AUDIT MANAGEMENT TECHNOLOGY AND SYSTEMS INFORMACIÓNAUDITORÍA MANAGEMENT TECHNOLOGY AND INFORMATION SYSTEMS
DOI:
https://doi.org/10.15381/idata.v6i1.6017Keywords:
Computing audit, Computing risks, Information technology.Abstract
This article outlines the use of computing audit as a tool to exert a suitable use of information thechnology, supported by applying legal regulations as well as international computing standards. In methodology, two basic features have been considered: both risk areas and control areas identification.
Downloads
Downloads
Published
Issue
Section
License
Copyright (c) 2003 Guadalupe Ramírez R., Ezzard Álvarez D.
![Creative Commons License](http://i.creativecommons.org/l/by-nc-sa/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
AUTHORS RETAIN THEIR RIGHTS:
a. Authors retain their trade mark rights and patent, and also on any process or procedure described in the article.
b. Authors retain their right to share, copy, distribute, perform and publicly communicate their article (eg, to place their article in an institutional repository or publish it in a book), with an acknowledgment of its initial publication in the INDUSTRIAL DATA.
c. Authors retain theirs right to make a subsequent publication of their work, to use the article or any part thereof (eg a compilation of his papers, lecture notes, thesis, or a book), always indicating the source of publication (the originator of the work, journal, volume, number and date).