journal header

Volume 5, 2015

This Week's Online-Exclusive Feature

Book Review:  IT Auditing and Application Controls for Small and Mid-sized Enterprises
19 August 2015
Reviewed by A. Krista Kivisild, CISA, CA, CPA

Former US President John F. Kennedy said, “The Chinese use two brush strokes to write the word ‘crisis.’ One brush stroke stands for danger; the other for opportunity. In a crisis, be aware of the danger, but recognize the opportunity.” Businesses recognize that they need to take advantage of opportunities to keep growing. And while risk is inevitable, some risk is too great a danger when compared to its associated opportunity, especially for small and midsized enterprises (SMEs) that need to take a more pragmatic approach to ensure they stay afloat in today’s business environment. The risk associated with the IT environment and applications is particularly difficult to communicate to the business as many of the related concepts are not well understood by those outside of the technology realm. Read More >>

Indicates Online-Exclusive Content



This Week's Featured Author Blog

The Necessary Prerequisite When Moving to the Cloud
3 August 2015
Corey Eng

Nearly every company on the planet is thinking about or looking to relocate applications and services to the cloud. With the endless options offered by a rapidly growing list of cloud providers, it is possible to find best-of-breed services and applications from anywhere, at any time and on any device.

But with the sheer amount of information available about the cloud, trying to determine the best way to reach and reside in the cloud is a daunting and overwhelming task.  Read More >>

Indicates Online-Exclusive Content



What's New for Nonmembers

IS Audit Basics Articles

Auditors and Large Software Projects, Part 1: Can Auditors Prevent Project Failure?

Helping Auditees Prepare for an IS/IT Audit

The Soft Skills Challenge

Successful Audits Do Not Just Happen

Perspectives From a Seasoned Practitioner

The Core of IT Auditing


Full Journal Issues

Volume 5, 2014 Mobile Devices

Volume 4, 2014 Governance and Management of Enterprise IT (GEIT)

Volume 3, 2014 Big Data

Volume 2, 2014 The IS Audit Transformation

Volume 1, 2014 Data Privacy

Volume 6, 2013 Security and Compliance