The Remote Audit
暂无分享,去创建一个
Miklos A. Vasarhelyi | Michael G. Alles | Ryan A. Teeter | Michael Alles | M. Vasarhelyi | R. Teeter | Ryan Teeter
[1] David C. Yen,et al. Auditing in the e-commerce era , 2004, Inf. Manag. Comput. Secur..
[2] Clarence A. Ellis,et al. Groupware: some issues and experiences , 1991, CACM.
[3] Miklos A. Vasarhelyi,et al. Continuous Assurance for the Now Economy , 2010 .
[4] Jay C. Thibodeau,et al. The impact of information technology on the audit process: an assessment of the state of the art and implications for the future , 2001 .
[5] Mignona Cote,et al. Committee of Sponsoring Organizations (COSO) , 2007, Information Security Management Handbook, 6th ed..
[6] D. Hamilton,et al. The Social and Academic Standing of the Information Systems Discipline: General Theory Considered as Cultural Capital , 2004 .
[7] John Campbell,et al. Defining a conceptual framework for telework and an agenda for research in accounting and finance , 2009, Int. J. Bus. Inf. Syst..
[8] Sirkka L. Jarvenpaa,et al. Communication and Trust in Global Virtual Teams , 1999 .
[9] Miklos A. Vasarhelyi,et al. Principles of Analytic Monitoring for Continuous Assurance , 2004 .
[10] Paul Dourish,et al. Extending document management systems with user-specific active properties , 2000, TOIS.
[11] Vincent Cho,et al. A study on the impact of Organisational Learning to the effectiveness of Electronic Document Management Systems , 2010, Int. J. Technol. Manag..
[12] C. Handy. Trust and the virtual organization , 1999 .
[13] Rick Elam,et al. Continuous Auditing: Building Automated Auditing Capability , 2002 .
[14] James E. Hunton,et al. Behavioral Self-Regulation of Telework Locations: Interrupting Interruptions! , 2005, J. Inf. Syst..
[15] Marilyn M. Greenstein,et al. Underlying principles of the electronization of business: a research agenda , 2003, Int. J. Account. Inf. Syst..
[16] L. DeYoung. Hypertext challenges in the auditing domain , 1989 .
[17] S. Raghuram,et al. Communication Patterns As Determinants of Organizational Identification in a Virtual Organization , 1999 .
[18] Miklos A. Vasarhelyi,et al. Process Mining of Event Logs in Auditing: Opportunities and Challenges , 2010 .
[19] Robert L. Braun,et al. Computer‐assisted audit tools and techniques: analysis and perspectives , 2003 .
[20] Benson Rosen,et al. Training for virtual teams: An investigation of current practices and future needs , 2006 .
[21] James E. Hunton,et al. Potential Functional and Dysfunctional Effects of Continuous Monitoring (Retracted) , 2008 .
[22] Alexander Kogan,et al. Measuring Information Latency , 2006 .
[23] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[24] Miklos A. Vasarhelyi,et al. Continuous monitoring of business process controls: A pilot implementation of a continuous auditing system at Siemens , 2006, Int. J. Account. Inf. Syst..
[25] Marilyn Prosch,et al. Protecting personal information using Generally Accepted Privacy Principles (GAPP) and Continuous Control Monitoring to enhance corporate governance , 2008 .
[26] Roger Debreceny,et al. Employing generalized audit software in the financial services sector: Challenges and opportunities , 2005 .
[27] Miklos A. Vasarhelyi,et al. Feasibility and Economics of Continuous Assurance , 2002 .
[28] James E. Hunton,et al. A model for investigating telework in accounting , 2004, Int. J. Account. Inf. Syst..
[29] Roderick M. Kramer,et al. Swift trust and temporary groups. , 1996 .
[30] Samprit Chatterjee,et al. Statistical Techniques for Analytical Review in Auditing , 1986 .
[31] Gerard Brennan,et al. Aiding the Audit: Using the IT Audit as a Springboard for Continuous Controls Monitoring , 2010 .
[32] F. Selto,et al. Management Control Systems and Boundaries of the Firm: Why do Firms Outsource Internal Auditing Activities? , 1999 .
[33] M. Nigrini,et al. The Use of Benford's Law as an Aid in Analytical Procedures , 1997 .
[34] Judith A. Holton,et al. Building trust and collaboration in a virtual team , 2001 .
[35] Jean C. Bedard,et al. Using Electronic Audit Workpaper Systems in Audit Practice: Task Analysis, Learning, and Resistance , 2006 .
[36] Miklos A. Vasarhelyi,et al. Putting Continuous Auditing Theory into Practice: Lessons from Two Pilot Implementations , 2008, J. Inf. Syst..
[37] Lee Nelson,et al. Stepping into continuous audit: a health-care audit shop shares its strategy for making real-time auditing a success , 2004 .
[38] Sirkka L. Jarvenpaa,et al. Is Anybody Out There? Antecedents of Trust in Global Virtual Teams , 1998, J. Manag. Inf. Syst..
[39] Uday S. Murthy. An Analysis of the Effects of Continuous Monitoring Controls on e-Commerce System Performance , 2004, J. Inf. Syst..
[40] Jon B. Woodroof,et al. Continuous audit: Model development and implementation within a debt covenant compliance domain , 2001, Int. J. Account. Inf. Syst..
[41] Peter R. Monge,et al. Introduction to the Special Issue: Communication Processes for Virtual Organizations , 1999 .
[42] Ralph H. Sprague,et al. Electronic Document Management: Challenges and Opportunities for Information Systems Managers , 1995, MIS Q..
[43] Anthony R. Hendrickson,et al. Virtual teams: Technology and the workplace of the future , 1998 .
[44] David Gefen,et al. Some antecedents and effects of trust in virtual communities , 2002, J. Strateg. Inf. Syst..
[45] Carol E. Brown,et al. A Review and Analysis of the Existing Research Streams in Continuous Auditing , 2007 .
[46] U. Meyerfeldt,et al. Advances in remote monitoring of implantable pacemakers, cardioverter defibrillators and cardiac resynchronization therapy systems , 2008, Journal of Interventional Cardiac Electrophysiology.
[47] Bradley L. Kirkman,et al. The Dimensions and Antecedents of Team Virtuality , 2005 .
[48] Miklos A. Vasarhelyi,et al. ASSURING HOMELAND SECURITY : CONTINUOUS MONITORING , CONTROL & ASSURANCE OF EMERGENCY PREPAREDNESS , 2005 .
[49] Michael Hammer,et al. Reengineering Work: Don’t Automate, Obliterate , 1990 .