- Table View
- List View
IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement
by Dimitris N. ChorafasInformation technology auditing and Sarbanes-Oxley compliance have several overlapping characteristics. They both require ethical accounting practices, focused auditing activities, a functioning system of internal control, and a close watch by the board's audit committee and CEO. Written as a contribution to the accounting and auditing professions
IT Auditing: The Practitioner's Guide to Reliable Information Automation
by Jerald SavinMore than ever, technology is indispensable to business operations and recordkeeping, so people skilled in computer automation — IT auditors — have become an essential part of the financial audit team.This book is a comprehensive guide to the IT audit discipline, and to the impact of abstraction on businesses. Developments including Robotic Process Automation (RPA) and artificial intelligence (AI) mean that businesses are moving from a physical world to an abstracted digital world, increasing reliance on systems, their design, their implementation and on those that oversee and maintain these systems — often parties outside the businesses’ control. Though the implications of these shifts go far beyond IT auditing, this book focuses on what IT auditors need to know in this new environment, such as:• How to understand abstracted services and appropriate internal business controls• How to evaluate situations where physicality has been replaced by abstracted services• How to understand and adapt to the impact of abstracted services on objectives, operations, decision-making, and Risk Management, including changing risk profiles and introducing new risks.In the wake of the Certified Public Accountant (CPA) Evolution project, this book will be an essential resource for readers seeking CPA certification, as well as for business leaders and Risk Management professionals who need to understand the benefits and challenges of ever-increasing automation and its concurrent abstraction of physical reality.
IT Auditing: Using Controls to Protect Information Assets
by Chris Davis Mike Kegerreis Mike SchillerSecure Your Systems Using the Latest IT Auditing Techniques <p><p>Fully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Third Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cybersecurity programs, big data and data repositories, and new technologies are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource.
IT Best Practices: Management, Teams, Quality, Performance, and Projects
by Tom C. WittConsistent success does not happen by chance. It occurs by having an understanding of what is happening in the environment and then having the skills to execute the necessary changes. Ideal for project, IT, and systems development managers, IT Best Practices: Management, Teams, Quality, Performance, and Projects details the skills, knowledge, and a
IT Controlling: From IT cost and activity allocation to smart controlling
by Andreas GadatschIT controlling is established as a tool for controlling information technology. The job description of the IT controller has changed only moderately over a long period of time. It was mainly associated with IT budgeting, IT portfolio management, IT cost planning, accounting and controlling. However, digitalization has brought movement in goals, contents and methods. New topics such as digital strategy management, cloud controlling, data science, etc. are being discussed. The task profile is changing away from pure IT cost analysis to the management of the digitization strategy with a focus on strategic IT portfolio management. Some voices are already talking about "smart controlling" or "digital controlling". This book presents an IT controlling concept for the digital age and explains the relevant methods in a practical way.
IT Convergence and Security 2012
by Kuinam J. Kim Kyung-Yong ChungThe proceedings approaches the subject matter with problems in technical convergence and convergences of security technology. This approach is new because we look at new issues that arise from techniques converging. The general scope of the proceedings content is convergence security and the latest information technology. The intended readership are societies, enterprises, and research institutes, and intended content level is mid- to highly educated personals. The most important features and benefits of the proceedings are the introduction of the most recent information technology and its related ideas, applications and problems related to technology convergence, and its case studies and finally an introduction of converging existing security techniques through convergence security. Overall, through the proceedings, authors will be able to understand the most state of the art information strategies and technologies of convergence security.
IT Convergence and Security: Proceedings of ICITCS 2020 (Lecture Notes in Electrical Engineering #712)
by Kuinam J. Kim Hyuncheol KimThis volume comprises the proceedings of ICITCS 2020. It aims to provide a snapshot of the latest issues encountered in IT convergence and security. The book explores how IT convergence and security is core to most current research, industrial and commercial activities. Topics covered in this volume include machine learning & deep learning, communication and signal processing, computer vision and applications, future network technology, artificial intelligence and robotics, software engineering and knowledge engineering, intelligent vehicular networking and applications, healthcare and wellness, web technology and applications, internet of things, and security & privacy. Through this volume, readers will gain an understanding of the current state-of-the-art information strategies and technologies in IT convergence and security. The book will be of use to researchers in academia, industry and other research institutes focusing on IT convergence and security.
IT Convergence and Security: Proceedings of ICITCS 2021 (Lecture Notes in Electrical Engineering #782)
by Kuinam J. Kim Hyuncheol KimThis book comprises the proceedings of ICITCS 2021. It aims to provide a snapshot of the latest issues encountered in IT convergence and security. The book explores how IT convergence and security are core to most current research, industrial, and commercial activities. Topics covered in this book include machine learning & deep learning, communication and signal processing, computer vision and applications, future network technology, artificial intelligence and robotics, software engineering and knowledge engineering, intelligent vehicular networking and applications, health care and wellness, web technology and applications, Internet of things, and security & privacy. Through this book, readers gain an understanding of the current state-of-the-art information strategies and technologies in IT convergence and security. The book is of use to researchers in academia, industry, and other research institutes focusing on IT convergence and security.
IT Convergence and Services
by James J. Park Hamid Arabnia Hang-Bae Chang Taeshik ShonIT Convergence and Services is proceedings of the 3rd FTRA International Conference on Information Technology Convergence and Services (ITCS-11) and the FTRA International Conference on Intelligent Robotics, Automations, telecommunication facilities, and applications (IRoA-11). The topics of ITCS and IRoA cover the current hot topics satisfying the world-wide ever-changing needs. The ITCS-11 will be the most comprehensive conference focused on the various aspects of advances in information technology convergence, applications, and services. The ITCS-11 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of ITCS. In addition, the conference will publish high quality papers which are closely related to the various theories, modeling, and practical applications in ITCS. The main scope of ITCS-11 is as follows. Computational Science and Applications Electrical and Electronics Engineering and Technology Manufacturing Technology and Services Management Information Systems and Services Electronic Commerce, Business and Management Vehicular Systems and Communications Bio-inspired Computing and Applications IT Medical Engineering Modeling and Services for Intelligent Building, Town, and City The IRoA is a major forum for scientists, engineers, and practitioners throughout the world to present the latest research, results, ideas, developments and applications in all areas of intelligent robotics and automations. The main scope of IRoA-11 is as follows. Intelligent Robotics & Perception systems Automations & Control Telecommunication Facilities Artificial Intelligence The IRoA is a major forum for scientists, engineers, and practitioners throughout the world to present the latest research, results, ideas, developments and applications in all areas of intelligent robotics and automations. The main scope of IRoA-11 is as follows. Intelligent Robotics & Perception systems Automations & Control Telecommunication Facilities Artificial Intelligence
IT Crisisology Casebook: Smart Digitalization for Sustainable Development (Smart Innovation, Systems and Technologies #300)
by Sergey V. ZykovThe book focuses on the real-world case-based crisis management in digital product development. This includes forecasting, responding, and agile engineering/management methods, patterns, and practices for sustainable development. This book introduces a set of case studies for sustainability in management as a blend, the components of which have been carefully selected from a few domains adjacent to digital production such as IT-intensive operation, human resource management, and knowledge engineering, to name a few. The key ingredients of this crisis management framework include information management, tradeoff optimization, agile product development, and knowledge transfer. The case studies this book features will help the stakeholders in understanding and identifying the key technology, business, and human factors that may likely result in a digital production crisis, i.e., critically affect the organization outcomes in terms of successful digitalization and sustainable development. These factors are particularly important for the large-scale applications, typically considered very complex in managerial and technological aspects, and, therefore, specifically addressed by the discipline of IT crisisology.
IT Crisisology Models: Object-Based Optimization for Sustainable Development (Smart Innovation, Systems and Technologies #381)
by Sergey V. ZykovThe book focuses on modeling real-world crisis management in digital product development. This includes models and methods for forecasting, responding, and agile engineering/managing for sustainable product development. This book suggests an approach that contains principles, formal models, and semi-formal practice-oriented methods, patterns and techniques to efficiently manage these crises and provide sustainable development. The book also introduces a set of principles, models, and methods for sustainable management as a blend, the components of which have been carefully selected from a few domains adjacent to digital production such as IT-intensive operation, human resource management, and knowledge engineering, to name a few. The key ingredients of this crisis management framework include smart data modeling, trade-off optimizing, agile product controlling, and knowledge transferring.
IT Crisisology: Models, Methods, Patterns, Practices, Case Studies (Smart Innovation, Systems and Technologies #210)
by Sergey V. ZykovThis book focuses on crisis management in software development which includes forecasting, responding and adaptive engineering models, methods, patterns and practices. It helps the stakeholders in understanding and identifying the key technology, business and human factors that may result in a software production crisis. These factors are particularly important for the enterprise-scale applications, typically considered very complex in managerial and technological aspects and therefore, specifically addressed by the discipline of software engineering. Therefore, this book throws light on the crisis responsive, resilient methodologies and practices; therewith, it also focuses on their evolutionary changes and the resulting benefits.
IT Development in Korea: A Broadband Nirvana? (Routledge Advances in Korean Studies)
by Kwang-Suk LeeThis book investigates the contextual factors that led to Korean society becoming ‘broadband heaven’ — the most wired nation in the world — by scrutinizing the historical contexts surrounding the Korean Information Infrastructure (KII) project (1995–2005), which aimed to establish a nationwide high-speed backbone network, as well as its later evolution, which involved redesigning the public infrastructure. The book details the hidden mechanisms and the real elements of building the ‘broadband heaven’: the global constraints conditioning its telecom policies, the dense state–capital linkages, and the bureaucratic desire for social control. It draws on the state-in-society approach to analyze the deformations caused by the symbiosis between the state and big business in implementing the rosy vision of the broadband network. This book provides insights into how to formulate future telecom policies along much more democratically participatory lines while restraining the overwhelming power of the telecom oligopolies and conglomerates. It stands alone as a comprehensive study of the recent East Asian model of IT development, written specifically to examine Korea’s socio-historical mechanisms for promoting physical speed and broadband mobility. This book will be important reading to anyone interested in Korean Studies, Information Technology and I.T. Development.
IT Disaster Recovery Planning For Dummies
by Peter H. Gregory Philip Jan RothsteinIf you have a business or a nonprofit organization, or if you're the one responsible for information systems at such an operation, you know that disaster recovery planning is pretty vital. But it's easy to put it off. After all, where do you start?IT Disaster Recovery Planning For Dummies shows you how to get started by creating a safety net while you work out the details of your major plan. The right plan will get your business back on track quickly, whether you're hit by a tornado or a disgruntled employee with super hacking powers. Here's how to assess the situation, develop both short-term and long-term plans, and keep your plans updated.This easy-to-understand guide will help youPrepare your systems, processes, and people for an organized response to disaster when it strikesIdentify critical IT systems and develop a long-range strategySelect and train your disaster recovery teamConduct a Business Impact AnalysisDetermine risks to your business from natural or human-made causesGet management supportCreate appropriate plan documentsTest your planSome disasters get coverage on CNN, and some just create headaches for the affected organization. With IT Disaster Recovery Planning For Dummies, you'll be prepared for anything from hackers to hurricanes!
IT Disaster Response
by Greg D. MooreLearn how to develop solutions to handle disasters both large and small. Real-world scenarios illustrate the importance of disaster response (DR) planning.IT Disaster Response takes a different approach to IT disaster response plans. Rather than focusing on details such as what hardware you should buy or what software you need to have in place, the book focuses on the management of a disaster and various management and communication tools you can use before and during a disaster.This book examines disasters in general—a compilation of lessons the author learned over the course of years working in IT, reviewing plane crashes, and his experiences as a cave rescuer and cave rescue instructor. Although at first it may seem that none of these are really related, the truth is they all have elements in common. In each case, the unexpected has happened. Just as not all plane crashes are deadly, not all IT mishaps have terrible consequences. With the proper training and approach, many problems can either be avoided in the first place or better handled if they do arise.The book contains practical guidance on:How to think about a disaster both before it happens and while it’s happeningHow to apply management skills used in other fields during disastersHow to get everyone on board when it comes to planning for and handling disastersHow to better deal with smaller, more manageable—and more frequently occurring—disastersWhat you’ll learn Discover the difference between a DR solution and a DR planDefine a disaster — it’s not always of the scale of a fire burning down the building.See when to actually implement your DR plan Who This Book Is ForIT professionals in charge of developing their company’s disaster recovery plan who also need to raise issues to the required C-level people to make sure they have a viable plan.
IT Enabled Services
by Shiro UesugiAs the global economy turns more and more service oriented, Information Technology-Enabled Services (ITeS) require greater understanding. Increasing numbers and varieties of services are provided through IT. Furthermore, IT enables the creation of new services in diverse fields previously untouched. Because of the catalyzing nature of internet technology, ITeS today has become more than "Outsourcing" of services. This book illustrates the enabling nature of ITeS with its entailment of IT, thus contributing to the betterment of humanity. The scope of this book is not only for academia but also for business persons, government practitioners and readers from daily lives. Authors from a variety of nations and regions with various backgrounds provide insightful theories, research, findings and practices in various fields such as commerce, finance, medical services, government and education. This book opens up a new horizon with the application of Internet-based practices in business, government and in daily lives. Information Technology-Enabled Services works as a navigator for those who sail to the new horizon of service oriented economies.
IT Essentials Companion Guide v6
by Cisco Networking Cisco Networking AcademyIT Essentials v6 Companion Guide supports the Cisco Networking Academy IT Essentials version 6 course. The course is designed for Cisco Networking Academy students who want to pursue careers in IT and learn how computers work, how to assemble computers, and how to safely and securely troubleshoot hardware and software issues.
IT Governance
by Alan Calder Steve WatkinsThe development of IT governance - which recognises the convergence between business practicve and IT management - makes it essential for managers at all levels, and in organizations of all sizes, to understand how best to deal with information security risk. The new edition has been full updated to take account of the latest regulatory and technological developments, including the creation of the International Board for IT Governance Qualifications. IT Governance also includes new material on key international markets - including the UK and the US, Australia and South Africa.
IT Governance
by Alan Calder Steve WatkinsFaced with constant and fast-evolving threats to information security and with a growing exposure to cyber risk, managers at all levels and in organizations of all sizes need a robust IT governance system. Now in its sixth edition, the bestselling IT Governance provides best-practice guidance for companies looking to protect and enhance their information security management systems and protect themselves against cyber threats. IT Governance has been fully updated to take account of current cyber security and advanced persistent threats and reflects the latest regulatory and technical developments, including the 2013 updates to ISO27001/ISO27002. Changes for this edition include: Full updates throughout in line with the revised ISO27001 standard and accompanying ISO27002 code of practice for information security controls Full coverage of changes to data-related regulations in different jurisdictions and advice on compliance Guidance on the options for continual improvement models and control frameworks made possible by the new standard New developments in cyber risk and mitigation practices The latest technological developments that affect IT governance and security Guidance on the new information security risk assessment process and treatment requirements Including coverage of key international markets including the UK, North America, the EU and Asia Pacific, IT Governance is the definitive guide to implementing an effective information security management and governance system.
IT Governance Bibliography
by Safari Content TeamIT Governance is the control of organizational structures through effective leadership and the hands-on management of organizational policies, processes, and structures that impact information, information-related assets and technology. Fundamentally, IT governance provides guidance to ensure that an information technology organization is performing successfully and that policies, processes and other organizational structures are in place so that essential organizational strategies and objectives are achieved. Organizations with excellent IT governance enjoy improved coordination, communication and alignment of goals throughout the entire enterprise. With effective IT governance, organizations are able to make effective decisions, manage performance and ensure that projects are completed on time and within budget. IT governance also helps to align business and IT strategy while minimizing risk and ensuring that processes comply with industry standards and frameworks. Most of all, IT governance helps organizations improve productivity, quality and achieve success. Follow along in this Safari Books Online bibliography to learn more about all of the IT Governance aspects that have been described here.
IT Governance and Information Security: Guides, Standards, and Frameworks (Advances in Cybersecurity Management)
by Yassine Maleh Mamoun Alazab Abdelkebir Sahid Mustapha BelaissaouiIT governance seems to be one of the best strategies to optimize IT assets in an economic context dominated by information, innovation, and the race for performance. The multiplication of internal and external data and increased digital management, collaboration, and sharing platforms exposes organizations to ever-growing risks. Understanding the threats, assessing the risks, adapting the organization, selecting and implementing the appropriate controls, and implementing a management system are the activities required to establish proactive security governance that will provide management and customers the assurance of an effective mechanism to manage risks. IT Governance and Information Security: Guides, Standards, and Frameworks is a fundamental resource to discover IT governance and information security. This book focuses on the guides, standards, and maturity frameworks for adopting an efficient IT governance and information security strategy in the organization. It describes numerous case studies from an international perspective and brings together industry standards and research from scientific databases. In this way, this book clearly illustrates the issues, problems, and trends related to the topic while promoting the international perspectives of readers. This book offers comprehensive coverage of the essential topics, including: IT governance guides and practices; IT service management as a key pillar for IT governance; Cloud computing as a key pillar for Agile IT governance; Information security governance and maturity frameworks. In this new book, the authors share their experience to help you navigate today’s dangerous information security terrain and take proactive steps to measure your company’s IT governance and information security maturity and prepare your organization to survive, thrive, and keep your data safe. It aspires to provide a relevant reference for executive managers, CISOs, cybersecurity professionals, engineers, and researchers interested in exploring and implementing efficient IT governance and information security strategies.
IT Governance to Drive High Performance: Lessons from Accenture
by Robert E. KressThis pocket guide provides you with an insider's detailed description of Accenture's IT governance policy and details its governance structure. It will show how effective IT governance links IT strategy and IT decisions to Accenture's business strategy and business priorities. Following the best practices approach set out in this pocket guide will serve as an excellent starting point for any organization with ambitions to achieve high performance. Benefits to business include: *Boost productivity* How hard do you work in other areas of your business to cut costs and improve efficiency? In testing economic times, is the absence of a clear strategy for your business s IT governance still a realistic option? Learning from Accenture s proven approach will enable you to increase your organization's competitiveness over the longer term. * Coordinate your operations * To ensure effective decision-making and align your IT function with your broader business goals, you need to make the structure of your IT governance fit your overall corporate governance structure. That way, you can make your IT work for your business. * Manage change effectively * IT is crucial for realizing the changes you want your business to make. For this reason, you cannot afford to have these changes treated merely as IT projects that have been foisted on the company by the IT department. By bringing top management on board, and giving business leaders a formal role in the IT governance of your organization, you will make the success of any project with an IT component much more likely. * Keep a grip on budgets * The costs of IT projects are notoriously prone to overrun, while some IT development programs have promised more than they ever delivered. The Accenture way of doing business is different. Following the Accenture approach means ensuring that your IT investment is backed by a solid business case, and measuring the return on investment following project completion.
IT Governance: A Pocket Guide
by Alan CalderAll businesses that accept payment cards are prey for hackers. When an attack is exposed - perhaps through a victim disputing fraudulent credit card charges - the target company will be exposed to a harsh and expensive set of repercussions. PCI DSS is designed to ensure that merchants are effectively protecting cardholder data. It recognises that not all merchants may have the technical understanding to identify for themselves the necessary steps and short-circuits to avoid danger. All merchants, and their service providers, should therefore ensure that they comply with PCI DSS, and that they stay compliant.
IT Governance: An International Guide to Data Security and ISO 27001/ISO 27002 (It Governance Ser.)
by Alan Calder Steve WatkinsFaced with the compliance requirements of increasingly punitive information and privacy-related regulation, as well as the proliferation of complex threats to information security, there is an urgent need for organizations to adopt IT governance best practice. IT Governance is a key international resource for managers in organizations of all sizes and across industries, and deals with the strategic and operational aspects of information security. Now in its seventh edition, the bestselling IT Governance provides guidance for companies looking to protect and enhance their information security management systems (ISMS) and protect themselves against cyber threats. The new edition covers changes in global regulation, particularly GDPR, and updates to standards in the ISO/IEC 27000 family, BS 7799-3:2017 (information security risk management) and the latest standards on auditing. It also includes advice on the development and implementation of an ISMS that will meet the ISO 27001 specification and how sector-specific standards can and should be factored in. With information on risk assessments, compliance, equipment and operations security, controls against malware and asset management, IT Governance is the definitive guide to implementing an effective information security management and governance system.
IT Governance: Guidelines for Directors
by Alan CalderThis book provides practical guidance to help directors and boards master the most important business topic of the information age. It comes with a complimentary eBook version! This important book cuts through the hype that surrounds IT governance to provide directors, executives, managers and professional advisers with clear, pragmatic guidelines for ensuring that IT and the business work together to ensure enterprise success in the highly competitive, global information economy. Aligning IT with the business is a key objective for boards and executives. Organizations with effective IT governance consistently generate better returns for their shareholders than equivalent organizations with ineffective IT governance, and the directors of companies that effectively govern their IT are significantly less exposed to compliance and shareholder challenges than others. It links IT governance to today's corporate governance environment and assesses the corporate impact t