Advances in information technology (IT) present important new organizational risks, and the assessment and management of these risks may involve a variety of groups, including internal auditors, external auditors, in-house IT experts, and outside consultants. To begin to understand how organizations are addressing their IT risks, this exploratory study examines the IT-related activities of one group-internal auditors. Information gathered from over 100 internal audit directors indicates that internal auditors focus primarily on traditional IT risks and controls, such as IT asset safeguarding, application processing, and data integrity, privacy, and security. Much less work is done on system development and acquisition issues. Several factor...
M.Com. (Computer Auditing)Intranets and related technology, can be used to solve many problems in th...
This exploratory study examines the role of the audit committee in overseeing information technology...
Internal Audit Functions (IAFs) are expected to play a critical role in cybersecurity risk managemen...
Many business processes now exist only in electronic form, and organizations face a host of new inf...
With the growing role of information technology (IT), many organizations have incorporated IT govern...
The main objectives this study are to investigate empirically the impact of emerging information tec...
Information Technology has become an essential driver in providing real-time accounting and business...
Advances in information technology (IT) have changed the way that companies conduct business, prepar...
This study examines how governmental internal auditors have adapted to the advancement of informati...
This paper presents research opportunities in the area of information technology (IT) within the con...
ABSTRACT The advancement of information technology is something that cannot be avoided in people's l...
While the relationship between Information Technology (IT) knowledge and integrated internal auditin...
Abstract: IT is an integral part of all organisations and consequently, all organisations should be ...
M.Com. (Computer Auditing)Modern organizations are increasingly dependent on information technology ...
Audit professionals today are becoming wiser in term of detecting audit errors and frauds. Auditor p...
M.Com. (Computer Auditing)Intranets and related technology, can be used to solve many problems in th...
This exploratory study examines the role of the audit committee in overseeing information technology...
Internal Audit Functions (IAFs) are expected to play a critical role in cybersecurity risk managemen...
Many business processes now exist only in electronic form, and organizations face a host of new inf...
With the growing role of information technology (IT), many organizations have incorporated IT govern...
The main objectives this study are to investigate empirically the impact of emerging information tec...
Information Technology has become an essential driver in providing real-time accounting and business...
Advances in information technology (IT) have changed the way that companies conduct business, prepar...
This study examines how governmental internal auditors have adapted to the advancement of informati...
This paper presents research opportunities in the area of information technology (IT) within the con...
ABSTRACT The advancement of information technology is something that cannot be avoided in people's l...
While the relationship between Information Technology (IT) knowledge and integrated internal auditin...
Abstract: IT is an integral part of all organisations and consequently, all organisations should be ...
M.Com. (Computer Auditing)Modern organizations are increasingly dependent on information technology ...
Audit professionals today are becoming wiser in term of detecting audit errors and frauds. Auditor p...
M.Com. (Computer Auditing)Intranets and related technology, can be used to solve many problems in th...
This exploratory study examines the role of the audit committee in overseeing information technology...
Internal Audit Functions (IAFs) are expected to play a critical role in cybersecurity risk managemen...