SlideShare a Scribd company logo
1 of 78
205
JOURNAL OF INFORMAITON SYSTEMS
Vol. 20, No. 1
Spring 2006
pp. 205–219
Research Opportunities in Information
Technology and Internal Auditing
Marcia L. Weidenmier
Mississippi State University
Sridhar Ramamoorti
Grant Thornton LLP
ABSTRACT: This paper presents research opportunities in the
area of information tech-
nology (IT) within the context of the internal audit function.
Given the pervasive use of
IT in organizations and the new requirements of the Sarbanes-
Oxley Act of 2002, in-
ternal audit functions must use appropriate technology to
increase their efficiency
and effectiveness. We develop IT and internal audit research
questions for three
governance-related activities performed by the internal audit
function-risk assessment,
control assurance, and compliance assessment of security and
privacy.
Keywords: IT / IS auditing; internal auditing; information
technology; research oppor-
tunities; Sarbanes-Oxley; corporate governance; risk
management; secu-
rity; privacy.
Data Availability: Please direct all comments and suggestions to
Dr. Marcia
Weidenmier.
I. INTRODUCTION
T
his paper develops information technology-related research
questions within the con-
text of the internal audit function. The internal audit function
(IAF) is one of the
cornerstones of corporate governance along with the external
auditor, executive man-
agement, and the audit committee of the Board of Directors
(Gramling et al. 2004). The
Board of Directors determines the overall governance process,
which senior management
implements and internal and external auditors evaluate, under
the watchful eye of the audit
committee (Blue Ribbon Committee 1999; Treadway
Commission 1987).
The IAF occupies a unique and pivotal role in corporate
governance. First, the IAF is
an information gathering and reporting resource for the three
other governance parties
(Gramling et al. 2004). Second, the IAF is an integral part of
the organization’s internal
control structure. In fact, Rule 303A of the New York Stock
Exchange requires listed
companies to have an IAF. Third, the IAF executes important
governance-related activities
including risk assessment, control assurance, and compliance
assessment, which are critical
We thank JIS editor Dan Stone for suggesting and encouraging
us to write the supplemental technology chapter
to the Research Opportunities in Internal Auditing (2003)
monograph. We remain grateful to the IIA Research
Foundation for granting us permission to reproduce, paraphrase,
and / or use copyrighted materials in preparing this
paper for the Journal of Information Systems. (Copyright 2004,
The Pervasive Impact of Information Technology
on Internal Auditing, by the Institute of Internal Auditors
Research Foundation, 247 Maitland Avenue, Altamonte
Springs, Florida 32701-4201 U.S.A. Reprinted with
permission.) The views expressed in this paper are the personal
views of Dr. Sridhar Ramamoorti and do not reflect the views
of, nor endorsement by, Grant Thornton LLP.
206 Weidenmier and Ramamoorti
Journal of Information Systems, Spring 2006
in complying with the new requirements of the Sarbanes-Oxley
Act of 2002 (SOX). Internal
auditors are central figures and function as a key support in
providing assurance for meeting
the requirements of SOX Section 302 (annual certifications of
the completeness and ac-
curacy of the financials by the CEO and the CFO) and Section
404 (external auditor attes-
tation of the effectiveness of internal controls over financial
reporting). As an integral part
of corporate governance, internal auditors must now consider
the ‘‘probability of significant
errors, irregularities, or noncompliance’’ (Implementation
Standard 1220.A1 [IIA 2004]) as
they execute their governance-related activities.
As IT and business models become virtually inseparable and
inextricably intertwined,
IT is playing a pivotal role in corporate governance and SOX
compliance. IT both enables
and drives effective governance structures, risk management,
and control processes because
it (1) shapes an organization by influencing the governance
structure selection and the
organization’s level of risk (Boritz 2002; Parker 2001), (2)
helps establish, maintain, and
enforce new governance processes throughout the organization
(Hamaker 2004; Fox
and Zonneveld 2004), and (3) helps integrate the risk
management and compliance proc-
esses—improving reputation, employee retention, and revenue
(by as much as 8 percent),
and lowering costs of capital and insurance premiums
(PricewaterhouseCoopers 2004).
IT’s rapid change is dramatically altering the IAF (Gorman and
Hargadon 2005). Ac-
cordingly, the Institute of Internal Auditors (IIA) requires
internal auditors to understand
how IT is used and should be used in an organization, as well as
key IT risks, controls,
and IT-based audit techniques (Implementation Standard
1210.A3 [IIA 2004]). Thus, given
the new requirements of SOX and the IIA, both the IAF and IT
have risen in prominence
and impact within organizations.
In this new era of governance reform, ‘‘IT-internal auditing
research’’ has become a
critical imperative. Surprisingly, however, ‘‘while the role of
assurance practitioners, from
an external perspective, has often been publicly discussed and
debated, the role of the
internal auditor and the resulting changes have not been quite so
publicized’’ (Boritz 2002,
232). Significant prospects exist for academic research in the
areas of internal auditing and
technology from theoretical and practical perspectives. To help
encourage research on IT
and the IAF, we develop research questions for three
governance-related activities per-
formed by the IAF: risk assessment, control assurance, and
compliance work (Hermanson
and Rittenberg 2003).
Our research builds on the following studies, which provide
comprehensive syntheses
of extant literature. Almost 30 years ago, Cash et al. (1977)
reviewed existing studies and
techniques on auditing and electronic data processing (EDP)
(primarily from an external
audit perspective) to encourage future EDP research. More
recently, O’Leary (2000) dis-
cusses the enterprise resource planning systems (ERPs)
literature. The Information Systems
Section of the American Accounting Association published
Researching Accounting as an
Information Systems Discipline (Arnold and Sutton 2002),
which presents research oppor-
tunities in a variety of areas including expert and group support
systems, decision aids,
electronic commerce, continuous and information systems
assurance, and knowledge man-
agement. Finally, Ramamoorti and Weidenmier (2004) develop
IT-related research oppor-
tunities in internal auditing for eight different areas, as part of
the Research Opportunities
in Internal Auditing (Bailey et al. 2003) monograph published
by the IIA Research Foun-
dation. We use the chapter by Ramamoorti and Weidenmier
(2004) as our starting point.
The remainder of the paper develops IT-related research
questions for each governance
activity performed by the IAF. Section II focuses on risk
assessment. Section III explores
control assurance, while Section IV discusses two primary areas
of compliance assess-
ment—security and privacy. Section V concludes.
Research Opportunities in Information Technology and Internal
Auditing 207
Journal of Information Systems, Spring 2006
II. RISK ASSESSMENT
Traditionally, internal auditing used a control-based approach
for planning its activities.
More recently, corporate governance focuses on risk
management, providing the impetus
for the IAF to move to a risk-based approach (McNamee and
Selim 1998). In fact, the IAF,
in the context of organizational risk assessment (Ramamoorti
and Traver 1998), must iden-
tify and assess risks to define the audit universe and to plan its
engagements (IIA Perform-
ance Standard 2010.A1). Unfortunately, organizations struggle
with enterprise-wide risk
management and ‘‘conflicting evidence exists regarding what
[enterprise risk management]
means and how common[ly] it actually is’’ implemented
(Kleffner 2003, 66). Moreover, a
lack of risk management frameworks, qualitative and
quantitative risk metrics, and acces-
sible central repository of actuarial data has hampered risk
management efforts (Ozier
2003). To help overcome some of these obstacles, the
Committee of Sponsoring Organi-
zations of the Treadway Commission (COSO) released the 2004
Enterprise Risk Manage-
ment (ERM) Framework that encompasses and expands its 1992
Internal Control-Integrated
Framework. The ERM Framework presents an integrated
framework with practical imple-
mentation guidelines to ensure achievement of organizational
objectives, reliable reporting,
and regulatory compliance.
IT and the IAF are both integral components of ERM. The
Board’s corporate gover-
nance process directs senior management’s development and
implementation of the risk
management process, which the IAF must evaluate for
‘‘adequacy and effectiveness’’ as
well as for ‘‘significant risks that might affect objectives,
operations, or resources’’ (Sobel
and Reding 2004; Implementation Standards 1220.A1 and
1220.A3 [IIA 2004]). IT also
permeates the risk management process as a source of risk and
as a tool to implement the
following eight components of the ERM Framework: internal
environment, objective setting,
identification of events, risk assessment, risk response, control
activities, information and
communication, and monitoring (Ramamoorti and Weidenmier
2004). While research op-
portunities exist for each Framework component, we focus only
on the third and fourth
components, identification of events and risk assessment, which
we consider to be the
pinnacle of the ERM Framework. To help the reader understand
the context of our research
questions, Figure 1 presents an overview of the Framework and
its relationship to this
paper. In addition, we now briefly describe how the other ERM
Framework components
relate to risk assessment and IT.
The first two ERM Framework components, the internal
environment and objective
setting, shape the organization’s risk assessment process. The
internal environment reflects
the organization’s risk appetite, or how much risk that
management and the Board are
willing to accept when conducting business, and is the basis for
all other Framework com-
ponents. Objective setting ensures that the organization has a
process to define high-level
strategic objectives as well as detailed operational, reporting,
and compliance objectives
that are consistent with its mission and risk appetite. Based on
their strategic objec-
tives, organizations must identify and assess the risk of events,
which are internal or external
incidents that may negatively affect strategy and the
achievement of objectives.
The last four ERM Framework components—risk response,
control activities, infor-
mation and communication, and monitoring—delineate the
organization’s response to the
assessed risk. Organizations can avoid, minimize, share, reduce,
or accept the assessed risk
via their response to identified risks. Control activities ensure
that risk responses are im-
plemented via controls that support strategic, operational,
reporting, and compliance objec-
tives. An information and communication system must identify,
analyze, and respond to
new and existing risks as well as communicate needed
information across the organization.
208 Weidenmier and Ramamoorti
Journal of Information Systems, Spring 2006
FIGURE 1
The Enterprise Risk Management Framework and its
Relationship to this Paper
Internal Environment
Risk Response
Risk Assessment
Identification of Events
Objective Setting
Negative events
Positive events
Control Activities
Monitoring
Info & Communication
SECTION II:
Risk assessment
SECTION III:
Control assurance
SECTION IV:
Compliance assessment
The Enterprise Risk Management Components are from COSO
(2004a).
Moreover, in today’s rapidly changing business environment,
the ERM plan requires con-
tinuous monitoring that is real-time, dynamic, and embedded in
the organization (COSO
2004a, 75) to ensure that the ERM plan evolves to effectively
manage the organization’s
risk.
IT is intricately intertwined with the components of the ERM
Framework affecting how
the organization manages risk. For example, the organization’s
risk appetite affects its
choice of IT, level of e-commerce, integration with business
partners, and the use of emerg-
ing technologies—all changing the risk of the organization.
While strategic objectives in-
fluence the IT infrastructure, IT can simultaneously help (1)
shape strategy, (2) use oper-
ational assets efficiently and effectively, (3) increase reporting
reliability and regulatory
compliance, (4) communicate information globally, and (5)
ensure that the organization is
operating within established risk tolerances, the acceptable
level of variation around ob-
jectives (PricewaterhouseCoopers 2003; Tillinghast-Towers
Perrin 2001; Leithhead and
McNamee 2000).
Keeping this framework in mind, we turn to the third and fourth
components of the
ERM Framework—the identification of events and risk
assessment. Negative events are
risks that must be assessed. Positive events are opportunities
that may redirect the organi-
zation’s objective setting process. The Framework identifies IT
as an external event and an
internal event. In fact, IT is the only item classified as both
types of events. For external
events, organizations must consider the impact of the changing
e-commerce environment,
the increasing availability of external data, potential
technological interruptions, and emerg-
ing technology (COSO 2004a, 47). For internal events,
organizations must consider how
data integrity, data and system availability, and system
selection, development, deployment,
Research Opportunities in Information Technology and Internal
Auditing 209
Journal of Information Systems, Spring 2006
and maintenance may affect their ability to operate (COSO
2004a, 46). IT also enables the
organization to identify other events. As an enabler, IT can help
internal auditors facilitate
interactive group workshops, pinpoint areas of concern via
escalation or threshold triggers,
and identify trends and causes of risks by statistically analyzing
historical data via data
mining and data warehouses (Nehmer 2003; Searcy and
Woodroof 2003; Rezaee et al.
2002).
Once the negative events (i.e., risks) have been identified,
organizations must estimate
the likelihood and timing of the events occurring and their
impact on the organization. To
estimate the financial impact of different time horizons and
probable outcomes, internal
auditors can use a variety of simulation, mapping,
benchmarking, and modeling tools. Data
warehouses and data mining can estimate the likelihood an
event will occur, thereby sup-
plementing managers’ qualitative estimates (Rezaee et al.
2002). Neural networks and data
envelopment analysis (DEA) can also be used to assess risk,
direct internal auditors’ atten-
tion to high risk audit areas, and engage in ‘‘brainstorming’’
and ‘‘scenario building’’ ac-
tivities that seek to track and monitor business risks as they
develop (Kinney 2003,
149; Bradbury and Rouse 2002; Ramamoorti and Traver 1998).
According to
PricewaterhouseCoopers Internal Audit Services Practices, the
IAF needs a level of IT
sophistication that matches the level of risk that it is trying to
manage (Heffes 2002); i.e.,
the concept of requisite variety applies to the IAF and the
system it regulates (Weick 1969,
1979). While prior studies examine what tools the IAF uses
(e.g., Hermanson et al. [2000];
annual IAF surveys by the Internal Auditor), we lack evidence
regarding how well the risk
identification and assessment tools used by the IAF match the
organization’s current and
planned level of risk and IT usage.
Understanding the impact of IT on risk assessment is especially
important for organi-
zations with ERPs. O’Leary (2000) and Addison (2001) state
that ERPs expose organiza-
tions to significantly different risks including business
interruption, change management,
process interdependency, privacy and confidentiality, data
content quality, and system se-
curity. Moreover, newly implemented ERP processes potentially
alter and even weaken
traditional segregation of duties, because traditional controls
are often eliminated and not
replaced during implementation (Bae and Ashcroft 2004).
Wright and Wright (2002) de-
lineate additional risks associated with ERP implementations
from customization, process
reengineering, bolt-on software (i.e., software from a different
vendor that adds functionality
to an ERP), and incompatibilities with organizational
requirements. Thus, ERPs may not
reduce control risk if organizations modify key process linkages
and integrated controls are
not fully implemented.
In light of these concerns, internal auditors must examine ERP
risk carefully. Given
the large variety of ERPs available, how is risk affected if
organizations implement primary
(manufacturing) versus support (financial and human resource)
software components? Does
risk vary with the specific ERP software (vendor) selected or
with internal audit involve-
ment? How much risk exists if organizations do not convert
from existing legacy systems
to ERPs?
As a starting point in answering these questions, Wright and
Wright (2002) report that
then-Big 5 information systems auditors identify supply-chain
and payroll ERP subsystems
as having the highest control and security risks. Other areas of
concern include interfaces
with legacy systems and non-ERP bolt-ons. Interviewees also
state that the major vendor
ERPs differ in terms of access and encryption controls as well
as input devices and controls.
External information systems auditors also appear not to be
concerned with the security
and control risks of business intelligence systems (Wright and
Wright 2002). To better
understand how organizations manage and control ERP risks,
future research can determine
210 Weidenmier and Ramamoorti
Journal of Information Systems, Spring 2006
how the IAF’s perspectives compare to those of external
auditors and whether internal
auditors consider the risks of business intelligence systems and
other areas that are appar-
ently overlooked by external auditors (Wright and Wright
2002). Given that internal au-
ditors work in the same organizational environment with the
same system(s) all year, their
depth-oriented viewpoints are likely to be different than the
breadth-oriented viewpoints of
external auditors who work on multiple clients (and systems). In
addition, future research
could examine the underlying software (O’Leary 2002) to
understand how the actual risks
match those perceived by internal and external auditors.
Kinney (2003, 147) asks, ‘‘How does IT affect risk, risk
assessment, and risk manage-
ment?’’ Answering this question requires a better understanding
of the differential impact
of internal and external factors on the organization’s use of IT
in risk assessment. For
example, organizational structure and its use of IT may affect
the ERM process. Kleffner
(2003) identifies silo (or functional) organizational structure,
resistance to change, lack of
qualified personnel, and need for internal controls and review
systems as deterrents to ERM.
Similarly, Wah (2000) identifies traditional silo structure as
among the top barriers to suc-
cessful ERP implementations. Thus, organizational structure
appears to affect the success
of ERM and ERP implementations. It would be interesting to
investigate whether firms that
have successfully implemented ERP are more likely to
successfully implement an ERM
process.
Hunton (2002) suggests that internal auditors may be able to
reduce the risk associated
with the organization’s IT by participating throughout the entire
system’s life cycle. Extant
research also finds that the involvement of information system
(IS) auditors in the systems
development stage reduces future software maintenance costs
(Wu 1992), indicating that
risks (from software and control errors) should be reduced as
well. Unfortunately, despite
the potential to reduce future costs, internal auditors spend the
least amount of their time
on the development, acquisition, and implementation of new
systems (Hermanson et al.
2000).
Why are internal auditors not more actively involved in the
development, acquisition,
and implementation of new systems? Prior research suggests
that this is because of inde-
pendence and objectivity concerns (Boritz 2002). However,
extant literature (generally)
finds that IAF quality depends more on work performance than
independence, objectivity,
and competence (Gramling et al. 2004). Moreover,
Krishnamoorthy’s (2001, 2002) analyt-
ical models suggest that the relative importance of objectivity,
work performance, and
competence varies with audit conditions. On the other hand,
extant literature reports con-
flicting evidence regarding whether internal auditors’ judgments
and decisions are affected
by prior design involvement (Grabski 1986; Gramling et al.
2004). Therefore, more research
is needed to determine the net benefits of IAF participation in
each stage of the system’s
life cycle.
Internal auditors, outsourced internal audit service providers,
and external auditors make
risk assessments. Inconsistent evidence exists regarding whether
the risk assessments made
by these various parties are the same. For example, Hunton et
al. (2004) find that external
then-Big 5, IT auditors assess higher risks in ERP than non-ERP
systems when compared
to external Big 5, non-IT auditors. However, Grabski et al.
(1987) report no differences
in the internal control evaluations of EDP and non-EDP internal
auditors. Church and
Schneider (1995) find that internal auditors are more likely to
generate cutoff errors than
external auditors, but Blocher (1993) finds that internal auditors
are less likely to use
analytical procedures compared with external auditors.
Moreover, Caplan and Embry (2003)
find that internal auditors, outsource providers, and external
auditors make similar judg-
ments about the severity of internal control weaknesses; where
there are differences, the
Research Opportunities in Information Technology and Internal
Auditing 211
Journal of Information Systems, Spring 2006
evaluations of outsourced internal auditors tend to fall between
internal and external au-
ditors. On the other hand, in a study of the relative importance
of risk factors for fraud,
Apostolou et al. (2001) report that the mean decision models of
Big 5, regional, and internal
auditors are not significantly different.
In light of these mixed results, how do the overall risk
assessments of internal, external,
and outsourced (IT and non-IT) auditors compare? Extant
research does not fully support
the correlation between external auditor’s risk assessments and
audit plans (Zimbelman
1997; Mock and Wright 1999). Do internal auditors incorporate
IT considerations into risk
assessments and their subsequent audit plans (see Church et al.
2001)? The audit committee
now expects the IAF to monitor, evaluate, and report
recommendations for the organiza-
tion’s risk management process (COSO 2004b, 104). Given the
growing importance of risk
management, outsourcing opportunities, and the expanding role
of the IAF, audit commit-
tees need answers to these questions.
III. CONTROL ASSURANCE
Control assurance is another important governance activity
performed by internal au-
ditors. To ensure that risk responses are implemented, audit
committees rely on the IAF to
determine if internal controls effectively support strategic,
operational, reporting, and com-
pliance objectives (Gendron et al. 2004). This task is critical
because ‘‘a strong system of
internal control is essential to effective ERM’’ (COSO 2004c,
slide 22).
Traditionally, corporate governance was synonymous with
organizational oversight by
various committees, internal auditors, and external auditors.
This was a costly, misleading,
and disempowering approach because businesses did not make
IT governance (risk and
compliance) investments a high priority (Meyer 2004). An
alternative, and better, approach
makes compliance integral, not incremental, by embedding IT
controls throughout the or-
ganization’s business processes (PricewaterhouseCoopers
2004). Embedded controls ensure
compliance at the time of the business process entry, making
employees systematically
follow governance directives, ultimately changing the
organizational culture (Heffes 2004;
Meyer 2004).
While corporate governance and ERM are rising into
prominence, investors are increas-
ingly IT-literate and sophisticated, now worrying about IT’s
risk to operations, and scruti-
nizing IT investments and system efficiency (Huber 2002).
Together these forces drive the
demand for a new type of governance, ‘‘IT governance,’’ which
coordinates IT with business
objectives to establish effective IT controls efficiently (ITGI
2004). The relationship be-
tween IT and governance exhibits ‘‘reciprocal causation.’’ In
other words, they feed into,
shape, and fuel the demand for each other (Hamaker 2004).
Organizations can also use IT—as an enabler—to help comply
with SOX Sec. 404
requirements that external auditors attest to management’s
assessment of the effectiveness
of internal controls relevant to financial reporting. In fact,
PCAOB Auditing Standard No.
2 encourages the implementation of entirely IT automated
application controls by allowing
the external auditor to utilize a benchmarking (and audit
efficiency-increasing) strategy
when there are effective IT general controls. The PCAOB’s
rationale seems to be that
entirely IT automated application controls are not subject to
breakdowns resulting from
human failure (e.g., error, complacency, distraction) and, once
properly defined, should
continue to perform effectively (PCAOB 2005). This new
environment requires controls
that are automatic, dynamic, integrated, preventive, multi-
compensating, real-time, and in-
clude sound authentication procedures and secured audit trails
(Parker 2001), which can
only be accomplished through automated IT controls.
212 Weidenmier and Ramamoorti
Journal of Information Systems, Spring 2006
But, do controls implemented in organizations achieve these
high standards? Despite
the increased demand for IT controls, even the largest
organizations still use manual controls
for compliance processes—increasing the likelihood of
compliance failures considerably
(PricewaterhouseCoopers 2004) and leading to the question:
Why do most companies still
continue to use manual compliance controls? Is it because IT
usage has generated significant
operational problems (see ITGI 2004)? Or is IT implementation
too costly? Perhaps senior
management is still wary of utilizing IT for governance-related
activities because they are
unfamiliar with its deployment or unsure of its impact.
IT can automatically monitor control effectiveness and changes
and automatically iden-
tify control weaknesses in ERPs. Organizations can also use IT
for ‘‘corrective control’’
purposes to identify these gaps, e.g., control mapping with
alarms and alerts (Alles et al.
2004) and segregation of duties analysis software (Lightle and
Vallario 2003). How effective
are these monitoring and corrective controls? Are there
systematic differences (e.g., IT
placement in organization, existence of integrated IT
governance process, IAF character-
istics) in the companies that use these IT controls versus those
that do not?
SOX Sec. 404 requires that a control framework be used but
does not specify which
framework. Perhaps the most popular choice is the 1992 Internal
Control-Integrated Frame-
work by COSO. Despite its formal publication and release over
a decade ago, many users
are unfamiliar with the COSO framework, particularly as it
interacts with IT applications.
Few firms showed interest in COSO until SOX’s passage (Alles
et al. 2004; Hermanson
2000). Other potential control frameworks include CobiT
(Information Systems Audit and
Control Foundation, ISACA), e-SAC (IIA), CoCo (Canadian
COSO) and SAS Nos. 55, 78,
and 94 (AICPA Professional Standards). (See Hermanson et al.
[2000]; Curtis and Wu
[2000]; Colbert and Bowen [2005] for a comparison of the
frameworks.)1
Because of the new SOX 404 disclosure requirements,
researchers can more easily
identify which control framework organizations use to evaluate
their controls for initial (and
subsequent) annual report filings. Promising research questions
include: Are there system-
atic differences in the framework selection (i.e., industry, size,
IAF characteristics, IT char-
acteristics, external auditor, supply partner integration, or
international presence)? Are there
systematic control weaknesses in certain industries? How does
an organization’s Sec. 404
internal control opinion affect the overall audit opinion?
Carcello et al. (2002) examine
audit committee disclosures and state that future research can
determine (1) whether com-
panies with more complete disclosures have fewer internal
control failures and (2) whether
enhanced disclosures improve internal control effectiveness.
The new SOX 404 internal
control attestation report should help answer these two
questions as well as other gover-
nance questions about the interactions among the audit
committee, the external auditor, the
IAF, management’s assessment of the effectiveness of controls
over financial reporting, and
financial-reporting quality.
Obtaining better internal control effectiveness requires answers
to the following ques-
tions: Which (COSO) control components are the strongest and
weakest in organizations?
How does the selected framework affect the (IT) audit? Are
internal controls more effective
when the organization has a well-developed ERM process?
Moreover, PCAOB Auditing
Standard No. 2 does not prescribe the scope or the required
amount of testing of internal
1 CobiT stands for Control Objectives for Information and
Technology. eSAC is the electronic version of the IIA’s
Systems Auditability and Control guidance. CoCo stands for
Criteria of Control developed by the Canadian
Criteria of Control Board. SAS 55 is the AICPA’s Statement of
Auditing Standard No. 55 (SAS No. 55) titled
The Consideration of the Internal Control Structure in a
Financial Statement Audit. SAS No. 78 amends SAS
No. 55. SAS No. 94 is titled The Effect of Information
Technology on the Auditor’s Consideration of Internal
Control in a Financial Statement Audit.
Research Opportunities in Information Technology and Internal
Auditing 213
Journal of Information Systems, Spring 2006
controls (Brady and Postal 2005). How much testing is needed
to be effective? Research
is needed to determine which method(s) might be best for
evaluating controls, how much
testing is needed to be effective, and whether SOX has changed
the IAF’s priorities and
use of resources as well as how it views, evaluates, and
monitors controls? Furthermore, a
survey by ACL Services Ltd. and the Center for Continuous
Auditing finds that 67 percent
of organizations do not have a budget for continued compliance
with SOX after the initial
filing deadline, indicating a short-term compliance response
(Anonymous 2004). Research
is needed to determine the long-term effects and effectiveness
of SOX and compliance by
organizations.
Finally, large organizations (with over $5 billion in revenues)
are spending approxi-
mately $4.36 million to comply with SOX Sec. 404, which
requires management to assess
the organization’s internal controls only over financial reporting
(Levinsohn 2005). Given
the increased focus on sound corporate governance by SOX,
internal auditors could reduce
organizational risk by expanding the audit scope to include the
entire underlying database.2
In other words, ‘‘substance attestation’’ may shift to ‘‘process
attestation’’ through contin-
uous control monitoring techniques that focus on the process
rather than the financial state-
ment numbers generated (Pacini and Sinason 1999). Are internal
auditors adjusting their
audit procedures (appropriately) for increased IT usage and the
audit of the entire opera-
tional database? What barriers, if any, exist?
IV. SECURITY AND PRIVACY COMPLIANCE ASSESSMENT
Internal controls also help ensure compliance with applicable
laws and regulations
(COSO 2004a, 109), an activity that becomes even more
important in heavily regulated
industries such as healthcare and financial services.
Accordingly, yet another significant
governance activity performed by internal auditors is
compliance assessment. We develop
research questions focusing on two increasingly important areas
of compliance—privacy
and security. Privacy and security have been identified as two
of the ‘‘Ethical Issues of the
Information Age’’ (Mason 1986; Sutton et al. 1999). They help
ensure data integrity to
support the governance and risk processes and must be part of
the ERM process. IT acts
as both a driver and enabler for compliance. As a driver, IT
poses additional security and
privacy risks of its own (e.g., cyber-security breaches, or
unauthorized disclosure of con-
fidential consumer information). As an enabler, IT can help
mitigate these risks.
Personal privacy is eroding as IT enables organizations to
collect, store, and ubiqui-
tously retrieve more consumer information than ever before,
e.g., using cookies, web bugs,
and port scans (Spinello 1998; King 2001). IT increases the risk
that information may be
accidentally or maliciously compromised, through hacking or
other forms of ‘‘cyber-
terrorism.’’ Given this environment, several laws have been
passed to protect the privacy
of consumers such as the Health Insurance Portability and
Accountability Act (HIPAA),
the Children’s Online Privacy Protection Act (COPPA), the
Identity Theft and Assumption
Deterrence Act, and the Gramm-Leach-Bliley Act (GLBA).
Noncompliance with these
laws, as well as failure to protect other data, exposes the
organization to potential lawsuits,
financial losses, and loss of reputation (cf. Cravens et al. 2003).
International organizations that operate or trade in Europe must
also contend with the
1995 European Union (E.U.) Data Protection Directive
(Directive 95 / 46 / EC) for the strict
privacy of consumer information or personally identifiable
information (PII). The E.U. will
prevent noncomplying organizations from transferring paper and
electronic customer data
2 This discussion of database audits was inspired by Dr. Brad
M. Tuttle’s remarks on January 7, 2005, at the
AAA Information Systems Section Midyear Meeting 2005.
214 Weidenmier and Ramamoorti
Journal of Information Systems, Spring 2006
from European to U.S. operations. To do business in Europe
now, the U.S. Department
of Commerce must certify that an organization complies with
the U.S. Safe Harbor Pri-
vacy Principles (notice, choice, onward transfer, security, data
integrity, access, and
enforcement).3
Internal auditors can assess their organization’s privacy
measures via a privacy impact
assessment (PIA). PIA is a generic framework for mapping data
sources and uses to data
privacy regulations (Kenny 2004). With this framework,
internal auditors can assess the
current state of privacy provisions and monitor future
configuration changes. Internal au-
ditors need to understand the laws, how they affect their
organization, and how to mitigate
the risk through proper IT security measures. Given the growing
need for sound privacy
measures, research is needed to better understand the privacy
environment. Jamal et al.
(2003, 2005) examine the privacy policies of high-traffic
websites in the United States and
heavily regulated United Kingdom and find that most
organizations in both countries follow
stated policies. They also state that compliance with U.K.
disclosure requirements is poor,
but regulations appear to reduce the use of cookies.
Unfortunately, they do not have data
on the substantive tests to verify compliance. This leaves
unanswered the issue of how
organizations assure compliance. Do internal auditors actively
assess compliance with ap-
plicable privacy laws? Do websites with lower levels of traffic
ensure compliance? Do
different stakeholders in non-E.U. jurisdictions reward
organizations that conform to the
higher privacy standards of the E.U. Directive?
To help ensure privacy, organizations are implementing a
variety of security measures
to protect themselves from external and internal threats. In fact,
information security has
been the number one technology concern in the United States
for the last three years
(AICPA 2005). The importance of security is unsurprising given
that more than ten new
vulnerabilities are created each day (Cohen 2005). Furthermore,
the importance of security
is highlighted by the ERM Framework that states ‘‘[given the]
growing reliance on infor-
mation systems at the strategic and operational level’’ new
security risks ‘‘such as in-
formation security breaches or cyber-crimes ... must be
integrated into the entity’s ERM’’
(COSO 2004a, 69).
Security includes considerations such as system confidentiality
(restricting access to
authorized users), and system integrity as well as ongoing
system availability. Organizations
must establish an enterprise-wide information security program
that uses IT to enforce data
protection rules (Hargraves et al. 2003). Organizations must
also ensure that systems are
not affected by viruses or worms that may unintentionally
distribute personal information
in violation of privacy laws (King 2001). Potential privacy and
security IT tools include
biometrics (Chandra and Calderon 2003), encryption (Friedlob
et al. 1997), and attack
simulation (Cohen 2005).
To prevent becoming victims of cyber-crimes, organizations are
beginning to use ‘‘eth-
ical hacking’’ (also known as penetration testing or
vulnerability testing) to evaluate the
effectiveness of their information security measures (CICA
2003). After a cyber-crime,
computer forensics can preserve, identify, extract, and
document computer evidence for use
in a criminal or civil court of law (Marcella and Greenfield
2002). Properly trained internal
auditors can utilize IT tools and knowledge to collect evidence
from computers, networks,
and the Internet to investigate acts that are illegal, unethical, or
against organizational policy
and involve a computer. The use of ethical hacking and
computer forensics are in their
infancy; therefore research should determine the appropriate
level of in-house (and IAF)
3 A list of companies that are Safe Harbor certified can be
found at http: / / web.ita.doc.gov / safeharbor / shlist.nsf
/ webPages / safe�harbor�list.
Research Opportunities in Information Technology and Internal
Auditing 215
Journal of Information Systems, Spring 2006
knowledge of computer forensic techniques. In addition, how
effective and pervasive is
ethical hacking? What is the most effective way for
organizations to obtain forensics ex-
pertise—outsourcing, co-sourcing, or in-house?
The IAF must periodically assess security provisions.
Particularly in the wake of Hur-
ricane Katrina, a viable and tested disaster recovery plan must
be in place to provide for
operational continuity in the face of unforeseen disturbances.
Internal auditors must under-
stand how to mitigate security risk through proper IT security
controls. Surprisingly,
Ivancevich et al. (1998) find that the existence and size of the
IAF is not associated with
(perceived) disaster recovery plan strength. Additional research
can help identify appropri-
ate metrics for internal auditors to measure the impact of a
privacy or security breach and
improve disaster recovery plans. What is the best method to
determine the financial impact
of computerized system intrusion (cf. Garg et al. 2003)?
V. CONCLUSION
IT changes and the SOX corporate governance reform
legislation continue to exert a
tremendous impact on how internal auditing evolves as a
profession. Despite these devel-
opments, research in IT and IAF is largely uncharted territory
that promises to become
fertile ground with an abundance of research possibilities. Our
goal in this paper is not to
be exhaustive but rather to stimulate IT-related research in
internal auditing in the areas of
risk assessment, control assurance, and security and privacy
compliance. The IAF and IT
are both integral components of these three areas.
IT plays the dual role as a driver and an enabler in all three
areas. For example,
regarding risk assessment, IT increases organizational risk. At
the same time, IT can be a
tool to implement the eight ERM components to mitigate risk.
Regarding control assurance,
IT’s risk to operations drives the demand for IT governance,
which coordinates IT with
business objectives to establish effective IT controls by
embedding controls into business
processes. IT makes compliance integral, helping organizations
comply with increasing
regulatory requirements like SOX Sec. 404. Regarding security
and privacy compliance, IT
increases security and privacy risks because organizations store
more information than ever
before, which can be compromised in violation of privacy laws.
Fortunately, IT can help
mitigate these risks as well.
The IAF must not only understand the IT used by the
organization, but it must also
understand applicable regulatory and privacy laws—how the
laws affect its organization,
and how to use IT to ensure compliance. In addition, the IAF
should use the appropriate
level of IT sophistication to evaluate and monitor organizational
risk, controls, and com-
pliance (i.e., requisite variety). Moreover, understanding how
the IAF should and does relate
to IT will help improve the corporate governance process and
the quality of financial
reporting.
REFERENCES
Addison, S. 2001. Risk and governance issues for ERP
enterprise applications. IS Control Journal
(4): 53–54.
Alles, M., A. Kogan, and M. Vasarhelyi. 2004. The law of
unintended consequences? Assessing the
costs, benefits, and outcomes of the Sarbanes-Oxley Act. IS
Control Journal (1): 17–21.
American Institute of Certified Public Accountants (AICPA).
2005. Information security tops technical
issues for 2005. AccountingWeb (January 4). Available at: http:
/ / www.accountingweb.com / cgi-
bin / item.cgi?id�100297.
216 Weidenmier and Ramamoorti
Journal of Information Systems, Spring 2006
Anonymous. 2004. Continuous monitoring, auditing needed for
Sarbanes-Oxley. Financial Executive
(September): 19.
Apostolou, B. A., J. M. Hassell, S. A. Webber, and G. E.
Summers. 2001. The relative importance
of management fraud risk factors. Behavioral Research in
Accounting (May): 1–24.
Arnold, V., and S. G. Sutton, eds. 2002. Research Accounting as
an Information Systems Discipline.
Sarasota, FL: American Accounting Association.
Bae, B., and P. Ashcroft. 2004. Implementation of ERP systems:
Accounting and auditing implica-
tions. The Information Systems Control Journal (4): 43–48.
Bailey, A. D., Jr., A. A. Gramling, and S. Ramamoorti, eds.
2003. Research Opportunities in Internal
Auditing. Altamonte Springs, FL: The Institute of Internal
Auditors Research Foundation.
Blocher, E. 1993. The Role of Analytical Procedures in
Detecting Management Fraud. Montevale,
NJ: Institute of Management Accountants.
Blue Ribbon Committee (BRC). 1999. Report and
Recommendations of the Blue Ribbon Committee
on Improving the Effectiveness of Corporate Audit Committees.
Stamford, CT: BRC.
Boritz, J. E. 2002. Information systems assurance. In Research
Accounting as an Information Systems
Discipline, edited by V. Arnold, and S. G. Sutton. Sarasota, FL:
American Accounting Asso-
ciation Information Systems Section.
Bradbury, M. E., and P. Rouse. 2002. An application of data
envelopment analysis to the evaluation
of audit risk. ABACUS (June): 263–279.
Brady, M., and A. D. Postal. 2005. Tweaking SOX: Regulators
ease up on compliance cost. National
Underwriter Property & Casualty Risk & Benefits Management
Edition (May 23): 31–32.
Canadian Institute of Chartered Accountants (CICA). 2003.
Using Ethical Hacking Technique to
Assess Information Security Risk. Toronto, ON: The Canadian
Institute of Chartered
Accountants.
Caplan, D., and C. Emby. 2003. An investigation of whether
outsourcing the internal audit function
affects internal controls. Working paper, Iowa State University
and Simon Fraser University.
Carcello, J. V., D. R. Hermanson, and T. L Neal. 2002.
Disclosures in audit committee charters and
reports. Accounting Horizons (December): 291–304.
Cash, J. I., Jr., A. D. Bailey Jr., and A. B. Whinston. 1977. A
survey of techniques for auditing EDP-
based accounting information systems. The Accounting Review
(October): 812–831.
Chandra, A., and T. G. Calderon. 2003. Toward a biometric
security layer in accounting systems.
Journal of Information Systems (Fall): 51–70.
Church, B. K., and A. Schneider. 1995. Internal auditors’
memory for financial statement errors.
Behavioral Research in Accounting 7: 17–36.
———, J. J. McMillan, and A. Schneider. 2001. Factors
affecting internal auditors’ consideration of
fraudulent financial reporting during analytical procedures.
Auditing: A Journal of Practice &
Theory (March): 65–80.
Cohen, G. 2005. The role of attack simulation in auditing
security risk management. The Information
Systems Control Journal (1): 51–54.
Colbert, J. L., and P. L. Bowen. 2005. A comparison of internal
controls. Available at: http: / /
www.isaca.org /
PrinterTemplate.cfm?Section�Home&CONTENTID�8174&TE
MPLATE� /
ContentManagement / ContentDisplay.cfm.
Committee of Sponsoring Organizations (COSO). 2004a.
Enterprise Risk Management-Integrated
Framework: Executive Summary Framework. Jersey City, NJ:
AICPA.
———. 2004b. Enterprise Risk Management-Integrated
Framework: Application Techniques. Jersey
City, NJ: AICPA.
———. 2004c. Applying COSO’s enterprise risk management-
integrated framework. (September 29).
Slideshow. Available at: http: / / www.coso.org /
publications.htm.
Cravens, K., E. Oliver, and S. Ramamoorti. 2003. The
reputation index: Measuring and managing
corporate reputation. European Management Journal 21 (2):
201–212.
Curtis, M. B., and F. H. Wu. 2000. The components of a
comprehensive framework of internal control.
The CPA Journal (March): 64–66.
Research Opportunities in Information Technology and Internal
Auditing 217
Journal of Information Systems, Spring 2006
Fox, C., and P. Zonneveld. 2004. IT Control Objectives for
Sarbanes-Oxley: The Importance of IT in
the Design, Implementation, and Sustainability of Internal
Control over Disclosure and Finan-
cial Reporting. Rolling Meadows, IL: Guidance document:
Information Technology Governance
Institute.
Friedlob, G. T., F. J. Plewa, L. L. F. Schleifer, and C. D. Schou.
1997. An Auditor’s Guide to En-
cryption. Altamonte Springs, FL: The Institute of Internal
Auditors Research Foundation.
Garg, A., J. Curtis, and H. Halper. 2003. The financial impact
of IT security breaches: What do
investors think? Information Systems Security (March / April):
22–32.
Gendron, Y., J. Bedard, and M. Gosselin. 2004. Getting inside
the black box: A field study of practices
in ‘‘effective’’ audit committees. Auditing: A Journal of
Practice & Theory (Spring): 153–171.
Gorman, J. F., and J. M. Hargadon. 2005. Accounting futures:
Healthy markets for a time-honored
profession. Journal of Financial Service Professionals
(January): 74–79.
Grabski, S. V. 1986. Auditor participation in accounting
systems design: Past involvement and future
challenges. Journal of Information Systems (Fall): 3–23.
———, J. H. Reneau, and S. G. West. 1987. A comparison of
judgment, skills, and prompting effects
between auditors and system analysts. MIS Quarterly (June):
151–161.
Gramling, A. A., M. J. Maletta, A. Schneider, and B. K. Church.
2004. The role of the internal audit
function in corporate governance: A synthesis of the extant
internal auditing literature and
directions for future research. Journal of Accounting Literature
23: 194–244.
Hamaker, S. 2004. Principles of IT governance. The Information
Systems Control Journal 2: 47–50.
Hargraves, K., S. B. Lione, K. L. Shackelford, and P. C. Tilton.
2003. Privacy: Assessing the risk.
Altamonte Springs, FL: The Institute of Internal Auditors
Research Foundation.
Heffes, E. M. 2002. PWC’s 10 imperatives for internal audit
transformation. Financial Executive
(June): 61.
———. 2004. Is software the solution for Sarbanes-Oxley?
Financial Executive (June): 19–20.
Hermanson, D., M. C. Hill, and D. M. Ivancevich. 2000.
Information technology-related activities of
internal auditors. Journal of Information Systems (Supplement):
39–53.
Hermanson, D. R., and L. E. Rittenberg. 2003. Internal audit
and organizational governance. In Re-
search Opportunities in Internal Auditing, edited by A. D.
Bailey, A. A. Gramling, and S.
Ramamoorti. Altamonte Springs, FL: The Institute of Internal
Auditors Research Foundation.
Hermanson, H. M. 2000. An analysis of the demand for
reporting on internal control. Accounting
Horizons (September): 325–341.
Huber, N. 2002. Business scandals put IT on the spot. Computer
Weekly (September): 16.
Hunton, J. E. 2002. The participation of accountants in all
aspects of AIS. In Researching Accounting
as an Information Systems Discipline, edited by V. Arnold and
S. G. Sutton. Sarasota, FL:
American Accounting Association Information Systems Section.
———, A. M. Wright, and S. Wright. 2004. Are financial
auditors overconfident in their ability to
assess risks associated with enterprise resource planning
systems? Journal of Information Sys-
tems (Fall): 7–28.
Institute of Internal Auditors (IIA). 2004. The Professional
Practices Framework. Altamonte Springs,
FL: The Institute of Internal Auditors.
IT Governance Institute (ITGI). 2004. IT Governance Global
Status Report. Rolling Meadows, IL:
The IT Governance Institute.
Ivancevich, D. M., D. R. Hermanson, and L. M. Smith. 1998.
The association of perceived disaster
recovery plan strength with organizational characteristics.
Journal of information Systems
(Spring): 31–40.
Jamal, K., M. Maier, and S. Sunder. 2003. Privacy in e-
commerce: Development of reporting stan-
dards, disclosure, and assurance services in an unregulated
market. Journal of Accounting Re-
search (May): 285–310.
———, ———, and S. Sunder. 2005. Enforced standards versus
evolution by general acceptance: A
comparative study of e-commerce privacy disclosure and
practice in the United States and the
United Kingdom. Journal of Accounting Research (March): 73–
96.
218 Weidenmier and Ramamoorti
Journal of Information Systems, Spring 2006
Kenny, S. 2004. Assuring data privacy compliance. The
Information Systems Control Journal 4: 31–
33.
King, C. G. 2001. Protecting online privacy. The CPA Journal
(November): 66–67.
Kinney, W. R. 2003. Auditing risk assessment and risk
management processes. In Research Oppor-
tunities in Internal Auditing, edited by A. D. Bailey, A. A.
Gramling, and S. Ramamoorti.
Altamonte Springs, FL: The Institute of Internal Auditors
Research Foundation.
Kleffner, A. E. 2003. The effect of corporate governance on the
use of enterprise risk management:
Evidence from Canada. Risk Management & Insurance Review
(Spring): 53–74.
Krishnamoorthy, G. 2001. A cascaded inference model for
evaluation of the internal audit report.
Decision Sciences (Summer): 499–520.
———. 2002. A multistage approach to external auditors’
evaluation of the internal audit function.
Auditing: A Journal of Practice & Theory (March): 95–121.
Leithhead, B. S., and D. McNamee. 2000. Assessing
organizational risk. Internal Auditor (June): 68–
69.
Levinsohn, A. 2005. First-year verdict of SOX 404:
Burdensome, costly, and confusing. Strategic
Finance (June): 67–68.
Lightle, S. S., and C. W. Vallario. 2003. Segregation of duties
in ERP. Internal Auditor (October):
27–31.
Marcella, A. J., and R. S. Greenfield, eds. 2002. Cyber
Forensics: A Field Manual for Collecting,
Examining, and Preserving Evidence of Computer Crime. Boca
Raton, FL: Auerbach
Publications, CRC Press LLC.
Mason, R. 1986. Four ethical issues of the Information Age.
MIS Quarterly 10 (1): 5–12.
McNamee, D., and G. M. Selim. 1998. Risk Management:
Changing the Internal Auditor’s Paradigm.
Altamonte Springs, FL: The Institute of Internal Auditors
Research Foundation.
Meyer, N. D. 2004. Systematic IS governance: An introduction.
Information Systems Management
(Fall): 23–34.
Mock, T. J., and A. M. Wright. 1999. Are audit programs risk-
adjusted? Auditing: A Journal of
Practice & Theory (Spring): 55–74.
National Commission on Fraudulent Financial Reporting (the
Treadway Commission). 1987. Report
of the National Commission on Fraudulent Financial Reporting.
Washington, D.C.: Government
Printing Office.
Nehmer, R. 2003. Transaction agents in eCommerce, A
generalized framework. In Trust and Data
Assurances in Capital Markets: The role of technology solution,
edited by S. J. Roohani. Smith-
field, RI: PricewaterhouseCoopers.
O’Leary, D. E. 2000. Enterprise Resource Planning Systems:
Systems, Life Cycle, Electronic Com-
merce, and Risk. Cambridge, U.K.: Cambridge University Press.
———. 2002. Discussion of information system assurance for
enterprise resource planning systems:
Unique risk considerations. Journal of Information Systems
(Supplement): 115–126.
Ozier, W. 2003. Risk metrics needed for IT security. ITAudit
(April 1). Available at: http: / / www.
theiia.org / itaudit / index.cfm?fuseaction�print&fid�5396.
Pacini, C., and D. Sinason. 1999. The law and CPA Webtrust.
Journal of Accountancy (February):
20–25.
Parker, X. L. 2001. An e-Risk Primer. Altamonte Springs, FL:
The Institute of Internal Auditors
Research Foundation.
PricewaterhouseCoopers. 2003. Technology Forecast: 2003–
2005. Menlo Park, CA:
PricewaterhouseCoopers.
———. 2004. Integrity driven performance. Available at: http: /
/ www.pwcglobal.com / images / gx /
eng / about / svcs / grms / PwC GRC WP.pdf.
Public Company Accounting Oversight Board (PCAOB). 2005.
Staff questions and answers on Au-
diting Standard No. 2—Internal Control. Available at: http: / /
www.pcaob.org / Standards / Staff
Questions and Answers / Auditing Internal Control over
Financial Reporting 2005-05-
16.pdf.
Research Opportunities in Information Technology and Internal
Auditing 219
Journal of Information Systems, Spring 2006
Ramamoorti, S., and R. O. Traver. 1998. Using Neural
Networks for Risk Assessment in Internal
Auditing: A Feasibility Study. Altamonte Springs, FL: The
Institute of Internal Auditors Re-
search Foundation.
———, and M. L. Weidenmier. 2004. The Pervasive Impact of
Information Technology on Internal
Auditors. Altamonte Springs, FL: The Institute of Internal
Auditors Research Foundation.
Rezaee, Z., A. Sharbatoghlie, R. Elam, and P. L. McMickle.
2002. Continuous auditing: Building
automated auditing capability. Auditing: A Journal of Practice
& Theory (March): 147–163.
Searcy, D. L., and J. B. Woodroof. 2003. Continuous auditing:
Leveraging technology. The CPA
Journal (May): 46–48.
Sobel, P. J., and K. F. Reding. 2004. Aligning corporate
governance with enterprise risk management.
Management Accounting Quarterly (Winter): 29–37.
Spinello, R. 1998. Privacy rights in the information economy.
Business Ethics Quarterly (October 4):
723–763.
Sutton, S. G., T. D. Arnold, and V. Arnold. 1999. An integrative
framework for analysis of the ethical
issues surrounding information technology integration by the
audit profession. Research on
Accounting Ethics 5: 21–36.
Tillinghast-Towers Perrin. 2001. Enterprise Risk Management:
Trends and Emerging Practices. Al-
tamonte Springs, FL: Institute of Internal Auditors Research
Foundation.
Wah, L. 2000. Give ERP a chance. Management Review
(March): 20–23.
Weick, K. E. 1969. The Social Psychology of Organizing.
Reading, MA: Addison-Wesley.
———. 1979. Social Psychology of Organizing. Reading, MA:
Addison-Wesley.
Wright, S., and A. M. Wright. 2002. Information system
assurance for enterprise resource planning
systems: Unique risk considerations. Journal of Information
Systems (Supplement): 99–114.
Wu, R. 1992. The information systems auditor’s review of the
systems development process and its
impact on software maintenance costs. Journal of Information
Systems (Spring): 1–13.
Zimbelman, M. F. 1997. The effects of SAS No. 82 on auditors’
attention to fraud risk factors and
audit planning decisions. Journal of Accounting Research
(Supplement): 75–97.
R. Ehrgott 1/6 01/28/01
The format to be used for the laboratory reports consists of
several
sections. Each section has a name, which appears in the
heading, and is
underlined. For example: Introduction
The sequence and description of the elements for the report will
be as
follows:
1. Title Page
All reports require a title page with the name and number of the
experiment, name of the author, date experiment is performed,
and
date report is submitted. A title page is given at the end of this
section.
2. Abstract
One paragraph, approximately 125 to 200 word summary of
what is
contained in the report. The abstract goes on the title page.
Abstracts are important because they give a first impression of
the
document that follows. Electronic databases may only store the
Abstract so it is important to write a complete, concise
description of
your work. The Abstract must include:
• Motivation: Why is it important to do this experiment? Why
do
we care about the problem and the results?
• Scope: What problem are you trying to solve?
• Approach: A clear description of what was tested and how.
What were the key variables?
• Result: What were your key results? Key results, for example,
might
be the modulus of elasticity of a material determined or that
stress was
found to be proportional to strain. Avoid presenting too much
data here.
R. Ehrgott 2/6 01/28/01
Example of an 180 word abstract:
ABSTRACT
Numerous joint injuries are reported each year related to the
sport of
running. If runners could reduce the impact forces at their
joints, injuries
could be prevented. This research addresses understanding the
mechanics
related to the impact forces produced while running. Tests were
conducted
on a treadmill at three different speeds, 3, 5 and 7 MPH. Five
different
runners were instrumented with accelerometers located at the
ankle, knee,
and lower back. Using a computer data acquisition system,
acceleration
was recorded simultaneously at the three locations. From the
measured
accelerations, estimates of the joint forces were obtained from
Newton’s
Second Law (F = Ma). Fourier transforms or the acceleration
records were
also obtained to determine key frequencies at which the body
vibrates
when leg impact with the ground occurs. Results indicate all
runners have
a similar vibration response at the instrumented locations. It
was observed
that the knee experienced the largest acceleration at all three
speeds. The
knee acceleration measured was approximately 5 G’s or five
times the
acceleration of gravity. Joint forces are also presented for the
different
runners at the various speeds.
3. Introduction
A brief background on the subject to tell the reader why the
experiment was performed (motivation). Also include
background
material that may be required for the reader to follow what you
are
presenting.
4. Theory
The theory is an important part of the report. This is especially
true
if experiments are generally conducted to verify, evaluate, or
illustrate theories. Present all key equations used in the
experiment.
Each equation should be numbered and the text should refer to
this
equation number. Derivations of key equations could be
referenced
to and appropriate text. Assumptions and limitations of the
theory
are also important to mention.
Motivation, why do
this Experiment ?
Scope, what problem
are you solving ?
Results, key results
found.
Approach, what was
done and how ?
R. Ehrgott 3/6 01/28/01
5. Test Procedure
In this section describe the test procedure that is not detailed in
the
manual. Do not copy procedures which are described in the lab
manual. However, do describe any variations. Specific
numerical
values used in the test should be presented. The description of
work
should contain sufficient information so that someone who is
familiar with the standard procedures and has access to the lab
manual could duplicate your test.
6. Results
This is the most important section of the report! This is where
you
clearly present your hard work. Review what the objectives of
the
experiment were prior to writing this section. The results you
present
should be in agreement with the goal of the experiment. In this
section clearly describe to the reader each Figure and Table of
results you present. Make sure to use Figure and Table numbers
(Figure 1 shows the …). Never include the raw data, which goes
in
the appendix. Tables and Figures should Include:
a. Tables - Significant experimental results as well as
theoretical
results should be presented in Tables. Tables of raw test data
should be put in the Appendix. Tables should be titled and
numbered consecutively, using Roman numerals (Table I,
Table II, etc).
b. Figures - Graphs are generally the best means of presenting
and visualizing results. Because of their importance, care
should be taken when constructing them. A spreadsheet
program is recommended for creating graphs. Coordinate
axes should be carefully labeled and include the proper units.
Data points should be clearly shown using suitable symbols.
If more than one curve occurs on a graph, each curve should
be clearly distinguished and labeled. The graph should
contain a suitable title and have a Figure number. Number
Figures, consecutively, using Arabic numerals (Figure 1,
Figure 2, etc.).
7. Discussion and Conclusions
In this section, briefly summarize what the experiment
demonstrated
and what you have learned. Compare the test results with
standard
or typical values and present possible explanations of any
significant differences. Any unusual or unexpected
observations,
which were made during the experiment, should be noted and
R. Ehrgott 4/6 01/28/01
discussed. Do the experimental results compare favorably with
expected results? If not, why?
8. Appendix
The following should be placed in an appendix at the end of the
report.
a. Sample Calculations - Present a sample of each type of
calculation performed using the experimental data as well as
any other required calculation.
b. Original Data Sheets - Raw data obtained and recorded
during
the experiment.
c. Copies of charts of data which were recorded automatically
would be included in the appendix as well as any tables or
figures not necessarily pertinent to or not referred to in the
Results or Discussion sections.
GENERAL NOTES
1. Use a word processor or type or print clearly in ink.
2. Number all pages, tables and figures, consecutively.
3. A spreadsheet program is recommended for creating graphs
and
performing data reduction. If drawn by hand, curves on graphs
may
be drawn in pencil.
4. Use correct grammar, spelling (use spell checker!),
abbreviations
and punctuation.
5. Folders are not to be used. Staple the report together with a
single
staple in the upper left-hand corner.
6. The experimental test data will be the same for each member
of the
group. However, each student will present the report as
independent
work. All calculations, data presentation, discussion and
conclusions
shall represent your individual effort.
7. FINALLY - remove all unnecessary words!
R. Ehrgott 5/6 01/28/01
Example Title Page
AM 317
MECHANICS LAB
EXPERIMENT 1
BEAM DEFLECTIONS
TEST PERFORMED: FEBRUARY 8, 2002
REPORT SUBMITTED: FEBRUARY, 15, 2002
BY
I.T. HARDER
GROUP 3
ABSTRACT
APPROXIMATELY 125 TO 250 WORDS INCLUDE:
• Motivation: Why is it important to do this experiment? Why
do we care about the problem and the results?
• Scope: What problem are you trying to solve?
• Approach: A clear description of what was tested and how.
What were the key variables?
• Result: What were your key results? Key results, for example,
might be the modulus of elasticity of a material determined or
that
stress was found to be proportional to strain. Avoid presenting
too
much data here.
R. Ehrgott 6/6 01/28/01
REFERENCES ON REPORT WRITING
Michaelson, Herbert, How to Write & Publish Engineering
Papers and
Reports, Oryx Press, 1990.
Brown, John Fiske, A Students Guide to Engineering Report
Writing, John
Fiske Brown Associates, Solana Beach, Ca 1982.
Eisenberg, Anne, Effective Technical Communication, McGraw-
Hill, NY
1982.
Weiss, Edmond H., The Writing System for Engineers and
Scientists,
Prentice-Hall, Englewood Cliffs, NJ 1982
ABSTRACTGENERAL NOTESExample Title PageAM
317EXPERIMENT 1I.T. HARDERREFERENCES ON REPORT
WRITING
MECHANICS LAB
AM 317
EXP 9
TWO-PINNED ARCH
I. OBJECTIVES
I.1 To explore the relationship between the loads and the
horizontal reaction
force in a two-pinned arch.
I.2 To determine the horizontal thrust force and reaction
influence lines for a
point load moving across a two-pinned arch.
I.3 To determine the horizontal thrust force for a uniformly
distributed load on a
two-pinned arch.
Figure 1 St. Louis Arch
II. INTRODUCTION AND BACKGROUND
The main advantage an arch has over a beam, is that it can carry
a much larger
load. Historically arches were important because they could be
constructed
using small, easily carried blocks of brick or stone rather than
using a massive,
monolithic stone beam or lentil. Romans used the semicircular
arch in bridges,
aqueducts, and in large-scale architecture. In most cases they
did not use
mortar, relying simply on the precision of their stone finish.
When an arch is
loaded by gravity forces, the pressure acts downward on the
arch and has the
effect of compressing it together instead of pulling it apart. A
free-body diagram
of the arch supports shows the arch requires both horizontal and
vertical reaction
R. Ehrgott (Created) 2/7 03/31/01
T. Hao (Revised) 08/28/16
forces (Figure 2). This horizontal reaction force, called thrust,
can cause the arch
to collapse if it is not properly restrained.
HA
HB
A B
VA VB
Figure 2 Free-Body Diagram of Two Hinged Arch.
One of the disadvantages of the arch resisting loads in
compression is the
possibility that the arch may buckle. Any practical arch design
would include
analysis involving stress, deflection and buckling. To perform
such analysis,
reaction forces, shear and moment diagrams are needed for a
given load case.
Since the arch is indeterminate, having more unknown reactions
forces than
equilibrium equations, methods such as the flexibility method
are required to
determine the reaction forces.
III. EQUIPMENT LIST
Structures test frame
Digital force display and power supply
Aluminum arch
Hangers and weights
Scale
R. Ehrgott (Created) 3/7 03/31/01
T. Hao (Revised) 08/28/16
Figure 3 Test Frame and Two Hinged Arch Set-Up
IV. PROCEDURE
• Visually inspect all parts of the test frame (including
electrical leads) for
damage or wear.
• Check that electrical connections are correct and secure.
• Check that all components are secured correctly and fastenings
are
sufficiently tight.
• Check the four securing thumbscrews are in the position
shown in Figure 3
and the rolling pivot on the right is gently resting against the
load cell.
• Make sure the digital force display is on and the force
transducer is connected
from the socket marked ‘Force Output’ on the right support, to
the Digital
Force Display ‘Force Input 1’.
R. Ehrgott (Created) 4/7 03/31/01
T. Hao (Revised) 08/28/16
• Carefully zero the force meter using the dial on the right-hand
side support.
Gently apply a small load with a finger to the crown of the arch
and release.
Zero the meter again if necessary.
NEVER apply excessive loads to any part of the equipment.
PART A
The first experiment is to measure the horizontal thrust force
HB for a single load
that is placed at increasing distances from the left support. A
theoretical
equation for the horizontal thrust force for a given load P at
location x, is given
below:
)2(
8
5 233
3 LxxLrL
Px
H B −+= 9.1
where:
HB = the horizontal thrust reaction at B (N)
P = the load (N)
L = the span of the arch (m)
x = the load location, distance from the left-hand side support
(m)
r = the Rise of the arch (m)
IV.1A Measure the necessary dimensions of the two-pinned arch
and record the
data.
IV.2A Adjust the “set zero” control on the right support so that
the digital force
reads zero.
IV.3A Apply a 100 gm load to the left most hanger and record
the thrust force.
Moving the 100 gm load to the remaining hangers and record
the thrust
force for each location. Repeat the process for a 500 gm load.
The
horizontal thrust shown on the digital force display has units of
Newton.
PART B
The second part of the experiment involves determining the
horizontal thrust
force for a uniform or distributed load w. The equation for the
thrust force is
given in Eq. (9.2).
R. Ehrgott (Created) 5/7 03/31/01
T. Hao (Revised) 08/28/16
r
wL
H B 8
2
= 9.2
where:
HB = the horizontal thrust reaction at B (N)
w = the intensity of uniform distributed loads (N/m)
L = the span of the arch (m)
r = the Rise of the arch (m)
IV.1B Adjust the “set zero” control on the right support so that
the digital force
reads zero.
IV.2B Apply 60 gm on each of the nine hangers (total of 540
gm) and record the
thrust force. Repeat the procedure with 120 gm on each hanger
(1080 gm
total).
V. REPORT
V.1 Plot the experimental and theoretical thrust force
determined in Part A of
the experiment.
V.2 Compare the theoretical and experimental thrust force for
the uniformly
loaded arch.
VI. SELECTED REFERENCES
Megson, T.H.G., Structural and Stress Analysis, 2nd edition,
Butterworth-
Heinmann, 2005, pp. 133-149.
Timoshenko, S.P., Young, D.H., Theory of Structures, 2nd
edition, McGraw
Hill Co., New York, 1965.
R. Ehrgott (Created) 6/7 03/31/01
T. Hao (Revised) 08/28/16
Table I Arch data
Rise of arch, r (m)
Length of arch, L (m)
Table II Weight data
Added mass 100 gm 500 gm
Hanger mass
Total mass
Total weight (N)
Table III Data for a point load moving across a two-pinned
arch
Load location
x (mm)
Measured thrust force
for 100 gm load (N)
Measured thrust force
for 500 gm load (N)
0 0 0
50
100
150
200
250
300
350
400
450
500 0 0
Table IV Data for a uniformly distributed load
Total
mass
(gm)
Total mass
of hangers
(gm)
Uniform
distributed
load (N/m)
Measured
thrust force
(N)
Calculated
thrust force
(N)
% Error
540
1080
R. Ehrgott (Created) 7/7 03/31/01
T. Hao (Revised) 08/28/16
MECHANICS LAB
AM 317
EXP 6
SPRINGS IN SERIES AND PARALLEL
I. OBJECTIVES
I.1 To study the relationship of springs connected in series and
parallel and
determine the equivalent spring constant.
I.2 To study the unsymmetric loading of parallel springs.
II. BACKGROUND
Springs are devices that can store and release energy. Because
of these
properties, springs are very important in engineering. It is
therefore essential
that engineers understand the different types of spring
combinations behave
when loaded.
Springs can be combined in series, parallel and in a combination
of series and
parallel. Each spring or spring system can be characterized by
its spring
constant k. The spring constant can be determined by use of
Hooke’s Law:
∆= kF 6.1
where:
F = applied force
∆ = the resulting displacement
III. EQUIPMENT
III.1 Assorted springs, hooks, and aluminum bars.
III.2 Steel scales
III.3 Steel frame
IV. PROCEDURE
IV.1 Determine the spring constant for each individual spring
using Eq. 6.1.
When determining the spring constant, be sure the spring has an
initial load
sufficient to separate the coils and remove the pretension.
Determine the
deflection due to several loads and take the average value for
the spring
constant, k. You may fit a linear trendline to the force-
deflection data to
R. Ehgott (Created) 2/7 04/07/01
T. Hao (Revised) 08/07/16
obtain the spring constant. k will be the slope m of the
trendline ( bmxy += )
and b is the initial preload required to separate the coils of the
spring.
IV.2 Set up the spring system shown in Figures 1, 2 and 3 to
determine the
equivalent spring constant for each system.
IV.3 Construct the spring system shown in Figure 4 and
determine the
equivalent spring constant. You will need to use two pairs of
springs with
matching spring constants to obtain good results.
k1
k2
FT
21 FFFT == 6.2
212
2
1
1
21 k
F
k
F
k
F
k
F TT
T +=+=∆+∆=∆ 6.3
2121
21
11
1
kkk
F
k
F
FFF
k
TT
TT
T
T
eq
+
=
+
=
∆+∆
=
∆
= 6.4
Figure 1 Springs in Series
k1 k2
FT
∆
1
∆
2
a b
L
21 ∆=∆=∆T 6.5
TTT kkkkFFF ∆+∆=∆+∆=+= 21221121 6.6
21
21 kk
kkF
k
T
TT
T
T
eq +=∆
∆+∆
=
∆
= 6.7
Location of when TF 21 kk ≠ :
L
kk
k
a
21
1
+
=
Figure 2 Springs in Parallel ( 21 ∆=∆ )
R. Ehgott (Created) 3/7 04/07/01
T. Hao (Revised) 08/07/16
k1 k2
FT
∆
1 ∆
2
a b
L
21 FFFT += 6.8
TFL
b
F =1 ; TFL
a
F =2 6.9
2
2
2
1
2
2
2
2
1
1
21
k
F
L
a
k
F
L
b
k
F
L
a
k
F
L
b
L
a
L
b
TT
T
+=
+=∆+∆=∆
6.10
2
2
1
2
2
2
2
2
1
2
2
k
a
k
b
L
k
F
L
a
k
F
L
b
FF
k
TT
T
T
T
eq
+
=
+
=
∆
= 6.11
Figure 3 Springs in Parallel – Unsymmetric Case ( 21 ∆≠∆ )
k1 k2
FT
k3 k3
k1
33121
11
1
kkkkk
keq
+
+
++
= 6.12
Figure 4 Springs in Series and Parallel
R. Ehgott (Created) 4/7 04/07/01
T. Hao (Revised) 08/07/16
V. REPORT
V.1 Plot the force versus deflection for each individual spring
and report the
stiffness for each spring in a table.
V.2 Calculate the theoretical equivalent spring constants given
by Eqs. 6.4, 6.7,
6.11 and 6.12 and compare them to the experimental values
determined.
Report the results in a table with the percent error referenced to
the
experimental values.
V.3 Discuss the results and draw appropriate conclusions.
VI. SELECTED REFERENCES
Thomson, W.T. and Dahleh, M.D., Theory of Vibration with
Applications, 5th
Edition, Pearson, 1997.
Avallone, E., Baumeister, T. and Sadegh, A., Marks’ Standard
Handbook for
Mechanical Engineers, 11th Edition, McGraw Hill, 2006.
Crandall, S.H., Dahl, N.C., Lardner, T.J., and Sivakumar, M.S.,
An
Introduction to the Mechanics of Solids, 3rd Edition, McGraw
Hill, 2012.
R. Ehgott (Created) 5/7 04/07/01
T. Hao (Revised) 08/07/16
Table I Spring Data
Spring # Force Reading Deflection Preload k
1
2
3
4
5
6
7
R. Ehgott (Created) 6/7 04/07/01
T. Hao (Revised) 08/07/16
Table II Measured Data
Spring System Force Reading Deflection Preload keq
Series
Parallel
Balanced
Parallel
Unbalanced
Series and
Parallel
R. Ehgott (Created) 7/7 04/07/01
T. Hao (Revised) 08/07/16
Research Opportunities in IT and Internal Auditing

More Related Content

Similar to Research Opportunities in IT and Internal Auditing

2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx
2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx
2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docxRAJU852744
 
Perceived significance of information security governance to predict the info...
Perceived significance of information security governance to predict the info...Perceived significance of information security governance to predict the info...
Perceived significance of information security governance to predict the info...Irfaan Bahadoor
 
2172020 Originality Reporthttpsucumberlands.blackboar.docx
2172020 Originality Reporthttpsucumberlands.blackboar.docx2172020 Originality Reporthttpsucumberlands.blackboar.docx
2172020 Originality Reporthttpsucumberlands.blackboar.docxjesusamckone
 
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docxRunning Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docxhealdkathaleen
 
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEM
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEMA DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEM
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEMIAEME Publication
 
Comparative Analysis of Information Security Governance Fram
Comparative Analysis of Information Security Governance FramComparative Analysis of Information Security Governance Fram
Comparative Analysis of Information Security Governance FramLynellBull52
 
Information Assurance Framework for Web Services .docx
Information Assurance Framework for Web Services                  .docxInformation Assurance Framework for Web Services                  .docx
Information Assurance Framework for Web Services .docxjaggernaoma
 
Implementing IT Security Controls
Implementing IT Security ControlsImplementing IT Security Controls
Implementing IT Security ControlsThomas Jones
 
The Generic IS/IT Bussiness Value Category : Cases In Indonesia
The Generic IS/IT Bussiness Value Category : Cases In IndonesiaThe Generic IS/IT Bussiness Value Category : Cases In Indonesia
The Generic IS/IT Bussiness Value Category : Cases In IndonesiaAinul Yaqin
 
GOVERNING INFORMATION SECURITY IN CONJUNCTION WITH COBIT AND ISO 27001
GOVERNING INFORMATION SECURITY IN CONJUNCTION WITH COBIT AND ISO 27001GOVERNING INFORMATION SECURITY IN CONJUNCTION WITH COBIT AND ISO 27001
GOVERNING INFORMATION SECURITY IN CONJUNCTION WITH COBIT AND ISO 27001IJNSA Journal
 
Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116
Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116
Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116Mohammed J. Khan
 
RANKING CRITERIA OF ENTERPRISE INFORMATION SECURITY ARCHITECTURE USING FUZZY ...
RANKING CRITERIA OF ENTERPRISE INFORMATION SECURITY ARCHITECTURE USING FUZZY ...RANKING CRITERIA OF ENTERPRISE INFORMATION SECURITY ARCHITECTURE USING FUZZY ...
RANKING CRITERIA OF ENTERPRISE INFORMATION SECURITY ARCHITECTURE USING FUZZY ...ijcsit
 
Sarbanes-Oxley Compliance and the RFI/RFP Process
Sarbanes-Oxley Compliance and the RFI/RFP ProcessSarbanes-Oxley Compliance and the RFI/RFP Process
Sarbanes-Oxley Compliance and the RFI/RFP ProcessCXT Group
 
Standards For Wright Aircraft Corp
Standards For Wright Aircraft CorpStandards For Wright Aircraft Corp
Standards For Wright Aircraft CorpAntoinette Williams
 
QUALITY ASSESSMENT OF ACCESS SECURITY CONTROLS OVER FINANCIAL INFORMATION
QUALITY ASSESSMENT OF ACCESS SECURITY CONTROLS OVER FINANCIAL INFORMATIONQUALITY ASSESSMENT OF ACCESS SECURITY CONTROLS OVER FINANCIAL INFORMATION
QUALITY ASSESSMENT OF ACCESS SECURITY CONTROLS OVER FINANCIAL INFORMATIONIJNSA Journal
 
Report on IT Auditing and Governance_Ta_Hoang_Thang
Report on IT Auditing and Governance_Ta_Hoang_ThangReport on IT Auditing and Governance_Ta_Hoang_Thang
Report on IT Auditing and Governance_Ta_Hoang_ThangThang Ta Hoang
 
QUALITY ASSESSMENT OF ACCESS SECURITY CONTROLS OVER FINANCIAL INFORMATION
QUALITY ASSESSMENT OF ACCESS SECURITY CONTROLS OVER FINANCIAL INFORMATIONQUALITY ASSESSMENT OF ACCESS SECURITY CONTROLS OVER FINANCIAL INFORMATION
QUALITY ASSESSMENT OF ACCESS SECURITY CONTROLS OVER FINANCIAL INFORMATIONIJNSA Journal
 
Challenges to the Implementation of Information Technology Risk Management an...
Challenges to the Implementation of Information Technology Risk Management an...Challenges to the Implementation of Information Technology Risk Management an...
Challenges to the Implementation of Information Technology Risk Management an...theijes
 
ISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_IntindoloISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_IntindoloJohn Intindolo
 

Similar to Research Opportunities in IT and Internal Auditing (20)

2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx
2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx
2 days agoShravani Kasturi DiscussionCOLLAPSETop of Form.docx
 
Perceived significance of information security governance to predict the info...
Perceived significance of information security governance to predict the info...Perceived significance of information security governance to predict the info...
Perceived significance of information security governance to predict the info...
 
2172020 Originality Reporthttpsucumberlands.blackboar.docx
2172020 Originality Reporthttpsucumberlands.blackboar.docx2172020 Originality Reporthttpsucumberlands.blackboar.docx
2172020 Originality Reporthttpsucumberlands.blackboar.docx
 
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docxRunning Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
 
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEM
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEMA DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEM
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEM
 
Comparative Analysis of Information Security Governance Fram
Comparative Analysis of Information Security Governance FramComparative Analysis of Information Security Governance Fram
Comparative Analysis of Information Security Governance Fram
 
Information Assurance Framework for Web Services .docx
Information Assurance Framework for Web Services                  .docxInformation Assurance Framework for Web Services                  .docx
Information Assurance Framework for Web Services .docx
 
Implementing IT Security Controls
Implementing IT Security ControlsImplementing IT Security Controls
Implementing IT Security Controls
 
The Generic IS/IT Bussiness Value Category : Cases In Indonesia
The Generic IS/IT Bussiness Value Category : Cases In IndonesiaThe Generic IS/IT Bussiness Value Category : Cases In Indonesia
The Generic IS/IT Bussiness Value Category : Cases In Indonesia
 
GOVERNING INFORMATION SECURITY IN CONJUNCTION WITH COBIT AND ISO 27001
GOVERNING INFORMATION SECURITY IN CONJUNCTION WITH COBIT AND ISO 27001GOVERNING INFORMATION SECURITY IN CONJUNCTION WITH COBIT AND ISO 27001
GOVERNING INFORMATION SECURITY IN CONJUNCTION WITH COBIT AND ISO 27001
 
Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116
Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116
Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116
 
RANKING CRITERIA OF ENTERPRISE INFORMATION SECURITY ARCHITECTURE USING FUZZY ...
RANKING CRITERIA OF ENTERPRISE INFORMATION SECURITY ARCHITECTURE USING FUZZY ...RANKING CRITERIA OF ENTERPRISE INFORMATION SECURITY ARCHITECTURE USING FUZZY ...
RANKING CRITERIA OF ENTERPRISE INFORMATION SECURITY ARCHITECTURE USING FUZZY ...
 
Sarbanes-Oxley Compliance and the RFI/RFP Process
Sarbanes-Oxley Compliance and the RFI/RFP ProcessSarbanes-Oxley Compliance and the RFI/RFP Process
Sarbanes-Oxley Compliance and the RFI/RFP Process
 
Standards For Wright Aircraft Corp
Standards For Wright Aircraft CorpStandards For Wright Aircraft Corp
Standards For Wright Aircraft Corp
 
QUALITY ASSESSMENT OF ACCESS SECURITY CONTROLS OVER FINANCIAL INFORMATION
QUALITY ASSESSMENT OF ACCESS SECURITY CONTROLS OVER FINANCIAL INFORMATIONQUALITY ASSESSMENT OF ACCESS SECURITY CONTROLS OVER FINANCIAL INFORMATION
QUALITY ASSESSMENT OF ACCESS SECURITY CONTROLS OVER FINANCIAL INFORMATION
 
Report on IT Auditing and Governance_Ta_Hoang_Thang
Report on IT Auditing and Governance_Ta_Hoang_ThangReport on IT Auditing and Governance_Ta_Hoang_Thang
Report on IT Auditing and Governance_Ta_Hoang_Thang
 
QUALITY ASSESSMENT OF ACCESS SECURITY CONTROLS OVER FINANCIAL INFORMATION
QUALITY ASSESSMENT OF ACCESS SECURITY CONTROLS OVER FINANCIAL INFORMATIONQUALITY ASSESSMENT OF ACCESS SECURITY CONTROLS OVER FINANCIAL INFORMATION
QUALITY ASSESSMENT OF ACCESS SECURITY CONTROLS OVER FINANCIAL INFORMATION
 
Challenges to the Implementation of Information Technology Risk Management an...
Challenges to the Implementation of Information Technology Risk Management an...Challenges to the Implementation of Information Technology Risk Management an...
Challenges to the Implementation of Information Technology Risk Management an...
 
ISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_IntindoloISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_Intindolo
 
G1803044045
G1803044045G1803044045
G1803044045
 

More from felicidaddinwoodie

Business UseWeek 1 Assignment #1Instructions1. Plea.docx
Business UseWeek 1 Assignment #1Instructions1. Plea.docxBusiness UseWeek 1 Assignment #1Instructions1. Plea.docx
Business UseWeek 1 Assignment #1Instructions1. Plea.docxfelicidaddinwoodie
 
Business UsePALADIN ASSIGNMENT ScenarioYou are give.docx
Business UsePALADIN ASSIGNMENT ScenarioYou are give.docxBusiness UsePALADIN ASSIGNMENT ScenarioYou are give.docx
Business UsePALADIN ASSIGNMENT ScenarioYou are give.docxfelicidaddinwoodie
 
Business UsePractical Connection WorkThis work is a writte.docx
Business UsePractical Connection WorkThis work is a writte.docxBusiness UsePractical Connection WorkThis work is a writte.docx
Business UsePractical Connection WorkThis work is a writte.docxfelicidaddinwoodie
 
Business System AnalystSUMMARY· Cognos Business.docx
Business System AnalystSUMMARY· Cognos Business.docxBusiness System AnalystSUMMARY· Cognos Business.docx
Business System AnalystSUMMARY· Cognos Business.docxfelicidaddinwoodie
 
Business StrategyOrganizations have to develop an international .docx
Business StrategyOrganizations have to develop an international .docxBusiness StrategyOrganizations have to develop an international .docx
Business StrategyOrganizations have to develop an international .docxfelicidaddinwoodie
 
Business StrategyGroup BCase Study- KFC Business Analysis.docx
Business StrategyGroup BCase Study- KFC Business Analysis.docxBusiness StrategyGroup BCase Study- KFC Business Analysis.docx
Business StrategyGroup BCase Study- KFC Business Analysis.docxfelicidaddinwoodie
 
Business Strategy Differentiation, Cost Leadership, a.docx
Business Strategy Differentiation, Cost Leadership, a.docxBusiness Strategy Differentiation, Cost Leadership, a.docx
Business Strategy Differentiation, Cost Leadership, a.docxfelicidaddinwoodie
 
Business Research Methods, 11e, CooperSchindler1case.docx
Business Research Methods, 11e, CooperSchindler1case.docxBusiness Research Methods, 11e, CooperSchindler1case.docx
Business Research Methods, 11e, CooperSchindler1case.docxfelicidaddinwoodie
 
Business RequirementsReference number Document Control.docx
Business RequirementsReference number Document Control.docxBusiness RequirementsReference number Document Control.docx
Business RequirementsReference number Document Control.docxfelicidaddinwoodie
 
Business ProposalThe Business Proposal is the major writing .docx
Business ProposalThe Business Proposal is the major writing .docxBusiness ProposalThe Business Proposal is the major writing .docx
Business ProposalThe Business Proposal is the major writing .docxfelicidaddinwoodie
 
Business ProjectProject Progress Evaluation Feedback Form .docx
Business ProjectProject Progress Evaluation Feedback Form .docxBusiness ProjectProject Progress Evaluation Feedback Form .docx
Business ProjectProject Progress Evaluation Feedback Form .docxfelicidaddinwoodie
 
BUSINESS PROCESSES IN THE FUNCTION OF COST MANAGEMENT IN H.docx
BUSINESS PROCESSES IN THE FUNCTION OF COST MANAGEMENT IN H.docxBUSINESS PROCESSES IN THE FUNCTION OF COST MANAGEMENT IN H.docx
BUSINESS PROCESSES IN THE FUNCTION OF COST MANAGEMENT IN H.docxfelicidaddinwoodie
 
Business Process Management JournalBusiness process manageme.docx
Business Process Management JournalBusiness process manageme.docxBusiness Process Management JournalBusiness process manageme.docx
Business Process Management JournalBusiness process manageme.docxfelicidaddinwoodie
 
Business Process DiagramACCESS for ELL.docx
Business Process DiagramACCESS for ELL.docxBusiness Process DiagramACCESS for ELL.docx
Business Process DiagramACCESS for ELL.docxfelicidaddinwoodie
 
Business Plan[Your Name], OwnerPurdue GlobalBUSINESS PLANDate.docx
Business Plan[Your Name], OwnerPurdue GlobalBUSINESS PLANDate.docxBusiness Plan[Your Name], OwnerPurdue GlobalBUSINESS PLANDate.docx
Business Plan[Your Name], OwnerPurdue GlobalBUSINESS PLANDate.docxfelicidaddinwoodie
 
Business PlanCover Page  Name of Project, Contact Info, Da.docx
Business PlanCover Page  Name of Project, Contact Info, Da.docxBusiness PlanCover Page  Name of Project, Contact Info, Da.docx
Business PlanCover Page  Name of Project, Contact Info, Da.docxfelicidaddinwoodie
 
Business Planning and Program Planning A strategic plan.docx
Business Planning and Program Planning          A strategic plan.docxBusiness Planning and Program Planning          A strategic plan.docx
Business Planning and Program Planning A strategic plan.docxfelicidaddinwoodie
 
Business Plan In your assigned journal, describe the entity you wil.docx
Business Plan In your assigned journal, describe the entity you wil.docxBusiness Plan In your assigned journal, describe the entity you wil.docx
Business Plan In your assigned journal, describe the entity you wil.docxfelicidaddinwoodie
 
Business Plan Part IVPart IV of the Business PlanPart IV of .docx
Business Plan Part IVPart IV of the Business PlanPart IV of .docxBusiness Plan Part IVPart IV of the Business PlanPart IV of .docx
Business Plan Part IVPart IV of the Business PlanPart IV of .docxfelicidaddinwoodie
 
BUSINESS PLAN FORMAT          Whether you plan to apply for a bu.docx
BUSINESS PLAN FORMAT          Whether you plan to apply for a bu.docxBUSINESS PLAN FORMAT          Whether you plan to apply for a bu.docx
BUSINESS PLAN FORMAT          Whether you plan to apply for a bu.docxfelicidaddinwoodie
 

More from felicidaddinwoodie (20)

Business UseWeek 1 Assignment #1Instructions1. Plea.docx
Business UseWeek 1 Assignment #1Instructions1. Plea.docxBusiness UseWeek 1 Assignment #1Instructions1. Plea.docx
Business UseWeek 1 Assignment #1Instructions1. Plea.docx
 
Business UsePALADIN ASSIGNMENT ScenarioYou are give.docx
Business UsePALADIN ASSIGNMENT ScenarioYou are give.docxBusiness UsePALADIN ASSIGNMENT ScenarioYou are give.docx
Business UsePALADIN ASSIGNMENT ScenarioYou are give.docx
 
Business UsePractical Connection WorkThis work is a writte.docx
Business UsePractical Connection WorkThis work is a writte.docxBusiness UsePractical Connection WorkThis work is a writte.docx
Business UsePractical Connection WorkThis work is a writte.docx
 
Business System AnalystSUMMARY· Cognos Business.docx
Business System AnalystSUMMARY· Cognos Business.docxBusiness System AnalystSUMMARY· Cognos Business.docx
Business System AnalystSUMMARY· Cognos Business.docx
 
Business StrategyOrganizations have to develop an international .docx
Business StrategyOrganizations have to develop an international .docxBusiness StrategyOrganizations have to develop an international .docx
Business StrategyOrganizations have to develop an international .docx
 
Business StrategyGroup BCase Study- KFC Business Analysis.docx
Business StrategyGroup BCase Study- KFC Business Analysis.docxBusiness StrategyGroup BCase Study- KFC Business Analysis.docx
Business StrategyGroup BCase Study- KFC Business Analysis.docx
 
Business Strategy Differentiation, Cost Leadership, a.docx
Business Strategy Differentiation, Cost Leadership, a.docxBusiness Strategy Differentiation, Cost Leadership, a.docx
Business Strategy Differentiation, Cost Leadership, a.docx
 
Business Research Methods, 11e, CooperSchindler1case.docx
Business Research Methods, 11e, CooperSchindler1case.docxBusiness Research Methods, 11e, CooperSchindler1case.docx
Business Research Methods, 11e, CooperSchindler1case.docx
 
Business RequirementsReference number Document Control.docx
Business RequirementsReference number Document Control.docxBusiness RequirementsReference number Document Control.docx
Business RequirementsReference number Document Control.docx
 
Business ProposalThe Business Proposal is the major writing .docx
Business ProposalThe Business Proposal is the major writing .docxBusiness ProposalThe Business Proposal is the major writing .docx
Business ProposalThe Business Proposal is the major writing .docx
 
Business ProjectProject Progress Evaluation Feedback Form .docx
Business ProjectProject Progress Evaluation Feedback Form .docxBusiness ProjectProject Progress Evaluation Feedback Form .docx
Business ProjectProject Progress Evaluation Feedback Form .docx
 
BUSINESS PROCESSES IN THE FUNCTION OF COST MANAGEMENT IN H.docx
BUSINESS PROCESSES IN THE FUNCTION OF COST MANAGEMENT IN H.docxBUSINESS PROCESSES IN THE FUNCTION OF COST MANAGEMENT IN H.docx
BUSINESS PROCESSES IN THE FUNCTION OF COST MANAGEMENT IN H.docx
 
Business Process Management JournalBusiness process manageme.docx
Business Process Management JournalBusiness process manageme.docxBusiness Process Management JournalBusiness process manageme.docx
Business Process Management JournalBusiness process manageme.docx
 
Business Process DiagramACCESS for ELL.docx
Business Process DiagramACCESS for ELL.docxBusiness Process DiagramACCESS for ELL.docx
Business Process DiagramACCESS for ELL.docx
 
Business Plan[Your Name], OwnerPurdue GlobalBUSINESS PLANDate.docx
Business Plan[Your Name], OwnerPurdue GlobalBUSINESS PLANDate.docxBusiness Plan[Your Name], OwnerPurdue GlobalBUSINESS PLANDate.docx
Business Plan[Your Name], OwnerPurdue GlobalBUSINESS PLANDate.docx
 
Business PlanCover Page  Name of Project, Contact Info, Da.docx
Business PlanCover Page  Name of Project, Contact Info, Da.docxBusiness PlanCover Page  Name of Project, Contact Info, Da.docx
Business PlanCover Page  Name of Project, Contact Info, Da.docx
 
Business Planning and Program Planning A strategic plan.docx
Business Planning and Program Planning          A strategic plan.docxBusiness Planning and Program Planning          A strategic plan.docx
Business Planning and Program Planning A strategic plan.docx
 
Business Plan In your assigned journal, describe the entity you wil.docx
Business Plan In your assigned journal, describe the entity you wil.docxBusiness Plan In your assigned journal, describe the entity you wil.docx
Business Plan In your assigned journal, describe the entity you wil.docx
 
Business Plan Part IVPart IV of the Business PlanPart IV of .docx
Business Plan Part IVPart IV of the Business PlanPart IV of .docxBusiness Plan Part IVPart IV of the Business PlanPart IV of .docx
Business Plan Part IVPart IV of the Business PlanPart IV of .docx
 
BUSINESS PLAN FORMAT          Whether you plan to apply for a bu.docx
BUSINESS PLAN FORMAT          Whether you plan to apply for a bu.docxBUSINESS PLAN FORMAT          Whether you plan to apply for a bu.docx
BUSINESS PLAN FORMAT          Whether you plan to apply for a bu.docx
 

Recently uploaded

Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 

Recently uploaded (20)

Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 

Research Opportunities in IT and Internal Auditing

  • 1. 205 JOURNAL OF INFORMAITON SYSTEMS Vol. 20, No. 1 Spring 2006 pp. 205–219 Research Opportunities in Information Technology and Internal Auditing Marcia L. Weidenmier Mississippi State University Sridhar Ramamoorti Grant Thornton LLP ABSTRACT: This paper presents research opportunities in the area of information tech- nology (IT) within the context of the internal audit function. Given the pervasive use of IT in organizations and the new requirements of the Sarbanes- Oxley Act of 2002, in- ternal audit functions must use appropriate technology to increase their efficiency and effectiveness. We develop IT and internal audit research questions for three governance-related activities performed by the internal audit function-risk assessment, control assurance, and compliance assessment of security and privacy. Keywords: IT / IS auditing; internal auditing; information
  • 2. technology; research oppor- tunities; Sarbanes-Oxley; corporate governance; risk management; secu- rity; privacy. Data Availability: Please direct all comments and suggestions to Dr. Marcia Weidenmier. I. INTRODUCTION T his paper develops information technology-related research questions within the con- text of the internal audit function. The internal audit function (IAF) is one of the cornerstones of corporate governance along with the external auditor, executive man- agement, and the audit committee of the Board of Directors (Gramling et al. 2004). The Board of Directors determines the overall governance process, which senior management implements and internal and external auditors evaluate, under the watchful eye of the audit committee (Blue Ribbon Committee 1999; Treadway Commission 1987). The IAF occupies a unique and pivotal role in corporate governance. First, the IAF is an information gathering and reporting resource for the three other governance parties (Gramling et al. 2004). Second, the IAF is an integral part of the organization’s internal control structure. In fact, Rule 303A of the New York Stock Exchange requires listed
  • 3. companies to have an IAF. Third, the IAF executes important governance-related activities including risk assessment, control assurance, and compliance assessment, which are critical We thank JIS editor Dan Stone for suggesting and encouraging us to write the supplemental technology chapter to the Research Opportunities in Internal Auditing (2003) monograph. We remain grateful to the IIA Research Foundation for granting us permission to reproduce, paraphrase, and / or use copyrighted materials in preparing this paper for the Journal of Information Systems. (Copyright 2004, The Pervasive Impact of Information Technology on Internal Auditing, by the Institute of Internal Auditors Research Foundation, 247 Maitland Avenue, Altamonte Springs, Florida 32701-4201 U.S.A. Reprinted with permission.) The views expressed in this paper are the personal views of Dr. Sridhar Ramamoorti and do not reflect the views of, nor endorsement by, Grant Thornton LLP. 206 Weidenmier and Ramamoorti Journal of Information Systems, Spring 2006 in complying with the new requirements of the Sarbanes-Oxley Act of 2002 (SOX). Internal auditors are central figures and function as a key support in providing assurance for meeting the requirements of SOX Section 302 (annual certifications of the completeness and ac- curacy of the financials by the CEO and the CFO) and Section 404 (external auditor attes- tation of the effectiveness of internal controls over financial reporting). As an integral part
  • 4. of corporate governance, internal auditors must now consider the ‘‘probability of significant errors, irregularities, or noncompliance’’ (Implementation Standard 1220.A1 [IIA 2004]) as they execute their governance-related activities. As IT and business models become virtually inseparable and inextricably intertwined, IT is playing a pivotal role in corporate governance and SOX compliance. IT both enables and drives effective governance structures, risk management, and control processes because it (1) shapes an organization by influencing the governance structure selection and the organization’s level of risk (Boritz 2002; Parker 2001), (2) helps establish, maintain, and enforce new governance processes throughout the organization (Hamaker 2004; Fox and Zonneveld 2004), and (3) helps integrate the risk management and compliance proc- esses—improving reputation, employee retention, and revenue (by as much as 8 percent), and lowering costs of capital and insurance premiums (PricewaterhouseCoopers 2004). IT’s rapid change is dramatically altering the IAF (Gorman and Hargadon 2005). Ac- cordingly, the Institute of Internal Auditors (IIA) requires internal auditors to understand how IT is used and should be used in an organization, as well as key IT risks, controls, and IT-based audit techniques (Implementation Standard 1210.A3 [IIA 2004]). Thus, given the new requirements of SOX and the IIA, both the IAF and IT have risen in prominence and impact within organizations.
  • 5. In this new era of governance reform, ‘‘IT-internal auditing research’’ has become a critical imperative. Surprisingly, however, ‘‘while the role of assurance practitioners, from an external perspective, has often been publicly discussed and debated, the role of the internal auditor and the resulting changes have not been quite so publicized’’ (Boritz 2002, 232). Significant prospects exist for academic research in the areas of internal auditing and technology from theoretical and practical perspectives. To help encourage research on IT and the IAF, we develop research questions for three governance-related activities per- formed by the IAF: risk assessment, control assurance, and compliance work (Hermanson and Rittenberg 2003). Our research builds on the following studies, which provide comprehensive syntheses of extant literature. Almost 30 years ago, Cash et al. (1977) reviewed existing studies and techniques on auditing and electronic data processing (EDP) (primarily from an external audit perspective) to encourage future EDP research. More recently, O’Leary (2000) dis- cusses the enterprise resource planning systems (ERPs) literature. The Information Systems Section of the American Accounting Association published Researching Accounting as an Information Systems Discipline (Arnold and Sutton 2002), which presents research oppor- tunities in a variety of areas including expert and group support systems, decision aids, electronic commerce, continuous and information systems
  • 6. assurance, and knowledge man- agement. Finally, Ramamoorti and Weidenmier (2004) develop IT-related research oppor- tunities in internal auditing for eight different areas, as part of the Research Opportunities in Internal Auditing (Bailey et al. 2003) monograph published by the IIA Research Foun- dation. We use the chapter by Ramamoorti and Weidenmier (2004) as our starting point. The remainder of the paper develops IT-related research questions for each governance activity performed by the IAF. Section II focuses on risk assessment. Section III explores control assurance, while Section IV discusses two primary areas of compliance assess- ment—security and privacy. Section V concludes. Research Opportunities in Information Technology and Internal Auditing 207 Journal of Information Systems, Spring 2006 II. RISK ASSESSMENT Traditionally, internal auditing used a control-based approach for planning its activities. More recently, corporate governance focuses on risk management, providing the impetus for the IAF to move to a risk-based approach (McNamee and Selim 1998). In fact, the IAF, in the context of organizational risk assessment (Ramamoorti and Traver 1998), must iden- tify and assess risks to define the audit universe and to plan its
  • 7. engagements (IIA Perform- ance Standard 2010.A1). Unfortunately, organizations struggle with enterprise-wide risk management and ‘‘conflicting evidence exists regarding what [enterprise risk management] means and how common[ly] it actually is’’ implemented (Kleffner 2003, 66). Moreover, a lack of risk management frameworks, qualitative and quantitative risk metrics, and acces- sible central repository of actuarial data has hampered risk management efforts (Ozier 2003). To help overcome some of these obstacles, the Committee of Sponsoring Organi- zations of the Treadway Commission (COSO) released the 2004 Enterprise Risk Manage- ment (ERM) Framework that encompasses and expands its 1992 Internal Control-Integrated Framework. The ERM Framework presents an integrated framework with practical imple- mentation guidelines to ensure achievement of organizational objectives, reliable reporting, and regulatory compliance. IT and the IAF are both integral components of ERM. The Board’s corporate gover- nance process directs senior management’s development and implementation of the risk management process, which the IAF must evaluate for ‘‘adequacy and effectiveness’’ as well as for ‘‘significant risks that might affect objectives, operations, or resources’’ (Sobel and Reding 2004; Implementation Standards 1220.A1 and 1220.A3 [IIA 2004]). IT also permeates the risk management process as a source of risk and as a tool to implement the following eight components of the ERM Framework: internal
  • 8. environment, objective setting, identification of events, risk assessment, risk response, control activities, information and communication, and monitoring (Ramamoorti and Weidenmier 2004). While research op- portunities exist for each Framework component, we focus only on the third and fourth components, identification of events and risk assessment, which we consider to be the pinnacle of the ERM Framework. To help the reader understand the context of our research questions, Figure 1 presents an overview of the Framework and its relationship to this paper. In addition, we now briefly describe how the other ERM Framework components relate to risk assessment and IT. The first two ERM Framework components, the internal environment and objective setting, shape the organization’s risk assessment process. The internal environment reflects the organization’s risk appetite, or how much risk that management and the Board are willing to accept when conducting business, and is the basis for all other Framework com- ponents. Objective setting ensures that the organization has a process to define high-level strategic objectives as well as detailed operational, reporting, and compliance objectives that are consistent with its mission and risk appetite. Based on their strategic objec- tives, organizations must identify and assess the risk of events, which are internal or external incidents that may negatively affect strategy and the achievement of objectives.
  • 9. The last four ERM Framework components—risk response, control activities, infor- mation and communication, and monitoring—delineate the organization’s response to the assessed risk. Organizations can avoid, minimize, share, reduce, or accept the assessed risk via their response to identified risks. Control activities ensure that risk responses are im- plemented via controls that support strategic, operational, reporting, and compliance objec- tives. An information and communication system must identify, analyze, and respond to new and existing risks as well as communicate needed information across the organization. 208 Weidenmier and Ramamoorti Journal of Information Systems, Spring 2006 FIGURE 1 The Enterprise Risk Management Framework and its Relationship to this Paper Internal Environment Risk Response Risk Assessment Identification of Events Objective Setting Negative events
  • 10. Positive events Control Activities Monitoring Info & Communication SECTION II: Risk assessment SECTION III: Control assurance SECTION IV: Compliance assessment The Enterprise Risk Management Components are from COSO (2004a). Moreover, in today’s rapidly changing business environment, the ERM plan requires con- tinuous monitoring that is real-time, dynamic, and embedded in the organization (COSO 2004a, 75) to ensure that the ERM plan evolves to effectively manage the organization’s risk. IT is intricately intertwined with the components of the ERM Framework affecting how the organization manages risk. For example, the organization’s risk appetite affects its choice of IT, level of e-commerce, integration with business partners, and the use of emerg- ing technologies—all changing the risk of the organization.
  • 11. While strategic objectives in- fluence the IT infrastructure, IT can simultaneously help (1) shape strategy, (2) use oper- ational assets efficiently and effectively, (3) increase reporting reliability and regulatory compliance, (4) communicate information globally, and (5) ensure that the organization is operating within established risk tolerances, the acceptable level of variation around ob- jectives (PricewaterhouseCoopers 2003; Tillinghast-Towers Perrin 2001; Leithhead and McNamee 2000). Keeping this framework in mind, we turn to the third and fourth components of the ERM Framework—the identification of events and risk assessment. Negative events are risks that must be assessed. Positive events are opportunities that may redirect the organi- zation’s objective setting process. The Framework identifies IT as an external event and an internal event. In fact, IT is the only item classified as both types of events. For external events, organizations must consider the impact of the changing e-commerce environment, the increasing availability of external data, potential technological interruptions, and emerg- ing technology (COSO 2004a, 47). For internal events, organizations must consider how data integrity, data and system availability, and system selection, development, deployment, Research Opportunities in Information Technology and Internal Auditing 209
  • 12. Journal of Information Systems, Spring 2006 and maintenance may affect their ability to operate (COSO 2004a, 46). IT also enables the organization to identify other events. As an enabler, IT can help internal auditors facilitate interactive group workshops, pinpoint areas of concern via escalation or threshold triggers, and identify trends and causes of risks by statistically analyzing historical data via data mining and data warehouses (Nehmer 2003; Searcy and Woodroof 2003; Rezaee et al. 2002). Once the negative events (i.e., risks) have been identified, organizations must estimate the likelihood and timing of the events occurring and their impact on the organization. To estimate the financial impact of different time horizons and probable outcomes, internal auditors can use a variety of simulation, mapping, benchmarking, and modeling tools. Data warehouses and data mining can estimate the likelihood an event will occur, thereby sup- plementing managers’ qualitative estimates (Rezaee et al. 2002). Neural networks and data envelopment analysis (DEA) can also be used to assess risk, direct internal auditors’ atten- tion to high risk audit areas, and engage in ‘‘brainstorming’’ and ‘‘scenario building’’ ac- tivities that seek to track and monitor business risks as they develop (Kinney 2003, 149; Bradbury and Rouse 2002; Ramamoorti and Traver 1998). According to PricewaterhouseCoopers Internal Audit Services Practices, the
  • 13. IAF needs a level of IT sophistication that matches the level of risk that it is trying to manage (Heffes 2002); i.e., the concept of requisite variety applies to the IAF and the system it regulates (Weick 1969, 1979). While prior studies examine what tools the IAF uses (e.g., Hermanson et al. [2000]; annual IAF surveys by the Internal Auditor), we lack evidence regarding how well the risk identification and assessment tools used by the IAF match the organization’s current and planned level of risk and IT usage. Understanding the impact of IT on risk assessment is especially important for organi- zations with ERPs. O’Leary (2000) and Addison (2001) state that ERPs expose organiza- tions to significantly different risks including business interruption, change management, process interdependency, privacy and confidentiality, data content quality, and system se- curity. Moreover, newly implemented ERP processes potentially alter and even weaken traditional segregation of duties, because traditional controls are often eliminated and not replaced during implementation (Bae and Ashcroft 2004). Wright and Wright (2002) de- lineate additional risks associated with ERP implementations from customization, process reengineering, bolt-on software (i.e., software from a different vendor that adds functionality to an ERP), and incompatibilities with organizational requirements. Thus, ERPs may not reduce control risk if organizations modify key process linkages and integrated controls are not fully implemented.
  • 14. In light of these concerns, internal auditors must examine ERP risk carefully. Given the large variety of ERPs available, how is risk affected if organizations implement primary (manufacturing) versus support (financial and human resource) software components? Does risk vary with the specific ERP software (vendor) selected or with internal audit involve- ment? How much risk exists if organizations do not convert from existing legacy systems to ERPs? As a starting point in answering these questions, Wright and Wright (2002) report that then-Big 5 information systems auditors identify supply-chain and payroll ERP subsystems as having the highest control and security risks. Other areas of concern include interfaces with legacy systems and non-ERP bolt-ons. Interviewees also state that the major vendor ERPs differ in terms of access and encryption controls as well as input devices and controls. External information systems auditors also appear not to be concerned with the security and control risks of business intelligence systems (Wright and Wright 2002). To better understand how organizations manage and control ERP risks, future research can determine 210 Weidenmier and Ramamoorti Journal of Information Systems, Spring 2006
  • 15. how the IAF’s perspectives compare to those of external auditors and whether internal auditors consider the risks of business intelligence systems and other areas that are appar- ently overlooked by external auditors (Wright and Wright 2002). Given that internal au- ditors work in the same organizational environment with the same system(s) all year, their depth-oriented viewpoints are likely to be different than the breadth-oriented viewpoints of external auditors who work on multiple clients (and systems). In addition, future research could examine the underlying software (O’Leary 2002) to understand how the actual risks match those perceived by internal and external auditors. Kinney (2003, 147) asks, ‘‘How does IT affect risk, risk assessment, and risk manage- ment?’’ Answering this question requires a better understanding of the differential impact of internal and external factors on the organization’s use of IT in risk assessment. For example, organizational structure and its use of IT may affect the ERM process. Kleffner (2003) identifies silo (or functional) organizational structure, resistance to change, lack of qualified personnel, and need for internal controls and review systems as deterrents to ERM. Similarly, Wah (2000) identifies traditional silo structure as among the top barriers to suc- cessful ERP implementations. Thus, organizational structure appears to affect the success of ERM and ERP implementations. It would be interesting to investigate whether firms that have successfully implemented ERP are more likely to successfully implement an ERM
  • 16. process. Hunton (2002) suggests that internal auditors may be able to reduce the risk associated with the organization’s IT by participating throughout the entire system’s life cycle. Extant research also finds that the involvement of information system (IS) auditors in the systems development stage reduces future software maintenance costs (Wu 1992), indicating that risks (from software and control errors) should be reduced as well. Unfortunately, despite the potential to reduce future costs, internal auditors spend the least amount of their time on the development, acquisition, and implementation of new systems (Hermanson et al. 2000). Why are internal auditors not more actively involved in the development, acquisition, and implementation of new systems? Prior research suggests that this is because of inde- pendence and objectivity concerns (Boritz 2002). However, extant literature (generally) finds that IAF quality depends more on work performance than independence, objectivity, and competence (Gramling et al. 2004). Moreover, Krishnamoorthy’s (2001, 2002) analyt- ical models suggest that the relative importance of objectivity, work performance, and competence varies with audit conditions. On the other hand, extant literature reports con- flicting evidence regarding whether internal auditors’ judgments and decisions are affected by prior design involvement (Grabski 1986; Gramling et al. 2004). Therefore, more research
  • 17. is needed to determine the net benefits of IAF participation in each stage of the system’s life cycle. Internal auditors, outsourced internal audit service providers, and external auditors make risk assessments. Inconsistent evidence exists regarding whether the risk assessments made by these various parties are the same. For example, Hunton et al. (2004) find that external then-Big 5, IT auditors assess higher risks in ERP than non-ERP systems when compared to external Big 5, non-IT auditors. However, Grabski et al. (1987) report no differences in the internal control evaluations of EDP and non-EDP internal auditors. Church and Schneider (1995) find that internal auditors are more likely to generate cutoff errors than external auditors, but Blocher (1993) finds that internal auditors are less likely to use analytical procedures compared with external auditors. Moreover, Caplan and Embry (2003) find that internal auditors, outsource providers, and external auditors make similar judg- ments about the severity of internal control weaknesses; where there are differences, the Research Opportunities in Information Technology and Internal Auditing 211 Journal of Information Systems, Spring 2006 evaluations of outsourced internal auditors tend to fall between internal and external au-
  • 18. ditors. On the other hand, in a study of the relative importance of risk factors for fraud, Apostolou et al. (2001) report that the mean decision models of Big 5, regional, and internal auditors are not significantly different. In light of these mixed results, how do the overall risk assessments of internal, external, and outsourced (IT and non-IT) auditors compare? Extant research does not fully support the correlation between external auditor’s risk assessments and audit plans (Zimbelman 1997; Mock and Wright 1999). Do internal auditors incorporate IT considerations into risk assessments and their subsequent audit plans (see Church et al. 2001)? The audit committee now expects the IAF to monitor, evaluate, and report recommendations for the organiza- tion’s risk management process (COSO 2004b, 104). Given the growing importance of risk management, outsourcing opportunities, and the expanding role of the IAF, audit commit- tees need answers to these questions. III. CONTROL ASSURANCE Control assurance is another important governance activity performed by internal au- ditors. To ensure that risk responses are implemented, audit committees rely on the IAF to determine if internal controls effectively support strategic, operational, reporting, and com- pliance objectives (Gendron et al. 2004). This task is critical because ‘‘a strong system of internal control is essential to effective ERM’’ (COSO 2004c, slide 22).
  • 19. Traditionally, corporate governance was synonymous with organizational oversight by various committees, internal auditors, and external auditors. This was a costly, misleading, and disempowering approach because businesses did not make IT governance (risk and compliance) investments a high priority (Meyer 2004). An alternative, and better, approach makes compliance integral, not incremental, by embedding IT controls throughout the or- ganization’s business processes (PricewaterhouseCoopers 2004). Embedded controls ensure compliance at the time of the business process entry, making employees systematically follow governance directives, ultimately changing the organizational culture (Heffes 2004; Meyer 2004). While corporate governance and ERM are rising into prominence, investors are increas- ingly IT-literate and sophisticated, now worrying about IT’s risk to operations, and scruti- nizing IT investments and system efficiency (Huber 2002). Together these forces drive the demand for a new type of governance, ‘‘IT governance,’’ which coordinates IT with business objectives to establish effective IT controls efficiently (ITGI 2004). The relationship be- tween IT and governance exhibits ‘‘reciprocal causation.’’ In other words, they feed into, shape, and fuel the demand for each other (Hamaker 2004). Organizations can also use IT—as an enabler—to help comply with SOX Sec. 404 requirements that external auditors attest to management’s
  • 20. assessment of the effectiveness of internal controls relevant to financial reporting. In fact, PCAOB Auditing Standard No. 2 encourages the implementation of entirely IT automated application controls by allowing the external auditor to utilize a benchmarking (and audit efficiency-increasing) strategy when there are effective IT general controls. The PCAOB’s rationale seems to be that entirely IT automated application controls are not subject to breakdowns resulting from human failure (e.g., error, complacency, distraction) and, once properly defined, should continue to perform effectively (PCAOB 2005). This new environment requires controls that are automatic, dynamic, integrated, preventive, multi- compensating, real-time, and in- clude sound authentication procedures and secured audit trails (Parker 2001), which can only be accomplished through automated IT controls. 212 Weidenmier and Ramamoorti Journal of Information Systems, Spring 2006 But, do controls implemented in organizations achieve these high standards? Despite the increased demand for IT controls, even the largest organizations still use manual controls for compliance processes—increasing the likelihood of compliance failures considerably (PricewaterhouseCoopers 2004) and leading to the question: Why do most companies still continue to use manual compliance controls? Is it because IT
  • 21. usage has generated significant operational problems (see ITGI 2004)? Or is IT implementation too costly? Perhaps senior management is still wary of utilizing IT for governance-related activities because they are unfamiliar with its deployment or unsure of its impact. IT can automatically monitor control effectiveness and changes and automatically iden- tify control weaknesses in ERPs. Organizations can also use IT for ‘‘corrective control’’ purposes to identify these gaps, e.g., control mapping with alarms and alerts (Alles et al. 2004) and segregation of duties analysis software (Lightle and Vallario 2003). How effective are these monitoring and corrective controls? Are there systematic differences (e.g., IT placement in organization, existence of integrated IT governance process, IAF character- istics) in the companies that use these IT controls versus those that do not? SOX Sec. 404 requires that a control framework be used but does not specify which framework. Perhaps the most popular choice is the 1992 Internal Control-Integrated Frame- work by COSO. Despite its formal publication and release over a decade ago, many users are unfamiliar with the COSO framework, particularly as it interacts with IT applications. Few firms showed interest in COSO until SOX’s passage (Alles et al. 2004; Hermanson 2000). Other potential control frameworks include CobiT (Information Systems Audit and Control Foundation, ISACA), e-SAC (IIA), CoCo (Canadian COSO) and SAS Nos. 55, 78,
  • 22. and 94 (AICPA Professional Standards). (See Hermanson et al. [2000]; Curtis and Wu [2000]; Colbert and Bowen [2005] for a comparison of the frameworks.)1 Because of the new SOX 404 disclosure requirements, researchers can more easily identify which control framework organizations use to evaluate their controls for initial (and subsequent) annual report filings. Promising research questions include: Are there system- atic differences in the framework selection (i.e., industry, size, IAF characteristics, IT char- acteristics, external auditor, supply partner integration, or international presence)? Are there systematic control weaknesses in certain industries? How does an organization’s Sec. 404 internal control opinion affect the overall audit opinion? Carcello et al. (2002) examine audit committee disclosures and state that future research can determine (1) whether com- panies with more complete disclosures have fewer internal control failures and (2) whether enhanced disclosures improve internal control effectiveness. The new SOX 404 internal control attestation report should help answer these two questions as well as other gover- nance questions about the interactions among the audit committee, the external auditor, the IAF, management’s assessment of the effectiveness of controls over financial reporting, and financial-reporting quality. Obtaining better internal control effectiveness requires answers to the following ques- tions: Which (COSO) control components are the strongest and
  • 23. weakest in organizations? How does the selected framework affect the (IT) audit? Are internal controls more effective when the organization has a well-developed ERM process? Moreover, PCAOB Auditing Standard No. 2 does not prescribe the scope or the required amount of testing of internal 1 CobiT stands for Control Objectives for Information and Technology. eSAC is the electronic version of the IIA’s Systems Auditability and Control guidance. CoCo stands for Criteria of Control developed by the Canadian Criteria of Control Board. SAS 55 is the AICPA’s Statement of Auditing Standard No. 55 (SAS No. 55) titled The Consideration of the Internal Control Structure in a Financial Statement Audit. SAS No. 78 amends SAS No. 55. SAS No. 94 is titled The Effect of Information Technology on the Auditor’s Consideration of Internal Control in a Financial Statement Audit. Research Opportunities in Information Technology and Internal Auditing 213 Journal of Information Systems, Spring 2006 controls (Brady and Postal 2005). How much testing is needed to be effective? Research is needed to determine which method(s) might be best for evaluating controls, how much testing is needed to be effective, and whether SOX has changed the IAF’s priorities and use of resources as well as how it views, evaluates, and monitors controls? Furthermore, a survey by ACL Services Ltd. and the Center for Continuous
  • 24. Auditing finds that 67 percent of organizations do not have a budget for continued compliance with SOX after the initial filing deadline, indicating a short-term compliance response (Anonymous 2004). Research is needed to determine the long-term effects and effectiveness of SOX and compliance by organizations. Finally, large organizations (with over $5 billion in revenues) are spending approxi- mately $4.36 million to comply with SOX Sec. 404, which requires management to assess the organization’s internal controls only over financial reporting (Levinsohn 2005). Given the increased focus on sound corporate governance by SOX, internal auditors could reduce organizational risk by expanding the audit scope to include the entire underlying database.2 In other words, ‘‘substance attestation’’ may shift to ‘‘process attestation’’ through contin- uous control monitoring techniques that focus on the process rather than the financial state- ment numbers generated (Pacini and Sinason 1999). Are internal auditors adjusting their audit procedures (appropriately) for increased IT usage and the audit of the entire opera- tional database? What barriers, if any, exist? IV. SECURITY AND PRIVACY COMPLIANCE ASSESSMENT Internal controls also help ensure compliance with applicable laws and regulations (COSO 2004a, 109), an activity that becomes even more important in heavily regulated
  • 25. industries such as healthcare and financial services. Accordingly, yet another significant governance activity performed by internal auditors is compliance assessment. We develop research questions focusing on two increasingly important areas of compliance—privacy and security. Privacy and security have been identified as two of the ‘‘Ethical Issues of the Information Age’’ (Mason 1986; Sutton et al. 1999). They help ensure data integrity to support the governance and risk processes and must be part of the ERM process. IT acts as both a driver and enabler for compliance. As a driver, IT poses additional security and privacy risks of its own (e.g., cyber-security breaches, or unauthorized disclosure of con- fidential consumer information). As an enabler, IT can help mitigate these risks. Personal privacy is eroding as IT enables organizations to collect, store, and ubiqui- tously retrieve more consumer information than ever before, e.g., using cookies, web bugs, and port scans (Spinello 1998; King 2001). IT increases the risk that information may be accidentally or maliciously compromised, through hacking or other forms of ‘‘cyber- terrorism.’’ Given this environment, several laws have been passed to protect the privacy of consumers such as the Health Insurance Portability and Accountability Act (HIPAA), the Children’s Online Privacy Protection Act (COPPA), the Identity Theft and Assumption Deterrence Act, and the Gramm-Leach-Bliley Act (GLBA). Noncompliance with these laws, as well as failure to protect other data, exposes the
  • 26. organization to potential lawsuits, financial losses, and loss of reputation (cf. Cravens et al. 2003). International organizations that operate or trade in Europe must also contend with the 1995 European Union (E.U.) Data Protection Directive (Directive 95 / 46 / EC) for the strict privacy of consumer information or personally identifiable information (PII). The E.U. will prevent noncomplying organizations from transferring paper and electronic customer data 2 This discussion of database audits was inspired by Dr. Brad M. Tuttle’s remarks on January 7, 2005, at the AAA Information Systems Section Midyear Meeting 2005. 214 Weidenmier and Ramamoorti Journal of Information Systems, Spring 2006 from European to U.S. operations. To do business in Europe now, the U.S. Department of Commerce must certify that an organization complies with the U.S. Safe Harbor Pri- vacy Principles (notice, choice, onward transfer, security, data integrity, access, and enforcement).3 Internal auditors can assess their organization’s privacy measures via a privacy impact assessment (PIA). PIA is a generic framework for mapping data sources and uses to data privacy regulations (Kenny 2004). With this framework, internal auditors can assess the
  • 27. current state of privacy provisions and monitor future configuration changes. Internal au- ditors need to understand the laws, how they affect their organization, and how to mitigate the risk through proper IT security measures. Given the growing need for sound privacy measures, research is needed to better understand the privacy environment. Jamal et al. (2003, 2005) examine the privacy policies of high-traffic websites in the United States and heavily regulated United Kingdom and find that most organizations in both countries follow stated policies. They also state that compliance with U.K. disclosure requirements is poor, but regulations appear to reduce the use of cookies. Unfortunately, they do not have data on the substantive tests to verify compliance. This leaves unanswered the issue of how organizations assure compliance. Do internal auditors actively assess compliance with ap- plicable privacy laws? Do websites with lower levels of traffic ensure compliance? Do different stakeholders in non-E.U. jurisdictions reward organizations that conform to the higher privacy standards of the E.U. Directive? To help ensure privacy, organizations are implementing a variety of security measures to protect themselves from external and internal threats. In fact, information security has been the number one technology concern in the United States for the last three years (AICPA 2005). The importance of security is unsurprising given that more than ten new vulnerabilities are created each day (Cohen 2005). Furthermore, the importance of security
  • 28. is highlighted by the ERM Framework that states ‘‘[given the] growing reliance on infor- mation systems at the strategic and operational level’’ new security risks ‘‘such as in- formation security breaches or cyber-crimes ... must be integrated into the entity’s ERM’’ (COSO 2004a, 69). Security includes considerations such as system confidentiality (restricting access to authorized users), and system integrity as well as ongoing system availability. Organizations must establish an enterprise-wide information security program that uses IT to enforce data protection rules (Hargraves et al. 2003). Organizations must also ensure that systems are not affected by viruses or worms that may unintentionally distribute personal information in violation of privacy laws (King 2001). Potential privacy and security IT tools include biometrics (Chandra and Calderon 2003), encryption (Friedlob et al. 1997), and attack simulation (Cohen 2005). To prevent becoming victims of cyber-crimes, organizations are beginning to use ‘‘eth- ical hacking’’ (also known as penetration testing or vulnerability testing) to evaluate the effectiveness of their information security measures (CICA 2003). After a cyber-crime, computer forensics can preserve, identify, extract, and document computer evidence for use in a criminal or civil court of law (Marcella and Greenfield 2002). Properly trained internal auditors can utilize IT tools and knowledge to collect evidence from computers, networks,
  • 29. and the Internet to investigate acts that are illegal, unethical, or against organizational policy and involve a computer. The use of ethical hacking and computer forensics are in their infancy; therefore research should determine the appropriate level of in-house (and IAF) 3 A list of companies that are Safe Harbor certified can be found at http: / / web.ita.doc.gov / safeharbor / shlist.nsf / webPages / safe�harbor�list. Research Opportunities in Information Technology and Internal Auditing 215 Journal of Information Systems, Spring 2006 knowledge of computer forensic techniques. In addition, how effective and pervasive is ethical hacking? What is the most effective way for organizations to obtain forensics ex- pertise—outsourcing, co-sourcing, or in-house? The IAF must periodically assess security provisions. Particularly in the wake of Hur- ricane Katrina, a viable and tested disaster recovery plan must be in place to provide for operational continuity in the face of unforeseen disturbances. Internal auditors must under- stand how to mitigate security risk through proper IT security controls. Surprisingly, Ivancevich et al. (1998) find that the existence and size of the IAF is not associated with (perceived) disaster recovery plan strength. Additional research can help identify appropri-
  • 30. ate metrics for internal auditors to measure the impact of a privacy or security breach and improve disaster recovery plans. What is the best method to determine the financial impact of computerized system intrusion (cf. Garg et al. 2003)? V. CONCLUSION IT changes and the SOX corporate governance reform legislation continue to exert a tremendous impact on how internal auditing evolves as a profession. Despite these devel- opments, research in IT and IAF is largely uncharted territory that promises to become fertile ground with an abundance of research possibilities. Our goal in this paper is not to be exhaustive but rather to stimulate IT-related research in internal auditing in the areas of risk assessment, control assurance, and security and privacy compliance. The IAF and IT are both integral components of these three areas. IT plays the dual role as a driver and an enabler in all three areas. For example, regarding risk assessment, IT increases organizational risk. At the same time, IT can be a tool to implement the eight ERM components to mitigate risk. Regarding control assurance, IT’s risk to operations drives the demand for IT governance, which coordinates IT with business objectives to establish effective IT controls by embedding controls into business processes. IT makes compliance integral, helping organizations comply with increasing regulatory requirements like SOX Sec. 404. Regarding security and privacy compliance, IT
  • 31. increases security and privacy risks because organizations store more information than ever before, which can be compromised in violation of privacy laws. Fortunately, IT can help mitigate these risks as well. The IAF must not only understand the IT used by the organization, but it must also understand applicable regulatory and privacy laws—how the laws affect its organization, and how to use IT to ensure compliance. In addition, the IAF should use the appropriate level of IT sophistication to evaluate and monitor organizational risk, controls, and com- pliance (i.e., requisite variety). Moreover, understanding how the IAF should and does relate to IT will help improve the corporate governance process and the quality of financial reporting. REFERENCES Addison, S. 2001. Risk and governance issues for ERP enterprise applications. IS Control Journal (4): 53–54. Alles, M., A. Kogan, and M. Vasarhelyi. 2004. The law of unintended consequences? Assessing the costs, benefits, and outcomes of the Sarbanes-Oxley Act. IS Control Journal (1): 17–21. American Institute of Certified Public Accountants (AICPA). 2005. Information security tops technical issues for 2005. AccountingWeb (January 4). Available at: http: / / www.accountingweb.com / cgi- bin / item.cgi?id�100297.
  • 32. 216 Weidenmier and Ramamoorti Journal of Information Systems, Spring 2006 Anonymous. 2004. Continuous monitoring, auditing needed for Sarbanes-Oxley. Financial Executive (September): 19. Apostolou, B. A., J. M. Hassell, S. A. Webber, and G. E. Summers. 2001. The relative importance of management fraud risk factors. Behavioral Research in Accounting (May): 1–24. Arnold, V., and S. G. Sutton, eds. 2002. Research Accounting as an Information Systems Discipline. Sarasota, FL: American Accounting Association. Bae, B., and P. Ashcroft. 2004. Implementation of ERP systems: Accounting and auditing implica- tions. The Information Systems Control Journal (4): 43–48. Bailey, A. D., Jr., A. A. Gramling, and S. Ramamoorti, eds. 2003. Research Opportunities in Internal Auditing. Altamonte Springs, FL: The Institute of Internal Auditors Research Foundation. Blocher, E. 1993. The Role of Analytical Procedures in Detecting Management Fraud. Montevale, NJ: Institute of Management Accountants. Blue Ribbon Committee (BRC). 1999. Report and Recommendations of the Blue Ribbon Committee on Improving the Effectiveness of Corporate Audit Committees.
  • 33. Stamford, CT: BRC. Boritz, J. E. 2002. Information systems assurance. In Research Accounting as an Information Systems Discipline, edited by V. Arnold, and S. G. Sutton. Sarasota, FL: American Accounting Asso- ciation Information Systems Section. Bradbury, M. E., and P. Rouse. 2002. An application of data envelopment analysis to the evaluation of audit risk. ABACUS (June): 263–279. Brady, M., and A. D. Postal. 2005. Tweaking SOX: Regulators ease up on compliance cost. National Underwriter Property & Casualty Risk & Benefits Management Edition (May 23): 31–32. Canadian Institute of Chartered Accountants (CICA). 2003. Using Ethical Hacking Technique to Assess Information Security Risk. Toronto, ON: The Canadian Institute of Chartered Accountants. Caplan, D., and C. Emby. 2003. An investigation of whether outsourcing the internal audit function affects internal controls. Working paper, Iowa State University and Simon Fraser University. Carcello, J. V., D. R. Hermanson, and T. L Neal. 2002. Disclosures in audit committee charters and reports. Accounting Horizons (December): 291–304. Cash, J. I., Jr., A. D. Bailey Jr., and A. B. Whinston. 1977. A survey of techniques for auditing EDP- based accounting information systems. The Accounting Review (October): 812–831.
  • 34. Chandra, A., and T. G. Calderon. 2003. Toward a biometric security layer in accounting systems. Journal of Information Systems (Fall): 51–70. Church, B. K., and A. Schneider. 1995. Internal auditors’ memory for financial statement errors. Behavioral Research in Accounting 7: 17–36. ———, J. J. McMillan, and A. Schneider. 2001. Factors affecting internal auditors’ consideration of fraudulent financial reporting during analytical procedures. Auditing: A Journal of Practice & Theory (March): 65–80. Cohen, G. 2005. The role of attack simulation in auditing security risk management. The Information Systems Control Journal (1): 51–54. Colbert, J. L., and P. L. Bowen. 2005. A comparison of internal controls. Available at: http: / / www.isaca.org / PrinterTemplate.cfm?Section�Home&CONTENTID�8174&TE MPLATE� / ContentManagement / ContentDisplay.cfm. Committee of Sponsoring Organizations (COSO). 2004a. Enterprise Risk Management-Integrated Framework: Executive Summary Framework. Jersey City, NJ: AICPA. ———. 2004b. Enterprise Risk Management-Integrated Framework: Application Techniques. Jersey City, NJ: AICPA. ———. 2004c. Applying COSO’s enterprise risk management-
  • 35. integrated framework. (September 29). Slideshow. Available at: http: / / www.coso.org / publications.htm. Cravens, K., E. Oliver, and S. Ramamoorti. 2003. The reputation index: Measuring and managing corporate reputation. European Management Journal 21 (2): 201–212. Curtis, M. B., and F. H. Wu. 2000. The components of a comprehensive framework of internal control. The CPA Journal (March): 64–66. Research Opportunities in Information Technology and Internal Auditing 217 Journal of Information Systems, Spring 2006 Fox, C., and P. Zonneveld. 2004. IT Control Objectives for Sarbanes-Oxley: The Importance of IT in the Design, Implementation, and Sustainability of Internal Control over Disclosure and Finan- cial Reporting. Rolling Meadows, IL: Guidance document: Information Technology Governance Institute. Friedlob, G. T., F. J. Plewa, L. L. F. Schleifer, and C. D. Schou. 1997. An Auditor’s Guide to En- cryption. Altamonte Springs, FL: The Institute of Internal Auditors Research Foundation. Garg, A., J. Curtis, and H. Halper. 2003. The financial impact of IT security breaches: What do investors think? Information Systems Security (March / April):
  • 36. 22–32. Gendron, Y., J. Bedard, and M. Gosselin. 2004. Getting inside the black box: A field study of practices in ‘‘effective’’ audit committees. Auditing: A Journal of Practice & Theory (Spring): 153–171. Gorman, J. F., and J. M. Hargadon. 2005. Accounting futures: Healthy markets for a time-honored profession. Journal of Financial Service Professionals (January): 74–79. Grabski, S. V. 1986. Auditor participation in accounting systems design: Past involvement and future challenges. Journal of Information Systems (Fall): 3–23. ———, J. H. Reneau, and S. G. West. 1987. A comparison of judgment, skills, and prompting effects between auditors and system analysts. MIS Quarterly (June): 151–161. Gramling, A. A., M. J. Maletta, A. Schneider, and B. K. Church. 2004. The role of the internal audit function in corporate governance: A synthesis of the extant internal auditing literature and directions for future research. Journal of Accounting Literature 23: 194–244. Hamaker, S. 2004. Principles of IT governance. The Information Systems Control Journal 2: 47–50. Hargraves, K., S. B. Lione, K. L. Shackelford, and P. C. Tilton. 2003. Privacy: Assessing the risk. Altamonte Springs, FL: The Institute of Internal Auditors Research Foundation. Heffes, E. M. 2002. PWC’s 10 imperatives for internal audit
  • 37. transformation. Financial Executive (June): 61. ———. 2004. Is software the solution for Sarbanes-Oxley? Financial Executive (June): 19–20. Hermanson, D., M. C. Hill, and D. M. Ivancevich. 2000. Information technology-related activities of internal auditors. Journal of Information Systems (Supplement): 39–53. Hermanson, D. R., and L. E. Rittenberg. 2003. Internal audit and organizational governance. In Re- search Opportunities in Internal Auditing, edited by A. D. Bailey, A. A. Gramling, and S. Ramamoorti. Altamonte Springs, FL: The Institute of Internal Auditors Research Foundation. Hermanson, H. M. 2000. An analysis of the demand for reporting on internal control. Accounting Horizons (September): 325–341. Huber, N. 2002. Business scandals put IT on the spot. Computer Weekly (September): 16. Hunton, J. E. 2002. The participation of accountants in all aspects of AIS. In Researching Accounting as an Information Systems Discipline, edited by V. Arnold and S. G. Sutton. Sarasota, FL: American Accounting Association Information Systems Section. ———, A. M. Wright, and S. Wright. 2004. Are financial auditors overconfident in their ability to assess risks associated with enterprise resource planning systems? Journal of Information Sys- tems (Fall): 7–28.
  • 38. Institute of Internal Auditors (IIA). 2004. The Professional Practices Framework. Altamonte Springs, FL: The Institute of Internal Auditors. IT Governance Institute (ITGI). 2004. IT Governance Global Status Report. Rolling Meadows, IL: The IT Governance Institute. Ivancevich, D. M., D. R. Hermanson, and L. M. Smith. 1998. The association of perceived disaster recovery plan strength with organizational characteristics. Journal of information Systems (Spring): 31–40. Jamal, K., M. Maier, and S. Sunder. 2003. Privacy in e- commerce: Development of reporting stan- dards, disclosure, and assurance services in an unregulated market. Journal of Accounting Re- search (May): 285–310. ———, ———, and S. Sunder. 2005. Enforced standards versus evolution by general acceptance: A comparative study of e-commerce privacy disclosure and practice in the United States and the United Kingdom. Journal of Accounting Research (March): 73– 96. 218 Weidenmier and Ramamoorti Journal of Information Systems, Spring 2006 Kenny, S. 2004. Assuring data privacy compliance. The Information Systems Control Journal 4: 31–
  • 39. 33. King, C. G. 2001. Protecting online privacy. The CPA Journal (November): 66–67. Kinney, W. R. 2003. Auditing risk assessment and risk management processes. In Research Oppor- tunities in Internal Auditing, edited by A. D. Bailey, A. A. Gramling, and S. Ramamoorti. Altamonte Springs, FL: The Institute of Internal Auditors Research Foundation. Kleffner, A. E. 2003. The effect of corporate governance on the use of enterprise risk management: Evidence from Canada. Risk Management & Insurance Review (Spring): 53–74. Krishnamoorthy, G. 2001. A cascaded inference model for evaluation of the internal audit report. Decision Sciences (Summer): 499–520. ———. 2002. A multistage approach to external auditors’ evaluation of the internal audit function. Auditing: A Journal of Practice & Theory (March): 95–121. Leithhead, B. S., and D. McNamee. 2000. Assessing organizational risk. Internal Auditor (June): 68– 69. Levinsohn, A. 2005. First-year verdict of SOX 404: Burdensome, costly, and confusing. Strategic Finance (June): 67–68. Lightle, S. S., and C. W. Vallario. 2003. Segregation of duties in ERP. Internal Auditor (October): 27–31.
  • 40. Marcella, A. J., and R. S. Greenfield, eds. 2002. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crime. Boca Raton, FL: Auerbach Publications, CRC Press LLC. Mason, R. 1986. Four ethical issues of the Information Age. MIS Quarterly 10 (1): 5–12. McNamee, D., and G. M. Selim. 1998. Risk Management: Changing the Internal Auditor’s Paradigm. Altamonte Springs, FL: The Institute of Internal Auditors Research Foundation. Meyer, N. D. 2004. Systematic IS governance: An introduction. Information Systems Management (Fall): 23–34. Mock, T. J., and A. M. Wright. 1999. Are audit programs risk- adjusted? Auditing: A Journal of Practice & Theory (Spring): 55–74. National Commission on Fraudulent Financial Reporting (the Treadway Commission). 1987. Report of the National Commission on Fraudulent Financial Reporting. Washington, D.C.: Government Printing Office. Nehmer, R. 2003. Transaction agents in eCommerce, A generalized framework. In Trust and Data Assurances in Capital Markets: The role of technology solution, edited by S. J. Roohani. Smith- field, RI: PricewaterhouseCoopers. O’Leary, D. E. 2000. Enterprise Resource Planning Systems:
  • 41. Systems, Life Cycle, Electronic Com- merce, and Risk. Cambridge, U.K.: Cambridge University Press. ———. 2002. Discussion of information system assurance for enterprise resource planning systems: Unique risk considerations. Journal of Information Systems (Supplement): 115–126. Ozier, W. 2003. Risk metrics needed for IT security. ITAudit (April 1). Available at: http: / / www. theiia.org / itaudit / index.cfm?fuseaction�print&fid�5396. Pacini, C., and D. Sinason. 1999. The law and CPA Webtrust. Journal of Accountancy (February): 20–25. Parker, X. L. 2001. An e-Risk Primer. Altamonte Springs, FL: The Institute of Internal Auditors Research Foundation. PricewaterhouseCoopers. 2003. Technology Forecast: 2003– 2005. Menlo Park, CA: PricewaterhouseCoopers. ———. 2004. Integrity driven performance. Available at: http: / / www.pwcglobal.com / images / gx / eng / about / svcs / grms / PwC GRC WP.pdf. Public Company Accounting Oversight Board (PCAOB). 2005. Staff questions and answers on Au- diting Standard No. 2—Internal Control. Available at: http: / / www.pcaob.org / Standards / Staff Questions and Answers / Auditing Internal Control over Financial Reporting 2005-05- 16.pdf.
  • 42. Research Opportunities in Information Technology and Internal Auditing 219 Journal of Information Systems, Spring 2006 Ramamoorti, S., and R. O. Traver. 1998. Using Neural Networks for Risk Assessment in Internal Auditing: A Feasibility Study. Altamonte Springs, FL: The Institute of Internal Auditors Re- search Foundation. ———, and M. L. Weidenmier. 2004. The Pervasive Impact of Information Technology on Internal Auditors. Altamonte Springs, FL: The Institute of Internal Auditors Research Foundation. Rezaee, Z., A. Sharbatoghlie, R. Elam, and P. L. McMickle. 2002. Continuous auditing: Building automated auditing capability. Auditing: A Journal of Practice & Theory (March): 147–163. Searcy, D. L., and J. B. Woodroof. 2003. Continuous auditing: Leveraging technology. The CPA Journal (May): 46–48. Sobel, P. J., and K. F. Reding. 2004. Aligning corporate governance with enterprise risk management. Management Accounting Quarterly (Winter): 29–37. Spinello, R. 1998. Privacy rights in the information economy. Business Ethics Quarterly (October 4): 723–763. Sutton, S. G., T. D. Arnold, and V. Arnold. 1999. An integrative
  • 43. framework for analysis of the ethical issues surrounding information technology integration by the audit profession. Research on Accounting Ethics 5: 21–36. Tillinghast-Towers Perrin. 2001. Enterprise Risk Management: Trends and Emerging Practices. Al- tamonte Springs, FL: Institute of Internal Auditors Research Foundation. Wah, L. 2000. Give ERP a chance. Management Review (March): 20–23. Weick, K. E. 1969. The Social Psychology of Organizing. Reading, MA: Addison-Wesley. ———. 1979. Social Psychology of Organizing. Reading, MA: Addison-Wesley. Wright, S., and A. M. Wright. 2002. Information system assurance for enterprise resource planning systems: Unique risk considerations. Journal of Information Systems (Supplement): 99–114. Wu, R. 1992. The information systems auditor’s review of the systems development process and its impact on software maintenance costs. Journal of Information Systems (Spring): 1–13. Zimbelman, M. F. 1997. The effects of SAS No. 82 on auditors’ attention to fraud risk factors and audit planning decisions. Journal of Accounting Research (Supplement): 75–97.
  • 44. R. Ehrgott 1/6 01/28/01 The format to be used for the laboratory reports consists of several sections. Each section has a name, which appears in the heading, and is underlined. For example: Introduction The sequence and description of the elements for the report will be as follows: 1. Title Page All reports require a title page with the name and number of the experiment, name of the author, date experiment is performed, and date report is submitted. A title page is given at the end of this section. 2. Abstract One paragraph, approximately 125 to 200 word summary of what is contained in the report. The abstract goes on the title page. Abstracts are important because they give a first impression of the document that follows. Electronic databases may only store the Abstract so it is important to write a complete, concise description of your work. The Abstract must include: • Motivation: Why is it important to do this experiment? Why do
  • 45. we care about the problem and the results? • Scope: What problem are you trying to solve? • Approach: A clear description of what was tested and how. What were the key variables? • Result: What were your key results? Key results, for example, might be the modulus of elasticity of a material determined or that stress was found to be proportional to strain. Avoid presenting too much data here. R. Ehrgott 2/6 01/28/01 Example of an 180 word abstract: ABSTRACT Numerous joint injuries are reported each year related to the sport of running. If runners could reduce the impact forces at their joints, injuries could be prevented. This research addresses understanding the mechanics related to the impact forces produced while running. Tests were conducted on a treadmill at three different speeds, 3, 5 and 7 MPH. Five different runners were instrumented with accelerometers located at the ankle, knee, and lower back. Using a computer data acquisition system, acceleration
  • 46. was recorded simultaneously at the three locations. From the measured accelerations, estimates of the joint forces were obtained from Newton’s Second Law (F = Ma). Fourier transforms or the acceleration records were also obtained to determine key frequencies at which the body vibrates when leg impact with the ground occurs. Results indicate all runners have a similar vibration response at the instrumented locations. It was observed that the knee experienced the largest acceleration at all three speeds. The knee acceleration measured was approximately 5 G’s or five times the acceleration of gravity. Joint forces are also presented for the different runners at the various speeds. 3. Introduction A brief background on the subject to tell the reader why the experiment was performed (motivation). Also include background material that may be required for the reader to follow what you are presenting. 4. Theory The theory is an important part of the report. This is especially true if experiments are generally conducted to verify, evaluate, or illustrate theories. Present all key equations used in the experiment.
  • 47. Each equation should be numbered and the text should refer to this equation number. Derivations of key equations could be referenced to and appropriate text. Assumptions and limitations of the theory are also important to mention. Motivation, why do this Experiment ? Scope, what problem are you solving ? Results, key results found. Approach, what was done and how ? R. Ehrgott 3/6 01/28/01 5. Test Procedure In this section describe the test procedure that is not detailed in the manual. Do not copy procedures which are described in the lab manual. However, do describe any variations. Specific numerical values used in the test should be presented. The description of work should contain sufficient information so that someone who is familiar with the standard procedures and has access to the lab manual could duplicate your test.
  • 48. 6. Results This is the most important section of the report! This is where you clearly present your hard work. Review what the objectives of the experiment were prior to writing this section. The results you present should be in agreement with the goal of the experiment. In this section clearly describe to the reader each Figure and Table of results you present. Make sure to use Figure and Table numbers (Figure 1 shows the …). Never include the raw data, which goes in the appendix. Tables and Figures should Include: a. Tables - Significant experimental results as well as theoretical results should be presented in Tables. Tables of raw test data should be put in the Appendix. Tables should be titled and numbered consecutively, using Roman numerals (Table I, Table II, etc). b. Figures - Graphs are generally the best means of presenting and visualizing results. Because of their importance, care should be taken when constructing them. A spreadsheet program is recommended for creating graphs. Coordinate axes should be carefully labeled and include the proper units. Data points should be clearly shown using suitable symbols. If more than one curve occurs on a graph, each curve should be clearly distinguished and labeled. The graph should contain a suitable title and have a Figure number. Number Figures, consecutively, using Arabic numerals (Figure 1, Figure 2, etc.). 7. Discussion and Conclusions
  • 49. In this section, briefly summarize what the experiment demonstrated and what you have learned. Compare the test results with standard or typical values and present possible explanations of any significant differences. Any unusual or unexpected observations, which were made during the experiment, should be noted and R. Ehrgott 4/6 01/28/01 discussed. Do the experimental results compare favorably with expected results? If not, why? 8. Appendix The following should be placed in an appendix at the end of the report. a. Sample Calculations - Present a sample of each type of calculation performed using the experimental data as well as any other required calculation. b. Original Data Sheets - Raw data obtained and recorded during the experiment. c. Copies of charts of data which were recorded automatically would be included in the appendix as well as any tables or figures not necessarily pertinent to or not referred to in the Results or Discussion sections. GENERAL NOTES
  • 50. 1. Use a word processor or type or print clearly in ink. 2. Number all pages, tables and figures, consecutively. 3. A spreadsheet program is recommended for creating graphs and performing data reduction. If drawn by hand, curves on graphs may be drawn in pencil. 4. Use correct grammar, spelling (use spell checker!), abbreviations and punctuation. 5. Folders are not to be used. Staple the report together with a single staple in the upper left-hand corner. 6. The experimental test data will be the same for each member of the group. However, each student will present the report as independent work. All calculations, data presentation, discussion and conclusions shall represent your individual effort. 7. FINALLY - remove all unnecessary words! R. Ehrgott 5/6 01/28/01 Example Title Page AM 317
  • 51. MECHANICS LAB EXPERIMENT 1 BEAM DEFLECTIONS TEST PERFORMED: FEBRUARY 8, 2002 REPORT SUBMITTED: FEBRUARY, 15, 2002 BY I.T. HARDER GROUP 3 ABSTRACT APPROXIMATELY 125 TO 250 WORDS INCLUDE: • Motivation: Why is it important to do this experiment? Why do we care about the problem and the results? • Scope: What problem are you trying to solve? • Approach: A clear description of what was tested and how. What were the key variables? • Result: What were your key results? Key results, for example, might be the modulus of elasticity of a material determined or that stress was found to be proportional to strain. Avoid presenting too much data here. R. Ehrgott 6/6 01/28/01
  • 52. REFERENCES ON REPORT WRITING Michaelson, Herbert, How to Write & Publish Engineering Papers and Reports, Oryx Press, 1990. Brown, John Fiske, A Students Guide to Engineering Report Writing, John Fiske Brown Associates, Solana Beach, Ca 1982. Eisenberg, Anne, Effective Technical Communication, McGraw- Hill, NY 1982. Weiss, Edmond H., The Writing System for Engineers and Scientists, Prentice-Hall, Englewood Cliffs, NJ 1982 ABSTRACTGENERAL NOTESExample Title PageAM 317EXPERIMENT 1I.T. HARDERREFERENCES ON REPORT WRITING MECHANICS LAB AM 317 EXP 9 TWO-PINNED ARCH
  • 53. I. OBJECTIVES I.1 To explore the relationship between the loads and the horizontal reaction force in a two-pinned arch. I.2 To determine the horizontal thrust force and reaction influence lines for a point load moving across a two-pinned arch. I.3 To determine the horizontal thrust force for a uniformly distributed load on a two-pinned arch. Figure 1 St. Louis Arch II. INTRODUCTION AND BACKGROUND The main advantage an arch has over a beam, is that it can carry a much larger load. Historically arches were important because they could be constructed using small, easily carried blocks of brick or stone rather than using a massive, monolithic stone beam or lentil. Romans used the semicircular arch in bridges, aqueducts, and in large-scale architecture. In most cases they did not use mortar, relying simply on the precision of their stone finish. When an arch is
  • 54. loaded by gravity forces, the pressure acts downward on the arch and has the effect of compressing it together instead of pulling it apart. A free-body diagram of the arch supports shows the arch requires both horizontal and vertical reaction R. Ehrgott (Created) 2/7 03/31/01 T. Hao (Revised) 08/28/16 forces (Figure 2). This horizontal reaction force, called thrust, can cause the arch to collapse if it is not properly restrained. HA HB A B VA VB Figure 2 Free-Body Diagram of Two Hinged Arch. One of the disadvantages of the arch resisting loads in compression is the possibility that the arch may buckle. Any practical arch design would include analysis involving stress, deflection and buckling. To perform such analysis,
  • 55. reaction forces, shear and moment diagrams are needed for a given load case. Since the arch is indeterminate, having more unknown reactions forces than equilibrium equations, methods such as the flexibility method are required to determine the reaction forces. III. EQUIPMENT LIST Structures test frame Digital force display and power supply Aluminum arch Hangers and weights Scale R. Ehrgott (Created) 3/7 03/31/01 T. Hao (Revised) 08/28/16 Figure 3 Test Frame and Two Hinged Arch Set-Up IV. PROCEDURE • Visually inspect all parts of the test frame (including
  • 56. electrical leads) for damage or wear. • Check that electrical connections are correct and secure. • Check that all components are secured correctly and fastenings are sufficiently tight. • Check the four securing thumbscrews are in the position shown in Figure 3 and the rolling pivot on the right is gently resting against the load cell. • Make sure the digital force display is on and the force transducer is connected from the socket marked ‘Force Output’ on the right support, to the Digital Force Display ‘Force Input 1’. R. Ehrgott (Created) 4/7 03/31/01 T. Hao (Revised) 08/28/16 • Carefully zero the force meter using the dial on the right-hand side support. Gently apply a small load with a finger to the crown of the arch and release. Zero the meter again if necessary. NEVER apply excessive loads to any part of the equipment. PART A
  • 57. The first experiment is to measure the horizontal thrust force HB for a single load that is placed at increasing distances from the left support. A theoretical equation for the horizontal thrust force for a given load P at location x, is given below: )2( 8 5 233 3 LxxLrL Px H B −+= 9.1 where: HB = the horizontal thrust reaction at B (N) P = the load (N) L = the span of the arch (m) x = the load location, distance from the left-hand side support (m) r = the Rise of the arch (m) IV.1A Measure the necessary dimensions of the two-pinned arch and record the data. IV.2A Adjust the “set zero” control on the right support so that the digital force reads zero.
  • 58. IV.3A Apply a 100 gm load to the left most hanger and record the thrust force. Moving the 100 gm load to the remaining hangers and record the thrust force for each location. Repeat the process for a 500 gm load. The horizontal thrust shown on the digital force display has units of Newton. PART B The second part of the experiment involves determining the horizontal thrust force for a uniform or distributed load w. The equation for the thrust force is given in Eq. (9.2). R. Ehrgott (Created) 5/7 03/31/01 T. Hao (Revised) 08/28/16 r wL H B 8 2 = 9.2 where: HB = the horizontal thrust reaction at B (N) w = the intensity of uniform distributed loads (N/m) L = the span of the arch (m)
  • 59. r = the Rise of the arch (m) IV.1B Adjust the “set zero” control on the right support so that the digital force reads zero. IV.2B Apply 60 gm on each of the nine hangers (total of 540 gm) and record the thrust force. Repeat the procedure with 120 gm on each hanger (1080 gm total). V. REPORT V.1 Plot the experimental and theoretical thrust force determined in Part A of the experiment. V.2 Compare the theoretical and experimental thrust force for the uniformly loaded arch. VI. SELECTED REFERENCES Megson, T.H.G., Structural and Stress Analysis, 2nd edition, Butterworth- Heinmann, 2005, pp. 133-149. Timoshenko, S.P., Young, D.H., Theory of Structures, 2nd edition, McGraw Hill Co., New York, 1965.
  • 60. R. Ehrgott (Created) 6/7 03/31/01 T. Hao (Revised) 08/28/16 Table I Arch data Rise of arch, r (m) Length of arch, L (m) Table II Weight data Added mass 100 gm 500 gm Hanger mass Total mass Total weight (N) Table III Data for a point load moving across a two-pinned arch Load location x (mm) Measured thrust force for 100 gm load (N) Measured thrust force for 500 gm load (N) 0 0 0 50
  • 61. 100 150 200 250 300 350 400 450 500 0 0 Table IV Data for a uniformly distributed load Total mass (gm) Total mass of hangers (gm) Uniform distributed load (N/m) Measured
  • 62. thrust force (N) Calculated thrust force (N) % Error 540 1080 R. Ehrgott (Created) 7/7 03/31/01 T. Hao (Revised) 08/28/16 MECHANICS LAB AM 317 EXP 6 SPRINGS IN SERIES AND PARALLEL I. OBJECTIVES
  • 63. I.1 To study the relationship of springs connected in series and parallel and determine the equivalent spring constant. I.2 To study the unsymmetric loading of parallel springs. II. BACKGROUND Springs are devices that can store and release energy. Because of these properties, springs are very important in engineering. It is therefore essential that engineers understand the different types of spring combinations behave when loaded. Springs can be combined in series, parallel and in a combination of series and parallel. Each spring or spring system can be characterized by its spring constant k. The spring constant can be determined by use of Hooke’s Law: ∆= kF 6.1 where: F = applied force ∆ = the resulting displacement III. EQUIPMENT III.1 Assorted springs, hooks, and aluminum bars.
  • 64. III.2 Steel scales III.3 Steel frame IV. PROCEDURE IV.1 Determine the spring constant for each individual spring using Eq. 6.1. When determining the spring constant, be sure the spring has an initial load sufficient to separate the coils and remove the pretension. Determine the deflection due to several loads and take the average value for the spring constant, k. You may fit a linear trendline to the force- deflection data to R. Ehgott (Created) 2/7 04/07/01 T. Hao (Revised) 08/07/16 obtain the spring constant. k will be the slope m of the trendline ( bmxy += ) and b is the initial preload required to separate the coils of the spring. IV.2 Set up the spring system shown in Figures 1, 2 and 3 to determine the equivalent spring constant for each system. IV.3 Construct the spring system shown in Figure 4 and determine the
  • 65. equivalent spring constant. You will need to use two pairs of springs with matching spring constants to obtain good results. k1 k2 FT 21 FFFT == 6.2 212 2 1 1 21 k F k F k F k F TT T +=+=∆+∆=∆ 6.3
  • 67. ∆ = 6.4 Figure 1 Springs in Series k1 k2 FT ∆ 1 ∆ 2 a b L 21 ∆=∆=∆T 6.5 TTT kkkkFFF ∆+∆=∆+∆=+= 21221121 6.6 21 21 kk kkF k T TT
  • 68. T T eq +=∆ ∆+∆ = ∆ = 6.7 Location of when TF 21 kk ≠ : L kk k a 21 1 + = Figure 2 Springs in Parallel ( 21 ∆=∆ ) R. Ehgott (Created) 3/7 04/07/01 T. Hao (Revised) 08/07/16 k1 k2
  • 69. FT ∆ 1 ∆ 2 a b L 21 FFFT += 6.8 TFL b F =1 ; TFL a F =2 6.9 2 2 2 1 2 2 2 2
  • 73. Figure 3 Springs in Parallel – Unsymmetric Case ( 21 ∆≠∆ ) k1 k2 FT k3 k3 k1 33121 11 1 kkkkk keq + + ++ = 6.12 Figure 4 Springs in Series and Parallel R. Ehgott (Created) 4/7 04/07/01
  • 74. T. Hao (Revised) 08/07/16 V. REPORT V.1 Plot the force versus deflection for each individual spring and report the stiffness for each spring in a table. V.2 Calculate the theoretical equivalent spring constants given by Eqs. 6.4, 6.7, 6.11 and 6.12 and compare them to the experimental values determined. Report the results in a table with the percent error referenced to the experimental values. V.3 Discuss the results and draw appropriate conclusions. VI. SELECTED REFERENCES Thomson, W.T. and Dahleh, M.D., Theory of Vibration with Applications, 5th Edition, Pearson, 1997. Avallone, E., Baumeister, T. and Sadegh, A., Marks’ Standard Handbook for Mechanical Engineers, 11th Edition, McGraw Hill, 2006. Crandall, S.H., Dahl, N.C., Lardner, T.J., and Sivakumar, M.S., An Introduction to the Mechanics of Solids, 3rd Edition, McGraw
  • 75. Hill, 2012. R. Ehgott (Created) 5/7 04/07/01 T. Hao (Revised) 08/07/16 Table I Spring Data Spring # Force Reading Deflection Preload k 1 2 3 4
  • 76. 5 6 7 R. Ehgott (Created) 6/7 04/07/01 T. Hao (Revised) 08/07/16 Table II Measured Data Spring System Force Reading Deflection Preload keq
  • 77. Series Parallel Balanced Parallel Unbalanced Series and Parallel R. Ehgott (Created) 7/7 04/07/01 T. Hao (Revised) 08/07/16