Advertisement

Audit and the Net

Critical Issues for Information Management and Control
  • James Gilligan

Abstract

As new organisational forms require management information and control systems to exist and interact through connective metasystems (more than simply networks) such as the Internet, so the need for change in the theory and practice of information systems audit provides a critical focus for significant issues in current methodological approaches to the development of business information systems and in the epistemological assumptions which are made about such systems.

Keywords

Internal Audit Soft System Methodology Computer Support Cooperative Work Electronic Data Interchange Data Communication System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chambers, A.D. and Court, J.M., 1991, “Computer Auditing”, 3rd ed., Pitman, London.Google Scholar
  2. Checkland, P.B., 1981, “Systems Thinking, Systems Practice”, John Wiley and Sons, Chichester.Google Scholar
  3. Cushing, B.E. and Romney, M.B. 1994, “Accounting Information Systems”, 6th ed., Addison-Wesley, Reading, Mass.Google Scholar
  4. Date, C.J., 1986, “An Introduction to Database Systems”, Volume 1, 4th ed., Addison-Wesley, Reading, Mass.Google Scholar
  5. Doyle and Wood, 1991, Soft systems and systems engineering: across the great divide, in: Addendum to proceeding of UKSS 1991, Plenum, New York.Google Scholar
  6. Gilligan, J., 1994, Patterns on glass: the language games of information, in: Proceedings of the Symposium on Philosophical and Logical Aspects of Information Systems, University of the West of England, 1994 (pending publication).Google Scholar
  7. Harnois, Albert J., 1991, “EDP Auditing: A Functional Approach”, Prentice-Hall, New York.Google Scholar
  8. Hinge, K.C., 1988, “Electronic Data Interchange: from understanding to implementation”, American Management Association, New York.Google Scholar
  9. Hirschheim, R. and Adams, D., 1991, Organisational Connectivity, Journal of General Management. 17(2).Google Scholar
  10. IEEE Computer Society, 1994, “Internet Security, Secure Communications Over Untrusted Networks”, Seminar Summary from 12th November, 1994, published on Usenet by voidstar@netcom.com.Google Scholar
  11. The Internet Society, 1994, “Internet Domain Survey”, data available on http://ftp.nw.com or http://www.nw.com.
  12. Weber, R., 1988, “EDP Auditing: Conceptual Foundations and Practice”, 2nd edition, McGraw-Hill, New York.Google Scholar
  13. Woolf, E., 1990, “Auditing Today”, 4th ed., Prentice-Hall.Google Scholar

Copyright information

© Springer Science+Business Media New York 1995

Authors and Affiliations

  • James Gilligan
    • 1
  1. 1.School of Information Systems, Faculty of Computer Studies and MathematicsUniversity of the West of EnglandUK

Personalised recommendations