• 제목/요약/키워드: Information System Audit

Search Result 273, Processing Time 0.031 seconds

Design on Fixed Quantity Analytical Model for Information System Audit (정보시스템 감리의 정량화 분석 모델 설계)

  • Kim, Hee-Wan;Lee, Hae-Man;Kim, Dong-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.2
    • /
    • pp.88-100
    • /
    • 2011
  • This thesis suggests fixed quantity model and detailed performance procedures of an information system audit. In addition, an identification of the check-items with high operating risk and factors that might lead to serious effects on the business are made. Then, this thesis proposes the information system audit model that can grant priorities. By using this model, the orderer can evaluate objectively with digitized mark. The model can improve the effectiveness, reliability, and objectivity of the audit by minimizing the discrepancies of different opinions about audit evaluation results between auditee and the orderer. The proposed model is adapted to an application system and audit projects of the database construction. As a result, the model has received an equal mark from the result of the general reviews, thus the propriety of the proposed model was verified.

A Study on Behavioral Intention and Application of Information Systems Audit technology Using the Technology Acceptance Model (TAM) (기술수용모델 (TAM)을 이용한 정보시스템 감리기술의 사용의도 수준이 활용에 미치는 영향에 관한 연구)

  • Jeon, Soon-Cheon
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.609-618
    • /
    • 2014
  • Information system audit, by checking overall matters about constructing and managing information system, has to contribute to improvement of information system's quality and improving performance of projects. For this, an auditor has to present objective corroborative facts which back up result of audit and ways of improvement, but in reality, general(especially businessmen's) cognition is that audit is biased by way too subjective opinions. Local experience and theoretical research until now propose that tools of automating audit will be an active means of systematically collecting and proposing these objective evidences of audit. This research not only verified that in the field of audit, phenomenon of technology application can be explained and predicted by applying TAM, but it also contributed in extending theoretical base on information technology and audit by distinguishing several characteristics which appear in the process of the model's application and analysis.

Study of the Acceptance of Interested Parties(Auditor /Auditee) in the Information System Audit Technologies Based Technology Acceptance Model(TAM) (정보시스템 감리기술에 대해 이해관계자(감리인/피감리인)의 수용에 관한 연구 -기술수용모델(TAM)을 중심으로-)

  • Kim, Hak-Joon;Jeon, Soon-Cheon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.2
    • /
    • pp.1403-1413
    • /
    • 2015
  • An information System Audit by the recognition of a problem and suggestions for solutions for overall matters about constructing and managing information systems is needed in order to contribute to the improvement of an information system's quality and improving the performance of projects. In reality, however, the general cognition is that audit is biased by subjective opinions. For this, an auditor needs to measure the level of recognition of the usability and convenience of the technologies of automating audit by applying TAM in the information system audit, and to analyze the relationship with recognition and availability of the interested parties for the technology (tool) of the audit. By the hypothesis verification result, an auditor needs to present objective corroborative facts that back up the level of recognition and usability for the information technology in the field of audit. This study verified that the phenomenon of technology application can be explained and predicted by applying TAM in the field of audit. Through an empirical study of the recognition level of audit and contractor, the developer suggests that the audit plan stage is similar to the audit corrective action stage, but the audit action stage is different from the audit review stage. This research can verify the audit technology preferred for the availability and intention of use and usability.

Audit Method Design and Performance Evaluation for Connection Information in ATM Switch (ATM 교환기에서 연결 정보에 대한 감사 기능 제공 방안 및 성능 평가)

  • 유영일;전병실
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.11
    • /
    • pp.27-33
    • /
    • 2003
  • This paper proposes the efficient audit method for the distributed connection information in ATM switch. Based on this method, we design the periodic audit function by a system and immediate audit function by a operator's order. We evaluate the performance about the proposed Audit method. At the result of evaluation, We figure out that the load of call control processor is almost independent of a system load regardless of audit function operation. Therefore, we confirm that the proposed audit method nearly have an effect on the load of call control processor. The proposed audit method can reestablish a Mismatched connection information with a little load.

Design on Fixed Quantity Analytical Model for Information System Audit based on Requirements (요구사항 기반 정보시스템 감리의 정량화 분석 모델 설계)

  • Kim, Hee-Wan;Kim, Hun-Kyeom;Koh, Chan;Kim, Dong-Soo
    • Journal of Digital Convergence
    • /
    • v.9 no.5
    • /
    • pp.141-156
    • /
    • 2011
  • Auditors' subjective opinions m audit activities weaken reliability in audit judgments. This paper suggests fixed quantity models through requirement priority for improving objective evaluation and priorities of requirements in information system audit. The value of requirements was evaluated based on customers' requirements with a premise that they are not in the same level. Furthermore, the audit objective judgments were enhanced to enable fixed quantity of subjective audit by subdividing detailed evaluation index of requirement priority standards into importance of service and function on orderers' perspective, and sectioning cost and schedule on contractors' perspective.

The Design and Implementation of Efficient Audit System for Intrusion Detection System (침입탐지 시스템을 위한 효율적인 Audit시스템 설계 및 구현)

  • 문제근;위규범
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.637-639
    • /
    • 2001
  • 침입탐지 시스템은 Audit 시스템, 침입탐지 엔진, 침입대응 시스템으로 나눌 수 있다. Audit 시스템을 통하여 감사자료를 수집하고, 침입탐지 엔진을 이용하여 침입을 탐지하며 대응 시스템을 통하며 침입에 대한 대응 및 대책을 세우게 된다. 지금까지 Audit 시스템은 침입탐지 엔진의 일부로 설계, 구현되어왔다. 이는 침입탐지 엔진에 따라 Audit 시스템도 함께 변경되어야 하는 비효율성을 가져왔다. 본 논문에서는 침입탐지 엔진과 독립적으로 Audit data 수집하고 관리하며 침입탐지 엔진과 효율적으로 연동될 수 있는 Audit 시스템을 설계 및 구현하였다. 탐지엔지을 알고리즘 개발 및 엔진의 변경시에 본 시스템과 연동하면 별다른 Audit 시스템 구현없이 효율적이고 빠르게 테스트 및 검증할 수 있다.

  • PDF

Implementation of Audit Trail Service System for EDI Security (EDI 보안 감사 추적 서비스 시스템 구현)

  • Jeong, Gyeong-Ja;Kim, Gi-Jung;Seo, Gyeong-Ran;Ryu, Geun-Ho;Gang, Chang-Gu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.3
    • /
    • pp.754-766
    • /
    • 1997
  • In this paper,we implement the Audit Trail Service Sydtem for the EDI Security.It has solved a law dispute between enterprises by informations that have generated by the EDI serice systrm.The audit trail service sys-tem implemented for EDI security satisfied the requirements of audit and the protocol of the security serive of X.435 and X.400.The EDI Security Audit System consists of the event discrimiator,the audit recirder,the audit archiver,and the provider of audit services .The event discriminator classified the reansmitted data from the EDI network ot audit sercices.The audit recorder constructs an index that has combined time information wiht audit unformations which are classified by the event discriminator.ZThe audit archiver performas the vacumming of added audit imformations by passing time by passing time.The audit provider is a module that carries out the audit trail servies by using stored audit informations. The audit provider suports audit servies,which are non-requdiation,proof and probe,controller of security,and accesing infrimation.The audit trail service system for EDI security constructs audit information by using index that is combining time imfromation,so it supports especially fast accesing audit information.

  • PDF

정보시스템 감리영역 평가에 영향을 미치는 요인에 관한 탐색적 연구

  • Won, Min-Jeong;Na, Jong-Hoe;Lee, Sang-Jun
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2008.10b
    • /
    • pp.96-103
    • /
    • 2008
  • The information systems audit is an proactive action to find out the predicted issues on proceeding the business beforehand, to make out whether the information systems satisfies the user's demand or not and to check up the result of the project with complementing the capabilities of self-diagnostics for the complicated and advanced information system. However, the results of the audited project are apt to be regarded as a failure in a case that an opinion of the audit area evaluation is described as 'insufficient' or 'negative' in the audit report that is submitted as the result of the audit. It makes a lot of arguments among the board of audit, the institution ordering the audit and the auditor. In this study, we made an attempt to finding out the factors affecting the audit area evaluation and verifying them objectively. A study model and hypothesis including the improvement type of the recommended subject to be improved, the importance, the audit time, the business scale of the audited object and the auditing company as a factor variable were established and the hypothesis was verified by analyzing the correlation between the factor variables and the audit area evaluation.

  • PDF

A Study on the Information System Security Audit Method for Personal Information Protection (개인정보보호를 위한 정보시스템 보안감사 방법에 관한 연구)

  • Lee, Dong-Nyuk;Park, Jeong-Sun
    • Journal of the Korea Safety Management & Science
    • /
    • v.12 no.4
    • /
    • pp.107-116
    • /
    • 2010
  • To give a solution to solve personal information problems issued in this study, the domestic and overseas cases about information security management system including an authentication technique are analyzed. To preserve the outflow of personal information, which is such a major issue all over the world, a new security audit check list is also proposed. We hope this study to help information system developers construct and operate confidential information systems through the three steps: Analysis of risk factors that expose personal information, Proposal to solve the problem, Verification of audit checking items.

An Audit Method on Information System Audit using Delphi Method - Based on Hyperledger Fabric (델파이기법을 이용한 감리점검항목 도출 방안 - 하이퍼레저 패브릭 기반으로)

  • Lee, Youngjoo;Park, Sooyong
    • Journal of Software Engineering Society
    • /
    • v.29 no.2
    • /
    • pp.7-12
    • /
    • 2020
  • A project to establish an information system with a project cost of more than 500 million won at a local public firm is subject to the Information System Audit (hereinafter referred to as IS Audit), and the IS Auditor shall conduct audit according to the audit criteria. Recently, as blockchain technology has been applied to various fields such as manufacturing, healthcare, distribution, and public sectors beyond the financial industry, the development of systems that apply blockchain technology is increasing. The use of Hyperledger Fabric, a private blockchain, is on the rise to utilize blockchain technology in public firms and private firms. However, the newly emerging blockchain-based system is not sufficient to carry out auditing with existing audit check items, so it has no choice but to make and use audit items individually. Therefore, a need for verified audit items for systems that base on blockchain technology has emerged. In this study, we customized the Delphi process to derive audit items suitable for the system development project using the blockchain technology, and verified the completeness and accuracy of the audit items derived through a survey by the IS Auditor. This research will be of direct help to the IS Auditor, and it is expected that operators and organizers who provide services through the blockchain-based system will also contribute to improving the quality of the system.