Loading…
E-COMMERCE INFORMATION SYSTEMS: AUDITING AND CONTROL ISSUES
E-commerce is quickly gaining ground as the rule, not the exception, when it comes to sales in the marketplace. There are downfalls, however, as businesses engaging in e-commerce are exposed to fraud and control risks that change and evolve as quickly as the technology being implemented does. As a r...
Saved in:
Published in: | Internal Auditing 2007-05, Vol.22 (3), p.31 |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | |
container_issue | 3 |
container_start_page | 31 |
container_title | Internal Auditing |
container_volume | 22 |
creator | Pathak, Jagdish Roberts, Timothy |
description | E-commerce is quickly gaining ground as the rule, not the exception, when it comes to sales in the marketplace. There are downfalls, however, as businesses engaging in e-commerce are exposed to fraud and control risks that change and evolve as quickly as the technology being implemented does. As a result of this, internal auditors who are tasked with reviewing the information systems used to facilitate electronic commerce need to be very knowledgeable in this area. Internal auditors who primarily deal with information systems and auditing the controls related to computers can acquire certification in this particular field. The number of malicious programs out there is always growing, and the processes and techniques involved in creating them and infecting legitimate computers seem to evolve even faster than the safeguards and preventative measures used to stop them. Internal auditors must be aware of the malicious programs out there, their effects on computer information systems, and the associated control risks. |
format | article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_reports_214389961</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1290312991</sourcerecordid><originalsourceid>FETCH-proquest_reports_2143899613</originalsourceid><addsrcrecordid>eNpjYeA0sLA01zUwNrfgYOAqLs4yMDC0MDIw5GSwdtV19vf1dQ1ydlXw9HPzD_J1DPH091MIjgwOcfUNtlJwDHXxDPH0c1dw9HNRcPb3Cwny91HwDA4OdQ3mYWBNS8wpTuWF0twMim6uIc4eugVF-YWlqcUl8UWpBflFJcXxRoYmxhaWlmaGxsSoAQATyi-8</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>214389961</pqid></control><display><type>article</type><title>E-COMMERCE INFORMATION SYSTEMS: AUDITING AND CONTROL ISSUES</title><source>ABI/INFORM Global</source><creator>Pathak, Jagdish ; Roberts, Timothy</creator><creatorcontrib>Pathak, Jagdish ; Roberts, Timothy</creatorcontrib><description>E-commerce is quickly gaining ground as the rule, not the exception, when it comes to sales in the marketplace. There are downfalls, however, as businesses engaging in e-commerce are exposed to fraud and control risks that change and evolve as quickly as the technology being implemented does. As a result of this, internal auditors who are tasked with reviewing the information systems used to facilitate electronic commerce need to be very knowledgeable in this area. Internal auditors who primarily deal with information systems and auditing the controls related to computers can acquire certification in this particular field. The number of malicious programs out there is always growing, and the processes and techniques involved in creating them and infecting legitimate computers seem to evolve even faster than the safeguards and preventative measures used to stop them. Internal auditors must be aware of the malicious programs out there, their effects on computer information systems, and the associated control risks.</description><identifier>ISSN: 0897-0378</identifier><language>eng</language><publisher>Boston: Thomson Reuters (Tax & Accounting) Inc</publisher><subject>Computer networks ; Computer viruses ; Customers ; Electronic commerce ; Information systems ; Internal auditors ; Internal controls ; Internet ; Malware ; Risk assessment</subject><ispartof>Internal Auditing, 2007-05, Vol.22 (3), p.31</ispartof><rights>Copyright Thomson Tax and Accounting d/b/a RIA May/Jun 2007</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/214389961?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>312,776,780,787,15292,36036,44336</link.rule.ids></links><search><creatorcontrib>Pathak, Jagdish</creatorcontrib><creatorcontrib>Roberts, Timothy</creatorcontrib><title>E-COMMERCE INFORMATION SYSTEMS: AUDITING AND CONTROL ISSUES</title><title>Internal Auditing</title><description>E-commerce is quickly gaining ground as the rule, not the exception, when it comes to sales in the marketplace. There are downfalls, however, as businesses engaging in e-commerce are exposed to fraud and control risks that change and evolve as quickly as the technology being implemented does. As a result of this, internal auditors who are tasked with reviewing the information systems used to facilitate electronic commerce need to be very knowledgeable in this area. Internal auditors who primarily deal with information systems and auditing the controls related to computers can acquire certification in this particular field. The number of malicious programs out there is always growing, and the processes and techniques involved in creating them and infecting legitimate computers seem to evolve even faster than the safeguards and preventative measures used to stop them. Internal auditors must be aware of the malicious programs out there, their effects on computer information systems, and the associated control risks.</description><subject>Computer networks</subject><subject>Computer viruses</subject><subject>Customers</subject><subject>Electronic commerce</subject><subject>Information systems</subject><subject>Internal auditors</subject><subject>Internal controls</subject><subject>Internet</subject><subject>Malware</subject><subject>Risk assessment</subject><issn>0897-0378</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2007</creationdate><recordtype>article</recordtype><sourceid>M0C</sourceid><recordid>eNpjYeA0sLA01zUwNrfgYOAqLs4yMDC0MDIw5GSwdtV19vf1dQ1ydlXw9HPzD_J1DPH091MIjgwOcfUNtlJwDHXxDPH0c1dw9HNRcPb3Cwny91HwDA4OdQ3mYWBNS8wpTuWF0twMim6uIc4eugVF-YWlqcUl8UWpBflFJcXxRoYmxhaWlmaGxsSoAQATyi-8</recordid><startdate>20070501</startdate><enddate>20070501</enddate><creator>Pathak, Jagdish</creator><creator>Roberts, Timothy</creator><general>Thomson Reuters (Tax & Accounting) Inc</general><scope>0U~</scope><scope>1-H</scope><scope>3V.</scope><scope>7WY</scope><scope>7WZ</scope><scope>7X1</scope><scope>7XB</scope><scope>87Z</scope><scope>88C</scope><scope>8A9</scope><scope>8AO</scope><scope>8FI</scope><scope>8FJ</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ANIOZ</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRAZJ</scope><scope>FRNLG</scope><scope>FYUFA</scope><scope>F~G</scope><scope>GHDGH</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>L.0</scope><scope>M0C</scope><scope>M0T</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PYYUZ</scope><scope>Q9U</scope><scope>S0X</scope></search><sort><creationdate>20070501</creationdate><title>E-COMMERCE INFORMATION SYSTEMS: AUDITING AND CONTROL ISSUES</title><author>Pathak, Jagdish ; Roberts, Timothy</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_reports_2143899613</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2007</creationdate><topic>Computer networks</topic><topic>Computer viruses</topic><topic>Customers</topic><topic>Electronic commerce</topic><topic>Information systems</topic><topic>Internal auditors</topic><topic>Internal controls</topic><topic>Internet</topic><topic>Malware</topic><topic>Risk assessment</topic><toplevel>online_resources</toplevel><creatorcontrib>Pathak, Jagdish</creatorcontrib><creatorcontrib>Roberts, Timothy</creatorcontrib><collection>Global News & ABI/Inform Professional</collection><collection>Trade PRO</collection><collection>ProQuest Central (Corporate)</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>Accounting & Tax Database</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection</collection><collection>Healthcare Administration Database (Alumni)</collection><collection>Accounting & Tax Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Hospital Premium Collection</collection><collection>Hospital Premium Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Accounting, Tax & Banking Collection</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Accounting, Tax & Banking Collection (Alumni)</collection><collection>Business Premium Collection (Alumni)</collection><collection>Health Research Premium Collection</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>Health Research Premium Collection (Alumni)</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ABI/INFORM Professional Standard</collection><collection>ABI/INFORM Global</collection><collection>Healthcare Administration Database</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ABI/INFORM Collection China</collection><collection>ProQuest Central Basic</collection><collection>SIRS Editorial</collection><jtitle>Internal Auditing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Pathak, Jagdish</au><au>Roberts, Timothy</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>E-COMMERCE INFORMATION SYSTEMS: AUDITING AND CONTROL ISSUES</atitle><jtitle>Internal Auditing</jtitle><date>2007-05-01</date><risdate>2007</risdate><volume>22</volume><issue>3</issue><spage>31</spage><pages>31-</pages><issn>0897-0378</issn><abstract>E-commerce is quickly gaining ground as the rule, not the exception, when it comes to sales in the marketplace. There are downfalls, however, as businesses engaging in e-commerce are exposed to fraud and control risks that change and evolve as quickly as the technology being implemented does. As a result of this, internal auditors who are tasked with reviewing the information systems used to facilitate electronic commerce need to be very knowledgeable in this area. Internal auditors who primarily deal with information systems and auditing the controls related to computers can acquire certification in this particular field. The number of malicious programs out there is always growing, and the processes and techniques involved in creating them and infecting legitimate computers seem to evolve even faster than the safeguards and preventative measures used to stop them. Internal auditors must be aware of the malicious programs out there, their effects on computer information systems, and the associated control risks.</abstract><cop>Boston</cop><pub>Thomson Reuters (Tax & Accounting) Inc</pub></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0897-0378 |
ispartof | Internal Auditing, 2007-05, Vol.22 (3), p.31 |
issn | 0897-0378 |
language | eng |
recordid | cdi_proquest_reports_214389961 |
source | ABI/INFORM Global |
subjects | Computer networks Computer viruses Customers Electronic commerce Information systems Internal auditors Internal controls Internet Malware Risk assessment |
title | E-COMMERCE INFORMATION SYSTEMS: AUDITING AND CONTROL ISSUES |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-25T18%3A58%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=E-COMMERCE%20INFORMATION%20SYSTEMS:%20AUDITING%20AND%20CONTROL%20ISSUES&rft.jtitle=Internal%20Auditing&rft.au=Pathak,%20Jagdish&rft.date=2007-05-01&rft.volume=22&rft.issue=3&rft.spage=31&rft.pages=31-&rft.issn=0897-0378&rft_id=info:doi/&rft_dat=%3Cproquest%3E1290312991%3C/proquest%3E%3Cgrp_id%3Ecdi_FETCH-proquest_reports_2143899613%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=214389961&rft_id=info:pmid/&rfr_iscdi=true |