Information security: Auditing the behaviour of the employee

被引:0
|
作者
Vroom, C [1 ]
von Solms, R [1 ]
机构
[1] Port Elizabeth Technikon, Port Elizabeth, South Africa
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The following paper serves to examine the evolution of auditing in the organization from traditional financial auditing through the introduction of Computers into daily transactions. It discusses the need for information security in business today and the methods that call be taken to verify that the security measures are properly utilized to ensure the safety of information systems. This paper hopes to enhance the future role of the auditor by including auditing the employee and his behaviour.
引用
收藏
页码:401 / 404
页数:4
相关论文
共 50 条
  • [21] A typology of employees' information security behaviour
    Ahmad, Zauwiyah
    Norhashim, Mariati
    Song, Ong Thian
    Hui, Liew Tze
    2016 4TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2016,
  • [22] Understanding the influences on information security behaviour
    Furnell, Steven
    Rajendran, Anish
    Computer Fraud and Security, 2012, 2012 (03): : 12 - 15
  • [23] The Role of Information Deserts in Information Security Awareness and Behaviour
    Snyman, D. P.
    Kruger, H. A.
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 613 - 620
  • [24] Collaborative Learning : A Case Study on Information Security and Auditing Management Course
    Parkavi, R.
    Karthikeyan, P.
    Abdullah, A. Sheik
    2022 International Conference for Advancement in Technology, ICONAT 2022, 2022,
  • [25] Security and auditing of VPN
    Boukari, N
    Aljane, A
    THIRD INTERNATIONAL WORKSHOP ON SERVICES IN DISTRIBUTED AND NETWORKED ENVIRONMENTS, PROCEEDINGS, 1996, : 132 - 138
  • [26] Employee voice and silence in auditing firms
    Donovan, Sean
    O'Sullivan, Michelle
    Doyle, Elaine
    Garvey, John
    EMPLOYEE RELATIONS, 2016, 38 (04) : 563 - 577
  • [27] Security Auditing in the Fog
    Parkinson, Simon
    Qin, Yongrui
    Khan, Saad
    Vallati, Mauro
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [28] Controls Mitigating the Risk of Confidential Information Disclosure by Facebook: Essential Concern in Auditing Information Security
    Kuyumdzhiev, Ivan Ognyanov
    TEM JOURNAL-TECHNOLOGY EDUCATION MANAGEMENT INFORMATICS, 2014, 3 (02): : 113 - 119
  • [29] Auditing the IT security function
    Osborne, K
    COMPUTERS & SECURITY, 1998, 17 (01) : 34 - 41
  • [30] Technostress and its influence on employee information security policy compliance
    Nasirpouri Shadbad, Forough
    Biros, David
    INFORMATION TECHNOLOGY & PEOPLE, 2022, 35 (01) : 119 - 141