Publication Cover
EDPACS
The EDP Audit, Control, and Security Newsletter
Volume 47, 2013 - Issue 6
557
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

IT Auditing for Modern Technology Management

Pages 1-14 | Published online: 06 Jun 2013
 

Abstract

IT Audit, Security, Compliance, and Assurance professionals work in some of the most challenging areas of technology risk. And today's technologies put a different spin on IT auditing as new technology tools cross traditional boundaries and engender new risks. The Cloud, Social Computing, Mobile Computing, BYOD, Big Data, and Business Intelligence all call for the IT auditor to take an enterprise view of related risks and opportunities.

A company that thrives by being early to deliver new services via technology must regard technology controls as the enablers of those services. That means: Information security controls must no longer be classified as “overhead” but new and incremental costs must be included in the assessments of the costs and benefits for new technology initiatives. Auditors must assess the relationships between an enterprise and its customers, vendors, business associates, stakeholders, regulators, and even competitors. They must understand how new technologies fit into enterprise strategies and objectives, and ensure the new controls provide ongoing evidence that they function effectively, consistently, and continuously across the enterprise.

Notes

1. Stateless, http://whatis.techtarget.com/definition/stateless One description of Stateful and Stateless as applied in programming.

2. See: Erickson, T. (2013). Social computing: What is it and where did it come from?: Social Computing. In Soegaard, Mads and Dam, Rikke Friis (Eds.), The Encyclopedia of Human-Computer Interaction,2nd Ed. Aarhus, Denmark: The Interaction Design Foundation. Retrieved from http://www.interaction-design.org/encyclopedia/social_computing.html

3. SEC says social media OK for company announcements if investors are alerted. Retrieved fromhttp://www.sec.gov/news/press/2013/2013-51.htm?goback=%2Egde_95089_member_229600755,

4. The Institute of Internal Auditors, Inc. Retrieved from www.theiia.org/periodicals (Click on Tone at the Top).

10. See Securing mobile devices, a 2010 white paper. Retrieved from http://www.isaca.org/

11. See note 1.

12. American Society of Clinical Oncology, CancerLinQ—Building a transformation in cancer care. Retrieved from http://www.asco.org/institute-quality/cancerlinq

13. American Society of Clinical Oncology, ASCO completes prototype for CancerLinQ™, marking first demonstration of a “Learning Health System” to transform cancer care,” March 27, 2013. Retrieved from http://www.asco.org/press-center/asco-completes-prototype-cancerlinq%E2%84%A2-marking-first-demonstration-%E2%80%9Clearning-health

14. Kim, G., Behr, K., & Spafford, G. (2013). The Phoenix Project: A novel about IT, DevOps, and helping your business win.Portland, OR: IT Revolution Press, info@itrevolution,net.

15. International Standards for the Professional Practice of Internal Auditing, The Institute of Internal Auditors. Retrieved from www.theiia.org (click on Professional Guidance).

Log in via your institution

Log in to Taylor & Francis Online

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 52.00 Add to cart

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 61.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.