Annotated Bibliography It Auditing Annotated Bibliography

Total Length: 739 words ( 2 double-spaced pages)

Total Sources: 0

Page 1 of 2

US General Accounting Office & National State Auditors Association. "Management Planning Guide for Information Systems Security Auditing." Issued 10 December 2011. Retrieved from http://www.gao.gov/special.pubs/managementpln.pdf

This source is a useful reference that can help determine the history and background of IT security and federal government regulation. This report is the first of its kind and can help provide deep background information on the topic at hand.

Spremic, M., Ivanov, M., Jackovic, B. (2012). IT Governance and information system auditing practice in credit institutions in the Republic of Croatia. International Journal of Applied Mathematics and Informatics, 2(6), 2012: 101,109. Retrieved from http://naun.org/multimedia/UPress/ami/16-201.pdf

This source provides a study to base the effectiveness of IT governance. Despite a question of relevance due to the geographical location of the study, the information still holds value because of the questions the article essentially asked. The study focused on financial institutions performance and actions and their reliance on IT governance.

Bekezhanova, A. & Atymaryeva, L. (2011). Development of Database For Expert Systems of Information Security Auditing. Computer Modeling and New Technologies, 2011, 15(4), 52-57. Retrieved from http://www.tsi.lv/RSR/vol15_4/15_4-8.pdf

This source described a study that was based on the development of database of experts system which will be fully audited information security and will be guided by the information that underlies international standards.

Stuck Writing Your "Annotated Bibliography It Auditing" Annotated Bibliography?

The article also discussed how the language of queries Transact SQL is a useful tool.

Baskerville, R. (1993). Information Systems Security Design Methods: Implications for Information Systems Development. ACM Computing Surveys, 25(4), December 1993. Retrieved from http://www.paul- hadrien.info/backup/LSE/IS%20490/baskerville%20risk%20management.pdf

Although this source is twenty years old, there is still some valuable information contained within the pages of this article. The article discussed how the security of information systems is a serious issue because of the rise of computer abuse. The article makes a call for designers to be more security orientated in the design process.

Breisbois, R., Boyd, G., Shadid, Z. (ND). What is IT Governance? And why is it important for the IS auditor. Office of the Auditor General of Canada. Retrieved from http://www.intosaiitaudit.org/intoit_articles/25_p30top35.pdf

This article looks at IT governance from the Canadian Government point-of-view. This article makes national implications for the correct practices of IT security within the Canadian borders. Eventually the….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Annotated Bibliography It Auditing" (2013, September 06) Retrieved May 6, 2024, from
https://www.aceyourpaper.com/essays/annotated-bibliography-auditing-95703

Latest MLA Format (8th edition)

Copy Reference
"Annotated Bibliography It Auditing" 06 September 2013. Web.6 May. 2024. <
https://www.aceyourpaper.com/essays/annotated-bibliography-auditing-95703>

Latest Chicago Format (16th edition)

Copy Reference
"Annotated Bibliography It Auditing", 06 September 2013, Accessed.6 May. 2024,
https://www.aceyourpaper.com/essays/annotated-bibliography-auditing-95703