Risks and Audit Objectives for IT Outsourcing
|
|
|
- Susanna Pitts
- 10 years ago
- Views:
Transcription
1 Informatica Economică vol. 14, no. 1/ Risks and Audit Objectives for IT Outsourcing Claudiu BRÂNDAŞ West University of Timisoara, Faculty of Economics and Business Administration In the recent years, as a result of globalization, internet and IT progress, the outsourcing of IT services has seen an exponential growth. As a result more and more companies decide to outsource, partially or totally, their IT services. Nevertheless, the outsourcing process exposes both clients and service providers to a series of risks that can seriously affect their activities. Managing these risks by improving the quality and efficiency of internal control has made the ITO audit a necessary component for all the companies involved in this process. The goal of this paper is to identify analyze and map the influence areas of ITO risks in order to suggest a series of objectives for ITO audit. Keywords: Information Technology, Outsourcing, Audit, Risks, Service Provider 1 Introduction Outsourcing is becoming an essential component for most of the businesses today. Globalization of business environment enabled an expansion of outsourcing activities. This new economic context stimulated many companies to reposition themselves into the service sector. In this respect the development of IT services outsourcing (ITO) has seen a progressive evolution. The two aspects of global economy influencing the growth of IT outsourcing are: (1) the tendency to relocate productive processes where production factors are less expensive [11]; (2) the growing acceptance of the Internet as a means of communication intra- or inter- organizations [17]. At the end of last century, globally, the IT services outsourcing has become a consolidated industry with an average turn-over of $100 billion [9]. The service range has extended to incorporate both IT traditionally services, and infrastructure operations as: software development; applications support and maintenance; ERP system implementation and customization; operations, database, system security and network administration; Internet hosting; cloud computing service provider. The IT outsourcing decisions are based on the following factors [4]: The IT department effectiveness and efficiency. The management might consider that the IT department is not working properly and might decide to outsource this function to an external provider. The research has shown that there is no direct correlation between the amount of money that a company is spending on IT and its profitability. The IT department must work together with all departments in a company in order to ensure that all IT systems contribute effectively to company s goals. The IT department authority within the organization could also impact the outsourcing decision. Generally the head of the IT department resists the outsourcing decision because this will cost his/hers and other employees jobs. The financial situation of a company might be considered the driving force behind the outsourcing decisions. The way in which IT is perceived by the accounting. If the IT is considered fixed costs, all the other company s departments will perceived these services as being free of charge. The outsourcing might modify these perceptions and might generate some discipline in the IT system evaluation. The transference of risk. Many managers believe that if they outsource one or more IT services, they transfer some of the associated risks with these services. The company structure might affect the outsourcing decisions. Culture, national and organizational, might affect the outsourcing decisions. IT Outsourcing can generate significant financial and functional advantages for a company. However this decision could imply increased internal and external risks for the organization. These risks occur at the client level as well as at service provider level. ITO risks identification and eval-
2 114 Informatica Economică vol. 14, no. 1/2010 uation in addition to the development of control functions to minimize those risks represents the main objective for the management of the companies. In order to assure the proper administration of the client and supplier side and that the system performs at the optimal level, more and more companies use ITO audit. ITO audit can be defined as an activity of gathering and evaluating samples of client/supplier informational system in order to determine if: contractual terms are clearly defined and complied with; processes and data that are outsourced are secured; legal aspect is considered and complied with; outsourcing decision process complies with organization strategy. In the second section of this paper we conducted an analytical research of the existing literature regarding ITO audit and ITO risks. In the third section we presented the research methodology. In the fourth part we identify and discussed ITO risks and their determinant factors in the areas of influence. In the fifth part we discussed ITO audit objectives. The last part presents our conclusions based on the research we have conducted. 2 Literature review The strategic importance of IT services outsourcing activity led the managerial and academic literature to focus upon this subject. The research of IT outsourcing (ITO) has examined multiple aspects of the phenomena, from reasons why organizations outsource, to long-term consequences of outsourcing from both client and supplier perspectives. The main aspects approached are [3]: (1) motivations of IT services outsourcing, (2) the relationships between client and IT services provider, and (3) internal and external factors impacting the decision make process. Summarizing the current research on the importance of ITO risk analysis the following questions may arise: What are the risks of IT outsourcing? What is the impact of every risk factor? How are IT outsourcing risks mitigated? The literature on ITO risk analysis identifies several risk factors and risk mitigation strategies. According to Lacity, Khan and Willcocks [16] the most cited paper on ITO risks is written by [8] Earl discusses eleven risks of IT outsourcing: possibility of weak management, inexperienced staff, business uncertainty, outdated technology skills, endemic uncertainty, hidden costs, lack of organizational learning, loss of innovative capacity, dangers of an eternal triangle, technology indivisibility, and fuzzy focus. Considering these factors the literature discusses several risk mitigation strategies. Some authors analyze risk mitigation on a general level such as: signing shortterm contracts [15], engaging multiple suppliers [5], outsourcing standard IT services for which there are many suppliers capable of delivering good services [1], [7], [14], and insourcing highly specific assets [21]. Others outline the risks specific to certain types of outsourcing, such as application service provision or offshore outsourcing.[12] examine specific risks and risk mitigation strategies for application service provision.[19] identifies eighteen risks and risk control mechanisms specific to offshore systems development. Another approach is to develop specific frameworks for the ITO risk analysis. Thus [12] developed a framework for IT outsourcing risk analysis with relational due diligence in risk mitigation. The fuzzy framework for risk assessment developed by [18] could be applied to assess risk of clients as well as service providers. Mathew identifies some key risk indicators in IT outsourcing. These are mapped to an output risk category through a fuzzy inference engine. Analyzing the current research studies it can be implied that in most of cases the academic research paid more attention to client side issues rather than supplier side in ITO risks. Regarding the audit and control of IT outsourcing, the academic and managerial literature recommends very few references. Most of the authors reduced their studies to ITO risk analysis. However, there are few authors who managed to cover some aspects of ITO audit [20]. Besides academic research, professional associations had a major impact on studying ITO audit and control. One of the most notable study in this area is Outsourced IT Environments Audit/Assurance Program from ISACA (Information Systems Audit and Control Association) [25]. According to ISACA this program was designed and created primarily as an informational resource for audit and assurance professionals. Another study from ISACA, COBIT (Control Objectives for Information Technologies) guide, makes a series of references regarding ITO in the context of organizational internal control [25]. Likewise, IIA (The Institute of Internal Auditors) has made a study regarding ITO in the context of internal audit and control [26]. This study describes how outsourcing activities should be managed by implementing well-defined plans that are supported by a companywide risk, control, compliance, and governance framework. Accord-
3 Informatica Economică vol. 14, no. 1/ ing to IIA this study offers the chief audit executive (CAE), internal auditors, and management information on the types of IT outsourcing activities and the IT outsourcing lifecycle. 3 Research Methodology Consistent with current research this study analyses the risks and characteristic factors of ITO by grouping them into areas of influence and identifying the ITO audit objectives. This study has a quantitative approach and it is manly bases on previous research on the topic and case studies. 4 IT Outsourcing Risks The rapid development of IT outsourcing has led recently to a more profound risks analysis regarding ITO. This in-depth analysis has shown a direct correlation between the amount of outsourced IT services and risks to which an organization can be exposed to [10]. Moreover the nature and complexity of these services has a direct influence on ITO risks. Therefore it is very important that IT audit correctly identifies labels and estimates the impact of ITO risks. Our paper will focus on identifying the most important ITO risks. For a better understanding we will correlate ITO risks with their influencing factors and with their area of influence. As area of influence we denote the client and the service provider or the supplier. This correlation will allow us to group the ITO risks in three categories: Mixed ITO risks (specific both for the client and supplier). specific ITO risks. Supplier specific ITO risks. Mixed ITO risks are: violation of contractual terms which will create a conflict between the parties; legal consequences; impossibility to adapt to new technologies. specific ITO risks are: provider s lack of compliance with the contract; unexpected increase in outsourcing costs; losing data privacy for the outsourced services; total dependence / exit barriers. Supplier specific ITO risks here according to Das Aundhe and Mathew (2009) the risks can be grouped into three categories: project specific, relationship specific and macroeconomic [17]. Project specific risks include risks generated by project delivery. This category covers risks due to (mis)management of schedule and budget, client expectations, requirements capture, knowledge transfer and staffing. Relationship specific risks for service providers include structural changes in an organization, cultural differences and the client s opportunistic behavior. Macroeconomic risks occur due to exchange rate fluctuations and changes in government policies. The table 1 summarizes the existing correlation between ITO risks, areas of influence and influencing factors. Table 1. ITO risks impacting factors on area of influence Influence on ITO Risks Determinants / Supplier Violation of contractual terms which will create a conflict between the parties Unclear contractual terms regarding roles and responsibilities. [2], [14] Lack of experience and expertise of the client and/or of the supplier with outsourcing contracts [8] Insufficient legislation knowledge /Supplier Legal Consequences [22] Change in government policies [6] /Supplier Impossibility to adapt to new technologies Provider s lack of compliance with the contract [10] Unexpected increase in outsourcing costs [8],[14],[3] Contractual terms Inability of client s employees to adapt to new technologies. Implementation failure of supplier s new technologies Supplier financial stability [8] Lack of experience and expertise of the supplier with the activity [8] Complexity of the outsourced activities Insufficient understanding of client needs. [6] Lack of experience and expertise of the client with contract management [8],[14] Lack of experience and expertise of the supplier with the activity [8] Complexity of the outsourced activities Transition costs incurred by switching suppliers
4 116 Informatica Economică vol. 14, no. 1/2010 Losing data privacy for the outsourced services [22] [3] Unclear contractual terms regarding data privacy Impossibility for the internal audit to supervise all the functions and processes of the service provider for the outsourced IT services. Supplier s systems lack of security management.[22] Total dependence / exit barriers [22] Small number of suppliers Asset specificity Supplier Inadequate requirements capture [6] Inadequate communication with the customer Lack of experience and expertise of the supplier with the activity [8] Lack of experience and expertise of the client with the activity [8],[14] Lack of system development technology Ambiguity in requirements gathering Supplier Inadequate staffing Supplier size [8] Lack of competent employees Supplier Difficulties in client relations Changes in client s corporate structure [6] Engaging with an inexperienced client culture size Supplier Supplier locked-in s activity is very specific The owns more than 70% from the supplier s business. In the context of the presented risks, the auditor must evaluate and quantify as many of these risks as possible. This task should be done regardless of the nature of the internal or external audit. 5 Audit objectives of IT Outsourcing The literature review has emphasized a considerable discrepancy between ITO risk analysis and ITO audit and control. We consider that efficient and effective risk analysis and risk mitigation strategies can be accomplished only with the support of ITO audit (internal or external). The arguments supporting our statement are: (1) risk management and risk mitigation for a company that has outsourced some or all its IT services must be effectively through appropriate controls; (2) assurance of the compliance with contractual terms and that the services are provided in good conditions; (3) effectiveness of the ITO security management; (4) assurance of the ITO compliance with organization s business strategy. According with ISACA s the main objectives of the ITO review are to [25]: Provide management with an independent assessment of the IT outsourcing process relating to the attainment of outsourcing objectives, compliance with the terms and conditions of the outsourcing contract, the accuracy of billing, and successful remediation of issues identified during the execution of business processes; Provide management with an evaluation of the internal controls affecting business processes relating to the activities outsourced and internal processes affected by the outsourcing. ITO has become a very important resource for business worldwide; therefore many governments and professional associations begin to understand the strategic role of this process. This new understanding of ITO processes triggered a series of changes in professional audit standards which specify some audit guideline for all the parties involved in an ITO process. For example AIC- PA s SAS 70 has become a widely recognized standard and indicates that a supplier has had its control objectives and activities examined by an independent accounting and auditing firm. At organization level, ITO audit can be included not only in the internal audit process but also in the external audit process. Moreover ITO audit can be extended from client to service provider. Regardless of his/hers position, the auditor must focus on evaluating the particular risks of the audited area and testing the effectiveness and efficiency of deployed controls. Considering the multitude of ITO risks and the role of IT audit in this process, Table 2 will present the major objectives of ITO audit. For a better understanding we will separate these ob-
5 Informatica Economică vol. 14, no. 1/ jectives in client area and supplier area. For each of the above mentioned objectives, the auditor may develop a series of questionnaires and work procedures according to the nature and the scope of the audited topic. Several help guides and specific ITO software were developed among the auditor communities such as ISACA s Outsourced IT Environments Audit/Assurance Program and IIA s Global Technology Audit Guide (GTAG) 7: Information Technology Outsourcing. Area Supplier Table 2. ITO audit objectives Audit objectives Outsourcing decision process Service provider selection and evaluation Forecasting outsourcing cost Outsourcing contract and SLA (Service-Level Agreement) Budget allocation and execution Communication with service provider Reliance on service provider Monitor provider s service execution and performance Managing risks in client/service provider relationship Impact on IT strategy The analysis of the client requirements in the pre-contractual phase The outsourcing contract and SLA Service-Level Agreement) Control tools and system security Analysis and implementation of client requirements SDLC Controls Delivery of services and client satisfaction monitoring Personnel selection, training and performance monitoring dependency Change Management In the context of the present study the most important audit objectives are: the outsourcing contract, the SLA (both client/supplier area) and the control procedures and system security (supplier area). These three objectives are the most relevant for this study and cover the majority of the possible risks. However, the other objectives should not be ignored since the auditor has to develop its working tool to be compliant with the nature and the scope of the audit mission. 6 Conclusions The outsourcing of IT services is and will be a major component of business world. The expansion of ITO can be seen as a natural effect of globalization and the exponential growth of internet and IT. Thus more and more companies find financial and functional incentives to outsource, partially or totally, their IT services. However the outsourcing decision exposes the companies to a series of new risks that needs to be analyzed. The outsourcing related risks can inflict substantial influence on both the client and the service provider activities. Therefore it is very important for both parties to ensure a very solid ITO risk management policy as well as a thorough ITO audit. In this context we consider that the client can have more confidence in a service provider who has been audited by an external IT auditor. In this paper we tried to identify the major risks associated with the IT outsourcing and to focus the risks analysis on two dimensions: client and service provider. Based on the risks categories that we have identified we tried to present what are the main objectives of an ITO audit so that an auditor could test and evaluate the efficiency and effectiveness of audit controls. Our goal is to underline the fact that ITO audit has a positive impact on risk mitigation and quality of internal control. Moreover we tried to analyze the nature and the variety of ITO risks in order to suggest a series of objectives for ITO audit. References [1] U. Apte, M. Sobol, S. Hanaoka, T. Shimada, T. Saarinen, T. Salmela and A. Vepsalainen, IS outsourcing practices in the USA, Japan, and Finland: a comparative study, Journal of Information Technology, Vol. 12, 1997, pp [2] B. A. Aubert, M. Patry and S. Rivard, A Tale of Two Outsourcing Contracts, Cahier du GreSI, 97-05, 1997.
6 118 Informatica Economică vol. 14, no. 1/2010 [3] J. Barthélemy and D. Geyer, An empirical investigation of IT outsourcing versus quasioutsourcing in France and Germany, Information & Management, Vol. 42, No. 4, 2005, pp [4] I. Boldea and C. Brandas, Some considerations about IT Outsourcing process, MPRA - Munich Personal RePEC Archive, [5] W. Currie, Using multiple suppliers to mitigate the risk of IT outsourcing at ICI and Wessex Water, Journal of Information Technology, Vol. 13, 1998, pp [6] Das Aundhe and S. K. Mathew, Risks in offshore IT outsourcing: A service provider perspective, European Management Journal, No. 27, 2009, pp [7] L. A. De Loof, Information systems outsourcing decision making: a framework, organizational theories and case studies, Journal of Information Technology, No. 10, 1995, pp [8] M. Earl, The risks of outsourcing IT, Sloan Management Review, Vol. 37, No. 3, 1996, pp [9] E. Gelbstein, Outsourcing, International Computing Center, United Nations, Encyclopedia of Information Systems, Vol. 3, [10] R. Gonzales, J. Gasco and J. Llopis, Information systems outsourcing risks: a study of large firms, Industrial Management & Data Systems, Vol. 105, No. 1, 2005, pp [11] R. Heecks et al., Synching or sinking? Global software outsourcing relationships, IEEE Software, Vol. 18, No. 2, 2001, pp [12] T. Kern and L. P. Willcocks, The Relationship Advantage, Information Technologies, Sourcing and Management, Oxford University Press Inc., New York, [13] T. Kern, L. Willcocks and M. Lacity, Application service provision: risk assessment and risk mitigation, MIS Quarterly Executive, Vol. 1, No. 2, 2002, pp [14] M. Lacity, R. Hirschheim and L. Willcocks, Realizing outsourcing expectations, Information Systems Management, Vol. 11, No. 4, 1994., pp [15] M. Lacity and L. Willcocks, An empirical investigation of information technology sourcing practices: lessons from experience, MIS Quarterly, Vol. 22, No. 3, 1998, pp [16] M. C. Lacity, S. A. Khan and L. P. Willcocks, A review of the IT outsourcing literature: Insights for practice, Journal of Strategic Information Systems, no. 18, 2009, pp [17] N. Marchand H. A. and Jacobsen, An economic model to study dependencies between independent software vendors and application service providers, Electronic Commerce Research, Vol. 1 No. 3, 2001, pp [18] S. K. Mathew, Understanding risk in IT outsourcing, a fuzzy framework, Journal of Information Technology Cases and Application Research (JITCAR), Vol. 8, No. 3, [19] S. Sakthivel, Managing risk in offshore systems development, Communications of the ACM, Vol. 50, No. 4, pp.60, [20] A. Sayana, Audit of outsourcing, Information Systems Control Journal, Vol. 5, [21] B. Watjatrakul, Determinants of IS sourcing decisions: a comparative study of transaction cost theory and the resource-based view, Journal of Strategic Information Systems Vol. 14, 2005 pp [22] C. Wright, Top Three Potential Risks With Outsourcing Information Systems, Information Systems Control Journal, Vol. 5, [23] C. Yang and J. B. Huang, A decision model for IS outsourcing, International Journal of Information Management, Vol. 20, No. 3, 2000, pp [24] A. Zhaohui Zeng, A synthetic study of sourcing strategies, Industrial Management & Data Systems, Vol. 100, No. 5, 2000, pp [25] ***, [26] ***, Claudiu BRANDAS is Associate Professor at the University of the West Timisoara, Faculty of Economics and Business Administration, Department of Business Information Systems and Statistics. He earned his PhD from "Babes-Bolyai" University of Cluj-Napoca, the Faculty of Economics in Decision Support Systems conception and design. Currently, his research interests include DSS (Decision Support System), Business Intelligence, Business Information Systems Analysis and Design, Business Process Modeling, and Information Systems Control and Audit.
A Review of Risk Management for Information Systems Outsourcing
International Journal of Business, Humanities and Technology Vol. 5, No. 4; August 2015 A Review of Risk Management for Information Systems Outsourcing Philbert Nduwimfura Glorious Sun School of Business
A Proposal Framework for Evaluating Risks of Information Technology Outsourcing
Proceedings of the 2011 International Conference on Industrial Engineering and Operations Management Kuala Lumpur, Malaysia, January 22 24, 2011 A Proposal Framework for Evaluating Risks of Information
IT OUTSOURCING PROJECT RISKS: FROM CLIENT AND VENDOR PERSPECTIVES
IT OUTSOURCING PROJECT RISKS: FROM CLIENT AND VENDOR PERSPECTIVES Abstract This study examines the risk factors of IT outsourcing projects from client and vendor perspective, and compares their difference.
Integrated Approach Model of Risk, Control and Auditing of Accounting Information Systems
Informatica Economică vol. 17, no. 4/2013 87 Integrated Approach Model of Risk, Control and Auditing of Accounting Information Systems Claudiu BRANDAS, Dan STIRBU, Otniel DIDRAGA West University of Timisoara,
B o a r d of Governors of the Federal Reserve System. Supplemental Policy Statement on the. Internal Audit Function and Its Outsourcing
B o a r d of Governors of the Federal Reserve System Supplemental Policy Statement on the Internal Audit Function and Its Outsourcing January 23, 2013 P U R P O S E This policy statement is being issued
Study on Risk Approaches in Software Development Projects
148 Informatica Economică vol. 16, no. 3/2012 Study on Risk Approaches in Software Development Projects Claudiu BRANDAS, Otniel DIDRAGA, Nicolae BIBU West University of Timisoara, Faculty of Economics
Analysis of the Risk in Information Technology (IT) outsourcing In Public Organisations
Analysis of the Risk in Information Technology (IT) outsourcing In Public Organisations Momoh A. Attai, Makoji Stephen & Alfa Patrick Innocent Federal Polytechnic, Idah - Kogi State. [email protected],
OCC 98-3 OCC BULLETIN
To: Chief Executive Officers and Chief Information Officers of all National Banks, General Managers of Federal Branches and Agencies, Deputy Comptrollers, Department and Division Heads, and Examining Personnel
Modern Management. IT Outsourcing. [email protected]
Modern Management IT Outsourcing [email protected] Evolution of Outsourcing Vendors Strategic Sourcing STRATEGIC PARTNERSHIP Programmatic Outsourcing BUSINESS PARTNER Project-based Outsourcing VENDOR
Internal Auditing Guidelines
Internal Auditing Guidelines Recommendations on Internal Auditing for Lottery Operators Issued by the WLA Security and Risk Management Committee V1.0, March 2007 The WLA Internal Auditing Guidelines may
Vendor Management Best Practices
23 rd Annual and One Day Seminar Vendor Management Best Practices Catherine Bruder CPA, CITP, CISA, CISM, CTGA Michigan Texas Florida Insight. Oversight. Foresight. SM Doeren Mayhew Bruder 1 $100 billion
THE EXISTING BARRIERS IN IMPLEMENTING TOTAL QUALITY MANAGEMENT
THE EXISTING BARRIERS IN IMPLEMENTING TOTAL QUALITY MANAGEMENT Sălăgean Horaţiu Cătălin 1, Bâlc Bogdan 2, Gârbacea Răzvan Dimitrie 3 1, 2, 3, Department of Management, FSEGA, UBB, Cluj-Napoca, România
CONSULTATION PAPER ON HIGH LEVEL PRINCIPLES ON OUTSOURCING COVER NOTE
CEBS CP 02 April 2004 COMMITTEE OF EUROPEAN BANKING SUPERVISORS CONSULTATION PAPER ON HIGH LEVEL PRINCIPLES ON OUTSOURCING COVER NOTE Introduction 1. European banking supervisors began work in 2002 on
Whitepaper: 7 Steps to Developing a Cloud Security Plan
Whitepaper: 7 Steps to Developing a Cloud Security Plan Executive Summary: 7 Steps to Developing a Cloud Security Plan Designing and implementing an enterprise security plan can be a daunting task for
Course Author: Dr. Monica Belcourt, School of Human Resource Management, York University; Ron Alexandrowich and Mark Podolsky
Strategic Human Resources Planning Course Author: Dr. Monica Belcourt, School of Human Resource Management, York University; Ron Alexandrowich and Mark Podolsky Description: The course provides students
Outsourcing Risk Guidance Note for Banks
Outsourcing Risk Guidance Note for Banks Part 1: Definitions Guideline 1 For the purposes of these guidelines, the following is meant by: a) outsourcing: an authorised entity s use of a third party (the
Top Management Control Functions for Information Systems in Small and Medium Enterprises
Informatica Economică vol. 13, no. 4/2009 109 Top Management Control Functions for Information Systems in Small and Medium Enterprises Uma VIJAYAKUMAR Practicing Chartered Accountant, Tiruchirappalli &
EXTERNAL AUDIT AND RELATION BETWEEN INTERNAL AUDITORS, SUPERVISORY BODY AND EXTERNAL AUDITORS OF THE BANKING SECTOR IN THE REPUBLIC OF MACEDONIA
EXTERNAL AUDIT AND RELATION BETWEEN INTERNAL AUDITORS, SUPERVISORY BODY AND EXTERNAL AUDITORS OF THE BANKING SECTOR IN THE REPUBLIC OF MACEDONIA Blagica Jovanova ([email protected]), Dushko Josheski
Software Testing Excellence Program (STEP) Project Proposal Offshore Outsourcing Management of Software Testing
Software Testing Excellence Program (STEP) Project Proposal Offshore Outsourcing Management of Software Testing This project focuses on issues related to the management of software testing in a global
Audit Report. Effectiveness of IT Controls at the Global Fund Follow-up report. GF-OIG-15-20b 26 November 2015 Geneva, Switzerland
Audit Report Effectiveness of IT Controls at the Global Fund Follow-up report GF-OIG-15-20b Geneva, Switzerland Table of Contents I. Background and scope... 3 II. Executive Summary... 4 III. Status of
BEYOND AMA PUTTING OPERATIONAL RISK MODELS TO GOOD USE POINT OF VIEW
POINT OF VIEW BEYOND AMA PUTTING OPERATIONAL RISK MODELS TO GOOD USE AUTHORS Ramy Farha, Principal Tom Ivell, Partner Thomas Jaeggi, Principal Evan Sekeris, Partner A long history of incidents, ranging
Managing Requirement Risks in Global Software Development
Managing Requirement Risks in Global Software Development Aurangzeb Khan Dr. Farooque Azam Muhammad Shoaib Zafar ABSTRACT Now a day s trend toward software development is changed and Software organizations
Development, Acquisition, Implementation, and Maintenance of Application Systems
Development, Acquisition, Implementation, and Maintenance of Application Systems Part of a series of notes to help Centers review their own Center internal management processes from the point of view of
Executive Master's in Business Administration Program
Executive Master's in Business Administration Program College of Business Administration 1. Introduction \ Program Mission: The UOS EMBA program has been designed to deliver high quality management education
EMERGENT CHANGES IN IT OUTSOURCING CLIENT-VENDOR RELATIONSHIPS
EMERGENT CHANGES IN IT OUTSOURCING CLIENT-VENDOR RELATIONSHIPS Mohammed H. A. Tafti, Department of Information Technology and Quantitative Methods, Hofstra University, Hempstead, NY, (516) 463-5720, [email protected]
14 December 2006 GUIDELINES ON OUTSOURCING
14 December 2006 GUIDELINES ON OUTSOURCING CEBS presents its Guidelines on Outsourcing. The proposed guidelines are based on current practices and also take into account international, such as the Joint
Operational Risk Management - The Next Frontier The Risk Management Association (RMA)
Operational Risk Management - The Next Frontier The Risk Management Association (RMA) Operational risk is not new. In fact, it is the first risk that banks must manage, even before they make their first
Office of the Auditor General AUDIT OF IT GOVERNANCE. Tabled at Audit Committee March 12, 2015
Office of the Auditor General AUDIT OF IT GOVERNANCE Tabled at Audit Committee March 12, 2015 This page has intentionally been left blank Table of Contents Executive Summary... 1 Introduction... 1 Background...
THE UH OH MOMENT. Financial Services Enterprises Focus on Governance, Transparency and Supply Chain Risk
THE UH OH MOMENT Financial Services Enterprises Focus on Governance, Transparency and Supply Chain Risk By Lois Coatney, Chuck Walker and Joseph Yacura, ISG Directors www.isg-one.com INTRODUCTION A top
Change to the Definition of Engagement Team in the Code of Ethics for Professional Accountants
IFAC Board Basis for Conclusions Exposure Draft Prepared by the Staff of the IESBA October 2011 March 2013 Comments due: February 29, 2012 International Ethics Standards Board for Accountants Change to
An Oracle White Paper January 2010. Access Certification: Addressing & Building on a Critical Security Control
An Oracle White Paper January 2010 Access Certification: Addressing & Building on a Critical Security Control Disclaimer The following is intended to outline our general product direction. It is intended
IT SERVICES OUTSOURCING LIVIU ION CIORA, ION BULIGIU
IT SERVICES OUTSOURCING LIVIU ION CIORA, ION BULIGIU Liviu Ion CIORA, Assist. Prof., Ph.D. Ion BULIGIU, Lect., Ph. D. University of Craiova, Faculty of Economics and Business Administration Keywords: outsourcing,
2014 HIMSS Analytics Cloud Survey
2014 HIMSS Analytics Cloud Survey June 2014 2 Introduction Cloud services have been touted as a viable approach to reduce operating expenses for healthcare organizations. Yet, engage in any conversation
Outsourcing. The Concept
Theoretical and Applied Economics Volume XIX (2012), No. 6(571), pp. 51-58 Outsourcing. The Concept Victor-Adrian TROACĂ Bucharest Academy of Economic Studies [email protected] Dumitru-Alexandru
Risk Considerations for Internal Audit
Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013
II. Compliance Examinations - Compliance Management System. Compliance Management System. Introduction. Board of Directors and Management Oversight
Compliance Management System Introduction Financial institutions operate in a dynamic environment influenced by industry consolidation, convergence of financial services, emerging technology, and market
The Role of Internal Audit in Risk Governance
The Role of Internal Audit in Risk Governance How Organizations Are Positioning the Internal Audit Function to Support Their Approach to Risk Management Executive summary Risk is inherent in running any
BANKING UNIT BANKING RULES OUTSOURCING BY CREDIT INSTITUTIONS AUTHORISED UNDER THE BANKING ACT 1994
BANKING UNIT BANKING RULES OUTSOURCING BY CREDIT INSTITUTIONS AUTHORISED UNDER THE BANKING ACT 1994 Ref: BR/14/2009 OUTSOURCING BY CREDIT INSTITUTIONS AUTHORISED UNDER THE BANKING ACT 1994 INTRODUCTION
On the Setting of the Standards and Practice Standards for. Management Assessment and Audit concerning Internal
(Provisional translation) On the Setting of the Standards and Practice Standards for Management Assessment and Audit concerning Internal Control Over Financial Reporting (Council Opinions) Released on
ICT Industry in Europe. Outsourcing Fuels Business Growth
ICT Industry in Europe. Outsourcing Fuels Business Growth 1 CONTENTS Introduction... 3 Implications of owning own IT infrastructure Drivers to outsourcing IT nearshoring to pick up in 2014 Risks of outsourcing
ASSESSMENT OF THE IT GOVERNANCE PERCEPTION WITHIN THE ROMANIAN BUSINESS ENVIRONMENT
Accounting and Management Information Systems Vol. 11, No. 1, pp. 44 55, 2012 ASSESSMENT OF THE IT GOVERNANCE PERCEPTION WITHIN THE ROMANIAN BUSINESS ENVIRONMENT Pavel NĂSTASE 1 and Simona Felicia UNCHIAŞU
Practice Guide. Selecting, Using, and Creating Maturity Models: A Tool for Assurance and Consulting Engagements
Practice Guide Selecting, Using, and Creating Maturity Models: A Tool for Assurance and Consulting Engagements July 2013 Table of Contents Executive Summary... 1 Introduction... 2 Example of Maturity
7 things to ask when upgrading your ERP solution
Industrial Manufacturing 7 things to ask when upgrading your ERP solution The capabilities gap between older versions of ERP designs and current designs can create a problem that many organizations are
SAP ERP FINANCIALS ENABLING FINANCIAL EXCELLENCE. SAP Solution Overview SAP Business Suite
SAP Solution Overview SAP Business Suite SAP ERP FINANCIALS ENABLING FINANCIAL EXCELLENCE ESSENTIAL ENTERPRISE BUSINESS STRATEGY PROVIDING A SOLID FOUNDATION FOR ENTERPRISE FINANCIAL MANAGEMENT 2 Even
Data Analysis: The Cornerstone of Effective Internal Auditing. A CaseWare Analytics Research Report
Data Analysis: The Cornerstone of Effective Internal Auditing A CaseWare Analytics Research Report Contents Why Data Analysis Step 1: Foundation - Fix Any Cracks First Step 2: Risk - Where to Look Step
Performance Management Systems: Conceptual Modeling
2011 International Conference on Economics and Business Information IPEDR vol.9 (2011) (2011) IACSIT Press, Bangkok, Thailand Performance Management Systems: Conceptual Modeling Dmitry Isaev Business Analytics
Auditing Outsourcing Arrangements
Auditing Outsourcing Arrangements Eileen Healy Enterprise Risk Services Director 16 April 2015 Contact Details: - Email: - [email protected] Mobile: - 086 164 3082 Session Objectives To provide an understanding
Assessing the Appropriate Level of Project, Program, and PMO Structure
PMI Virtual Library 2011 Daniel D. Magruder Assessing the Appropriate Level of Project, Program, and PMO Structure By Daniel D. Magruder, PMP Executive Summary Does your organization have in-flight projects
EVALUATION OF THE EFFECTIVENESS OF ACCOUNTING INFORMATION SYSTEMS
49 International Journal of Information Science and Technology EVALUATION OF THE EFFECTIVENESS OF ACCOUNTING INFORMATION SYSTEMS H. Sajady, Ph.D. M. Dastgir, Ph.D. Department of Economics and Social Sciences
Impact of Supply Chains Agility on Customer Satisfaction
2010 International Conference on E-business, Management and Economics IPEDR vol.3 (2011) (2011) IACSIT Press, Hong Kong Impact of Supply Chains Agility on Customer Satisfaction Dr. Akhilesh Barve Assistant
The Applications of Business Intelligence to the Improvement of Supply Chain Management A Case of an Electronic Company
JOURNAL OF SOFTWARE, VOL. 6, NO. 11, NOVEMBER 2011 2173 The Applications of Business Intelligence to the Improvement of Supply Chain Management A Case of an Electronic Company Chwei-Jen Fan Dept. of Information
Global Strategic Sourcing Services
where experience counts Global Strategic Sourcing Services Capabilities Overview Prepared For: Our Current and Future Valued Clients Our Strategic Sourcing Capabilities Sourcing Strategy Deciding whether
Applying Integrated Risk Management Scenarios for Improving Enterprise Governance
Applying Integrated Risk Management Scenarios for Improving Enterprise Governance János Ivanyos Trusted Business Partners Ltd, Budapest, Hungary, [email protected] Abstract: The term of scenario is used
1. FPO. Guide to the Sarbanes-Oxley Act: IT Risks and Controls. Second Edition
1. FPO Guide to the Sarbanes-Oxley Act: IT Risks and Controls Second Edition Table of Contents Introduction... 1 Overall IT Risk and Control Approach and Considerations When Complying with Sarbanes-Oxley...
Checklist for Operational Risk Management
Checklist for Operational Risk Management I. Development and Establishment of Comprehensive Operational Risk Management System by Management Checkpoints - Operational risk is the risk of loss resulting
Growing Vendor Management
V E N D O R M A N A G E M E N T P R O F I L E S E R I E S A Wh it e Pap e r by Ve n d or I NS I G HT an d C MPG, L L C Growing Vendor Management as a Sustainable Business Process with Automated Vendor
IT Audit in the Cloud
IT Audit in the Cloud Pavlina Ivanova, CISM ISACA-Sofia Chapter Content: o 1. Introduction o 2. Cloud Computing o 3. IT Audit in the Cloud o 4. Residual Risks o Used Resources o Questions 1. ISACA Trust
Internal Audit Department NeighborWorks America. Audit Review of the Business Continuity Plan (BCP) Management and Documentation
Department NeighborWorks America Audit Review of the Business Continuity Plan (BCP) and Documentation Project Number: ADMN.BCP.2013 Audit Review of of BCP Table of Contents Project Completion Letter...
Manual on o Training Management
5 Project on Improvement of Local Administration in Cambodia Manual on o Training Management Introduction What is Training Management? How to Use the Manuals Table of Contents 1. Introduction...4 2. What
ITIL V3 Application Support Volume 1
ITIL V3 Application Support Volume 1 Service Management For Application Support ITIL is a Registered Trade Mark and Community Trademark of the Office of Government and Commerce. This document may contain
THE INTERNATIONAL JOURNAL OF BUSINESS & MANAGEMENT
THE INTERNATIONAL JOURNAL OF BUSINESS & MANAGEMENT Performance Management Model for SMEs Rusaneanu Alexandra Ph.D. Student, Faculty of Cybernetics, Statistics and Economic Informatics, Bucharest University
Research on Capability Assessment of IS Outsourcing Service Providers
, pp.291-298 http://dx.doi.org/10.14257/ijunesst.2015.8.6.28 Research on Capability Assessment of IS Outsourcing Service Providers Xinjun Li and Junyan Wang School of Economic and Management, Yantai University,
GUIDANCE FOR MANAGING THIRD-PARTY RISK
GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,
pm4dev, 2007 management for development series Introduction to Project Management PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS
pm4dev, 2007 management for development series Introduction to Project Management PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS A methodology to manage
GAP ANALYSIS OF APPROACHES TO IMPLEMENTATION OF MANAGEMENT SYSTEMS
52 PROCEEDINGS OF THE SCIENTIFIC CONFERENCE QUALITY AND LEADING INNOVATION 2014 GAP ANALYSIS OF APPROACHES TO IMPLEMENTATION OF MANAGEMENT SYSTEMS DOI: 10.12776/QALI.V1.#5 MIROSLAV HRNIAR ABSTRACT Purpose:
June 2008 Report No. 08-038. An Audit Report on The Department of Information Resources and the Consolidation of the State s Data Centers
John Keel, CPA State Auditor An Audit Report on The Department of Information Resources and the Consolidation of the State s Data Centers Report No. 08-038 An Audit Report on The Department of Information
Generic Risk Mitigation Framework for Business Process Outsourcing
Generic Risk Mitigation Framework for Business Process Outsourcing Nanayakkara B.S 1, Hirano.M 2, Waseda Business School Abstract Business process outsourcing risk mitigation is a popular topic among the
BNM748 STRATEGIC GLOBAL OUTSOURCING AND OFFSHORING
BNM748 STRATEGIC GLOBAL OUTSOURCING AND OFFSHORING Academic Year 2014/15 Number of Aston Credits: Number of ECTS Credits: 15 7.5 Staff Members Responsible for the Module: Professor Julia Kotlarsky, Operations
Internal Audit. Audit of HRIS: A Human Resources Management Enabler
Internal Audit Audit of HRIS: A Human Resources Management Enabler November 2010 Table of Contents EXECUTIVE SUMMARY... 5 1. INTRODUCTION... 8 1.1 BACKGROUND... 8 1.2 OBJECTIVES... 9 1.3 SCOPE... 9 1.4
INTERNATIONAL STANDARDS FOR THE PROFESSIONAL PRACTICE OF INTERNAL AUDITING (STANDARDS)
INTERNATIONAL STANDARDS FOR THE PROFESSIONAL PRACTICE OF INTERNAL AUDITING (STANDARDS) Introduction to the International Standards Internal auditing is conducted in diverse legal and cultural environments;
The impact of external environment on organizational development strategy
MPRA Munich Personal RePEc Archive The impact of external environment on organizational development strategy Alina Voiculet and Nicoleta Belu and Denisa Elena Parpandel and Ionela Carmen Rizea Constantin
Credit Union Liability with Third-Party Processors
World Council of Credit Unions Annual Conference Credit Union Liability with Third-Party Processors Andrew (Andy) Poprawa CEO, Deposit Insurance Corporation of Ontario Canada 1 Credit Union Liability with
Statement of Guidance
Statement of Guidance Internal Audit Unrestricted Trust Companies 1. Statement of Objectives 1.1. To provide specific guidance on Internal Audit Functions as called for in section 3.6 of the Statement
COMPLIANCE MANAGEMENT SYSTEM
COMPLIANCE MANAGEMENT SYSTEM INTRODUCTION Financial institutions operate in a dynamic environment influenced by industry consolidation, convergence of financial services, emerging technology, and market
International Journal of Management and Social Science Research Review, Vol.1, Issue.2, Aug - 2014. Page 46
HRIS AND ITS IMPLICATIONS IN HRM INDUSTRY Ms.S.Usha Lecturer, Department of Business Administration, Madurai Kamaraj University College, Madurai. Ramu.V Assistant Professor, Dept. of Management Studies,
Development of Performance Management Systems Dmitry Isaev Business Analytics Department Higher School of Economics (HSE) Moscow, Russian Federation [email protected] Abstract In the paper basic principles
Continuous Monitoring and Auditing: What is the difference? By John Verver, ACL Services Ltd.
Continuous Monitoring and Auditing: What is the difference? By John Verver, ACL Services Ltd. Call them the twin peaks of continuity continuous auditing and continuous monitoring. There are certainly similarities
Managing Information Resources and IT Security
Managing Information Resources and IT Security Management Information Code: 164292-02 Course: Management Information Period: Autumn 2013 Professor: Sync Sangwon Lee, Ph. D D. of Information & Electronic
Balanced Scorecard; a Tool for Measuring and Modifying IT Governance in Healthcare Organizations
Balanced Scorecard; a Tool for Measuring and Modifying IT Governance in Healthcare Organizations Ehsan Borousan, Roozbeh Hojabri, Mahmoud Manafi and Aliread Hooman Abstract Nowadays healthcare organizations
Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)
It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The
Guide to the Sarbanes-Oxley Act: IT Risks and Controls. Frequently Asked Questions
Guide to the Sarbanes-Oxley Act: IT Risks and Controls Frequently Asked Questions Table of Contents Page No. Introduction.......................................................................1 Overall
Information Security Management System for Microsoft s Cloud Infrastructure
Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System
White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA
White Paper Achieving GLBA Compliance through Security Information Management White Paper / GLBA Contents Executive Summary... 1 Introduction: Brief Overview of GLBA... 1 The GLBA Challenge: Securing Financial
Measuring IT Governance Maturity Evidences from using regulation framework in the Republic Croatia
Measuring IT Governance Maturity Evidences from using regulation framework in the Republic Croatia MARIO SPREMIĆ, Ph.D., CGEIT, Full Professor Faculty of Economics and Business Zagreb, University of Zagreb
STRATEGIC COST MANAGEMENT ACCOUNTING INSTRUMENTS AND THEIR USAGE IN ALBANIAN COMPANIES ABSTRACT
STRATEGIC COST MANAGEMENT ACCOUNTING INSTRUMENTS AND THEIR USAGE IN ALBANIAN COMPANIES Marsel Sulanjaku Lecturer at A.Xhuvani University ALBANIA Ali Shingjergji Lecturer at A.Xhuvani University ALBANIA
Status Report of the Auditor General of Canada to the House of Commons
2011 Status Report of the Auditor General of Canada to the House of Commons Chapter 1 Financial Management and Control and Risk Management Office of the Auditor General of Canada The 2011 Status Report
International Workshop Agreement 2 Quality Management Systems Guidelines for the application of ISO 9001:2000 on education.
ISO 2002 All rights reserved ISO / IWA 2 / WD1 N5 Date: 2002-10-25 Secretariat: SEP-MÉXICO International Workshop Agreement 2 Quality Management Systems Guidelines for the application of ISO 9001:2000
Running Head: HUMAN RESOURCE PRACTICES AND ENTERPRISE PERFORMANCE. Pakistan. Muzaffar Asad. Syed Hussain Haider. Muhammad Bilal Akhtar
Running Head: HUMAN RESOURCE PRACTICES AND ENTERPRISE PERFORMANCE Human Resource Practices and Enterprise Performance in Small and Medium Enterprises of Pakistan Muzaffar Asad Syed Hussain Haider Muhammad
