FREE ELECTRONIC LIBRARY - Dissertations, online materials

Pages:     | 1 |   ...   | 14 | 15 ||

«Item type text; Dissertation-Reproduction (electronic) Authors DUNN, THURMAN STANLEY. Publisher The University of Arizona. Rights Copyright © is ...»

-- [ Page 16 ] --

Summary Generalized audit packages such as those discussed above are typically oriented to assisting the internal or external auditor in forming conclusions regarding the acuracy and integrity of systems and their data. The audit traditionally has taken place after the fact, usually including processing for a given period or as of a certain date. This approach assumes, to a large extent, that certain internal controls and audit trails exist. Given that the necessary audit trails do exist, enabling the auditor to track transactions or activities all the way through the system, a fairly precise analysis can be performed.

However, as indicated in Appendix A, many systems today with real-time,

–  –  –

Appendix A will be necessary to evaluate systems with inadequate or suspicious audit trails.


Ackoff, R.L., and Sasieni, M.W. Fundamentals of Operations Research.

New York: John Wiley &Sons, Inc., 1968.

Adams, Donald L., and Mullarkey, John F. "A Survey of Audit Software. II Journal of Accountancy, (September 1972): 39-66 Alderman, Tom. "Computer Crime." Journal of Systems Management, (September 1977): 32-35.

Allen, Brandt R. "Computer Fraud," Financial Executive, VOl. 39 (May 1971): 38-42.

___."Embezzler's Guide to the Computer," Harvard Busines Review, (July 1975): 79-89.

___ • liThe Biggest Computer Frauds: Lessons for.r.PA~s," Journal of Accountancy, Vol. 143 (May 1977): 52-62.

____ • liThe Menace of Computer Fraud," The Office, (August 1979):


Arkin, Herbert. Handbook of samelin g for Auditing and Accounting. New York: McGraw-Hill Book ompany, 1967.

Auerbach. Lessons to be Learned From Computer Fraud. 1978-80.

Bequai, August. Computer Crime. Lexington, Mass: Lexington Books, 1977 • Becker, Jay. "Computer Crime Fighters ••• Go To Boot Camp at FBI Academy," Security World, (September 1978): 30-31.

Boockholdt, J.L. "Prosecution of Computer Crime," Journal of Systems Management, Vol. 29 (December 1978): 6-11.

Comptroller General of the United States. Report to the Congress:

Computer-Related Crimes in Federal Programs. Washington D.C.:

General Accounting Office, April 27, 1976.

Cook, John W., and Winkle, Gary M. Auditing. Boston: Houghton Mifflin Company, 1980.

Davis, Gordon B. Auditing and EDP. American Institute of Certified Public Accountants, 1968.

Dunn, Thurman S. A Pricing Model. Unpublished, 1972.

Elliot, Robert K., and Willingham, John J. Management Fraud:

Detection and Deterrence. New York: Petrocelli Books, Inc., 1980.

Fitzgerald, Jerry. Internal Controls for Computerized Systems.

California: Jerry Fitzgerald and Associates, 1978.

Horne, John M. "EDP Controls to Check Fraud," Management Accounting, Vol. 56 (October 1974): 43-46.

Hsiao, David K., Kerr, Douglas S. and Madnick, Stuart E. Computer Security. New York: Academic Press,. 1979.

Kemeny, John G., Sness, Laurie J., and Thompson, Gerald L.

Introduction to Finite Mathematics. New Jersey: PrenticeHall, Inc., 1966.

Krauss, Leonard I., and MacGahan, Aileen. Computer Fraud and Countermeasures. New Jersey: Prentice-Hall, Inc., 1979.

Kwak, N.K. Mathematical Programming with Business Applications. New York: McGraw-Hill book Company, 1973.

Liebholz, Stephen W., and Wilson, Louis D. User's Guide to Computer

Crime, Its Commission, Detection and Prevention. Radnor, PA:

Chilton Book Company, 1974.

Lieberman, Arthur Zale. Methodoldgy for the Automation of the Audit Process Involvin the Evaluation of the Plan of Internal ontro. Arlzona: Unlverslty 0 Arlzona, 977 Doctoral Dissertation).

Linstone, Harold A., and Turoff, Murray. The Delphi Method:

Techniques and Applications. Mass: Addison-Wesley Publishing Co., 1975.

Lobel, Jerome. "Planning a Secure System," Journal of Systems Management, Vol. 27 (July 1976): 14-19.

NBS, Special Publication 500-25. An Analysis of Computer Security Safeguards for Detecting and Preventing Intentional Computer Misuse. Washington D.C: U.S. Department of Commerce, 1978.

_ _---" Special Publication 500-57. Audit and Evaluation of Computer Security II: System Vulnerability and Controls. Washington D.C.: U.S. Department of Commerce, 1980.

Parker, Donn B. Crime by Computer. New York: Scribner, 1976.

_ _ _ Computer Security Special Report, Jan/Feb 1979.


Perry, William E., and Kuong, Javier E. Generalized Comeuter Audit

Software Selection and Aeplication. Wellesley Hll1s, Mass:

Management Advisory Publlcations, 1980.

Randall, Robert F. "Computer Fraud:. A Growing Problem, II Management Accounting, Vol 59 (April 1978): 61-64.

Wagner, Charles, R. The CPA and Computer Fraud. Lexington, Mass:

Lexington Books, 1979.

Wong, Kenneth Kiu. Risk Analysis and Control: A Guide for DP

Pages:     | 1 |   ...   | 14 | 15 ||

Similar works:

«APPENDIX P ° Federa l Aviatio n Administration %%sH^V Memorandum Date: —' o From: Ai r Traffic Organization, ATO To: All Field Facilities Subject: Cel l Phones in Operations/Work Areas Cellular telephones can cause audio rectification interference to air traffic controlle r headsets. This harmful interferenc e has the possibility of seriously degrading, obstructing, or interrupting with radio frequency transmissions. Due to the safety implications related to this issue, effective...»

«ASTHMA AND ALLERGY FOUNDATION OF AMERICA, NEW ENGLAND CHAPTER FOOD ALLERGIES and COLLEGE: Planning for Campus Life A forum for high school juniors and seniors, and their parents September 21, 2011 Newton-Wellesley Hospital, Newton, MA Panel: Campus life topics: • Elisabeth Stieb, RN, BSN, AE-C, is a nurse at Eating on Campus Massachusetts General Hospital for Children, • Asking about food ingredients specializing in allergies and asthma. She is the and preparation former volunteer leader of...»

«Fear of Flying: Learning to Fly Comfortably If you are afraid of flying, you’ve got lots of company. Various surveys suggest that 1 in 5 or 1 in 6 Americans identify themselves as “fearful flyers.” Some experience only moderate apprehension before a flight and more acute distress during take-off. Others fly but live in fear of even the slightest turbulence. For others, the fear of flying may keep them from visiting relatives, taking a job promotion that would require occasional travel or...»

«ANIMAL MANAGEMENT STRATEGY REVISED EDITION 2013-2018 Logan City Council Animal Management Strategy Revised Edition 2013-2018 Introduction Animal Management Strategy Logan's initial 2011-2015 Animal Management Strategy (the Strategy) identified the key issues impacting the community and provided five strategic directions for animal management to be achieved over 4 years. In 2013, given the changes experienced in two years together with the achievements accomplished earlier than anticipated, a...»

«National Gallery of Art NATIONAL GALLERY OF ART ONLINE EDITIONS Italian Paintings of the Thirteenth and Fourteenth Centuries Agnolo Gaddi Florentine, c. 1350 1396 Saint Andrew and Saint Benedict with the Archangel Gabriel [left panel] shortly before 1387 tempera on poplar panel overall: 197 × 80 cm (77 9/16 × 31 1/2 in.) Inscription: across the bottom below the saints: S. ANDREAS AP[OSTO]L[U]S; S. BENEDICTUS ABBAS; on the book held by St. Benedict: AUSCU / LTA.O/ FILI.PR / ECEPTA /.MAGIS /...»

«Hydra Nemesis 2.6 User’s Manual Revision 2.6.2 Copyright © 2008, All Rights Reserved Hydra Nemesis 2.6 User’s Manual Table of Contents Table of Contents Disclaimers Introduction Parts List Hardware Installation Software Installation Getting Started Base Map Sensor Calibration Engine Start The Editing Screen Menu Bar Work Area Maps and Setting Modules Status Display Map Map Data Edit Colors 3D Map Editing Track Point and Cursor Navigation Centering Editing Direct Entry Arithmetic Functions...»

<<  HOME   |    CONTACTS
2016 www.dissertation.xlibx.info - Dissertations, online materials

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.