Securities in the Auditor of Securities in the Auditor of Professionalization of Information Security Research -A Case Study on Internal Control Computer-Controlled Cycle

碩士 === 萬能科技大學 === 經營管理研究所 === 97 === With the evolution of information technology and the prevalence of the use of the Internet, for consumers, the implication behind the one-stop shopping consumer marketing. In addition to securities dealers should pay attention to the customer's personal...

Full description

Bibliographic Details
Main Authors: Ching-Lan Lin, 林靜蘭
Other Authors: Mei-Chun Chen
Format: Others
Language:zh-TW
Published: 2008
Online Access:http://ndltd.ncl.edu.tw/handle/96021367241884534488
id ndltd-TW-097VNU05457001
record_format oai_dc
spelling ndltd-TW-097VNU054570012015-11-13T04:15:06Z http://ndltd.ncl.edu.tw/handle/96021367241884534488 Securities in the Auditor of Securities in the Auditor of Professionalization of Information Security Research -A Case Study on Internal Control Computer-Controlled Cycle 證券商稽核人員對資訊安全專業程度之研究-以個案公司內部控制之電腦控制作業循環為例 Ching-Lan Lin 林靜蘭 碩士 萬能科技大學 經營管理研究所 97 With the evolution of information technology and the prevalence of the use of the Internet, for consumers, the implication behind the one-stop shopping consumer marketing. In addition to securities dealers should pay attention to the customer's personal data privacy protection, information security and information technology ability is also the priorities of the controls. This study is a document from the control and information technology point of view of the application process, to discuss the cases of companies (Ma Securities) into the proposed information security control, audit staff to provide information on control of security to ensure that, to achieve sustainable management of the company Target. The mistake of IT application belongs to the information security management control, information security than the application of information technology management to be more of the procedures or processes to ensure relevance, and to implement, and in line with the continued operation of the needs of sustainable Operation of cognitive training. For the purposes of this study, as far as the professional level of the information security audit staff, for the company. Although its high level of the strict internal control system can fill in the weakness of the audit staff’s shortage of information security to some extent, the use of information technology skills without the IT security awareness of the continuing operation of training will lead to less financial products in response to the increasing complexity of the trend; with the development of professional audit , the Ministry of Information can strengthen the control over the operations risk management. Mei-Chun Chen 陳美純 2008 學位論文 ; thesis 127 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 萬能科技大學 === 經營管理研究所 === 97 === With the evolution of information technology and the prevalence of the use of the Internet, for consumers, the implication behind the one-stop shopping consumer marketing. In addition to securities dealers should pay attention to the customer's personal data privacy protection, information security and information technology ability is also the priorities of the controls. This study is a document from the control and information technology point of view of the application process, to discuss the cases of companies (Ma Securities) into the proposed information security control, audit staff to provide information on control of security to ensure that, to achieve sustainable management of the company Target. The mistake of IT application belongs to the information security management control, information security than the application of information technology management to be more of the procedures or processes to ensure relevance, and to implement, and in line with the continued operation of the needs of sustainable Operation of cognitive training. For the purposes of this study, as far as the professional level of the information security audit staff, for the company. Although its high level of the strict internal control system can fill in the weakness of the audit staff’s shortage of information security to some extent, the use of information technology skills without the IT security awareness of the continuing operation of training will lead to less financial products in response to the increasing complexity of the trend; with the development of professional audit , the Ministry of Information can strengthen the control over the operations risk management.
author2 Mei-Chun Chen
author_facet Mei-Chun Chen
Ching-Lan Lin
林靜蘭
author Ching-Lan Lin
林靜蘭
spellingShingle Ching-Lan Lin
林靜蘭
Securities in the Auditor of Securities in the Auditor of Professionalization of Information Security Research -A Case Study on Internal Control Computer-Controlled Cycle
author_sort Ching-Lan Lin
title Securities in the Auditor of Securities in the Auditor of Professionalization of Information Security Research -A Case Study on Internal Control Computer-Controlled Cycle
title_short Securities in the Auditor of Securities in the Auditor of Professionalization of Information Security Research -A Case Study on Internal Control Computer-Controlled Cycle
title_full Securities in the Auditor of Securities in the Auditor of Professionalization of Information Security Research -A Case Study on Internal Control Computer-Controlled Cycle
title_fullStr Securities in the Auditor of Securities in the Auditor of Professionalization of Information Security Research -A Case Study on Internal Control Computer-Controlled Cycle
title_full_unstemmed Securities in the Auditor of Securities in the Auditor of Professionalization of Information Security Research -A Case Study on Internal Control Computer-Controlled Cycle
title_sort securities in the auditor of securities in the auditor of professionalization of information security research -a case study on internal control computer-controlled cycle
publishDate 2008
url http://ndltd.ncl.edu.tw/handle/96021367241884534488
work_keys_str_mv AT chinglanlin securitiesintheauditorofsecuritiesintheauditorofprofessionalizationofinformationsecurityresearchacasestudyoninternalcontrolcomputercontrolledcycle
AT línjìnglán securitiesintheauditorofsecuritiesintheauditorofprofessionalizationofinformationsecurityresearchacasestudyoninternalcontrolcomputercontrolledcycle
AT chinglanlin zhèngquànshāngjīhérényuánduìzīxùnānquánzhuānyèchéngdùzhīyánjiūyǐgèàngōngsīnèibùkòngzhìzhīdiànnǎokòngzhìzuòyèxúnhuánwèilì
AT línjìnglán zhèngquànshāngjīhérényuánduìzīxùnānquánzhuānyèchéngdùzhīyánjiūyǐgèàngōngsīnèibùkòngzhìzhīdiànnǎokòngzhìzuòyèxúnhuánwèilì
_version_ 1718130166951051264