• Title/Summary/Keyword: audit checklists

Search Result 12, Processing Time 0.023 seconds

A Design of University Information System Operation Audit Model based on ITIL V3

  • Kim, Hee-Wan;Kang, Bo-Ra;Kim, Dong-Soo;Moon, Song-Chul
    • Journal of Information Technology Applications and Management
    • /
    • v.25 no.3
    • /
    • pp.29-41
    • /
    • 2018
  • The purpose of constructing university information system is for improvement in diversification and throughput of information, streamlines business processes, rapid exchange of information, sharing of information, decision-making information, and securing educational facilities. Similar to business information technology system, university information system does not have a review system for sharing and overlapping investment of information. Due to the lack of project management for outsourcing and vulnerability of system suitability, system audit is absolutely needed for the university information system. This paper especially focuses on an operational phase in the audit of university information system. Additionally, we proposed operating model and checklists of the university information system based on Management Guidelines of ITIL V3 Operational and Information System. We derived the checklists of operation audit by each domain of service strategy, service design, service transition, service operation, and continual service improvement. As the result, this study appear to have more than average satisfaction the suitability results were.

Design of Audit Model in Web-based Information System (웹 기반 정보시스템에서의 감리모형 설계)

  • Ko, Kyung Ei;Choi, Jin Tak;Kim, Dong Soo;Kim, Hee Wan
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.123-136
    • /
    • 2012
  • Web applications are widely used by the development of the Internet, but there are no separate audit model for a web-based information systems. Information business has a wide variety of characteristics. So, web-based information system audit model is needed. Therefore, a web-based information system audit model was proposed to enhance the effectiveness of audit and to increase the quality. Audit check lists were applied based on three sets of existing information audit check framework. An audit point of time was defined as analysis, design, and implementation. An audit domain was defined as contents, design, and process. Moreover, audit viewpoint and inspection standards were defined by setting standards of process, product, and performance. Moreover, this paper proposes differences between an existing model of information system development methodology and web-based information system. It also deduced audit checklists according to audit domains for web-based information system audit. The deduced audit checklists were verified for its suitability by conducting surveys, and the modified audit inspection model, in which the deduced audit checklists were applied, was proposed.

The Model of Information System Operating Audit for the Service Level Agreement (서비스 수준 협약에 따른 정보시스템 운영감리 모형)

  • Lee, Sung-Ho;Choi, Jin-Tak;Kim, Dong-Soo;Kim, Hee-Wan
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.71-82
    • /
    • 2012
  • The interest in SLA in accordance with the development of IT outsourcing has increased due to the rapid development of information systems. Moreover, an awareness and necessity for the Information System Operating Audit has increased while an effective IT service management operations for information systems is needed desperately. However, information system operations and maintenance instructions of the National Information Society Agency operates due to the current information system operation, but the experience and the interpretation of the auditor determine the decision in the field. This paper introduces an operating audit model for the efficient management. This model is derived from the Korea Information Society Agency's operating instructions of the Information Systems Audit and their inspection services. The audit checklists were derived from the areas of service planning, service delivery, service support, and service management. Consequently, the operating audit model was proposed, and the suitability of this model was verified by experts' opinions on the survey.

A Case Study of Information System Auditing of CBD Project (CBD프로젝트의 정보시스템감리 사례연구)

  • 조남재;박기호;전순천;박준호
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.167-178
    • /
    • 2004
  • Different from traditional development methodologies like waterfall model, the CBD (component based development) methodology relies on a building block approach in the design and development of information system. The audit procedure and checklist for the traditional IS development methodology are required to be modified to be suitable for CBD. This research reviewed IS audit guidelines for the existing development process and analyzed multiple projects that employed the by component based development process. For the purpose of this study, we chose a governmental project and a next-generation IS project of a financial agency as sample cases. By comparing existing IS audit checklists and items actually reviewed in audit projects, this study identified appropriate check items for the CBD-centric audit program. New items were proposed as additional items such as project control in management phase, usage case and conceptual model establishment, component evaluation and design, in implementation phase, and so forth. The result of the research provides new guidelines for the audit CBD projects for the purposed of increased efficiency and qualify of application development projects.

  • PDF

A Study on the Agile-based Information System Audit Model (애자일에 기반한 정보시스템 감리 모델에 관한 연구)

  • Kim, Dong Hyup;Chan, Koh;Kim, Dong Soo;Kim, Hee Wan
    • Journal of Digital Convergence
    • /
    • v.11 no.8
    • /
    • pp.95-108
    • /
    • 2013
  • Agile development methods regards an interaction among software developers, operating softwares, and cooperation with customers as its main value. Most of the developing processes undergo a procedure called tailoring to meet the relevant project. Yet, in reality, projects run in disorder due to their overlap with other methods and management processes. As a result, the advantages of agile process cannot be fully used. So, the information system audit has an important role to detect these problems and improve the qualities of agile application projects. Also, researches should be conducted on Agile-based Iformation System Audit Model in order to enhance the effectiveness of agile projects. This paper suggests a model for an information system audit that applied agile developing methods. This model proposes audit domains and check lists for agile-based information system. In order to verify the suitability of the suggested model, more than 89.3% of the checklists were verified as suitable in all domains.

Cybersecurity Audit of 5G Communication-based IoT, AI, and Cloud Applied Information Systems (5G 통신기반 IoT, AI, Cloud 적용 정보시스템의 사이버 보안 감리 연구)

  • Im, Hyeong-Do;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.3
    • /
    • pp.428-434
    • /
    • 2020
  • Recently, due to the development of ICT technology, changes to the convergence service platform of information systems are accelerating. Convergence services expanded to cyber systems with 5G communication, IoT, AI, and cloud are being reflected in the real world. However, the field of cybersecurity audit for responding to cyber attacks and security threats and strengthening security technology is insufficient. In this paper, we analyze the international standard analysis of information security management system, security audit analysis and security of related systems according to the expansion of 5G communication, IoT, AI, Cloud based information system security. In addition, we design and study cybersecurity audit checklists and contents for expanding security according to cyber attack and security threat of information system. This study will be used as the basic data for audit methods and audit contents for coping with cyber attacks and security threats by expanding convergence services of 5G, IoT, AI, and Cloud based systems.

Design of a Project Management Maturity Evaluation Model using Information System Audit Checklists (정보시스템 감리점검항목을 활용한 프로젝트 조직성숙도 평가 모델의 설계)

  • Kim, Yun-Seok;Cho, Eun-Ae;Baik, Doo-Kwon
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.2
    • /
    • pp.105-117
    • /
    • 2008
  • Generally, project audit provides the service which accomplishes a project successfully by checking the management activity of information system project, indicating a controversial point and reflecting the improvement issues based on project audit check list. In addition, the projects are managed by using the project management maturity model based on process. However, the effect is not big as we except projects performance of real world. In this paper. to solve these problems, the project management maturity evaluation model which is connected with project audit check list and organizational maturity model survey items is designed. Thus, we propose the model which can improve the project performance through the project evaluation of customer's project and development part and the evaluation of organization level as we design that it is possible to not only audit the project but also evaluate it before and after the project.

The Effect of Resilience on Posttraumatic Stress Disorder Symptoms and Comorbid Symptoms in Firefighters (강원지역 소방관에서 외상후 스트레스 증상 및 동반증상에 미치는 리질리언스의 영향)

  • Lee, Hong-Eui;Kang, Suk-Hoon;Ye, Byoung Seok;Choi, Jong-Hyuck
    • Anxiety and mood
    • /
    • v.8 no.2
    • /
    • pp.86-92
    • /
    • 2012
  • Objective : This study investigated the relationship between the resilience and posttraumatic stress symptoms, as well as comorbid symptoms in firefighters. Methods : We collected 764 firefighters, who worked at six fire department stations in Gangwon-do. We investigated the impact of event scale-revised (IES-R), the life events checklists (LEC), Connor-Davidson resilience scale (CD-RISC), Beck depression inventory (BDI), state trait anxiety inventory (STAI) and alcohol use disorder identification test (AUDIT). Full PTSD groups, partial PTSD groups and non-PTSD groups, which were classified by IES-R scores, were compared in the LEC, CD-RISC, BDI, STAI and AUDIT, ; multiple linear regression analyses were done for independent predictors of variables. Results : Of the 764 firefighters, there were significant differences in LEC (p<0.001), CD-RISC (p<0.001), BDI (p<0.001), and AUDIT (p=0.001) among the full PTSD groups, partial PTSD groups and non-PTSD groups. However, STAI did not show significant difference among three groups. In multiple regression analysis, CD-RISC (${\beta}=-0.168$, p<0.001), LEC (${\beta}=0.211$, p<0.001) and AUDIT (${\beta}=0.115$, p=0.001) were significant predictors for IES-R. Conclusion : The results of the present study suggested that resilience might be a protective factor in PTSD and comorbid symptoms of PTSD.

A Study on Developing the Performance Audit Methodology for Performance Evaluation of Transportation Planning Process (교통계획 분야 성과평가를 위한 성과감사 방법론 개발에 관한 연구)

  • Lee, Yong-Taek;O, Chang-Seok
    • Journal of Korean Society of Transportation
    • /
    • v.29 no.2
    • /
    • pp.47-58
    • /
    • 2011
  • Nowaday OECD countries actively introduce the performance audit to evaluate the performance of public policies. Motivated by the current trend in practice, this paper presents performance audit indices and methodology developed for evaluating the transportation investment projects and policies. The main contribution of this study would be twofold:1) key performance indices, 5Es + 4Cs rule, and methodology of performance audit are derived from foreign (GAO, NAO) and domestic (BAI) audit reports; 2) checklists (key issues and focuses) of performance audit are suggested as ranks. It is also suggested that further studies are needed to maintain the indices and the methodology to achieve sustainable performance of transportation projects and policies.

Correlation Analysis in Information Security Checklist Based on Knowledge Network (지식 네트워크에 근거한 정보보호 점검기준 관계분석)

  • Jin, Chang Young;Kim, Ae Chan;Lim, Jong In
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.2
    • /
    • pp.109-124
    • /
    • 2014
  • As the emerged importance and awareness for information security, It is being implemented by each industrial sector to protect information assets. In this paper, we analyze the information security checklists or security ratings criteria to derive similarity and difference in context which used to knowledge network analysis method. The analyzed results of all checklists (ISMS, PIMS, 'FSS', 'FISS', 'G') are as follows : First, It is common factors that the protection of information systems and information assets, incident response, operations management. Second, It deals with relatively important factors that IT management, the adequacy of audit activities in the financial IT sector including common factors. Third, the criteria of ISMS contains the majority of the contents among PIMS, 'FSS', 'FISS'and 'G'.