Abstracts - faqs.org

Abstracts

Business

Search abstracts:
Abstracts » Business

Managing information technology risk

Article Abstract:

The Canadian Conference on Auditing and Computer Technology Workshop Series for 1996 dwelt on the role that auditors should play for the effective management of information technology. The conference observed that success will be achieved only by those organizations that understand the changes that the 'control landscape' is undergoing and know how these changes should be addressed. However, an informal survey conducted among the conference attendees found that 64% of the respondents showed a lack of leadership in using and managing new technologies.

Author: Scroppo, Fina
Publisher: The Canadian Institute of Chartered Accountants
Publication Name: CA Magazine
Subject: Business
ISSN: 0317-6878
Year: 1996
Data Processing Auditors, Management, Conferences, meetings and seminars, Information technology, Auditors

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Managing the Microcomputer Explosion

Article Abstract:

Microcomputers have many benefits including: productivity improvement; faster and better information; operating efficiency; low cost; portability and easy installation. Microcomputers can serve as backups to one another. But microcomputers often alter traditional structures and roles in an organization. A common problem in microcomputer use is the selection of unsuitable application for automation. Its control is also difficult.

Author: Kidd, H.P., Leung, D.H.
Publisher: The Canadian Institute of Chartered Accountants
Publication Name: CA Magazine
Subject: Business
ISSN: 0317-6878
Year: 1984
Computers, Digital computers, Automation, Industrial productivity, evaluation, Microcomputer, Productivity, Organization Structure, Advantages, Benefits

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


The ethical hack

Article Abstract:

Ethical hackers use the same techniques as hackers to pinpoint the weak points of their client's computer network. In many cases, companies only use the services of ethical hackers after they have suffered a breach of network security.

Author: Melek, Adel, Keong, Victor
Publisher: The Canadian Institute of Chartered Accountants
Publication Name: CA Magazine
Subject: Business
ISSN: 0317-6878
Year: 2000
Data Processing Services, Specialized Computer Services, Information technology services, Prevention, Computer crimes

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA

Similar abstracts:
  • Abstracts: Retirement Planning for Small and Medium-Sized Employers. The more things change ... . Employers: consider change carefully
  • Abstracts: Planning for a fall. The computing iceberg
  • Abstracts: Shares soar on new technology. Buy the shares but not the goods
  • Abstracts: Changes in corporate debt policy: information asymmetry and agency factors. Leverage determinants in the absence of corporate tax system: the case of non-financial publicly traded corporations in Saudi Arabia
  • Abstracts: Maintaining Client Confidence. Computer hardware
This website is not affiliated with document authors or copyright owners. This page is provided for informational purposes only. Unintentional errors are possible.
Some parts © 2025 Advameg, Inc.