Last edited by Gobar
Monday, July 20, 2020 | History

5 edition of EDI security, control, and audit found in the catalog.

EDI security, control, and audit

by Albert J. Marcella

  • 95 Want to read
  • 30 Currently reading

Published by Artech House in Boston .
Written in English

    Subjects:
  • Electronic data interchange.,
  • Electronic data interchange -- Auditing.,
  • Data transmission systems -- Standards.

  • Edition Notes

    Includes bibliographical references and index.

    StatementAlbert J. Marcella, Jr. and Sally Chan.
    ContributionsChan, Sally.
    Classifications
    LC ClassificationsHF5548.33 .M37 1993
    The Physical Object
    Paginationxviii, 212 p. :
    Number of Pages212
    ID Numbers
    Open LibraryOL1735738M
    ISBN 100890066108
    LC Control Number92040730

    Managing and Auditing EDI Systems Development. By Chan, Sally. Read preview. on business and our everyday life cannot be under-estimated. Electronic data interchange (EDI)--the computer-to-computer exchange of business documents in a standard format between trading partners--is an excellent illustration of IT operating at its best as. Figure An Iterative Process of Security Risk Assessment and Audit Assessing security risk is the initial step to evaluate and identify risks and consequences associated with vulnerabilities, and to provide a basis for management to establish a cost-effective security program.

    Electronic data interchange (EDI) is the concept of businesses electronically communicating information that was traditionally communicated on paper, such as purchase orders and cal standards for EDI exist to facilitate parties transacting such instruments without having to make special arrangements.. EDI has existed at least since the early 70s, and there are many EDI . A third-party EDI specialist is an excellent resource for your EDI system security needs. He or she is well-versed in how EDI systems work, their vulnerabilities, and how to best protect them. When you bring a third-party EDI specialist on-board, you gain peace of mind that your investment is safe. Moreover, you can focus on your core business.

    This thesis evaluates and analyzes the feasible internal controls in an EDI environment and provides recommendations for further development. It discusses the basic concepts of EDI, general control and application control issues, as well as legal issues related to an EDI environment. (Author). airline tickets or hotel reservations online and then receive an electronic confirmation. This book focuses on electronic data interchange (EDI), the most commonly used B2B ecommerce technology. In today’s business environment, EDI remains a gamechanger across all industries, including retail, banking, manufacturing, high-tech, and services.


Share this book
You might also like
adversaries of St. Paul in 2nd Corinthians.

adversaries of St. Paul in 2nd Corinthians.

Life extending control for rocket engines

Life extending control for rocket engines

Two great raids

Two great raids

Ulster to-day and to-morrow

Ulster to-day and to-morrow

Speedily will be published, Bibliotheca septentrionalis, or, an universal dictionary, containing every thing relative to the northern nations, ... By John Callander. ...

Speedily will be published, Bibliotheca septentrionalis, or, an universal dictionary, containing every thing relative to the northern nations, ... By John Callander. ...

Pan ji, the culture hero

Pan ji, the culture hero

The Canary Trainer

The Canary Trainer

Disputed Handwriting

Disputed Handwriting

Practical budget procedure

Practical budget procedure

twelve-pound look and other plays.

twelve-pound look and other plays.

Bantu folk tales, seven stories

Bantu folk tales, seven stories

Farewell sermons preached by Mr. Calamy, Dr. Manton, Mr. Caryle [et. al.]

Farewell sermons preached by Mr. Calamy, Dr. Manton, Mr. Caryle [et. al.]

EDI security, control, and audit by Albert J. Marcella Download PDF EPUB FB2

Edi Management, Control, Security and Audit (Map) Ringbound Edition by Masp (Author) ISBN ISBN X. Why is ISBN important. ISBN. This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The digit and digit formats both work.

EDI Security, Control, and Audit - Albert J. Marcella, Sally Chan - Google Books Provides answers to key questions affecting the future of electronic data interchange (EDI) and its impact on the. EDI security, control, and audit. [Albert J Marcella; Sally Chan] Home. WorldCat Home About WorldCat Help.

Search. Search for Library Items Search for Lists Search for Book, Internet Resource: All Authors / Contributors: Albert J Marcella; Sally Chan. Find more information about: ISBN:   EDI Audit and Control by Albert J. Marcella,available at Book Depository with free delivery worldwide.4/5(3).

LibraryThing is a cataloging and social networking site for booklovers All about EDI and audit book, control, and audit by Albert J.

Marcella. LibraryThing is a cataloging and social networking site for booklovers Home Groups Talk And audit book Albert J. Marcella. Additional Physical Format: Online version: EDI control, management, and audit issues.

New York, NY: American Institute of Certified Public Accountants, © Internal EDI risks include: of security, control and auditability has con- risks directly associated with EDI message tributed to the false impressions of unrelia- security and threats which affect message bility, enforceability of electronic transaction integrity, authenticity, repudiation, availabil- records and legal uncertainty in the elec- ity, timeliness and confidentiality.

The only source for information on the combined areas of computer audit, control, and security, the IT Audit, Control, and Security describes the types of internal controls, security, and integrity procedures that management must build into its automated systems.

This very timely book provides auditors with the guidance they need to ensure that their systems are secure from both Reviews: 7. suggesting security and control procedures, and considering appropriate techniques to audit these systems, and environments (Jamieson, ).

EDI External Risks EDI external risks are those associated with access to and interference with the EDI infrastructure and Internet exposure since the information transmitted is.

Risk & Control Matrices - RCMs EDI Audit Work Program This audit work program focuses on the processes to set up, design, and test client and carrier interfaces, and understand the documentation that is maintained for each electronic data interchange (EDI) interface.

The only source for information on the combined areas of computer audit, control, and security, the IT Audit, Control, and Security describes the types of internal controls, security, and integrity procedures that management must build into its automated.

System controls for electronic data interchange. (The Practitioner & the Computer) by Tsay, Bor-Yi. Abstract- Electronic data interchange (EDI) networks require the formulation of cooperative controls among network members to prevent fraud and unauthorized networking eliminates the paper trail that was the cornerstone of the traditional audit and has made certain controls.

The same features that make EDI attractive because of increased efficiencies make EDI an audit concern if management has not instituted effective controls over the entire EDI application system.

Auditors may want to determine that changes have been authorized by management and that a paper trail of these changes exists and has been examined by.

For 50 years and counting, ISACA ® has been helping information systems governance, control, risk, security, audit/assurance and business and cybersecurity professionals, and enterprises succeed.

Our community of professionals is committed to lifetime learning, career progression and sharing expertise for the benefit of individuals and organizations around the globe.

The EDI Au-dit Approaches group was concerned with the EDI and electronic record issues as they af-fect the tax audit. The EDI Audit Approaches group was further divided into three sub-groups: System Integrity Audits, Electronic Records Audits, and Educational Needs and Approaches.

This white paper contains the work product of the EDI Audit. The great news is that EDI VANs provide a high level of security by nature and you’ll never have to pay to make the service more secure.

Keeping your data transactions more safe using an EDI VAN is also an extremely cost-effective option, especially if you use a service provider like BOLD VAN that operates in the cloud. Security concerns The lack of experience and knowledge of security, control and auditability in respect of EDI has con- tributed to false impressions of unreliability, enforce- ability of electronic transaction records and legal uncertainty in the electronic trade area.

Electronic Data Interchange (EDI) is the computer-to-computer exchange of business documents in a standard electronic format between business partners. By moving from a paper-based exchange of business document to one that is electronic, businesses enjoy major benefits such as reduced cost, increased processing speed, reduced errors and.

The Information Systems Audit and Control Association Support the professional education of stakeholders in enhancing their understanding of information systems security and control. Failure to comply with this Code of Professional Ethics can result in an investigation into a member’s or certification.

RISKS AND CONTROLS IN E-BUSINESS AND EDI (STUDY OBJECTIVE 8, continued). Exhibit in Chapter 8 summarized the risks and controls from the seller's perspective.

That exhibit is presented here as Exhibit to summarize risks and controls of electronic purchase transactions from the buyer's perspective, including security and confidentiality risks, processing integrity risks, and.

The only source for information on the combined areas of computer audit, control, and security, the IT Audit, Control, and Security describes the types of internal controls, security, and integrity procedures that management must build into its automated systems.

In addition, the adoption of EDI presents significant information security, control, and auditing problems. Among other things, it eliminates long established paper document processing activities and the division of responsibilities and the audit trails associated with those operations.EDI brings with it, however, new and important control considerations.

This article discusses, in a non-technical fashion, the control architec-tures and concerns associated with EDI. Audit considerations in the EDI environment, as well as related audit tools, are also outlined. Keywords: Data communications, control and audit, electronic data.