IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 8 - Issue 8, August 2019 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



The Effect Of IT Audit On Security Incidents

[Full Text]

 

AUTHOR(S)

Armend Salihu, Xhemile Berisha - Hoti

 

KEYWORDS

IT Audit, Internal Audit, Security Incidents.

 

ABSTRACT

In this paper we present the effect of implementing IT Audit recommendations on organizations regarding the security incidents. From the data collected, we noted that with the implementation of IT Audit recommendations the security incidents are reduced. From the interviews we have seen that the IT Audit function is considered very important role in the prevention of the organization from security incidents and other cyber-attacks.

 

REFERENCES

[1] D. M. Cannon and G. A. Crowe, "SOA Compliance: Will IT Sabotage Your Efforts?," The Journal of Corporate Accounting and Finance, vol. 15, no. 5, pp. 31-37, 2004.
[2] J. Warren, L. Edelson, X. Parker and R. Thrun, Handbook of IT Auditing, New York: Warren, Gorham & Lamont, 1998.
[3] U. Gelinas, S. Sutton and A. Oran, Accounting Information Systems, Ohio: South-Western College Publishing, 1999.
[4] D. R. Hermanson, M. C. Hill and D. M. Ivancevich, "Information Technology-Related Activities of Internal Auditors," Journal of Information Systems, vol. 14, no. 1, pp. 39-53, 2000.
[5] B. L. Hadden, F. T. DeZoort and D. R. Hermanson, "IT Risk Oversight: The Roles of Audit Committees, Internal Auditors, and External Auditors," Internal Auditing, vol. 18, no. 6, pp. 28-31, 2003.
[6] A. Abu-Musa, "Exploring Perceived Threats of CAIS in Developing Countries: The Case of Saudi Arabia," Managerial Auditing Journal, vol. 21, no. 4, pp. 487-507, 2006.
[7] M. Kayrak, "Information Technology Audit in the Context of Information Criteria," Journal of Turkish Court of Accounts, pp. 143-167, 2012.
[8] IT-Governance-Institute, Board Briefing on IT Governance, 2nd Edition, USA: IT Governance Institute, 2003.
[9] P. Weill and J. W. Ross, IT Governance – How Top Performers Manage IT Decision Rights for Superior Results, Harvard Business School Press, 2004.
[10] D. Radonovic, T. Radonovic, L. Dubravka and M. Sarac, "IT audit in accordance with COBIT standard," in Conference: MIPRO, 2010 Proceedings of the 33rd International Convention, IEEE, 2010.
[11] J. D. Tongren, "Co Active audit: The enhancement audit model," Managerial Finance, vol. 23, no. 12, pp. 44-51, 1997.
[12] Z. Rezaee and A. Reinstein, "The Impact of Emerging Information Technology on Auditing," Managerial Auditing Journal, vol. 18, no. 2, pp. 465-471, 1998.
[13] M. Spremić, "Managing IT Risks by implementing Information System Audit Function: Case of Croatian Large Companies," in 3rd INTERNATIONAL WORKSHOP IN WIRELESS SECURITY TECHNOLOGIES PROCEEDINGS, 2005.
[14] R. Weber, Information systems control and audit, Prentice Hall, 1999.
[15] Z. Panian, Kontrola i revizija informacijskih sustava, 2001.
[16] M. Kayrak, Information Technology Audit and the Practice of the Turkish Court of Accounts, 2014.
[17] M. E. Porter, Competitive Advantage, New York: Free Press, 1988.
[18] I. Solomon and K. Trotman, "Experimental judgment and decision research in auditing: The first 25 years of AOS," Accounting, Organizations and Society, vol. 28, pp. 395-412, 2003.
[19] S. Hass, M. J. Abdolmohammad and P. Burnaby, "The America’s literature review on internal auditing," Managerial Auditing Journal, vol. 21, no. 8, pp. 835-844, 2006.
[20] ISACA, COBIT® 2019 FRAMEWORK: INTRODUCTION & METHODOLOGY, USA: ISACA, 2019.
[21] K. Omoteso, Audit Effectiveness: Meeting the IT Challenge, Brookfield: Gower Publishing Co., 2013.
[22] F. B. Veerankutty, "INFORMATION TECHNOLOGY (IT) RELATED AUDITING IN MALAYSIAN PUBLIC SECTOR: An Empirical Study of National Audit Department of Malaysia," 2010.
[23] T. Beridze, "Information Technology Audit in Georgia," European Scientific Journal, vol. 13, no. 25, pp. 72-93, 2017.
[24] D. Y. Abu, "The impact of accounting information systems on the effectiveness of the internal control system in Jordanian Commercial Banks," University of Jordan, Jordan, 2017.
[25] A. Bo-Hayek, "The role of the accounting information system in the effectiveness of internal control in oil companies in Algeria," University of Qasidi Marbah, Algeria, 2015.
[26] M. Al-Sawaf, "The effect of internal control on the sizing of operational risks in commercial banks," University of Mosul Journal Iraq, 2011.
[27] M. Alshaibi, "Adapting internal control system with a use of IT and its effect on reliability of financial statements," Jordan, Amman: Middle East University, 2011.
[28] M. AL-Sharairi, A. Al-Hosban. and H. Thnaibat, "The impact of the risks of the input of accounting information systems on managerial control, accounting control and internal control in commercial banks in Jordan," International Journal of Business and Management, vol. 13, no. 2, pp. 96-107, 2018.
[29] A. Alhosban and M. Al-Sharairi, "Role of internal auditor in dealing with computer networks technology - Applied study in Islamic banks in Jordan," International Business Research, vol. 10, no. 6, pp. 259-269, 2017.