Books, Articles, Instructions, and Guidance

Books, Articles, Instructions, and Guidance

[1] American Institute of Certified Public Accountants Reporting on controls at a service organization relevant to security, availability, processing integrity, confidentiality, or privacy. Durham, NC: American Institute of Certified Public Accountants; 2012.

[2] American Institute of Certified Public Accountants Service organizations: reporting on controls at a service organization relevant to user entities’ internal control over finan- cial reporting. Durham, NC: American Institute of Certified Public Accountants; 2013.

[3] Office of Management and Budget Audits of states, local governments, and non-profit organizations. Washington, DC: Office of Management and Budget; 2007. [OMB Circular A-133].

[4] Barney JB, Clark DN. Resource-based theory. Oxford, UK: Oxford University Press; 2007. [5] Bazerman MH, Moore D. Judgment in managerial decision making. Hoboken, NJ: John Wiley & Sons; 2009. [6] Board of the International Federation of Accountants Statement of membership obli-

gations. New York, NY: International Federation of Accountants; 2012. [7] Cartlidge A, Hanna A, Rudd C, Macfarlane I, Windebank J, Rance S. An introductory overview of ITIL ® V3. Wokingham, UK: IT Service Management Forum, UK Chapter; 2007.

[8] Cascarino RE. Auditor’s guide to IT auditing Hoboken, NJ, 2nd ed. : John Wiley & Sons; 2012. [9] Chambers A, Rand G. The operational auditing handbook: auditing business and IT processes. West Sussex, UK: John Wiley & Sons; 2010. [10] International Ethics Standards Board Code of ethics for professional accountants. New York, NY: International Ethics Standards Board; 2009. [11] Committee of Sponsoring Organizations of the Treadway Commission Enterprise risk management—Integrated framework. New York, NY: Committee of Sponsoring Organizations of the Treadway Commission; 2004.

[12] Committee of Sponsoring Organizations of the Treadway Commission Internal con- trol—Integrated framework. New York, NY: Committee of Sponsoring Organizations of the Treadway Commission; 2013.

[13] Crouhy M, Galai D, Mark R. The essentials of risk management. New York, NY: McGraw-Hill; 2006. [14] Davis C, Schiller M. IT auditing: using controls to protect information assets, 2nd ed. New York, NY: McGraw-Hill; 2011. [15] Deming WE. Out of the crisis. Cambridge, MA: MIT Center for Advanced Educational Services; 1986. [16] Internal Revenue Service Examination of returns, appeal rights, and claims for refund.

Washington, DC: Internal Revenue Service; 2008. IRS Publication 556. [17] Office of Management and Budget FEA consolidated reference model version 2.3. Washington, DC: Office of Management and Budget; 2007. [18] Government Accountability Office Federal information system controls audit manual

(FISCAM). Washington, DC: Government Accountability Office; 2009. [19] Government Accountability Office Government auditing standards. Washington, DC: Government Accountability Office; 2011. [20] Office of Management and Budget Guidance on Exhibit 300—planning, budget- ing, acquisition, and management of it capital assets. Washington, DC: Office of

Legislation and Statutes 223

[21] National Institute of Standards and Technology Guide for assessing the security con- trols in federal information systems and organizations. Gaithersburg, MD: National Institute of Standards and Technology, Computer Security Division; 2010. [Special Publication 800-53A revision 1].

[22] National Institute of Standards and Technology Guide for conducting risk assess- ments. Gaithersburg, MD: National Institute of Standards and Technology, Computer Security Division; 2012. [Special Publication 800-30 revision 1].

[23] International Auditing and Assurance Standards Board Handbook of international quality control, auditing review, other assurance, and related services pronouncements. New York, NY: International Auditing and Assurance Standards Board; 2012.

[24] Institute of Internal Auditors International Professional Practices Framework (IPPF) 2013 Edition. Altamonte Springs, FL: Institute of Internal Auditors; 2013. [25] ISACA. COBIT 5: a business framework for the governance and management of enter- prise IT; Rolling Meadows, IL: ISACA; 2012. [26] ISACA COBIT 5 for assurance. Rolling Meadows, IL: ISACA; 2013. [27] ISACA ITAF: a professional practices framework for IS audit/assurance, 2nd ed.

Rolling Meadows, IL: ISACA; 2013. [28] Federal Financial Institutions Examination Council IT examination handbook. Arlington, VA: Federal Financial Institutions Examination Council; 2012. [29] IT Governance Institute Board briefing on IT governance, 2nd ed. Rolling Meadows, IL: IT Governance Institute; 2003. [30] IT Governance Institute COBIT 4.1. Rolling Meadows, IL: IT Governance Institute; 2007. [31] Cabinet Office. ITIL glossary and abbreviations. London, UK: Cabinet Office; 2011. [32] Kissel R., Stine K., Scholl M., Rossman H., Fahlsing J., Gulick J. Security consid-

erations in the system development life cycle. Gaithersburg, MD: National Institute of Standards and Technology, Computer Security Division; 2008. [Special Publication 800-64 revision 2].

[33] National Institute of Standards and Technology Managing information security risk: organization, mission, and information system view. Gaithersburg, MD: National Institute of Standards and Technology, Computer Security Division; 2011. [Special Publication 800-39].

[34] Moeller R.R. IT audit, control, and security. Hoboken, NJ: John Wiley & sons; 2010. [35] Organisation for Economic Cooperation and Development OECD guidelines on

the protection of privacy and transborder flows of personal data. Paris, France: Organisation for Economic Cooperation and Development; 1980.

[36] Orr A.T. Introduction to the ITIL service lifecycle. London, UK: Cabinet Office; 2011. [37] Parasuraman A, Zeithaml VA, Barry LL. SERVQUAL: a multiple-item scale for meas-

uring consumer perceptions of service quality. J Retailing 1988;64(1):12–40. [38] Project Management Institute A guide to the project management body of knowledge, 4th ed. Newtown Square, PA: Project Management Institute; 2008. [39] National Institute of Standards and Technology. {tag as book}Recommended secu- rity controls for federal information systems and organizations. Gaithersburg, MD: National Institute of Standards and Technology, Computer Security Division; 2009. [Special Publication 800-53 revision 3].

[40] Russell JP, editor. The ASQ auditing handbook (4th ed.). Milwaukee, WI: ASQ Quality Press; 2013. [41] National Institute of Standards and Technology Security and privacy controls for fed-

224 References

Standards and Technology, Computer Security Division; 2013. [Special Publication 800-53 revision 4].

[42] Senft S, Gallegos F, Davis A. Information technology control and audit Boca Raton, FL, 4th ed. : CRC Press; 2013. [43] Teece D. Dynamic capabilities and strategic management. New York, NY: Oxford University Press; 2009. [44] VA Office of the Inspector General Audit of veteran-owned and service-disabled veteran-owned small business programs. Washington, DC: Department of Veterans Affairs; 2011. Available from: http://www.va.gov/oig/52/reports/2011/VAOIG-10- 02436-234.pdf .

[45] Wrightson MT, Caldwell SL. Further refinements needed to assess risks and prioritize protective measures at ports and other critical infrastructure. Report to Congressional Requesters. Washington, DC: Government Accountability Office; 2005. GAO 06-91.

Dokumen yang terkait

Food and Nutritional Toxicology

0 1 308

POTENSI EKSTRAK DAUN PINUS (Pinus merkusii Jungh. et de Vriese) SEBAGAI BIOHERBISIDA PENGHAMBAT PERKECAMBAHAN Echinochloa colonum L. DAN Amaranthus viridis. ( Potencies of Pine leaf Extract (Pinus merkusii Jungh. et de Vriese) as Bioherbicides for Geminat

0 0 9

Chapter 4 The Study of Chemical Reactions

0 0 44

TUGAS 9 MATA KULIAH PENGEMBANGAN MEDIA PEMBELAJARAN FISIKA BERBASIS IT “CARA PENYUSUNAN INSTRUMEN EVALUASI MEDIA DAN CONTOH ANGKET MEDIA PEMBELAJARAN” OLEH VEFRA YULIANI (14175036) KELAS A DOSEN PEMBIMBING: PROF. DR. FESTIYED, MS DR. USMELDI, M.PD PENDIDI

0 0 14

TUGAS 3 MATA KULIAH PENGEMBANGAN MEDIA PEMBELAJARAN FISIKA BERBASIS IT “TEORI PEMBUATAN MEDIA PRESENTASI YANG KREATIF, EFEKTIF, EFISIEN, MENARIK SERTA INTERAKTIF UNTUK PEMBELAJARAN” OLEH KELOMPOK 5 VEFRA YULIANI (14175036) DOSEN PEMBIMBING: PROF. DR. FEST

0 1 25

TUGAS 2 MATA KULIAH PENGEMBANGAN MEDIA PEMBELAJARAN FISIKA BERBASIS ICT “PERKEMBANGAN PEMBELAJARAN BERBASIS IT TERKINI” OLEH KELOMPOK 4 VEFRA YULIANI (14175036) DOSEN PEMBIMBING: Prof. Dr. Festiyed, MS Dr. Usmeldi, M.Pd PENDIDIKAN FISIKA PROGRAM PASCA SAR

0 0 26

PUSAT PENELITIAN OSEANOGRAFI LIPI CORAL REEF REHABILITATION AND MANAGEMENT PROGRAM (COREMAP) Phase II Coral Reef Information and Training Centers (CRITC)

0 0 79

OPTIMALISASI JUMLAH PEMBERIAN KONSENTRAT PADA PROGRAM PENGGEMUKAN SAPI PERANAKAN ONGOLE (PO) The optimum amounts of concentrate applied on the feedlot program of the male Ongole Cattle (MOC) Hybrid

0 0 7

LOGICAL Type and Variables

0 0 48

The elements and principles of graphic design used in desktop publishing

0 0 65