![]() |
Center for Open Access in Science (COAS) OPEN JOURNAL FOR INFORMATION TECHNOLOGY (OJIT) ISSN (Online) 2620-0627 * ojit@centerprode.com |
Information Systems Audit Framework to Improve the Quality of Audit in Higher Education in East Africa Jeremiah Osida Onunga * jerryosida@gmail.com * ORCID: 0000-0002-9827-7352 Open Journal for Information Technology, 2020, 3(2), 53-62 * https://doi.org/10.32591/coas.ojit.0302.02053o LICENCE: Creative Commons Attribution 4.0 International License. ARTICLE (Full Text - PDF) |
ABSTRACT: KEY WORDS: ISA Framework, data mining framework, anomaly detection technique, higher education. CORRESPONDING AUTHOR: |
REFERENCES: Comyn-Wattiau I., & Akoka, J. (1996). Logistics information system auditing using expert system technology. Journal of Expert Systems with Applications, 11(4), 463-473. Han J., Kamber, M., & Pei, J. (2012). Data mining concepts and techniques. Morgan Kaufmann: Waltham, MA 02451, USA. Hardy, C. A., & Laslett, G. (2015). Continuous auditing and monitoring in practice: Lessons from Metcash’s business assurance group. Journal of Information Systems, 29(2), 183-191. Rus, I. (2015). Technologies and methods for auditing databases. Procedia Economics and Finance, 26, 991-999. Omoteso, K. (2012). The application of artificial intelligence in auditing: Looking back to the future. Journal of Expert Systems with Applications, 39(9), 8490-8495. Kim, S. L., Teo, T. S. H., Bhattacherjee, A., & Nam, K. (2015). IS auditor characteristics, audit process variables, and IS audit satisfaction: An empirical study in South Korea. Information Systems Frontiers, November 2015, 1-15. Kurniati, A. P., Kusuma, G. P., & Ary Wisudiawan, G. A. (2015). Designing application to support process audit using process mining. Journal of Theoretical and Applied Information Technology. 80(3), 473-480. Liu, L., De Vel, O., Han, Q-L., Zhang, J., & Xian, Y. (2018). Detecting and preventing cyber insider threats: A survey. IEEE Communications Surveys & Tutorials, 20(2), SECOND QUARTER 2018. Lope, A. R., Islam, & Ai-Nemrat (2015). Measuring sustainability for an effective Information System audit from public organization perspective. 9th IEEE International Conference on Research Challenges in Information Science, IEEE RCIS 2015; Athens; Greece; 13-15 May 2015; Category number CFP1540D-ART. Marques, R. P., Santos, H., & Santos, C. (2015). Monitoring organizational transactions in enterprise information systems with continuous assurance requirements. International Journal of Enterprise Information Systems, 11(1), 13-32. Tao, P., Sun, Z., & Sun, Z. (2018). An improved intrusion detection algorithm based on GA and SVM. IEEE Access, 2018, 13624-13631. Marquesa, R. P., Santosa, H., & Santos, C. (2012). A solution for real time monitoring and auditing of organizational transactions. Procedia Technology, 5, 190-198. Shing-Han, L., Shi-Ming, H., & Yuah-Chiao, G. L. (2007). Developing a continuous Auditing Assistance System Based on Information Process Models. The Journal of Computer Information Systems, 48, 1. Wang, Y., Wu, Q., Qin, B., Shi, W., & Deng, R. H. (2017). Identity-based data outsourcing with comprehensive auditing in clouds. IEEE Transactions on Information Forensics and Security, 12(4), 940-952. Rezaee, Z., Sharbatoghlieb, A., Elam, R., & McMickle, P. L. (2002). Continuous auditing: Building automated auditing capability. AUDITING: A Journal of Practice & Theory, 21(1).
|
© Center for Open Access in Science