메뉴 건너뛰기




Volumn 14, Issue 5, 2005, Pages 15-28

Sarbanes—oxley and enterprise security: It governance — what it takes to get the job done

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85006687496     PISSN: 1065898X     EISSN: None     Source Type: Journal    
DOI: 10.1201/1086.1065898X/45654.14.5.20051101/91010.4     Document Type: Article
Times cited : (22)

References (28)
  • 2
    • 33645607057 scopus 로고    scopus 로고
    • Sarbanes-oxley: The it dimension
    • Chan, S. (2004). Sarbanes-Oxley: The IT dimension. The Internal Auditor, 61(1), 31-33.
    • (2004) The Internal Auditor , vol.61 , Issue.1 , pp. 31-33
    • Chan, S.1
  • 5
    • 9144267776 scopus 로고    scopus 로고
    • Sarbanes-oxley: Pain or gain?
    • November
    • Cobb, C. G. (2004, November). Sarbanes-Oxley: Pain or gain? Quality Progress, 37(11), 48-52.
    • (2004) Quality Progress , vol.37 , pp. 48-52
    • Cobb, C.G.1
  • 6
    • 85023871638 scopus 로고    scopus 로고
    • Available at http://www. coso.org/Publications/ERM/erm_faq.htm
    • Committee of Sponsoring Organizations. (2005). FAQs for COSO’s Enterprise Risk Management— Integrated Framework. Available at http://www. coso.org/Publications/ERM/erm_faq.htm.
    • (2005) Faqs for COSO’s Enterprise Risk Management
  • 7
    • 10244236477 scopus 로고    scopus 로고
    • Winter). Sarbanes-oxley and it governance: New guidance and it control and compliance
    • Damianides, M. (2005, Winter). Sarbanes-Oxley and IT governance: New guidance and IT control and compliance. Information Systems Management.
    • (2005) Information Systems Management
    • Damianides, M.1
  • 9
    • 33645591692 scopus 로고    scopus 로고
    • November). What will you do in sarbanes- oxley’s second year?”
    • Dittmar, L. (2004, November). What will you do in Sarbanes- Oxley’s second year?” Financial Executive, 20(8), 17-18.
    • (2004) Financial Executive , vol.20 , Issue.8 , pp. 17-18
    • Dittmar, L.1
  • 10
    • 33645605030 scopus 로고    scopus 로고
    • January-february). Fei ceo’s 2005 top 10 financial reporting issues
    • Available at
    • Heffes, E. (2005, January-February). FEI CEO’s 2005 top 10 financial reporting issues. Financial Executive, 21(1). Available at http://www.fei.org
    • (2005) Financial Executive , vol.21 , Issue.1
    • Heffes, E.1
  • 11
    • 33645590626 scopus 로고    scopus 로고
    • Available at http://www. isaca.org
    • Information Systems Audit and Control Association. (2005). About ISACA. Available at http://www. isaca.org
    • (2005) About ISACA
  • 12
    • 25644456506 scopus 로고    scopus 로고
    • Available at http://www.itgi.org
    • IT Governance Institute. (2005a). Board briefing on IT governance. Available at http://www.itgi.org
    • (2005) Board Briefing on IT Governance
  • 15
    • 33645603716 scopus 로고    scopus 로고
    • January-february). Sarbanes-oxley section 404: From practice to best practice
    • Kola, V. (2004, January-February). Sarbanes-Oxley Section 404: From practice to best practice. Financial Executive, 20.
    • (2004) Financial Executive , vol.20
    • Kola, V.1
  • 19
    • 85023884041 scopus 로고    scopus 로고
    • Available at the Microsoft Corporation Web site: http://www.microsoft. com
    • Microsoft Executive Circle. (2004). Motorola case study. Available at the Microsoft Corporation Web site: http://www.microsoft. com
    • (2004) Motorola Case Study
  • 20
    • 2342631845 scopus 로고    scopus 로고
    • Regulation and information security: Can y2k lessons help us?
    • IEEE
    • Mead, N. R., & McGraw, G. (2004). Regulation and information security: Can Y2K lessons help us? In IEEE Security and Privacy, IEEE.
    • (2004) IEEE Security and Privacy
    • Mead, N.R.1    McGraw, G.2
  • 22
    • 33645586567 scopus 로고    scopus 로고
    • Sarbanes-oxley security and risk controls: When is enough enough?
    • Available at the META Group Web site: http://www.metagroup. com
    • Proctor, P. (2004). Sarbanes-Oxley security and risk controls: When is enough enough? In Infusion: Security & Risk Strategies. Available at the META Group Web site: http://www.metagroup. com
    • (2004) Infusion: Security & Risk Strategies
    • Proctor, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.