期刊文献+

从Carlson公司的IT决策体制谈IT治理风险审计 被引量:1

Case Carlson Co.and the Researching on IT Risk Auditing of IT Governance
下载PDF
导出
摘要 本文以美国Carlson公司IT治理案例为起点,以构建企业IT治理风险审计框架为目的,运用演绎和调查等方法对企业IT治理的内容、机制、IT治理风险审计等相关内容进行规范性研究,搭建起企业IT治理风险审计的内容框架,研究的结论是:对于企业客观存在的IT治理风险应该从IT治理机制构建的初期、运行过程中适时地对IT治理的运行效能进行审计分析评价,实现IT治理的最大效能。 IT governance effects its function through the management of IT investment direction, manners, valuation and so on. The risk auditing of IT governance aim to estimate the efficiency and effective of IT governance on archetypes, contents and mechanisms.This paper's researching starts from Carlson case, its aim is to build the framework of auditing of IT governance's risks. The approaches of deduction and question investigation are used.The result of researching is that the risks of IT governance should be monitored and evaluation from the beginning to the running.
作者 王晓霞
出处 《审计研究》 CSSCI 北大核心 2008年第6期91-96,共6页 Auditing Research
关键词 IT治理机制效能 IT治理风险 IT治理审计测评 effective of IT governance mechanism, risk of IT governance, Auditing testing and appraising on IT governance
  • 相关文献

参考文献8

  • 1詹姆斯.A.霍尔(James.A.Hall),李丹,刘济平译.2003.《信息系统审计与鉴证》.中信出版社.
  • 2Jack J.Champlain,张金城,李海风译.2004.《审计信息系统》(第2版).清华大学出版社.
  • 3Peter Weill \Jeanne W. Ross, 2004"IT Governance" John Wiley & Sons, Ltd P2,P85,P108-114, p155
  • 4James E. Hunton \Stephanie M. Bryant\Nancy A. Bagranoff, 2004 "Information Technology Auditing" John Wiley & Sons, Ltd P2,P48
  • 5Krag Brotby, 2007 “Information Security Govenance: Who Need It?” 《Information Systems Control》 (ISACA) Volume2:13-14
  • 6Chatterji, 2007 “Bridging Business & IT Strategies with Enterprise Arthitecture: Realising the Real Value of Business-IT Alignment” 《 Information Systems Control 》 (ISACA) Volume3:17- 18
  • 7S. Ramanathan,: 2007 "IT Governance-Challenges in Implementation From an Asian Perspective" 《Information Systems Control》 (ISACA) Volume5:26-27
  • 8Peter Weill \Jeanne W. Ross 的"IT Govemance"P108-114 (John Wiley 和 Sons, Ltd 2004).

同被引文献9

  • 1S. Ramanathart IT Governance Challenges in Implementation from an Asian Perspective [J]. Information Systems Control(ISACA) ,2007, (5) :26 - 27.
  • 2Peter Weill, Jeanne W. Ross. IT Governance [M]. John Wiley,Sons,2004. 2. 85. 108 - 114. 155.
  • 3孙强.IT治理--信息的必由之路[M].北京:电子工业出版社,2006.23.
  • 4安永(中国)企业咨询有限公司北京分公司在国务院国有资产监督管理委员会“中央企业全面风险管理经验交流会”报告[D].2008-12-21.
  • 5Krag Brotby. Information Security Govenance: Who Need It? [ J]. Information Systems Control (ISACA), 2007, (2) :13 - 14.
  • 6詹姆斯·A.霍尔(James.A.Hall).信息系统审计与鉴证[M].李丹,刘济平译,中信出版社,2003.177.
  • 7Jack J.Champlain.审计信息系统(第二版)[M].张金城,李海风译,北京:清华大学出版社,2004.290.
  • 8James E. Hunton, Stephanie M. Bryant, Nancy A. Bagranoff. Information Technology Auditing [M]. John Wiley & Sons,2004. 2.48.
  • 9Shil Chatterji. Bridging Business & IT Strategies with Enterprise Arthiteeture: Realising the Real Value of Business- IT Alignment [J]. Information Systems Control(ISACA) ,2007, (3) : 17 - 18.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部