Sox Compliance: Eleven Essential Controls for Sme
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 4
Abstract
Abstract: Sarbanes-Oxley (SOX) act, was enacted in 2002, in the wake of large accounting scandals ENRON and WORLDCOM .Especially for SMEs (small to mid-sized enterprises) that can benefit from implementing the control objectives, for governance, compliance and improved security. SOX compliance did not gave detailedrequirements for IT compliance, therefore many auditors adopted COBIT and COBIT guidelines to comply with SOX. This research discusses the latest sox developments in the SME, key findings from ISACA study and COBIT control objectives to satisfy internal IT controls .This compliance escalates and maps out internal it controls that protect information assets.
Authors and Affiliations
Utkarshni Sharma
Estimation of Arm Joint Angles from Surface Electromyography signals using Artificial Neural Networks
Vicon system is implemented in almost every motion analysis systems. It has many applications like robotics, gaming, virtual reality and animated movies. The motion and orientation plays an important role in th...
Studying the Performance of a Local Area Network through a Statistical Results of a Simulation Program
The ring topology was selected among several topologies,since in the ring topology easy to isolate faults and it has good performs under heavy network load, but the most problem that face in the ring topology is th...
Change-Proneness of Software Components
Abstract : In this research paper, we have done a statistical study on the factors that influence the rate of change of piece of code (class or groups of class of working together).After conducting systematic liter...
Performance Evaluation of IPv4 Vs Ipv6 and TunnellingTechniques Using Optimized Network Engineering Tools(OPNET)
Abstract: Internet Protocol version 6 (IPv6) is the latest version of the Internet Protocol (IP). IPv6 is intendedto replace IPv4, which is still widely used, in order to deal with the problem of IPv4 address exhau...
Abstraction and Automation: A Software Design Approach forDeveloping Secure Data Management Application.
Abstract: Security plays a vital role in data management application. For this purpose while developing, threedifferent views of applications are modeled namely conceptual, security and GUI model. It formalizes the...