Standards and guidelines for IS auditing

Information Systems (IS) auditing is governed by a set of standards and guidelines that ensure audits are conducted consistently, effectively, and in alignment with industry best practices. These frameworks are primarily developed by ISACA (Information Systems Audit and Control Association), which provides globally recognized IS auditing standards.

 

The Information Systems Audit and Control Association (ISACA) plays a pivotal role in establishing standards and guidelines for IS auditing, reflecting the evolving landscape of technology and its implications for auditing practices. ISACA’s frameworks, such as COBIT and the CISA certification, provide essential guidelines that help auditors navigate the complexities of IT environments. The following sections outline key aspects of ISACA’s contributions to IS auditing standards.

ISACA’s IS Auditing Standards & Guidelines

Key IS Auditing Standards:

  • ISACA IT Audit Framework (ITAF) – Provides guidelines for conducting IT audits.
  • COBIT 2019 – Focuses on IT governance, risk management, and compliance.
  • NIST SP 800-53 – Security controls for U.S. federal IT systems.
  • ISO 27001 – Global standard for IT security management.

Guidelines for IS Auditing:

  • Define audit scope and objectives.
  • Conduct risk-based audits by focusing on high-risk IT areas.
  • Use a structured audit methodology for consistency and reliability.

ISACA's Frameworks and Standards

COBIT Framework

1.Dependence on Information Systems

Organizations across various sectors increasingly depend on their information systems to operate efficiently. The failure of these systems can lead to significant operational disruptions, jeopardizing business continuity. This dependence highlights the critical nature of robust IT systems in supporting day-to-day business operations and long-term growth. Organizations must ensure that their IT infrastructure is resilient and capable of supporting business needs even in times of crisis.

 

2.Strategic Management of IT

Successful organizations treat IT management as a strategic function, integral to their core business processes. This approach involves understanding and mitigating the risks associated with IT, which are no longer seen merely as technical issues, but as strategic business concerns. Organizations that adopt a strategic perspective on IT management can better align technology with business goals, leading to enhanced operational performance and competitive advantage.

 

3.Corporate IT Risk Management Model

One of the key contributions of the paper is the proposal of a Corporate IT Risk Management model. This model emphasizes proactive IT risk management, enabling organizations to identify, assess, and address IT risks before they manifest as issues. By aligning IT strategies with broader business objectives, this model helps organizations safeguard their information systems while ensuring that IT investments contribute positively to overall organizational performance.

4.Frameworks for IT Governance and IS Audit

The paper also discusses contemporary frameworks for IT governance and auditing, such as COBIT, the ISO 27000 family, and ITIL. These frameworks provide structured approaches to ensure compliance, manage risks, and optimize IT performance. They are designed to help organizations implement effective governance, enhance security protocols, and maintain auditing standards that contribute to the reliability and integrity of their IT systems. Frameworks like COBIT are essential for organizations seeking to navigate the complexities of IT governance and risk management.

 

5.Integration of IT and Business Processes

A key insight from the paper is the recognition of the interdependence between IT and business processes. Effective IT management can lead to improvements in efficiency, productivity, and competitiveness, both within an organization and across its value chain. Organizations must integrate IT into their core business functions to drive innovation and maintain agility in an increasingly digital world. This integration also facilitates better decision-making and enables businesses to respond more swiftly to market changes.

 

6.Evolving Nature of IT Risks

As technology continues to evolve, so too do the risks associated with it. The paper underscores the importance of adapting risk management strategies to address these emerging challenges. IT risks are becoming more complex and varied, from cybersecurity threats to the vulnerabilities introduced by new technologies such as artificial intelligence and cloud computing. Organizations must continuously update their risk management practices to stay resilient in the face of evolving threats and ensure the security and stability of their information systems.

In conclusion, the paper emphasizes the importance of treating IT management as a strategic function, with a strong focus on risk management and governance. By adopting frameworks such as COBIT and proactively addressing emerging IT risks, organizations can ensure that their information systems contribute to organizational success. The evolving nature of IT risks requires businesses to remain agile and forward-thinking, adapting their strategies and systems to meet the challenges of the future. Ultimately, organizations that integrate IT into their core processes and embrace robust frameworks will be better positioned to thrive in an increasingly complex and digital business environment.

CISA Certification

The “CISA Certified Information Systems Auditor Study Guide” provides a comprehensive resource for individuals preparing for the Certified Information Systems Auditor (CISA) exam. Here are the key conclusions drawn from the paper:

Industry Relevance: The CISA certification is recognized as a leading credential for IT security professionals, with over 27,000 candidates taking the exam annually. This highlights the growing importance of IS auditing in the IT industry.

 

Up-to-Date Content: The study guide is noted for its timely updates, reflecting changes in compliance, regulations, and best practices for IS auditing. The standards are revised twice a year, ensuring that candidates have access to the most current information available.

 

Comprehensive Coverage: The guide covers essential topics necessary for the CISA exam, including the IS audit process, IT governance, systems and infrastructure lifecycle management, IT service delivery and support, and disaster recovery. This breadth of content prepares candidates thoroughly for the exam.

High Earning Potential: CISAs are among the highest-paid IT security professionals, indicating that obtaining this certification can lead to significant career advancement and financial benefits.

 

Effective Learning Approach: The Sybex approach utilized in the study guide breaks down the exam content into manageable tasks and knowledge areas, making it easier for candidates to understand and retain the information needed for the exam.

 

Preparation for Aspiring CISAs: The guide is designed to fully prepare individuals seeking CISA certification, providing detailed information and strategies to tackle the exam effectively.

In summary, the CISA Certified Information Systems Auditor Study Guide serves as a vital tool for aspiring CISAs, offering updated content, comprehensive coverage of relevant topics, and effective learning strategies to enhance exam preparation and career prospects in the field of IT security.

ISACA

The paper discusses the evolution of IT auditing and internal control standards in the context of financial statement audits in the United States. Here are the key conclusions drawn from the research:

Increased Importance of IT Auditing: The rapid advancement of technology has made IT auditing increasingly vital for ensuring the integrity of financial statements. As businesses rely more on computer systems for data processing, the need for robust IT auditing standards has grown significantly.

 

Role of Professional Organizations: Organizations such as the American Institute of Certified Public Accountants (AICPA) and the Information Systems Audit and Control Association (ISACA) have played a crucial role in developing and issuing IT auditing standards. These standards guide auditors in their responsibilities and help maintain the quality of audits.

 

Evolution of Standards: The paper traces the historical development of IT auditing standards, highlighting how they have adapted to the changing technological landscape. This evolution reflects the increasing complexity of IT systems and the necessity for auditors to stay updated with current standards and guidelines.

Future Expectations: As technology continues to evolve, the paper anticipates that there will be more pronouncements and updates to IT audit standards. Auditors will need to be well-versed in these new standards to effectively perform IT audits and ensure compliance with regulatory requirements.

 

Significance for the Auditing Profession: The evolution of IT auditing standards is significant for the auditing profession as it enhances the reliability of financial reporting. Understanding these standards is essential for auditors to fulfill their roles effectively and to adapt to the ongoing changes in technology.

In summary, the paper emphasizes the critical role of IT auditing standards in the auditing profession, the influence of professional organizations in shaping these standards, and the need for auditors to continuously adapt to technological advancements.

Evolution of Standards

The paper emphasizes the evolving role of the Information Systems (IS) auditor, highlighting the necessity for auditors to possess a blend of IT and auditing knowledge to effectively perform their duties in a rapidly changing technological landscape.

It identifies that the traditional approach of auditing “around the box” is no longer sufficient. Instead, auditors must adopt a hands-on approach, which involves auditing “through and within the box” to address the complexities introduced by modern information systems.

The integration of IT and auditing professions is crucial. The paper suggests that IS auditors should leverage knowledge and skills from both fields to meet the challenges posed by the increasing reliance on information systems in organizations.

The study outlines key knowledge areas required for IS auditors, which include understanding business processes, IT governance, and the ability to assess risks associated with information security. This knowledge is essential for identifying key risk areas that need to be audited.

The research methodology involved qualitative approaches, including literature reviews and structured interviews, to gather insights on the knowledge requirements of IS auditors. This comprehensive approach ensures that the findings are well-supported and relevant to current practices in the field.

The paper concludes that academic institutions and the auditing profession should adapt their curricula and training programs to incorporate the necessary knowledge and skills for IS auditors. This adaptation is vital for preparing future auditors to navigate the complexities of modern auditing effectively.

Overall, the study contributes to a better understanding of the roles, responsibilities, and knowledge requirements of IS auditors, providing a framework for enhancing their effectiveness in the auditing process.

Code of ethics

The standards and guidelines for IS auditing, particularly concerning the code of ethics, are crucial for ensuring integrity and accountability within the auditing profession. Various frameworks have been established to guide auditors in their ethical conduct, reflecting the importance of ethical standards across different sectors, including Islamic finance and corporate environments.

A Code of Ethics ensures that IS auditors perform their duties with integrity, professionalism, and confidentiality. ISACA and other audit organizations establish ethical guidelines.

Key Ethical Principles:

1️⃣ Integrity – Perform audits honestly and avoid conflicts of interest.
2️⃣ Objectivity – Maintain independence and avoid bias.
3️⃣ Confidentiality – Protect sensitive information.
4️⃣ Professional Competence – Continuously improve auditing skills.
5️⃣ Due Care – Apply professional judgment when performing audits.

Why It Matters:
Following ethical principles ensures trust, transparency, and accountability in IT audits.

Islamic Finance Auditing Standards

The paper discusses the auditing standards and ethical guidelines for Islamic financial institutions, focusing on the developments by the Accounting and Auditing Organization for Islamic Financial Institutions (AAOIFI). Here are the main conclusions drawn from the paper:

Introduction of New Standards: The paper highlights the introduction of new auditing standards and a management standard titled “Internal Sharia Audit,” which are essential for ensuring compliance with Islamic financial principles. These standards are crucial for maintaining the integrity and transparency of Islamic financial institutions.

 

Implementation of Code of Ethics: A significant conclusion is the establishment of a new Code of Ethics for specialists in Islamic finance, which began to be applied from January 1, 2021. This code aims to guide professionals in their conduct and decision-making processes, ensuring that they adhere to ethical practices in line with Islamic teachings.

 

Global Adoption: The paper notes that these auditing standards and the Code of Ethics have been adopted, either fully or partially, as mandatory regulatory requirements in several countries, including Bahrain, Jordan, and Pakistan. This widespread adoption indicates a growing recognition of the importance of standardized practices in Islamic finance.

Educational Relevance: The textbook serves as a valuable resource for undergraduates and anyone interested in the standardization of audit and business ethics according to Islamic principles. It includes self-examination questions and a glossary, making it suitable for systematic study.

 

Regulatory Compliance: The standards and ethical guidelines are designed to meet the requirements of federal state educational standards of higher education, emphasizing their role in promoting regulatory compliance and professional development in the field of Islamic finance.

In summary, the paper underscores the importance of auditing standards and ethical guidelines in Islamic finance, highlighting their implementation, global adoption, and educational significance. These developments are crucial for enhancing the credibility and accountability of Islamic financial institutions.

Corporate Ethics Standards

The paper “A Code of Ethics for Corporate Code of Ethics” presents several important conclusions regarding the ethical evaluation of corporate codes of ethics. Here are the key takeaways:

Need for Ethical Standards: The paper argues that corporate codes of ethics are not inherently ethical. To address this, it proposes a set of universal moral standards that can be used to evaluate the ethical nature of these codes. The proposed standards include trustworthiness, respect, responsibility, fairness, caring, and citizenship.

 

Application of Standards: The authors apply these six moral standards to four different stages of code development: content, creation, implementation, and administration. This structured approach allows for a comprehensive evaluation of corporate ethics programs.

 

Ethical Audit Findings: The newly proposed code of ethics for corporate codes was tested on four large Canadian companies from various industries, including telecommunications, banking, manufacturing, and high technology. The results of the ethical audit indicated that all four companies have significant room for improvement in the ethical nature of their codes of ethics across all evaluated stages.

Implications for Companies: The findings suggest that companies should not only develop codes of ethics but also ensure that these codes are aligned with the proposed universal moral standards. This alignment is crucial for fostering a genuinely ethical corporate culture and for enhancing the credibility of the codes themselves.

 

Call for Continuous Improvement: The paper emphasizes the importance of ongoing evaluation and improvement of corporate codes of ethics. By regularly assessing their codes against the proposed standards, companies can better ensure that they are promoting ethical behavior and accountability within their organizations.

In summary, the paper highlights the necessity of establishing clear ethical standards for corporate codes of ethics and demonstrates that many companies currently fall short of these standards, indicating a need for continuous improvement in ethical practices.

Internal Auditing Ethics

The paper on the Code of Ethics for Internal Auditors presents several important conclusions regarding the ethical framework that governs the internal audit profession. Here are the main points derived from the provided context:

 

Binding Nature of the Code: The Code of Ethics is essential and binding for internal auditors. It serves as a foundational guideline that auditors must adhere to during their professional activities, ensuring that their work is credible and trustworthy.

 

Fundamental Principles: The Code outlines four fundamental principles that are crucial for the integrity of the internal audit profession:

Integrity: This principle is the cornerstone of trust in internal auditors. It emphasizes the need for honesty and ethical behavior in all professional dealings.

 

Objectivity: Objectivity is closely linked to the independence of auditors. It requires auditors to remain impartial and free from conflicts of interest, ensuring that their judgments are not influenced by external factors.

Confidentiality: Auditors must maintain confidentiality regarding the information they encounter during their audits. This principle is vital, although there are specific legal exceptions where disclosure may be required.

 

Competence: This principle highlights the importance of continuous professional development. Auditors are expected to keep their knowledge and skills up to date to perform their duties effectively.

Impact on Internal Control Systems: The adherence to the Code of Ethics directly influences the quality of the internal control systems being audited. By following these ethical guidelines, internal auditors can provide more reliable assessments and recommendations, ultimately enhancing the effectiveness of the organizations they serve .

 

Ongoing Relevance: The principles outlined in the Code of Ethics are not static; they require ongoing reflection and adaptation to remain relevant in the face of changing professional landscapes and regulatory environments. This adaptability is crucial for maintaining the integrity and effectiveness of the internal audit profession .

 

In summary, the paper emphasizes that the Code of Ethics is fundamental to the internal audit profession, providing a framework that ensures integrity, objectivity, confidentiality, and competence among auditors. These principles are essential for fostering trust and enhancing the quality of internal audits.

IS audit practices and techniques

The standards and guidelines for Information Systems (IS) auditing encompass a range of practices and techniques aimed at ensuring the integrity, efficiency, and compliance of IS within organizations. These standards are crucial for addressing the complexities of modern IS environments and mitigating risks associated with fraud and misstatements. The following sections outline key aspects of IS audit practices and techniques.

IS auditors use various techniques to assess IT security, data integrity, and risk management.

 

🔹 Key Audit Practices:
Risk-Based Auditing – Focus on high-risk areas (e.g., financial systems, cybersecurity).
Compliance Auditing – Ensure adherence to regulations like GDPR, PCI-DSS, and HIPAA.
Control Assessment – Evaluate IT General Controls (ITGCs) and Application Controls.
Vulnerability Assessment – Identify and mitigate cybersecurity risks


🔹 Common Audit Techniques:
1️⃣ Recalculation – Verify accuracy of system-generated financial reports.

2️⃣ Reperformance – Test the effectiveness of security controls.

3️⃣ Inspection – Review IT policies, logs, and system configurations.

4️⃣ Interviews & Observations – Engage with employees to understand processes.

5️⃣ Data Analytics – Use tools like ACL, IDEA, or Power BI to analyze large datasets.

✅ Why It Matters: Effective auditing helps prevent security breaches, financial fraud, and system failures.

Importance of Standards in IS Auditing

Framework for Consistency

The paper presents several important conclusions regarding the audit expectations gap (AEG) and the role of auditing standards, particularly in the context of France. Here are the main points derived from the analysis:

Persistence of the Audit Expectations Gap: Despite the adoption of International Standards on Auditing (ISAs), the audit expectations gap continues to exist. This indicates that merely implementing these standards does not automatically align public expectations with the actual performance of audits.

 

French Context and Exceptionalism: The study challenges the notion of French exceptionalism in audit practices. While France is often viewed as resistant to Anglo-American influences, the findings suggest that French audit standard-setting processes have largely conformed to the principles of ISAs. This alignment contradicts the idea that France maintains a unique approach to auditing that diverges from international norms.

 

Narrow Interpretation of AEG: The research highlights that the French interpretation of the audit expectations gap is relatively narrow. This limited perspective may contribute to the ongoing gap, as it does not fully address the broader public expectations surrounding audit quality and accountability.

Impact of Audit Standard Setting: The analysis raises questions about the effectiveness of auditing standard-setting in driving significant improvements in auditing practices. It suggests that simply having standards in place is insufficient to bridge the gap between what the public expects from audits and what auditors deliver.

 

Need for Broader Engagement: The findings imply that there is a need for more comprehensive engagement with stakeholders to better understand and address the factors contributing to the audit expectations gap. This could involve revisiting how standards are interpreted and implemented in practice.

In summary, the paper emphasizes that the persistence of the audit expectations gap, particularly in the French context, calls for a reevaluation of how auditing standards are perceived and applied, highlighting the limitations of current approaches in meeting public expectations.

Ethical Considerations

The paper “The Necessity of AI Audit Standards Boards” presents several important conclusions regarding the auditing of AI systems and the establishment of governance structures. Here are the main points:

Inadequacy of Current Standards: The paper argues that existing efforts to create auditing standards for AI systems are not only insufficient but can also be harmful. This is due to the proliferation of inconsistent and unheeded standards that fail to keep pace with the rapid evolution of AI technologies and their associated ethical and safety challenges.

 

Need for an AI Audit Standards Board: The authors propose the establishment of an AI Audit Standards Board. This board would be responsible for developing and continuously updating auditing methods and standards to ensure they remain relevant and robust in the face of evolving AI technologies. This governance structure is seen as essential for maintaining public trust in AI systems.

 

Learning from Other Industries: The paper draws parallels with other industries, such as aviation, nuclear energy, financial accounting, and pharmaceuticals. It suggests that AI auditing should not only focus on technical assessments but also incorporate ethical considerations and stakeholder engagement. Emulating the governance mechanisms of these fields is deemed necessary for effective AI auditing.

Comprehensive Auditing Approach: The authors emphasize the importance of auditing the entire development process of AI systems, rather than just the final products. This comprehensive approach is crucial for addressing ethical issues and ensuring safety throughout the lifecycle of AI technologies.

 

Promoting Ethical Responsibility: Establishing a dedicated board for AI auditing is expected to foster a culture of safety and ethical responsibility within the AI industry. This would help in addressing societal risks and ethical problems associated with AI systems, ultimately benefiting both the industry and the public.

In summary, the paper advocates for a structured and dynamic approach to AI auditing through the creation of an AI Audit Standards Board, emphasizing the need for continuous adaptation to the fast-paced developments in AI technology.

Computer-Assisted Audit Tools (CAATs)

The paper “Computer-Assisted Audit Tools for IS Auditing” presents several important conclusions regarding the use of Computer-Assisted Audit Tools (CAATs) in Information Systems (IS) auditing. Here are the main takeaways:

Importance of Information Systems: The paper emphasizes that Information Systems are crucial for the success of institutions, as they facilitate decision-making and help address emerging problems. This highlights the need for effective auditing to ensure their efficiency and accuracy.

 

Need for Comprehensive Auditing: Each area where information systems are applied requires thorough auditing. The paper suggests that IS auditors must adhere to existing standards and guidelines while performing their tasks, which can be quite challenging without the aid of CAATs.

 

Role of CAATs: The study indicates that CAATs are essential tools for IS auditors, as they assist in the auditing process. However, it also points out that these tools do not cover all areas of IS auditing and have specific limitations.

Comparative Study of Tools: One of the primaries aims of the paper is to provide a comparative analysis of existing IS auditing software tools. This analysis leads to insights regarding the capabilities and limitations of these tools, which can help auditors choose the right tools for their specific tasks.

 

Insights for IS Auditors: The findings from the comparative study can guide IS auditors in understanding which tools are most effective for their needs, thereby enhancing the overall auditing process. This is particularly important as the landscape of information systems continues to evolve.

In summary, the paper underscores the critical role of CAATs in IS auditing, the necessity for comprehensive auditing practices, and the importance of understanding the capabilities and limitations of various auditing tools to improve the effectiveness of IS audits.

Techniques and Tools

Risk Assessment Procedures

The paper presents several key conclusions regarding the application of the International Standard of Auditing (ISA) 315, which focuses on identifying and assessing risks of material misstatement in financial statements. Here are the main conclusions drawn from the study:

Importance of Planning Phase: The study emphasizes that the planning phase of an audit engagement is crucial. Auditors must utilize the provisions of ISA 315 to assess various external factors that can impact financial reporting, such as sectoral and regulatory influences.

Understanding the Entity: Auditors are required to analyze specific characteristics of the auditing entity, including:

  • Nature of the business
  • Ownership patterns and corporate management
  • Types of investments
  • Financing structure and methods This analysis helps auditors determine the inherent risk associated with the client’s business.

Inherent Risk Assessment: The conclusions highlight that the auditor’s analysis should lead to a well-informed conclusion about the inherent risk. This risk reflects the potential for material misstatement due to the nature of the client’s operations.

Economies of Scale for Small Firms: The paper notes that when auditing small firms, auditors can leverage economies of scale. This means that small firms may implement control measures differently than larger entities, allowing for a more tailored approach to risk management.

Audit Procedures: The study concludes that effective auditing procedures should begin with inquiries, observations, document reviews, and risk assessment procedures. This systematic approach is essential for identifying business risks and ensuring adequate control measures are in place.

Systematization of Risks: Finally, the paper emphasizes the need for a systematic approach to identifying business risks and control measures. This includes recognizing conditions and events that may indicate significant risks of material misstatement in financial statements.

Challenges in IS Auditing

Adapting to Rapid Changes

The paper “The Necessity of AI Audit Standards Boards” presents several important conclusions regarding the auditing of AI systems and the establishment of governance structures. Here are the main points:

Inadequacy of Current Standards: The paper argues that existing efforts to create auditing standards for AI systems are not only insufficient but can also be harmful. This is due to the proliferation of inconsistent and unheeded standards that fail to keep pace with the rapid evolution of AI technologies and their associated ethical and safety challenges.

 

Need for an AI Audit Standards Board: The authors propose the establishment of an AI Audit Standards Board. This board would be responsible for developing and continuously updating auditing methods and standards to ensure they remain relevant and robust in the face of evolving AI technologies. This governance structure is seen as essential for maintaining public trust in AI systems.

 

Learning from Other Industries: The paper draws parallels with other industries, such as aviation, nuclear energy, financial accounting, and pharmaceuticals. It suggests that AI auditing should not only focus on technical assessments but also incorporate ethical considerations and stakeholder engagement. Emulating the governance mechanisms of these fields is deemed necessary for effective AI auditing.

Comprehensive Auditing Approach: The authors emphasize the importance of auditing the entire development process of AI systems, rather than just the final products. This comprehensive approach is crucial for addressing ethical issues and ensuring safety throughout the lifecycle of AI technologies.

 

Promoting Ethical Responsibility: Establishing a dedicated board for AI auditing is expected to foster a culture of safety and ethical responsibility within the AI industry. This would help in addressing societal risks and ethical problems associated with AI systems, ultimately benefiting both the industry and the public.

In summary, the paper advocates for a structured and dynamic approach to AI auditing through the creation of an AI Audit Standards Board, emphasizing the need for continuous adaptation to the fast-paced developments in AI technology.

Fraud Detection

The research paper presents several key conclusions regarding the role of audit procedures in detecting and limiting fraudulent practices, particularly in the context of the International Auditing Standard (ISA No. 240). Here are the main conclusions drawn from the study:

Importance of ISA No. 240: The study emphasizes that ISA No. 240 plays a crucial role in defining the auditor’s responsibilities concerning fraud detection during financial statement audits. The standard is essential for guiding auditors in identifying and addressing fraud risks effectively.

 

Effectiveness of Audit Procedures: The research highlights that traditional audit procedures have often failed to adequately detect fraud, leading to the development of more robust standards like ISA No. 240. The findings suggest that adopting these enhanced audit procedures significantly improves the ability to discover fraudulent practices in financial statements.

 

Statistical Relationship: Through statistical analysis, the research found a significant relationship between the adoption of audit procedures in accordance with ISA No. 240 and the detection of fraud risks in the financial statements of Iraqi companies. This indicates that implementing these procedures can lead to better fraud detection outcomes.

Recommendations for Auditors: The study recommends that auditors should engage with major auditing firms that possess field experience and expertise in fraud detection. This collaboration can enhance the quality of audits and improve the overall effectiveness of fraud detection efforts.

 

Governance and Management Role: The research also underscores the importance of governance and management in the economic unit’s efforts to reduce and detect fraud. Effective governance structures can support auditors in their responsibilities and contribute to a more transparent financial reporting environment.

In summary, the research concludes that the implementation of ISA No. 240 and the adoption of effective audit procedures are vital for improving fraud detection in financial statements, particularly in the context of the Iraqi Stock Exchange. The study advocates for a collaborative approach between auditors and experienced firms to enhance audit quality and effectiveness in combating fraud.

ISO 27001: ISO/IEC 27001

Key Components of ISO/IEC 27001

  • The paper outlines the approach taken by an IT firm to comply with ISO 27001, emphasizing the importance of documenting processes and ensuring they are up-to-date to manage information security effectively.

Conducting a risk assessment is highlighted as one of the most time-consuming yet crucial steps in developing an information security strategy. It is essential for identifying all potential risks that could affect the organization.

 

The risks faced by companies are unique, but the ultimate goal remains the same: to protect sensitive data and find the best solutions that meet the organization’s needs.

 

The firm had many operational procedures in place, but most were not documented consistently. This lack of documentation meant that many risks were not recognized or addressed.

 

The rapid growth of the company made it clear that a streamlined information security model could enhance the efficiency of various business operations. However, this growth also made the company a more attractive target for cyberattacks.

In response to these challenges, the company prioritized developing a comprehensive and robust information security policy. This was necessary to adapt to the increasing complexity of managing information security as the workforce expanded.

 

The paper concludes that as the number of employees increases, so does the potential for human error, which can compromise information security. This situation led to frequent customer inquiries about the trustworthiness of the company’s data handling practices.

 

Ultimately, the lengthy process of implementing ISO 27001 culminated in a more structured approach to information security. However, it is noted that risk assessment is not a one-time task; it must be revisited regularly to adapt to new threats and changes within the organization.

Framework for ISMS

The paper presents several important conclusions regarding the recertification of the ISO/IEC 27001 standard in a university setting. Here are the key points derived from the research:

Framework for Information Security: The ISO/IEC 27001 standard is recognized as a leading framework for establishing an Information Security Management System (ISMS). It provides essential guidelines for organizations to protect their information assets effectively, making it particularly relevant for universities that handle sensitive data.

 

Structured Methodology: The university employed a structured methodology that aligned the seven clauses of the ISO/IEC 27001 standard with the four phases of the continuous improvement cycle. This approach ensured that all necessary components of the ISMS were systematically addressed, leading to a more effective implementation.

 

Continuous Improvement Cycle: The integration of the standard’s clauses into the continuous improvement cycle is crucial. The phases include:

 

    • Plan: Involves context, leadership, planning, and support clauses.
    • Do: Corresponds to the operation clause.
    • Check: Relates to the performance evaluation clause.
    • Act: Focuses on the improvement clause. This cycle promotes ongoing assessment and enhancement of the ISMS.

Leadership’s Role: The paper emphasizes the vital role of top management in the successful implementation of the ISMS. Their support is essential for fostering a culture of security and ensuring that adequate resources are allocated for effective information security practices.

 

Successful Recertification: The successful recertification of the university’s ISMS highlights the effectiveness of the implemented methodology and adherence to the ISO/IEC 27001 standard. This achievement not only strengthens the university’s information security framework but also enhances trust among stakeholders.

In summary, the paper underscores the importance of a structured approach to ISO/IEC 27001 implementation, the critical role of leadership, and the positive outcomes of the recertification process in a university context.

Continuous Improvement Cycle

The paper “Information Security Behavior and Compliance with ISO 27001 in IT Companies” presents several important conclusions regarding information security behavior and the implementation of the ISO 27001 standard in IT companies. Here are the main points derived from the provided context:

Importance of Information Security Behavior: The study emphasizes that information security behavior is crucial for maintaining the integrity, confidentiality, and availability of information within organizations. This behavior is a key factor in ensuring that information systems are secure and that sensitive data is protected from unauthorized access or breaches.

 

Role of ISO 27001: The ISO 27001 standard is highlighted as the primary framework for managing secure information systems. The paper outlines the main stages of its implementation, which include planning, executing, and checking the processes involved in information security management. This structured approach helps organizations systematically address security concerns.

 

Influencing Factors: The research identifies several factors that influence the successful implementation of information security behavior in IT companies. These factors include:

    • Organizational Culture: A strong culture that prioritizes security can enhance compliance with security protocols.
    • Training: Regular training programs are essential to ensure that employees understand their roles in maintaining information security.
    • Management Supervision: Active involvement and oversight from management can motivate employees to adhere to security practices.
    • Communication: Effective communication between departments is necessary to foster a collaborative environment focused on security.

 

Achieving Security Goals: By deeply understanding and effectively implementing the ISO 27001 standard, IT companies can significantly enhance their information security posture. This not only protects sensitive information but also aligns with the overall goals of information security within the organizational and technological context.

In summary, the paper concludes that a comprehensive approach to information security behavior, supported by the ISO 27001 framework and influenced by organizational factors, is essential for IT companies to safeguard their information assets effectively.

Risk Management

The paper outlines the approach taken by an IT firm to comply with ISO 27001, emphasizing the importance of documenting processes and ensuring they are up-to-date to manage information security effectively.

 

Conducting a risk assessment is highlighted as one of the most time-consuming yet crucial steps in developing an information security strategy. It is essential for identifying all potential risks that could affect the organization.

 

The risks faced by companies are unique, but the ultimate goal remains the same: to protect sensitive data and find the best solutions that meet the organization’s needs.

 

The firm had many operational procedures in place, but most were not documented consistently. This lack of documentation meant that many risks were not recognized or addressed.

 

The rapid growth of the company made it clear that a streamlined information security model could enhance the efficiency of various business operations. However, this growth also made the company a more attractive target for cyberattacks.

 

In response to these challenges, the company prioritized developing a comprehensive and robust information security policy. This was necessary to adapt to the increasing complexity of managing information security as the workforce expanded.

 

The paper concludes that as the number of employees increases, so does the potential for human error, which can compromise information security. This situation led to frequent customer inquiries about the trustworthiness of the company’s data handling practices.

 

Ultimately, the lengthy process of implementing ISO 27001 culminated in a more structured approach to information security. However, it is noted that risk assessment is not a one-time task; it must be revisited regularly to adapt to new threats and changes within the organization.

Resource Constraints

The paper discusses the significant role of ISO security standards in enhancing the cybersecurity posture of organizations. Here are the main conclusions drawn from the research:

Importance of ISO Standards: The ISO/IEC 27000 series, particularly ISO/IEC 27001, is crucial for organizations to establish a robust Information Security Management System (ISMS). This systematic approach helps in managing sensitive information effectively, ensuring its confidentiality, integrity, and availability.

 

Risk Management and Incident Response: By adopting ISO standards, organizations can significantly improve their risk management processes. This includes better identification, management, and mitigation of cybersecurity risks, which leads to enhanced incident response capabilities.

 

Regulatory Compliance: The implementation of ISO security standards aids organizations in aligning with various regulatory compliance requirements, such as GDPR and HIPAA. This alignment is essential for organizations that handle sensitive personal or financial data.

Cultural Shift Towards Security: ISO standards promote a security-first culture within organizations. This cultural shift fosters greater employee awareness regarding cybersecurity and encourages the consistent implementation of best practices across different departments and regions.

 

Challenges in Implementation: Despite the benefits, the paper highlights challenges in implementing ISO standards, such as resource constraints, scalability issues, and the necessity for continuous updates to keep pace with evolving cyber threats.

 

Integration with Emerging Technologies: The paper concludes that as the threat landscape continues to evolve, ISO security standards will remain integral to developing proactive cybersecurity strategies. This includes their integration with emerging technologies like artificial intelligence and the Internet of Things (IoT).

 

Global Adoption: The global adoption of ISO security standards reflects their pivotal role in securing the digital infrastructure of modern organizations, indicating a growing recognition of their importance in the cybersecurity landscape.

These conclusions underscore the critical impact of ISO security standards on enhancing organizational cybersecurity and highlight the ongoing need for adaptation and improvement in response to emerging threats.

Implementation Challenges

Cultural Factors

The paper “Information Security Behavior and Compliance with ISO 27001 in IT Companies” presents several important conclusions regarding information security behavior and the implementation of the ISO 27001 standard in IT companies. Here are the main points derived from the provided context:

Importance of Information Security Behavior: The study emphasizes that information security behavior is crucial for maintaining the integrity, confidentiality, and availability of information within organizations. This behavior is a key factor in ensuring that information systems are secure and that sensitive data is protected from unauthorized access or breaches.

 

Role of ISO 27001: The ISO 27001 standard is highlighted as the primary framework for managing secure information systems. The paper outlines the main stages of its implementation, which include planning, executing, and checking the processes involved in information security management. This structured approach helps organizations systematically address security concerns.

 

Influencing Factors: The research identifies several factors that influence the successful implementation of information security behavior in IT companies. These factors include:

    • Organizational Culture: A strong culture that prioritizes security can enhance compliance with security protocols.
    • Training: Regular training programs are essential to ensure that employees understand their roles in maintaining information security.
    • Management Supervision: Active involvement and oversight from management can motivate employees to adhere to security practices.
    • Communication: Effective communication between departments is necessary to foster a collaborative environment focused on security.

 

Achieving Security Goals: By deeply understanding and effectively implementing the ISO 27001 standard, IT companies can significantly enhance their information security posture. This not only protects sensitive information but also aligns with the overall goals of information security within the organizational and technological context.

In summary, the paper concludes that a comprehensive approach to information security behavior, supported by the ISO 27001 framework and influenced by organizational factors, is essential for IT companies to safeguard their information assets effectively.

ISO/IEC 27001

The paper discusses the significant role of ISO security standards in enhancing the cybersecurity posture of organizations. Here are the main conclusions drawn from the research:

Importance of ISO Standards: The ISO/IEC 27000 series, particularly ISO/IEC 27001, is crucial for organizations to establish a robust Information Security Management System (ISMS). This systematic approach helps in managing sensitive information effectively, ensuring its confidentiality, integrity, and availability.

Risk Management and Incident Response: By adopting ISO standards, organizations can significantly improve their risk management processes. This includes better identification, management, and mitigation of cybersecurity risks, which leads to enhanced incident response capabilities.

Regulatory Compliance: The implementation of ISO security standards aids organizations in aligning with various regulatory compliance requirements, such as GDPR and HIPAA. This alignment is essential for organizations that handle sensitive personal or financial data.

Cultural Shift Towards Security: ISO standards promote a security-first culture within organizations. This cultural shift fosters greater employee awareness regarding cybersecurity and encourages the consistent implementation of best practices across different departments and regions.

Challenges in Implementation: Despite the benefits, the paper highlights challenges in implementing ISO standards, such as resource constraints, scalability issues, and the necessity for continuous updates to keep pace with evolving cyber threats.

 

Integration with Emerging Technologies: The paper concludes that as the threat landscape continues to evolve, ISO security standards will remain integral to developing proactive cybersecurity strategies. This includes their integration with emerging technologies like artificial intelligence and the Internet of Things (IoT).

 

Global Adoption: The global adoption of ISO security standards reflects their pivotal role in securing the digital infrastructure of modern organizations, indicating a growing recognition of their importance in the cybersecurity landscape.

These conclusions underscore the critical impact of ISO security standards on enhancing organizational cybersecurity and highlight the ongoing need for adaptation and improvement in response to emerging threats.

ITIL (Information Technology Infrastructure Library)

The Information Technology Infrastructure Library (ITIL) provides a comprehensive framework for IT service management (ITSM), emphasizing best practices that enhance service delivery and operational efficiency. ITIL’s structured approach is particularly beneficial for organizations seeking to align IT services with business objectives, ensuring that IT governance and service management are effectively integrated. The following sections outline key aspects of ITIL’s standards and guidelines for IS auditing.

🔹 What is ITIL?
ITIL is a best practice framework for IT Service Management (ITSM).

It focuses on delivering high-quality IT services aligned with business needs.

🔹 Key ITIL Practices:
1️⃣ Service Strategy – Define IT services to meet business goals.
2️⃣ Service Design – Plan IT infrastructure, security, and performance.
3️⃣ Service Transition – Deploy new systems and manage changes.
4️⃣ Service Operation – Ensure smooth running of IT services (incident and problem management).
5️⃣ Continual Service Improvement – Optimize IT processes over time.

🔹 ITIL and IS Auditing

  • ITIL helps standardize IT processes, making audits more structured.
  • IT auditors assess ITIL compliance to ensure efficient IT service delivery.
  • ITIL frameworks improve incident response and change management.

Why It Matters:
Implementing ITIL ensures better IT governance, reduced downtime, and improved service quality.

The paper presents several key conclusions regarding the audit of information technology services using the ITIL V.3 framework, particularly in the context of the Communications and Information Technology Agency in Denpasar. Here are the main points derived from the paper:

Importance of Good Governance: The study emphasizes that good governance is crucial in public administration, especially in managing IT services. The municipal government of Denpasar recognizes this by appointing the Office of Communications and Information Technology as the service manager for SIPKD, highlighting the need for effective governance in IT service management.

 

Need for Standardized IT Governance: The rapid development of information technology necessitates a standardized approach to IT governance. The paper argues that adopting a framework like ITIL V.3 can provide best practice guidance, ensuring that IT services are managed effectively and efficiently.

 

ITIL V.3 Framework: ITIL V.3 is identified as a comprehensive framework that covers various aspects of IT service management, including Service Strategy, Service Transition, Service Operation, and Continual Service Improvement (CSI). This framework is essential for understanding the lifecycle of IT services and improving their quality.

Maturity Level Assessment: The audit based on ITIL V.3 aims to assess the maturity level of the IT services provided by the agency. This assessment is crucial for identifying areas of improvement and ensuring that the services meet the required standards of quality and efficiency.

 

Recommendations for Management: The findings from the audit are expected to lead to actionable recommendations for the management of Diskominfo Denpasar. These recommendations will be based on the maturity level assessment and will guide the agency in enhancing its IT service delivery.

In summary, the paper concludes that implementing ITIL V.3 can significantly improve the governance and management of IT services in public administration, leading to better service delivery and enhanced operational efficiency. The audit serves as a critical tool for assessing current practices and guiding future improvements.

ITIL Framework Overview

ITIL

Information Technology (IT) is essential for the effective functioning of business processes today. The complexity of the IT environment, which includes various technologies and suppliers, necessitates the use of effective methods and approaches to manage these complexities.

 

IT Service Management (ITSM) is a structured approach that includes policies, processes, and procedures aimed at managing and improving customer-oriented IT services. Unlike traditional IT management practices that focus on hardware or systems, ITSM emphasizes continuous improvement in IT customer service to align with business goals.

 

The most widely adopted framework in ITSM is ITIL (Information Technology Infrastructure Library), which focuses specifically on IT service management. Following ITIL, ISO/IEC 20000 is recognized as a standard that integrates various management processes for IT service management. COBIT (Control Objectives for Information and related Technology) is also popular, as it combines governance and management of corporate information and technologies.

The paper highlights that businesses that do not adopt ITSM principles may struggle to remain efficient and competitive in the market. This is particularly important for small and medium-sized enterprises, which require effective mechanisms to ensure the delivery of quality IT services.

 

The future of ITSM frameworks, standards, and norms is promising due to the increasing digitization and the integration of digital technologies in business operations. Organizations are encouraged to utilize these frameworks to enhance their management of business processes, improve profitability, and maintain competitiveness.

 

Overall, the research emphasizes the critical role of ITSM in modern business environments and suggests that organizations should actively implement these frameworks and standards to thrive in a digital age.

It serves as a guideline

The paper titled “Evaluation of IT Service Level Infrastructure In Organizations Using ITIL (Information Technology Infrastructure Library) Version 3 Standardization” presents several key conclusions regarding the assessment of IT services in organizations, particularly startups. Here are the main points derived from the provided context:

Importance of IT in Business: The paper emphasizes that the rapid development of information technology is crucial for businesses, especially startups, which rely heavily on IT to support their operations and achieve business goals. This highlights the need for robust IT services that are always available to meet business demands.

 

Need for IT Service Assessment: It concludes that regular assessment of IT services is essential for organizations to evaluate their information system capabilities. This assessment helps identify areas for improvement and ensures that the IT services align with the organization’s objectives.

 

Utilization of ITIL Standards: The research advocates for the use of ITIL standards as a framework for conducting IT service assessments. ITIL provides a structured approach to service management, which can help organizations enhance their service delivery and management processes.

Development of Assessment Tools: The paper discusses the creation of a website application designed to facilitate the assessment of IT services based on ITIL standards. This tool focuses on the domains of Service Management and Service Delivery, aiming to improve the services provided by the organization, specifically PT Loyal.id.

 

Expectation of Service Improvement: The ultimate goal of using ITIL standards and the assessment tool is to foster continuous improvement in IT services. By regularly evaluating and refining their IT service infrastructure, organizations can better support their business processes and adapt to changing market conditions.

In summary, the paper concludes that leveraging ITIL standards for IT service assessment is vital for organizations, particularly startups, to ensure their IT infrastructure is robust and capable of supporting their business needs effectively. The development of dedicated assessment tools can further enhance this process, leading to improved service delivery and management.

Implementation in Organizations

Organizations can utilize ITIL
Conclusions from the Paper on ITIL Implementation in Small Businesses

The paper presents several key conclusions regarding the implementation of ITIL (Information Technology Infrastructure Library) in small businesses. Here are the main points derived from the analysis:

Guideline Development: The authors successfully developed guidelines tailored for small businesses to implement ITIL processes effectively. This is crucial as small businesses often face unique challenges that differ from larger organizations, necessitating a customized approach.

 

Process Selection: Through careful analysis, the authors identified specific ITIL processes that are essential for small businesses. This selection process ensures that the guidelines are relevant and practical, focusing on processes that can deliver the most value without overwhelming the limited resources typical in small enterprises.

 

Implementation Strategy: The paper emphasizes the importance of a structured implementation strategy. By following the developed guidelines, small businesses can systematically adopt ITIL practices, which can lead to improved IT service management and operational efficiency.

Knowledge Utilization: The conclusions are based on extensive knowledge gathered from the analysis of ITIL processes. This knowledge base supports the credibility of the guidelines and provides a solid foundation for small businesses to rely on during their implementation journey.

 

Conclusion on Effectiveness: The authors conclude that with the right guidelines and processes in place, small businesses can significantly enhance their IT service management capabilities. This improvement can lead to better service delivery, increased customer satisfaction, and ultimately, business growth.

In summary, the paper highlights the necessity of tailored ITIL implementation guidelines for small businesses, focusing on essential processes and structured strategies to enhance IT service management effectively. The conclusions drawn from the analysis provide a roadmap for small businesses looking to adopt ITIL practices successfully.

Small businesses

The paper presents several key conclusions regarding the implementation of ITIL (Information Technology Infrastructure Library) in small businesses. Here are the main points derived from the analysis:

Guideline Development: The authors successfully developed guidelines tailored for small businesses to implement ITIL processes effectively. This is crucial as small businesses often face unique challenges that differ from larger organizations, necessitating a customized approach.

 

Process Selection: Through careful analysis, the authors identified specific ITIL processes that are essential for small businesses. This selection process ensures that the guidelines are relevant and practical, focusing on processes that can deliver the most value without overwhelming the limited resources typical in small enterprises.

 

Implementation Strategy: The paper emphasizes the importance of a structured implementation strategy. By following the developed guidelines, small businesses can systematically adopt ITIL practices, which can lead to improved IT service management and operational efficiency.

Knowledge Utilization: The conclusions are based on extensive knowledge gathered from the analysis of ITIL processes. This knowledge base supports the credibility of the guidelines and provides a solid foundation for small businesses to rely on during their implementation journey.

 

Conclusion on Effectiveness: The authors conclude that with the right guidelines and processes in place, small businesses can significantly enhance their IT service management capabilities. This improvement can lead to better service delivery, increased customer satisfaction, and ultimately, business growth.

In summary, the paper highlights the necessity of tailored ITIL implementation guidelines for small businesses, focusing on essential processes and structured strategies to enhance IT service management effectively. The conclusions drawn from the analysis provide a roadmap for small businesses looking to adopt ITIL practices successfully.

Benefits of ITIL Adoption

The paper titled “ITIL frameworks to ITD Company for improving capabilities in service management” presents several key conclusions regarding the adoption of ITIL frameworks to enhance service management capabilities. Here are the main points derived from the provided context:

Need for Improvement: The paper emphasizes that IT operates in dynamic environments, necessitating continuous change and adaptation. It highlights the importance of improving performance to meet these challenges.

 

Identified Gaps: Through an IT audit, various gaps in capabilities were identified within the ITD Company. The recognition of these gaps is crucial as it sets the stage for implementing effective solutions.

 

Adoption of Best Practices: One of the primary conclusions is that adopting widely recognized good practices can help close the identified gaps. The paper suggests that frameworks and standards such as ITIL, COBIT, and others can provide valuable guidance for improving service management capabilities.

Frameworks as Solutions: The proposal to implement ITIL frameworks specifically is aimed at enhancing the service management capabilities of ITD Company. This indicates a strategic approach to leverage established frameworks to address the performance issues identified during the audit.

 

Broader Implications: The conclusions drawn from the paper suggest that organizations can benefit significantly from adopting structured frameworks like ITIL. This not only helps in closing existing gaps but also positions

In summary, the paper concludes that by recognizing performance gaps and adopting ITIL frameworks, ITD Company can significantly improve its service management capabilities, thereby enhancing overall operational efficiency and adaptability in a dynamic environment.

The framework supports the integration

Information Technology (IT) is crucial for businesses today, as it supports various processes and operations. The complexity of the IT environment, which includes different technologies and suppliers, requires effective management methods to handle these challenges.

 

IT Service Management (ITSM) is a structured approach that focuses on managing and improving IT services that are customer-oriented. Unlike traditional IT management, which often centers on hardware and systems, ITSM aims to continuously enhance customer service in line with business objectives.

 

The most widely used framework in ITSM is ITIL (Information Technology Infrastructure Library). ITIL is specifically designed for IT service management and helps organizations implement best practices. Following ITIL, ISO/IEC 20000 is recognized as a standard that integrates various management processes for effective IT service management. COBIT (Control Objectives for Information and related Technology) is also popular, as it combines governance and management of corporate information and technologies.

The paper emphasizes that businesses that do not adopt ITSM principles may find it increasingly difficult to remain efficient and competitive. This is especially important for small and medium-sized enterprises, which need effective mechanisms to ensure the delivery of quality IT services.

 

The future of ITSM frameworks, standards, and norms looks promising due to the growing digitization and the integration of digital technologies in business operations. Organizations are encouraged to utilize these frameworks to improve their management of business processes, enhance profitability, and maintain competitiveness.

 

Overall, the research highlights the vital role of ITSM in modern business environments and suggests that organizations should actively implement these frameworks and standards to succeed in a digital age.

References

Spremić, M. (2011). Standards and Frameworks for Information System Security Auditing and Assurance.
Cannon, D. L. (2006). CISA Certified Information Systems Auditor Study Guide. https://www.amazon.com/Certified-Information-Systems-Auditor-Study/dp/1119056241
Yang, D. C., & Guan, L. (2004). The evolution of IT auditing and internal control standards in financial statement audits: The case of the United States. Managerial Auditing Journal, 19(4), 544–555. https://doi.org/10.1108/02686900410530547
Seeburn, K. (2013). The IS auditor: what are the key knowledge requirements. 1(1), 34. https://doi.org/10.1504/IJAUDIT.2013.052244
Harisova, F. I., Umarov, H. S., Nesterov, V. M., & Yusupova, A. (2023). Auditing Standards of Islamic Financial Institutions and Code of Ethics for Islamic Finance Specialists (AAOIFI – AAOIFI). https://doi.org/10.12737/1874285
Schwartz, M. S. (2016). A Code of Ethics for Corporate Code of Ethics.
Calota, G. (2008). Code of Ethics for Internal Auditors Harmonised with the International Standards for Internal Audit. Annals of the University of Petrosani: Economics, 8(1), 41–48. https://ideas.repec.org/a/pet/annals/v8i1y2008p41-48.html
Jedidi, I., & Humphrey, C. J. (2024). Auditing standards and the persistence of the audit expectations gap: Evidencing the absence of French ‘exceptionalism.’ International Journal of Auditing. https://doi.org/10.1111/ijau.12351
Manheim, D., Martin, S., Bailey, M., Samin, M., & Greutzmacher, R. (2024). The Necessity of AI Audit Standards Boards. arXiv.Org, abs/2404.13060. https://doi.org/10.48550/arxiv.2404.13060
Kamal, S., Helal, I. M. A., Mazen, S. A., & Elhennawy, S. (2020). Computer-Assisted Audit Tools for IS Auditing (pp. 139–155). Springer, Singapore. https://doi.org/10.1007/978-981-15-3075-3_10
Lubenchenko, O. E., & Korinko, M. (2021). Using the International Standard of Auditing 315 “Identifying and Assessing the Risks of Material Misstatement through Understanding the Entity and Its Environment” in the Auditing Practice. https://doi.org/10.31767/nasoa.3-4-2021.06
Manheim, D., Martin, S., Bailey, M., Samin, M., & Greutzmacher, R. (2024). The Necessity of AI Audit Standards Boards. arXiv.Org, abs/2404.13060. https://doi.org/10.48550/arxiv.2404.13060
Mohammed, M. J., Jabar, M., دمحم, د., & ىنم, ر. (2022). The role of audit procedures according to the International Auditing Standard (ISA No. 240) in detecting and limiting fraudulent practices. https://doi.org/10.58564/easj/1.4.2022.4
Kitsios, F., Chatzidimitriou, E., & Kamariotou, M. (2023). The ISO/IEC 27001 Information Security Management Standard: How to Extract Value from Data in the IT Sector. Sustainability, 15(7), 5828. https://doi.org/10.3390/su15075828
Rojas, E. (2024). Recertificación del ISO/IEC 27001 de un área universitaria. https://doi.org/10.22201/dgtic.ctud.2024.2.2.52
Rafli, M., Nusantara, N. C. A., Putri, E. R., Sari, I. P., Zamzami, N., & Muharroman, A. I. (2024). Information Security Behavior and Compliance with ISO 27001 in IT Companies. https://doi.org/10.26740/jdbim.v3i1.59163
Kitsios, F., Chatzidimitriou, E., & Kamariotou, M. (2023). The ISO/IEC 27001 Information Security Management Standard: How to Extract Value from Data in the IT Sector. Sustainability, 15(7), 5828. https://doi.org/10.3390/su15075828
Folorunso, A., Mohammed, V., Wada, I., & Samuel, B. J. (2024). The impact of ISO security standards on enhancing cybersecurity posture in organizations. World Journal Of Advanced Research and Reviews, 24(1), 2582–2595. https://doi.org/10.30574/wjarr.2024.24.1.3169
Rafli, M., Akhwat Nusantara, N. C., Putri, E. R., Sari, I. P., Zamzami, N., & Muharroman, A. I. (2024). Information Security Behavior and Compliance with ISO 27001 in IT Companies. https://doi.org/10.26740/jdbim.v3i1.59163
Wijaya, A. P., Widiadnyana, P., & Swamardika, I. B. A. (2016). Audit of Information Technology using ITIL V.3 Domain Service Operation on Communications and Information Technology Agency. International Journal of Engineering, 1(1).
Bednarčíková, D. (2023). Use of Frameworks, Norms and Standards in Information Technology Service Management. https://doi.org/10.53465/edamba.2022.9788022550420.27-38
Hans, A. R., Firmansyah, G., Tjahyono, B., & Widodo, A. M. (2024). Evaluation of IT Service Level Infrastructure In Organizations Using ITIL (Information Technology Infrastructure Library) Version 3 Standardization. Asian Journal of Social and Humanities, 2(12), 2995–3006. https://doi.org/10.59888/ajosh.v2i12.393
Piterāns, A., Ņemņasevs, V., Pavļukaite, A., & Teilāns, A. (2016). Itil implementation in small business. Cilvēks. Vide. Tehnoloģijas, 20, 168–173. https://doi.org/10.17770/het2016.20.3535
Nguyen, P. V. (2011). ITIL frameworks to ITD Company for improving capabilities in service management. arXiv: Software Engineering. https://dblp.uni-trier.de/db/journals/corr/corr1112.html#abs-1112-4017
Bednarčíková, D. (2023). Use of Frameworks, Norms and Standards in Information Technology Service Management. https://doi.org/10.53465/edamba.2022.9788022550420.27-38