-
1
-
-
0000702359
-
Decision Support and Expert Systems in Auditing: A Review and Research Directions
-
Abdolmohammadi, M.J., 1987, “Decision Support and Expert Systems in Auditing: A Review and Research Directions”, Accounting and Business Research, Vol. 17, No. 66: 173-85.
-
(1987)
Accounting and Business Research
, vol.17
, Issue.66
, pp. 173-185
-
-
Abdolmohammadi, M.J.1
-
2
-
-
84950626193
-
-
The Institute of Internal Auditors Research Foundation, Altamonte Springs, Florida
-
Albrecht, W., K. Howe., and M. Romney., 1984, Deterring Fraud: The Internal Auditor’s Perspective, The Institute of Internal Auditors Research Foundation, Altamonte Springs, Florida.
-
(1984)
Deterring Fraud: The Internal Auditor’s Perspective
-
-
Albrecht, W.1
Howe, K.2
Romney, M.3
-
3
-
-
0007140959
-
-
Fourth Edition, Prentice-Hall, Sydney
-
Arens, A.A., P.J. Best., G.E.P. Shailer., and J. K. Loebbecke., 1997, Auditing in Australia: an Integrated Approach, Fourth Edition, Prentice-Hall, Sydney.
-
(1997)
Auditing in Australia: An Integrated Approach
-
-
Arens, A.A.1
Best, P.J.2
Shailer, G.E.P.3
Loebbecke, J.K.4
-
4
-
-
84899253388
-
-
2nd edn., Que, Henley on Thames
-
ASAP World Consultancy, 1997, Using SAP R/3, 2nd edn., Que, Henley on Thames.
-
(1997)
Using SAP R/3
-
-
-
5
-
-
0001772218
-
An experimental study of internal control judgements
-
Spring
-
Ashton, R., 1974, “An experimental study of internal control judgements”, Journal of Accounting Research, Vol. 12, No. 1, Spring: 143-57.
-
(1974)
Journal of Accounting Research
, vol.12
, Issue.1
, pp. 143-157
-
-
Ashton, R.1
-
6
-
-
0002549014
-
Descriptive modelling of auditor’s internal control judgements: Replication and extension
-
Spring
-
Ashton, R., and R. Brown., 1980, “Descriptive modelling of auditor’s internal control judgements: replication and extension”, Journal of Accounting Research, Vol. 18, No. 1, Spring: 269-77.
-
(1980)
Journal of Accounting Research
, vol.18
, Issue.1
, pp. 269-277
-
-
Ashton, R.1
Brown, R.2
-
7
-
-
85040419311
-
-
Commonwealth of Australia
-
Australian National Audit Office, 1998, Security and Control for SAP R/3, Commonwealth of Australia.
-
(1998)
Security and Control for SAP R/3
-
-
-
8
-
-
0031144883
-
MIATA: A Machine Independent Audit Trail Analyser
-
May
-
Best, P.J., G. Mohay., and A. Anderson., 1997, “MIATA: A Machine Independent Audit Trail Analyser”, Australian Computer Journal, Vol. 29, No. 2, May: 57-63.
-
(1997)
Australian Computer Journal
, vol.29
, Issue.2
, pp. 57-63
-
-
Best, P.J.1
Mohay, G.2
Anderson, A.3
-
9
-
-
84950229231
-
Expert Systems in Accountancy: A Review of Some Recent Applications
-
Connell, N.A.D., 1987, “Expert Systems in Accountancy: A Review of Some Recent Applications”, Accounting and Business Research, Vol. 17, No. 67: 221-33.
-
(1987)
Accounting and Business Research
, vol.17
, Issue.67
, pp. 221-233
-
-
Connell, N.A.D.1
-
10
-
-
0006025721
-
Identification of Host Audit Data to Detect Attacks on Low-Level IP Vulnerabilities
-
Daniels, T.E., and E.H. Spafford., 1999, “Identification of Host Audit Data to Detect Attacks on Low-Level IP Vulnerabilities”, Journal of Computer Security, Vol. 7, No. 1: 3-35.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.1
, pp. 3-35
-
-
Daniels, T.E.1
Spafford, E.H.2
-
11
-
-
0023294428
-
An Intrusion Detection Model
-
Denning, D.E., 1987, “An Intrusion Detection Model”, IEEE Transactions on Software Engineering, Vol. SE-13, No. 2: 222-32.
-
(1987)
IEEE Transactions on Software Engineering
, vol.SE-13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
13
-
-
0043198932
-
ERP Vendors Look at Rebound After Slowdown
-
14 February
-
Gilbert, A., 2000, “ERP Vendors Look at Rebound After Slowdown”, Informationweek, No. 773, 14 February: 98-100.
-
(2000)
Informationweek
, Issue.773
, pp. 98-100
-
-
Gilbert, A.1
-
14
-
-
0003045704
-
Internal control judgments and effects of experience: Replications and extensions
-
Autumn
-
Hamilton, R., and W. Wright., 1982, “Internal control judgments and effects of experience: replications and extensions”, Journal of Accounting Research, Vol. 20, No. 2, Autumn: 756-65.
-
(1982)
Journal of Accounting Research
, vol.20
, Issue.2
, pp. 756-765
-
-
Hamilton, R.1
Wright, W.2
-
15
-
-
0041137161
-
-
Addison-Wesley, Reading, MA
-
Hellerstein, J.L., D.A. Klein., and K.R. Milliken., 1990, Expert Systems in Data Processing, Addison-Wesley, Reading, MA.
-
(1990)
Expert Systems in Data Processing
-
-
Hellerstein, J.L.1
Klein, D.A.2
Milliken, K.R.3
-
16
-
-
85040410657
-
-
Altamonte Springs, Florida
-
Institute of Internal Auditors, 1997, SAP R/3: Its Use, Control, and Audit, Institute of Internal Auditors Research Foundation, Altamonte Springs, Florida.
-
(1997)
SAP R/3: Its Use, Control, and Audit, Institute of Internal Auditors Research Foundation
-
-
-
17
-
-
0003690982
-
-
technical report, SRI International, Menlo Park, CA
-
Jagannathan, R., T. Lunt., D. Anderson., C. Dodd., F. Gilham., C. Jalali., H. Javitz., P. Neumann., A. Tamaru., and A. Valdes., 1993, “System Design Document: Next-Generation Intrusion Detection Expert System (NIDES)", technical report, SRI International, Menlo Park, CA.
-
(1993)
System Design Document: Next-Generation Intrusion Detection Expert System (NIDES)
-
-
Jagannathan, R.1
Lunt, T.2
Anderson, D.3
Dodd, C.4
Gilham, F.5
Jalali, C.6
Javitz, H.7
Neumann, P.8
Tamaru, A.9
Valdes, A.10
-
18
-
-
33646029915
-
-
McAuliffe, N., D. Wolcott., L. Schaefer., N. Kelem., B. Hubbard., and T. Haley., 1990, “Is Your Computer Being Misused? A Survey of Current Intrusion Detection System Technology”, proceedings of 6th Annual Computer Security Applications Conference, IEEE Computer Society Press, Tucson, Arizona: 260-72.
-
(1990)
Is Your Computer Being Misused? A Survey of Current Intrusion Detection System Technology
, pp. 260-272
-
-
McAuliffe, N.1
Wolcott, D.2
Schaefer, L.3
Kelem, N.4
Hubbard, B.5
Haley, T.6
-
20
-
-
0030643035
-
-
proceedings of the ISOC’97 Symposium on Network and Distributed System Security, San Diego, California
-
Mounji, A., and B. Le Charlier., 1997, “Continuous Assessment of a Unix Configuration: Integrating Intrusion Detection and Configuration Analysis”, proceedings of the ISOC’97 Symposium on Network and Distributed System Security, San Diego, California.
-
(1997)
Continuous Assessment of a Unix Configuration: Integrating Intrusion Detection and Configuration Analysis
-
-
Mounji, A.1
Le Charlier, B.2
-
21
-
-
4444291000
-
-
Wiley, New York
-
Norris, G., I. Wright., J.R. Hurley., J. Dunleavy., and A. Gibson., 1998, SAP: An Executive’s Comprehensive Guide, Wiley, New York.
-
(1998)
SAP: An Executive’s Comprehensive Guide
-
-
Norris, G.1
Wright, I.2
Hurley, J.R.3
Dunleavy, J.4
Gibson, A.5
-
24
-
-
84970207099
-
The influence of segregation of duties on internal control judgements
-
Srinidhi, B., 1994, “The influence of segregation of duties on internal control judgements”, Journal of Accounting, Auditing & Finance, Vol. 9, No. 3: 423-44.
-
(1994)
Journal of Accounting, Auditing & Finance
, vol.9
, Issue.3
, pp. 423-444
-
-
Srinidhi, B.1
-
26
-
-
0011466491
-
-
2nd edn., Prentice-Hall, Englewood Cliffs, NJ
-
Watney, D.A., and P.B.B. Turney., 1990, Auditing EDP Systems, 2nd edn., Prentice-Hall, Englewood Cliffs, NJ.
-
(1990)
Auditing EDP Systems
-
-
Watney, D.A.1
Turney, P.B.B.2
-
28
-
-
84919499210
-
-
Audit Guide No. 5, Australian Accounting Research Foundation, Caulfield, Victoria
-
Wright, M., 1999, Audit Guide No. 5 Auditing in an IT Systems Environment, Australian Accounting Research Foundation, Caulfield, Victoria.
-
(1999)
Auditing in an IT Systems Environment
-
-
Wright, M.1
|