journal header

Volume 3, 2016

This Week's Online-Exclusive Feature

Maximize Value, Adopt a Flexible Approach to Auditing Major Projects
22 June 2016
Joseph Zipper, CISA, IPRC, PMP

For most organizations, project execution is the primary means of achieving business objectives—such as cost reduction, reorganization, regulatory compliance, expansion of product lines or entrance into new markets—and implementing new or significantly changed systems and processes. Inherent in each of these business objectives is the achievement of a particular value statement or vision—balancing opportunity with the organization’s risk capacity. However, the projects themselves are often costly and can be extraordinarily complex, and successful outcomes are far from guaranteed. Read More >>

Indicates Online-Exclusive Content

 

 


This Week's Featured Author Blog

Social Learning and Security Awareness
20 June 2016
Kerry A. Anderson, CISA, CISM, CGEIT, CRISC, CCSK, CFE, CISSP, CSSLP, ISSAP, ISSMP

A workplace is a social place, and much of the learning that occurs there is social learning. Social learning occurs through observation of other individuals’ actions and behaviors. It is not a mere imitation of the behaviors of others in an environment, but a reasoning process in which the individual examines others’ behaviors and makes conscious decisions about whether to adopt or reject this learning. Social learning occurs continually, although we might not be aware that it is taking place.

One motivation for social learning in the workplace is the individual’s desire to fit into the environment. Read More >>

Indicates Online-Exclusive Content

 

 


What's New for Nonmembers

IS Audit Basics Articles

Auditing IS/IT Risk Management, Part 2

Auditing IS/IT Risk Management, Part 1

Is There Such a Thing as a Bad IS Auditor? Part 2

Is There Such a Thing as a Bad IS Auditor? Part 1

Trust, but Verify

Auditors and Large Software Projects, Part 3

 

Full Journal Issues

Volume 3, 2015 Governance and Management of Enterprise IT (GEIT)

Volume 2, 2015 Opportunities and Challenges of New Technology

Volume 1, 2015 Analytics and Risk Intelligence

Volume 6, 2014 Cybersecurity

Volume 5, 2014 Mobile Devices

Volume 4, 2014 Governance and Management of Enterprise IT (GEIT)