Information systems auditing and computer fraud / Yap May Lin

"EDP auditing is defined as the process of collecting and evaluating evidence to determine whether a computer system safeguards assets, maintains data integrity, achieves organizational goals effectively, and consumes resources efficiently. " [Weber, 1988]. The issue of computer fraud has...

Full description

Saved in:
Bibliographic Details
Main Author: Yap, May Lin (Author)
Format: Book
Published: Faculty of Information Technology and Quantitative Sciences, 1997.
Subjects:
Online Access:Link Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000 am a22000003u 4500
001 repouitm_11816
042 |a dc 
100 1 0 |a Yap, May Lin  |e author 
245 0 0 |a Information systems auditing and computer fraud / Yap May Lin 
260 |b Faculty of Information Technology and Quantitative Sciences,   |c 1997. 
500 |a https://ir.uitm.edu.my/id/eprint/11816/1/AJ_YAP%20MAY%20LIN%20TMSK%2097.pdf 
520 |a "EDP auditing is defined as the process of collecting and evaluating evidence to determine whether a computer system safeguards assets, maintains data integrity, achieves organizational goals effectively, and consumes resources efficiently. " [Weber, 1988]. The issue of computer fraud has been given a considerable amount of space in most books devoted to the subject of EDP or Information Systems (IS) auditing. Studies have shown that the monetary amounts misappropriated in the average fraud involving EDP or IS substantially exceed the corresponding monetary amounts in the average fraud situation that does not involve automated services. Hence, the subsequent establishment or expansion of existing IS audit departments by management primarily as a defense against material fraud. The purpose of this paper is to focus on two issues. One, the occurrence of computer fraud in the IT environment, and secondly, IS auditing as a deterrent to discourage the commission of fraud. 
546 |a en 
690 |a Auditing. Auditors 
690 |a Computer fraud 
690 |a Electronic Computers. Computer Science 
655 7 |a Article  |2 local 
655 7 |a PeerReviewed  |2 local 
787 0 |n https://ir.uitm.edu.my/id/eprint/11816/ 
856 4 1 |u https://ir.uitm.edu.my/id/eprint/11816/  |z Link Metadata