{"title":"Neural networks and the auditor","authors":"T. Macguire","doi":"10.1016/S0960-2593(97)87190-X","DOIUrl":"https://doi.org/10.1016/S0960-2593(97)87190-X","url":null,"abstract":"","PeriodicalId":100310,"journal":{"name":"Computer Audit Update","volume":"77 1","pages":"20-24"},"PeriodicalIF":0.0,"publicationDate":"1997-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75285197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An expert system for financial and accounting information system auditing","authors":"J. Akoka, I. Comyn-Wattiau","doi":"10.1016/S0960-2593(97)87189-3","DOIUrl":"https://doi.org/10.1016/S0960-2593(97)87189-3","url":null,"abstract":"","PeriodicalId":100310,"journal":{"name":"Computer Audit Update","volume":"1997 10","pages":"Pages 8-19"},"PeriodicalIF":0.0,"publicationDate":"1997-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0960-2593(97)87189-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90126463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BSA invites you to get legal via LegalWare","authors":"","doi":"10.1016/S0960-2593(97)80005-5","DOIUrl":"https://doi.org/10.1016/S0960-2593(97)80005-5","url":null,"abstract":"","PeriodicalId":100310,"journal":{"name":"Computer Audit Update","volume":"1997 10","pages":"Page 6"},"PeriodicalIF":0.0,"publicationDate":"1997-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0960-2593(97)80005-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90126465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An expert system for financial and accounting information system auditing","authors":"J. Akoka, I. Comyn-Wattiau","doi":"10.1016/S0960-2593(97)87189-3","DOIUrl":"https://doi.org/10.1016/S0960-2593(97)87189-3","url":null,"abstract":"","PeriodicalId":100310,"journal":{"name":"Computer Audit Update","volume":"293 1","pages":"8-19"},"PeriodicalIF":0.0,"publicationDate":"1997-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77169080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Theft of data in cyberspace: Management's role","authors":"August Bequai","doi":"10.1016/S0960-2593(97)87191-1","DOIUrl":"https://doi.org/10.1016/S0960-2593(97)87191-1","url":null,"abstract":"<div><p>Securing data in Cyber-space can frequently prove difficult. It can also prove costly, especially where high-tech security systems are involved. A meaningful data security program must, by necessity, also incorporate an array of personnel safeguards.</p></div>","PeriodicalId":100310,"journal":{"name":"Computer Audit Update","volume":"1997 10","pages":"Pages 25-27"},"PeriodicalIF":0.0,"publicationDate":"1997-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0960-2593(97)87191-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91736745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scanning tool slashes time wasted on year 2000 work","authors":"","doi":"10.1016/S0960-2593(97)80003-1","DOIUrl":"https://doi.org/10.1016/S0960-2593(97)80003-1","url":null,"abstract":"","PeriodicalId":100310,"journal":{"name":"Computer Audit Update","volume":"1997 10","pages":"Page 5"},"PeriodicalIF":0.0,"publicationDate":"1997-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0960-2593(97)80003-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90126466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}