4,827 research outputs found
Development of Information Technology Auditing Teaching Modules: An Interdisciplinary Endeavor between Seidenberg and Lubin Faculty
The original goals of the project were to develop interdisciplinary Information Technology (IT) Auditing
teaching modules, to be integrated into courses offered by both Business and Information Technology
disciplines during Fall 2009 and Spring 2010. IT Auditing is an interdisciplinary field which requires
understanding audit, control, technology and security concepts in accordance with audit standards,
guidelines, and best practices. Thus, IT Auditing requires interdisciplinary knowledge across IT and
Accounting/Auditing domains. With increasing use of IT in business processes, the demand for IT
Auditors is increasing rapidly, offering a lucrative career path. Acquiring IT Audit related knowledge and
skills will help our students improve their career opportunities by exploring this growing field.
Based upon the curriculum content areas of the CISA Exam as well as the ISACA Model Curriculum, we
proposed the following three interdisciplinary teaching modules for IT Auditing: 1) IT Auditing
Frameworks & Business Continuity; 2) IT Lifecycle Management & Service Delivery; and 3) Protection of
Information Assets.
We had developed the three teaching modules. Each individual module can be covered in one to two
weeks. The entire set of three IT Auditing modules can then be covered in 3-4 weeks of class time. For
each of the individual modules, we had developed presentation slides, reading lists and online quizzes
based on the CISA Exam. We had also identified an overarching case study to be used throughout the
three individual modules for continuity reasons
InfoTech Update, Volume 1, Number 1, Fall 1991
https://egrove.olemiss.edu/aicpa_news/4938/thumbnail.jp
Study of fault-tolerant software technology
Presented is an overview of the current state of the art of fault-tolerant software and an analysis of quantitative techniques and models developed to assess its impact. It examines research efforts as well as experience gained from commercial application of these techniques. The paper also addresses the computer architecture and design implications on hardware, operating systems and programming languages (including Ada) of using fault-tolerant software in real-time aerospace applications. It concludes that fault-tolerant software has progressed beyond the pure research state. The paper also finds that, although not perfectly matched, newer architectural and language capabilities provide many of the notations and functions needed to effectively and efficiently implement software fault-tolerance
Audit implications of EDI; Auditing procedure study;
https://egrove.olemiss.edu/aicpa_guides/1035/thumbnail.jp
Initial flight qualification and operational maintenance of X-29A flight software
A discussion is presented of some significant aspects of the initial flight qualification and operational maintenance of the flight control system softward for the X-29A technology demonstrator. Flight qualification and maintenance of complex, embedded flight control system software poses unique problems. The X-29A technology demonstrator aircraft has a digital flight control system which incorporates functions generally considered too complex for analog systems. Organizational responsibilities, software assurance issues, tools, and facilities are discussed
A system overview of the Aerospace Safety Research and Data Institute data management programs
The NASA Aerospace Safety Information System, is an interactive, generalized data base management system. The on-line retrieval aspects provide for operating from a variety of terminals (or in batch mode). NASIS retrieval enables the user to expand and display (review) the terms of index (cross reference) files, select desired index terms, combine sets of documents corresponding to selected terms and display the resulting records. It also allows the user to print (record) this information on a high speed printer if desired. NASIS also provides the ability to store the strategy of any given session the user has executed. It has a searching and publication ability through generalized linear search and report generating modules which may be performed interactively or in a batch mode. The user may specify formats for the terminal from which he is operating. The system features an interactive user's guide which explains the various commands available and how to use them as well as explanations for all system messages. This explain capability may be extended, without program changes, to include descriptions of the various files in use. Coupled with the ability of NASIS to run in an MTT (multi-terminal task) mode is its automatic accumulation of statistics on each user of the system as well as each file
State of Alaska Election Security Project Phase 2 Report
A laska’s election system is among the most secure in the country,
and it has a number of safeguards other states are now adopting. But
the technology Alaska uses to record and count votes could be improved—
and the state’s huge size, limited road system, and scattered communities
also create special challenges for insuring the integrity of the vote.
In this second phase of an ongoing study of Alaska’s election
security, we recommend ways of strengthening the system—not only the
technology but also the election procedures. The lieutenant governor
and the Division of Elections asked the University of Alaska Anchorage to
do this evaluation, which began in September 2007.Lieutenant Governor Sean Parnell.
State of Alaska Division of Elections.List of Appendices / Glossary / Study Team / Acknowledgments / Introduction / Summary of Recommendations / Part 1 Defense in Depth / Part 2 Fortification of Systems / Part 3 Confidence in Outcomes / Conclusions / Proposed Statement of Work for Phase 3: Implementation / Reference
- …