{"title":"Perceptions and realities: the need for risk management programmes","authors":"Stephen Hinde","doi":"10.1016/S0960-2593(97)87188-1","DOIUrl":"https://doi.org/10.1016/S0960-2593(97)87188-1","url":null,"abstract":"","PeriodicalId":100310,"journal":{"name":"Computer Audit Update","volume":"1997 10","pages":"Pages 2-4"},"PeriodicalIF":0.0,"publicationDate":"1997-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0960-2593(97)87188-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91759980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lockheed Martin & NEC biometrie ID alliance","authors":"","doi":"10.1016/S0960-2593(97)80007-9","DOIUrl":"https://doi.org/10.1016/S0960-2593(97)80007-9","url":null,"abstract":"","PeriodicalId":100310,"journal":{"name":"Computer Audit Update","volume":"1997 10","pages":"Page 7"},"PeriodicalIF":0.0,"publicationDate":"1997-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0960-2593(97)80007-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91759982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Expert Systems for Computer and Management Information Systems Auditing","authors":"Isabelle Comn Wattiau, Jacky Akoka","doi":"10.1016/S0960-2593(97)81181-0","DOIUrl":"10.1016/S0960-2593(97)81181-0","url":null,"abstract":"","PeriodicalId":100310,"journal":{"name":"Computer Audit Update","volume":"1997 9","pages":"Pages 17-27"},"PeriodicalIF":0.0,"publicationDate":"1997-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0960-2593(97)81181-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78804690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Conducting A Financial Audit In An Automated Environment","authors":"Michael J. Cerullo, M. Virginia Cerullo","doi":"10.1016/S0960-2593(97)81180-9","DOIUrl":"10.1016/S0960-2593(97)81180-9","url":null,"abstract":"","PeriodicalId":100310,"journal":{"name":"Computer Audit Update","volume":"1997 9","pages":"Pages 8-16"},"PeriodicalIF":0.0,"publicationDate":"1997-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0960-2593(97)81180-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85725212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Why Stealing Proprietary Data Pays: Challenges for Management in Cyber-Space","authors":"August Bequai","doi":"10.1016/S0960-2593(97)81182-2","DOIUrl":"10.1016/S0960-2593(97)81182-2","url":null,"abstract":"<div><p>In closing, data crime can safely be said to be the wave of the future. Databases and not banks, will increasingly attract the attention of criminal cartels. Unlike bank robbers who, if apprehended and prosecuted, stand to face life imprisonment; data criminals rarely ever see the inside of a prison. Management, more than ever, needs to play a role in ensuring that data thefts do not pay.</p></div>","PeriodicalId":100310,"journal":{"name":"Computer Audit Update","volume":"1997 9","pages":"Pages 28-32"},"PeriodicalIF":0.0,"publicationDate":"1997-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0960-2593(97)81182-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76402653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}