Reading Materials: Required Text Book: Hall, J. & Singleton, T. Information Technology Auditing and Assurance, 4th Edition.

Similar documents
ACADEMIC POLICIES AND PROCEDURES

TROY UNIVERSITY MASTER OF SCIENCE IN INTERNATIONAL RELATIONS DEGREE PROGRAM

MGMT 479 (Hybrid) Strategic Management

MBA6941, Managing Project Teams Course Syllabus. Course Description. Prerequisites. Course Textbook. Course Learning Objectives.

Sul Ross State University Spring Syllabus for ED 6315 Design and Implementation of Curriculum

MBA 5652, Research Methods Course Syllabus. Course Description. Course Material(s) Course Learning Outcomes. Credits.

MSE 5301, Interagency Disaster Management Course Syllabus. Course Description. Prerequisites. Course Textbook. Course Learning Objectives

School: Business Course Number: ACCT603 General Accounting and Business Concepts Credit Hours: 3 hours Length of Course: 8 weeks Prerequisite: None

Maintaining Resilience in Teaching: Navigating Common Core and More Online Participant Syllabus

Dowling, P. J., Festing, M., & Engle, A. (2013). International human resource management (6th ed.). Boston, MA: Cengage Learning.

Ruggiero, V. R. (2015). The art of thinking: A guide to critical and creative thought (11th ed.). New York, NY: Longman.

LMIS430: Administration of the School Library Media Center

Office Hours: Day Time Location TR 12:00pm - 2:00pm Main Campus Carl DeSantis Building 5136

Introduction to Forensic Anthropology ASM 275, Section 1737, Glendale Community College, Fall 2008

SAMPLE. PJM410: Assessing and Managing Risk. Course Description and Outcomes. Participation & Attendance. Credit Hours: 3

EDUC-E328 Science in the Elementary Schools

CRITICAL THINKING AND WRITING: ENG 200H-D01 - Spring 2017 TR 10:45-12:15 p.m., HH 205

ECON492 Senior Capstone Seminar: Cost-Benefit and Local Economic Policy Analysis Fall 2017 Instructor: Dr. Anita Alves Pena

Adler Graduate School

Instructor Experience and Qualifications Professor of Business at NDNU; Over twenty-five years of experience in teaching undergraduate students.

BUS 4040, Communication Skills for Leaders Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes. Credits. Academic Integrity

HIST 3300 HISTORIOGRAPHY & METHODS Kristine Wirts

Valcik, N. A., & Tracy, P. E. (2013). Case studies in disaster response and emergency management. Boca Raton, FL: CRC Press.

University of Massachusetts Lowell Graduate School of Education Program Evaluation Spring Online

Course Syllabus MFG Modern Manufacturing Techniques I Spring 2017

HCI 440: Introduction to User-Centered Design Winter Instructor Ugochi Acholonu, Ph.D. College of Computing & Digital Media, DePaul University

MAR Environmental Problems & Solutions. Stony Brook University School of Marine & Atmospheric Sciences (SoMAS)

THESIS GUIDE FORMAL INSTRUCTION GUIDE FOR MASTER S THESIS WRITING SCHOOL OF BUSINESS

Content Teaching Methods: Social Studies. Dr. Melinda Butler

English Policy Statement and Syllabus Fall 2017 MW 10:00 12:00 TT 12:15 1:00 F 9:00 11:00

BHA 4053, Financial Management in Health Care Organizations Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes.

BOS 3001, Fundamentals of Occupational Safety and Health Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes.

Accounting 543 Taxation of Corporations Fall 2014

Prentice Hall Literature: Timeless Voices, Timeless Themes Gold 2000 Correlated to Nebraska Reading/Writing Standards, (Grade 9)

Course Syllabus p. 1. Introduction to Web Design AVT 217 Spring 2017 TTh 10:30-1:10, 1:30-4:10 Instructor: Shanshan Cui

MASTER S THESIS GUIDE MASTER S PROGRAMME IN COMMUNICATION SCIENCE

Be aware there will be a makeup date for missed class time on the Thanksgiving holiday. This will be discussed in class. Course Description

Physics 270: Experimental Physics

SYLLABUS- ACCOUNTING 5250: Advanced Auditing (SPRING 2017)

CEEF 6306 Lifespan Development New Orleans Baptist Theological Seminary

Prentice Hall Literature: Timeless Voices, Timeless Themes, Platinum 2000 Correlated to Nebraska Reading/Writing Standards (Grade 10)

LEAD 612 Advanced Qualitative Research Fall 2015 Dr. Lea Hubbard Camino Hall 101A

MMC 6949 Professional Internship Fall 2016 University of Florida, Online Master of Arts in Mass Communication 3 Credit Hours

Medical Terminology - Mdca 1313 Course Syllabus: Summer 2017

Shank, Matthew D. (2009). Sports marketing: A strategic perspective (4th ed.). Upper Saddle River, NJ: Pearson/Prentice Hall.

Facing our Fears: Reading and Writing about Characters in Literary Text

EDIT 576 (2 credits) Mobile Learning and Applications Fall Semester 2015 August 31 October 18, 2015 Fully Online Course

BIOH : Principles of Medical Physiology

SPM 5309: SPORT MARKETING Fall 2017 (SEC. 8695; 3 credits)

Senior Stenographer / Senior Typist Series (including equivalent Secretary titles)

BSM 2801, Sport Marketing Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes. Credits.

MANAGERIAL LEADERSHIP

Aronson, E., Wilson, T. D., & Akert, R. M. (2010). Social psychology (7th ed.). Upper Saddle River, NJ: Prentice Hall.

Accounting 380K.6 Accounting and Control in Nonprofit Organizations (#02705) Spring 2013 Professors Michael H. Granof and Gretchen Charrier

AMLA 600: Second Language and Immersion Methodologies Summer 2015 Concordia College/Concordia Language Villages Dr. Paul J. Hoff

Monday/Wednesday, 9:00 AM 10:30 AM

Chemistry 106 Chemistry for Health Professions Online Fall 2015

Grade 4. Common Core Adoption Process. (Unpacked Standards)

IST 440, Section 004: Technology Integration and Problem-Solving Spring 2017 Mon, Wed, & Fri 12:20-1:10pm Room IST 202

STRATEGIC LEADERSHIP PROCESSES

EDIT 576 DL1 (2 credits) Mobile Learning and Applications Fall Semester 2014 August 25 October 12, 2014 Fully Online Course

Exploring World Religions Spring 2015

INTRODUCTION TO GENERAL PSYCHOLOGY (PSYC 1101) ONLINE SYLLABUS. Instructor: April Babb Crisp, M.S., LPC

SAMPLE. ORG423: Communication Strategies for Leaders

Reading Grammar Section and Lesson Writing Chapter and Lesson Identify a purpose for reading W1-LO; W2- LO; W3- LO; W4- LO; W5-

GUIDE TO EVALUATING DISTANCE EDUCATION AND CORRESPONDENCE EDUCATION

Records and Information Management Spring Semester 2016

Journalism 336/Media Law Texas A&M University-Commerce Spring, 2015/9:30-10:45 a.m., TR Journalism Building, Room 104

Applied Trumpet V VIII

International Baccalaureate Diploma Programme

HSMP 6611 Strategic Management in Health Care (Strg Mgmt in Health Care) Fall 2012 Thursday 5:30 7:20 PM Ed 2 North, 2301

Introduction to Information System

Texas A&M University-Kingsville Department of Language and Literature Summer 2017: English 1302: Rhetoric & Composition I, 3 Credit Hours

Language Arts: ( ) Instructional Syllabus. Teachers: T. Beard address

Coding II: Server side web development, databases and analytics ACAD 276 (4 Units)

ACC 380K.4 Course Syllabus

PHO 1110 Basic Photography for Photographers. Instructor Information: Materials:

The University of British Columbia Board of Governors

International Environmental Policy Spring :374:315:01 Tuesdays, 10:55 am to 1:55 pm, Blake 131

ACC 362 Course Syllabus

KOMAR UNIVERSITY OF SCIENCE AND TECHNOLOGY (KUST)

Course Policies and Syllabus BUL3130 The Legal, Ethical, and Social Aspects of Business Syllabus Spring A 2017 ONLINE

SAMPLE SYLLABUS. Master of Health Care Administration Academic Center 3rd Floor Des Moines, Iowa 50312

Teaching Task Rewrite. Teaching Task: Rewrite the Teaching Task: What is the theme of the poem Mother to Son?

Bittinger, M. L., Ellenbogen, D. J., & Johnson, B. L. (2012). Prealgebra (6th ed.). Boston, MA: Addison-Wesley.

Spring 2015 IET4451 Systems Simulation Course Syllabus for Traditional, Hybrid, and Online Classes

Demography and Population Geography with GISc GEH 320/GEP 620 (H81) / PHE 718 / EES80500 Syllabus

Syllabus for GBIB 634 Wisdom Literature 3 Credit hours Spring 2014

PSYCHOLOGY 353: SOCIAL AND PERSONALITY DEVELOPMENT IN CHILDREN SPRING 2006

Albright College Reading, PA Tentative Syllabus

DOCTOR OF PHILOSOPHY HANDBOOK

BUS Computer Concepts and Applications for Business Fall 2012

Texas A&M University - Central Texas PSYK EDUCATIONAL PSYCHOLOGY INSTRUCTOR AND CONTACT INFORMATION

MATH 205: Mathematics for K 8 Teachers: Number and Operations Western Kentucky University Spring 2017

Graduate Program in Education

HARRISBURG AREA COMMUNITY COLLEGE ONLINE COURSE SYLLABUS

95723 Managing Disruptive Technologies

Biology 1 General Biology, Lecture Sections: 47231, and Fall 2017

Rhetoric and the Social Construction of Monsters ACWR Academic Writing Fall Semester 2013

ACC : Accounting Transaction Processing Systems COURSE SYLLABUS Spring 2011, MW 3:30-4:45 p.m. Bryan 202

Transcription:

IS 680: Information Systems Auditing Fall; September 5, 2017 December 13, 2017 Please refer to online syllabus for detailed assignments. Office Hours: Fridays 5-7PM, EST, by appointment Instructor: Dr. Charles Pak Email: cpak@njit.edu; charlespak@verizon.net Email is the best way to contact me. Here is my cell number if needed: (443)610-7986 Office hours: Fridays 5-7PM, EST. General Course Information Due to the dynamic nature of information technology, the need arises continually to redefine audit, control and security requirements and processes. Topics include the IS audit process, IT infrastructure and operations, information protection, disaster recovery and business continuity, IT service delivery and support, business application systems, and project management. Students gain practical experience with each by working through a series of sample Certified Information Systems Audit (CISA) exam questions. Course Description This course presents a systematic process of objectively obtaining and evaluating evidence regarding Information System s security incidents caused by an adversary externally or internally. Security incidents will be objectively evaluated to analyze each case and create an audit report with findings. http://catalog.njit.edu/graduate/computing-sciences/information-systems/#coursestext Course Objectives Upon completion of this course, the student will be able to: 1. Describe the systematic process of information security audit. 2. Demonstrate an independent professional audit activity to support the incident investigation. 3. Analyze the security incident with a proven audit procedure. 4. Generate an audit reporting with findings. 5. Present the security audit case to legal proceedings or management. Reading Materials: Required Text Book: Hall, J. & Singleton, T. Information Technology Auditing and Assurance, 4th Edition. Cengage Method of Instruction The method of instruction will combine the following elements: - Online Class Discussion, Collaboration, Audit Analysis and Report - Information Security Audit Forensic Research Presentation, Project Paper Deliverable Policy on Paper Submission

Papers are due on the date they are due. Up until midnight of that night, no penalty will accrue. Please note that life emergencies happen. Do NOT wait until the last moment to start on your paper. If you do that and something comes up to impede your progress, it will hamper your ability to turn in your paper on time. Papers MUST be submitted electronically via Blackboard. All papers must include the following statement: This paper or presentation is my own work. Any assistance I received in its preparation is acknowledged within the paper or presentation, in accordance with academic practice. If I used data, ideas, words, diagrams, pictures, or other information from any source, I have cited the sources fully and completely in footnotes and bibliography entries. This includes sources that I have quoted or paraphrased. Furthermore, I certify that this paper or presentation was prepared by me specifically for this class and has not been submitted, in whole or in part, to any other class in this University or elsewhere, or used for any purpose other than satisfying the requirements of this class, except that I am allowed to submit the paper or presentation to a professional publication, peer reviewed journal, or professional conference. In adding my name following the word Signature, I intend that this certification will have the same authority and authenticity as a document executed with my hand-written signature. Signature Reading Assignments: The scope of this course is very broad, and a large amount of reading is required. However, the relative importance of materials, as specified in the course outline, varies. Specifically assigned materials must be read in detail. Materials to which students are directed or for which copies are provided but which are not specifically assigned are recommended for added understanding of required material, but are optional in the sense that students will not be held explicitly responsible for anything that appears only in these materials. They are appropriate either for students who have difficulty with the subject matter based on the required readings or for those who want a deeper understanding of the material. Recommended background reading is valuable for overall understanding, may provide a technical depth beyond the requirements of the class, may provide valuable material for student research topics, and may be useful in responding to comprehensive essay questions. Since much of what is happening in information security is happening now, current events will play a role in class discussions. As professionals, it is crucial for you to keep up with events as they unfold. There is no substitute for regular reading of business and technology news in a major newspaper, for following current journal articles, visiting key web sites, and for noting the direction of industry organizations such as the IEEE, IETF, and the ACM. You should constantly consider how what you read in such sources fits into the subject you are studying. Current articles, including Web articles, may be assigned as supplementary reading as the course progresses. Students are encouraged to use as many and varied sources as possible in exploring the questions presented during the course, and to share those sources with their classmates. References to sources should be explicit in exchanges among the students and instructor, and will be considered in determining the extent to which each student participated for purposes of awarding grades. Grading Policy: The overall course grade will be established as follows: Grading Criteria Percentage IS Auditing Case Study Report 30 IS Auditing Case Study Presentation 10 Discussion Participation 30 Final exam 30 Total 100 Other Items of Importance Don t ask for an incomplete for convenience. The University has very specific policy on when a grade of incomplete may be awarded. See the Bulletin for more information on grading policies.

Writing and Speaking Standards: Written communication is an important element of the total communication process. This is a graduate program. Students are assumed to have learned how to prepare academic papers in their earlier studies, including how to reference works used in preparation of their papers and presentations. The University recognizes and expects exemplary writing to be the norm for course work. To this end, all papers, individual and group, must demonstrate graduate level writing and comply with and conform to standard academic format as specified in A Manual For Writers of Term Papers, Theses, and Dissertations by Kate L. Turabian, Seventh Edition. Points will be subtracted for format errors. Points will also be subtracted for spelling and grammatical errors. Use of Standard English ensures that your points will be both understood and correctly interpreted by all readers, a skill that will be vital to your success after graduation. Effective managers, leaders, and teachers are also effective communicators. It is no understatement to say that effective speaking and writing skills are as important to career success as technical mastery of a subject. Speaking and writing effectively are a critical part of this course. Correct and graduate level Standard English must be used. Academic integrity: Academic integrity is central to the learning and teaching process. Students are expected to conduct themselves in a manner that will contribute to the maintenance of academic integrity by making all reasonable efforts to prevent the occurrence of academic dishonesty. Academic dishonesty includes, but is not limited to, obtaining or giving aid on an examination, having unauthorized prior knowledge of an examination, doing work for another student, and plagiarism of all types. Plagiarism is the intentional or unintentional presentation of another person s idea or product as one s own. Plagiarism includes, but is not limited to, the following: copying verbatim all or part of another s written work; using phrases, charts, figures, illustrations, or mathematical or scientific solutions without citing the source; paraphrasing ideas, conclusions, or research without citing the source; and using all or part of a literary plot, poem, film, musical score, or other artistic product without attributing the work to its creator. Students can avoid unintentional plagiarism by following carefully accepted scholarly practices. Notes taken for papers and research projects should accurately record sources of material to be cited, quoted, paraphrased, or summarized, and papers should acknowledge these sources. There is no such thing as boilerplate in academia. If you don t understand what plagiarism is and how to avoid it, consult the University s academic integrity policy. See also http://www.prism-magazine.org/december/html/student_plagiarism_in_an_onlin.htm This is a graduate program. Students are assumed to have learned how to prepare academic papers in their earlier studies, including how to reference works used in preparation of their papers and presentations. The penalties for plagiarism include a zero or a grade of F on the work in question, a grade of F in the course, suspension with a file letter, suspension with a transcript notation, or expulsion. Students are not permitted to submit an assignment or paper that already has been submitted for another course at any institution, even if it is entirely their own work. This includes cutting and pasting portions of previous papers or other written assignments. The penalties will be the same as those listed above for plagiarism. Please check your work carefully. Turabian contains complete guidance on how to correctly reference all forms of material. There is no such thing as boilerplate or standard language in academia. Students are expected to write their reports themselves. If it is necessary to use material from other sources, it is expected (and mandatory) that the standards of academic style and integrity will be followed. Every student is encouraged to visit these websites for interesting information regarding this issue: - A true story about plagiarism gone awry http://www.aweekofkindness.com/blog/archives/the_laura_k_krishna_saga/000023.html (May only be available in a Google Cache as Domain expired 2/23/2011). - Goucher College s Plagiarism-by-Paraphrase Risk Quiz http://faculty.goucher.edu/writingprogram/sgarrett/default.html - Copyright law, frequently asked questions, and other good stuff

http://www.copyright.gov/ - The Islam Online.net Fatwa on Plagiarism http://www.islamonline.net/servlet/satellite?pagename=islamonline-english- Ask_Scholar/FatwaE/FatwaE&cid=1119503549102 http://www.ipl.org home page of the Internet Public Library. Users may search the databases for topics of various interests. The site provides links for viewing and downloading numerous academic articles on the development of technology, the history of computers and the Internet, and the evolution of digital communication. http://www.isoc.org The Internet Society (ISOC) is a professional membership society with more than 100 organization and over 20,000 individual members in over 180 countries. It provides leadership in addressing issues that confront the future of the Internet, and is the organization home for the groups responsible for Internet infrastructure standards, including the Internet Engineering Task Force (IETF) and the Internet Architecture Board (IAB). http://www.fcc.gov The Federal Communications Commission (FCC) is an independent U.S. government agency, directly responsible to Congress. The FCC was established by the Communications Act of 1934 and is charged with regulating interstate and international communications by radio, television, wire, satellite and cable. The FCC's jurisdiction covers the 50 states, the District of Columbia, and U.S. possessions. http://www.netlingo.com This site contains thousands of definitions about computers, the Internet, and the online world of business, technology, and communication. Disabled Students: Any student who has a disability and is in need of special consideration must inform the instructor of this need within the first week of class (or immediately if the disability appears after the first week of class) so that appropriate arrangements can be made. This includes students with reading or learning disabilities who may require extra time on tests. In all cases, the student must communicate with the Disability Services Center and have registered the disability with the University. Forensic Case Study Research Project The student will conduct a Forensic Case Study Research and produce a forensic report paper for submission in a length of 10-15 pages, double-spaced. The paper must conform to APA; see http://www.apastyle.org/ for a proper APA style. The paper should include a comprehensive evaluation of a Forensic case of a real or potential fictitious case. The paper will be assessed on a case build-up, analysis, arguments, and recommendations on the case. Please do not include any organizational sensitive or confidential data on the paper. The paper should be properly formatted with a cover page, table of contents, content sections, conclusions, and a list of references. Conference Post The following table depicts a conference rubric that guides students how to prepare each conference post and how each conference post will be graded by the instructor. Each conference discussion will be graded with its own criteria, and the following rubric depicts the first week discussion forum. Conference rubric for weekly discussion forum, thread, and post participation will be available online. Course Schedule Week Date Discussion Topic Assignments 1 Chapter 1: Read Chapter 1 9/5 Auditing, Assurance, and Internal Control

2 3 4 5 6 7 8 9 10 11 12 9/12 9/19 9/26 10/3 10/10 Chapter 2: Computer Operations Chapter 3: Data Management Systems Chapter 4: Systems Development & Maintenance Activities Chapter 5: Networks, Internet & Ecommerce Chapter 6: Enterprise Resource Planning Systems Read Chapter 2 Read Chapter 3 Read Chapter 4 Read Chapter 5 Read Chapter 6 10/17 Chapter 7: Computer-Assisted Audit Techniques [CAATs] Read Chapter 7 10/24 Chapter 8: CAATTs for Data Extraction and Analysis Read Chapter 8 10/31 Chapter 9: Auditing the Revenue Cycle Read Chapter 9 11/7 Chapter 10: Auditing the Expenditure Cycle Read Chapter 10 11/14 Chapter 11: Introduction to Business Ethics and Read Chapter 11 Fraud 11/21 Chapter 12: Fraud Schemes & Fraud Detection Read Chapter 12 13 14 11/28 12/7 15 12/12-12/13 Final Exam Review Forensic Findings Presentation Slide Deck Due Final Exam Forensic Case Study Research Project Due Final Exam Final ends on 12/13