:::

詳目顯示

回上一頁
題名:Cybersecurity and AI--Implications for Internal Auditing
書刊名:電腦稽核
作者:takada, toshifumiSakaki, MasatoshiAoyagi, ShiroKawaguchi, Hiroshi
出版日期:2019
卷期:40
頁次:頁31-48
主題關鍵詞:AISupervised machine learningInternal auditorCybersecurityHackersIncidents
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:4
期刊論文
1.Li, He、Dai, J.、Gershberg, T.、Vasarhelyi, M. A.(2018)。Understanding usage and value of audit analytics for internal auditors: An organizational approach。International Journal of Accounting Information Systems,28,59-76。  new window
2.Earley, Christine E.(2015)。Data analytics in auditing: Opportunities and challenges。Business Horizons,58(5),493-500。  new window
會議論文
1.Jaber, Raced J.、Wadi, Mohammad A.(2018)。Auditors' usage of computer-assisted audit techniques (CAATs): Challenges and opportunities。17th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society,(會議日期: October 30 - November 1)。Springer。365-375。  new window
2.Leping, Jiang(2018)。Research on the application of computer aided audit technology。International conference on application and techniques in cyber security and intelligence ATCI,921-927。  new window
圖書
1.Aghili, Shaun(2009)。Fraud Auditing Using CAATT: A manual for auditors and forensic accountants to detect organizational fraud。Auerbach。  new window
2.National Center of Incident Readiness and Strategy for Cybersecurity(2017)。Information Security Handbook for Network Beginners。  new window
其他
1.Information Processing Association(2018)。Information Security White Paper。  new window
2.National Center of Incident Readiness and Strategy for Cybersecurity(2015)。Report of the Investigation on Causes of Leakage of Japan Pension Service。  new window
3.Ministry of Internal Affairs and Communications(2017)。Japan: Consolidated Measures for IOT Securities。  new window
4.Ministry of Internal Affairs and Communications(2018)。Japan: WHITE PAPER。  new window
5.Karen, Waltermire(2019)。White Paper (DRAFT) Continuous monitoring for IT infrastructure: Techniques for auditing user activity and detecting irregular activity events within small and medium-size businesses,Computer Security Resource Center。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top