2012
DOI: 10.2308/isys-50216
|View full text |Cite
|
Sign up to set email alerts
|

Information Fusion in Continuous Assurance

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(14 citation statements)
references
References 35 publications
0
14
0
Order By: Relevance
“…Evaluation requires a translation from the operational level to the business, or value object level, as in [30]. In a Service Oriented perspective, the focal value object is the business service that uses resources to add value to other resources.…”
Section: Aspectmentioning
confidence: 99%
“…Evaluation requires a translation from the operational level to the business, or value object level, as in [30]. In a Service Oriented perspective, the focal value object is the business service that uses resources to add value to other resources.…”
Section: Aspectmentioning
confidence: 99%
“…To enable a permanent communication, [15] developed a continuous auditing model, which effectively connects the auditor's systems to the auditee's systems, by using XML and CORBA. Similar auditing architectures include independent monitoring and control layers for continuously querying and analyzing auditing objects [3,42,52,53]. Additionally, different kinds of middleware and standard interfaces [49] as well as independent auditing web services [39] are suggested to be integrated in continuous auditing systems, allowing cloud service customers to continuously review and validate the adherence with selected certification criteria.…”
Section: System Architecturementioning
confidence: 99%
“…For example, [30] analyzed the OVAL (Open Vulnerability and Assessment Language) and the XCCDF (Extensible Configuration Checklist Description Format) to enable (semi-) automated IT controls checks, patch and configuration management validation, and vulnerability assessments. The provided tools, processes, and capabilities may differ based upon the extent, kind, and objectives of the used auditing system [15,42,52,53].…”
Section: System Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…The current issue encompasses: one article on organizational effects and new cloud technology (Alali and Yeh 2012); three articles in the emerging continuous audit/continuous monitoring (CA/ CM) paradigms (Perols and Murthy 2012;Gonzalez et al 2012;Borthick 2012); two articles on user reaction to electronic disclosure (Smith et al 2012;Sutton et al 2012); one article on behavioral factors in technological systems (Huerta et al 2012); one article looking at statutory guidance relative to internal controls (Janvrin et al 2012); one article on technology company performance (Bauer et al 2012); and this current editorial, which looks at standards and their relevance (Vasarhelyi 2012). These articles taken together present a portfolio that is representative of extant AIS research and certainly addresses some of the paradigm changes discussed in this editorial.…”
Section: Paths For Ais Researchmentioning
confidence: 99%