Skip Nav Destination
Close Modal
Update search
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Article Type
Issue Section
Date
Availability
1-4 of 4
Keywords: internal audit
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2023) 37 (1): 67–83.
Published: 01 March 2023
...Arno L. P. Nuijten; Mark Keil; Bert Zwiers ABSTRACT With the growing role of information technology (IT), many organizations have incorporated IT governance practices that include keeping executives apprised of IT risks. To perform this function, organizations rely upon their internal audit staff...
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2016) 30 (1): 71–92.
Published: 01 March 2016
... the data used in this paper. Editor's note: Accepted by David A. Wood. February 2015 August 2015 2016 information security effectiveness survey instrument development internal audit information security Over the past two decades, research on information security has...
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2013) 27 (2): 65–86.
Published: 01 December 2013
... the two functions, however, is not always supportive. This paper presents the results of a survey of information security professionals' perceptions about the nature of the relationship between the information security and internal audit functions in their organization. We find that information security...
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2013) 27 (1): 41–59.
Published: 01 June 2013
...Bruce I. Davidson; Naman K. Desai; Gregory J. Gerard ABSTRACT Prior research indicates that external auditors are willing to rely to a greater extent on the work of the internal audit (IA) function when the function has been outsourced, or co-sourced, as opposed to maintained in-house...