research and guidance by The Institute of Internal Auditors Inc., its Research Foundation and the Institute of Internal Auditors - UK and Ireland. Each chapter stands alone by focusing on an individual internal auditing theme, considered from both the perspective of internal auditing and its customers to suggest an appropriate vision as a goal for every internal audit activity. Each chapter also includes self-assessment questions to challenge the readers understanding of its messages. Companion website contains some of the author's training slides and seventy case studies, many written by leading internal audit practitioners, this book creates a vision for future cutting edge internal auditing.




QFINANCE: The Ultimate Resource, 4th edition


Book Description

QFINANCE: The Ultimate Resource (4th edition) offers both practical and thought-provoking articles for the finance practitioner, written by leading experts from the markets and academia. The coverage is expansive and in-depth, with key themes which include balance sheets and cash flow, regulation, investment, governance, reputation management, and Islamic finance encompassed in over 250 best practice and thought leadership articles. This edition will also comprise key perspectives on environmental, social, and governance (ESG) factors -- essential for understanding the long-term sustainability of a company, whether you are an investor or a corporate strategist. Also included: Checklists: more than 250 practical guides and solutions to daily financial challenges; Finance Information Sources: 200+ pages spanning 65 finance areas; International Financial Information: up-to-date country and industry data; Management Library: over 130 summaries of the most popular finance titles; Finance Thinkers: 50 biographies covering their work and life; Quotations and Dictionary.




Toward Wiser Public Judgment


Book Description

Polls tell us almost nothing about how people make up their minds.




Evidence-Based Cybersecurity


Book Description

The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a computer, computer networks, or other forms of information communication technology has significantly increased during the last two decades in the USA and worldwide. As a result, cybersecurity scholars and practitioners have developed various tools and policies to reduce individuals' and organizations' risk of experiencing cyber-dependent crimes. However, although cybersecurity research and tools production efforts have increased substantially, very little attention has been devoted to identifying potential comprehensive interventions that consider both human and technical aspects of the local ecology within which these crimes emerge and persist. Moreover, it appears that rigorous scientific assessments of these technologies and policies "in the wild" have been dismissed in the process of encouraging innovation and marketing. Consequently, governmental organizations, public, and private companies allocate a considerable portion of their operations budgets to protecting their computer and internet infrastructures without understanding the effectiveness of various tools and policies in reducing the myriad of risks they face. Unfortunately, this practice may complicate organizational workflows and increase costs for government entities, businesses, and consumers. The success of the evidence-based approach in improving performance in a wide range of professions (for example, medicine, policing, and education) leads us to believe that an evidence-based cybersecurity approach is critical for improving cybersecurity efforts. This book seeks to explain the foundation of the evidence-based cybersecurity approach, review its relevance in the context of existing security tools and policies, and provide concrete examples of how adopting this approach could improve cybersecurity operations and guide policymakers' decision-making process. The evidence-based cybersecurity approach explained aims to support security professionals', policymakers', and individual computer users' decision-making regarding the deployment of security policies and tools by calling for rigorous scientific investigations of the effectiveness of these policies and mechanisms in achieving their goals to protect critical assets. This book illustrates how this approach provides an ideal framework for conceptualizing an interdisciplinary problem like cybersecurity because it stresses moving beyond decision-makers' political, financial, social, and personal experience backgrounds when adopting cybersecurity tools and policies. This approach is also a model in which policy decisions are made based on scientific research findings.




Creative and Innovative Auditing


Book Description

Bringing creativity and innovation into all professions and types of auditing today, this book meets the needs of auditing practices in the future. Recent criticisms of auditing practices by financial regulators, the traditional ‘expectation gaps’ between auditors and auditees and the continuing advances in technology make it even more important today to motivate creativity and innovation in the professions of auditors, be they internal, external, quality, environmental, social, clinical and so on. In Creative and Innovative Auditing, Jeffrey Ridley studies all auditing practices, not just internal auditing, using an innovation model he has developed through research which is applicable to all auditing organisations and professions. He shows how motivating innovation in auditing practices will address the needs of today and tomorrow’s auditing of governance, risk management and control.




Banking Sector Reforms


Book Description

China registered double-digit GDP growth for more than three decades. Recently, the rate has slowed down considerably. The slow growth period, which Chinese policymakers refer to as the 'new-normal', has created enormous curiosity among scholars and policymakers. In particular, scholars often tend to project if China is destined to follow Japan's fate. Insufficient reforms in the banking sector in commensuration with the real economy in Japan resulted in an unprecedented financial catastrophe. Similarly, an asymmetric development between the Chinese banking sector and the real economy is observed. This leads to an interesting question: is China destined to meet Japan's legacy? This Element attempts to answer this question. In so doing, it delves deep into the banking sector reforms of China. The Element concludes that China is not on course to meet an immediate financial chaos, but the country needs further banking reforms to avoid a potential crisis.







ITIL® 4 Essentials: Your essential guide for the ITIL 4 Foundation exam and beyond, second edition


Book Description

ITIL® 4 Essentials contains everything you need to know to pass the ITIL 4 Foundation Certificate, plus more. It covers practices and concepts that are not addressed as part of the Foundation syllabus, making it ideal for newly qualified practitioners. This second edition has been updated to align with amendments to the ITIL® 4 Foundation syllabus.




Who Controls the Internet?


Book Description

Is the Internet erasing national borders? Will the future of the Net be set by Internet engineers, rogue programmers, the United Nations, or powerful countries? Who's really in control of what's happening on the Net? In this provocative new book, Jack Goldsmith and Tim Wu tell the fascinating story of the Internet's challenge to governmental rule in the 1990s, and the ensuing battles with governments around the world. It's a book about the fate of one idea--that the Internet might liberate us forever from government, borders, and even our physical selves. We learn of Google's struggles with the French government and Yahoo's capitulation to the Chinese regime; of how the European Union sets privacy standards on the Net for the entire world; and of eBay's struggles with fraud and how it slowly learned to trust the FBI. In a decade of events the original vision is uprooted, as governments time and time again assert their power to direct the future of the Internet. The destiny of the Internet over the next decades, argue Goldsmith and Wu, will reflect the interests of powerful nations and the conflicts within and between them. While acknowledging the many attractions of the earliest visions of the Internet, the authors describe the new order, and speaking to both its surprising virtues and unavoidable vices. Far from destroying the Internet, the experience of the last decade has lead to a quiet rediscovery of some of the oldest functions and justifications for territorial government. While territorial governments have unavoidable problems, it has proven hard to replace what legitimacy governments have, and harder yet to replace the system of rule of law that controls the unchecked evils of anarchy. While the Net will change some of the ways that territorial states govern, it will not diminish the oldest and most fundamental roles of government and challenges of governance. Well written and filled with fascinating examples, including colorful portraits of many key players in Internet history, this is a work that is bound to stir heated debate in the cyberspace community.