The Proceedings of the Conference on Information Systems Applied Research 2009: §3523
Home
Papers/Indices
prev (§3364)
Next (§3544)
| Sat, Nov 7, 2:30 - 2:55, Ballroom C Paper (refereed)
| Recommended Citation: Kim, P S and L A T Nelson. The Results of Implementing a Knowledge Management Initiative to Enhance Network Access Controls. In The Proceedings of the Conference on Information Systems Applied Research 2009, v 2 (Washington DC): §3523. ISSN: 0000-0000. (A later version appears in Journal of Information Systems Applied Research 3(16). ISSN: 1946-1836.)
|
| |
The Results of Implementing a Knowledge Management Initiative to Enhance Network Access Controls
| | Philip S. Kim [a1] [a2]
School of Business
Walsh University [u1] [u2]
North Canton, Ohio, USA [c1] [c2]
Lisa A. T. Nelson [a1] [a2]
Pedro Arrupe Center for Business Ethics
Saint Joseph's University [u1] [u2]
Philadelphia, Pennsylvania, USA [c1] [c2]
|
Information technology and securing information assets are growing concerns for organizations, especially those within the financial services industry. As a result, information technology (IT) audits are increasingly integral to ensuring that adequate information security controls are in place over data and information systems. Despite the growing importance of information security within the financial services industry there appears to be a lack of empirical data on the effects of conducting an IT audit and implementing recommendations as a result of audit findings. This study seeks to 1) report on a recent IT General Computer Controls Audit conducted at one financial services institution, and 2) to investigate whether the decision to strengthen the knowledge management (KM) process between the institution’s Human Resources and Information Technology departments will result in fewer policy violations, thus creating a more effective information security environment. The conclusion shows that IT audits can be beneficial to organizations that rely on standard information security controls and that a knowledge management approach to implementing network access controls can significantly lower the risk of unauthorized access to corporate resources.
Keywords: IT audit, knowledge management, access controls, network access, dormant accounts
Read this refereed paper in Adobe Portable Document (PDF) format. (11 pages, 497 K bytes)
Preview this refereed paper in Plain Text (TXT) format. (33 K bytes)
Comments and corrections to
webmaster@isedj.org