¶ … Internal Control for Information Security: Annotated Bibliography
Making the case for Network Security. (2012, Apr 19). Retrieved from Wikibon Blog:
http://wikibon.org/blog/making-the-case-for-network-security/
This author addresses the central concerns regarding information security in the modern business world using broad strokes to make the importance of network security as a key business operation readily apparent to the reader. As the article is addressed primarily on business managers and other practically interested personnel, the language is a bit too full of professional jargon and other needless complications, however the basic facts that the author lays out and the conclusions drawn from these facts and their relationship are quite straightforward and clear. Though not providing any truly in-depth and concrete data or profound insights, this presents overview information that is directly related to the investigation of network and information security.
Information: Complying with the Safeguards Rule. (n.d.). Retrieved from Bureau of Consumer Protection: http://www.business.ftc.gov/documents/bus54-
Schneider, G.P. (2009). Electronic Commerce Security. In G.P. Schneider,
Electronic Commerce (p. 459). Boston, MA: Cengage Learning.
A chapter in a larger…
US General Accounting Office & National State Auditors Association. "Management Planning Guide for Information Systems Security Auditing." Issued 10 December 2011. Retrieved from http://www.gao.gov/special.pubs/managementpln.pdf This source is a useful reference that can help determine the history and background of IT security and federal government regulation. This report is the first of its kind and can help provide deep background information on the topic at hand. Spremic, M., Ivanov, M., Jackovic, B.
Phishing Spear Phishing and Pharming The following is intended to provide a very brief overview of examples of some the most dangerous and pervasive security risks in the online and networked world. One of the most insidious of identity theft is known as phishing. The term 'phishing' refers to the practice of "fishing for information." This term was originally used to describe "phishing" for credit card numbers and other sensitive information
Ge, L., & Voss, S.. (2009). ERP application in China: An overview. International Journal of Production Economics, 122(1), 501. Of the many challenges of planning, implementing and using ERP systems in China, the two greatest unmet needs of these systems on a consistent basis is business intelligence and data analytics. This analysis evaluates these two unmet needs from the standpoint of their use in supply chains. Included in the analysis is
awarding audit contracts by U.S. government departments and agencies Audit Management Red Rationale for and Objectives of the project main and secondary Desktop or literature search Rationale for Search Methodology LITERATURE/DESKTOP RESEARCH Authoritative sources Desktop Findings Justification for audits Evolving role of auditors Types of audit contracts Understanding the Audit Process Best practices and benchmarking Terminology Case Studies Audit management is a fundamental element in government accountability, control and performance management. Certainly there is justification within the Federal government to conduct audits of contracts for the
Vose, D. (2008). Risk Analysis: A quantitative guide. (3rd ed.). West Sussex, England: John Wiley & Sons, Ltd. The book is written on risk analysis using quantitative methodologies. The book has two parts and chapters are divided into these two parts. The first part is intended to help managers realize the rationale for conducting risk analysiswhereas the second part explains the modeling techniques of risk analysis. First part describes in detail
Public Safety Administration Challenges; Annotated Bibliography Cook, C. (September 1, 2012). The Challenges and Opportunities for Public Safety Communications: The Adams County Case Study. Silicon Flatirons Center On the 23rd of September in the year 2011, scholars, law professionals and members of public safety communications industry were brought together by the Silicon Flatirons Center to discuss issues that faced the industry in the 21st century, both in terms of benefits and challenges
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now