|
References from Literature [1]Aalst W.M.P. van der, Mar. 1999, “Formalization and verification of event-driven process chains”, Information and Software Technology, Volume 41, Page 639-650. [2]Alavi M. and Carlson P., 1992, “A review of MIS research and disciplinary development”, Journal of Management Information Systems, Volume 8, Issue 4, Page 45-62. [3]American Institute of Certified Public Accountants, 1996, “Amendment to Statement on Auditing Standards No. 31, Evidential Matter”, Statement on Auditing Standards, No. 80, New York: AICPA. [4]American Institute of Certified Public Accountants, 2001, “The Effect of Information Technology on the Auditor's Consideration of Internal Control in a Financial Statement Audit”, Statement on Auditing Standards, No. 94, New York: AICPA. [5]Anisingaraju Sager, Oct. 2003, “The Role of Technology in the Sarbanes-Oxley Act Compliance”, Computer Technology Review, Volume 23, Issue, 10, Page 36. [6]Badica Costin, Badica Amelia, and Litoiu Valentin, 2003, “A New Formal IDEF-based Modelling of Business Processes”, Proceedings of the First Balkan Conference in Informatics. [7]Baird Jane, Caster Paul, Dilla William N., Earley Christine E., Johnson Eric N., Louwers Timothy J., Aug. 2003, “Challenges to Audit Education for the 21st Century: A Survey of Curricula, Course Content, and Delivery Methods The 2000-2001 Auditing Section Education Committee American Accounting Association”, Issue in Accounting Education, Volume 18, Issue 3, Page 241-263. [8]Bandyopadhyay Kakoli, Mykytyn Peter P., Mykytyn Kathleen., 1999, “A framework for integrated risk management in information technology”, Management Decision, Volume 37, Issue 5, Page 437-444. [9]Beckmerhagen I. A., Berg H. P., Karapetrovic S.V., Willborn W. O., 2003, “Auditing in support of the integration of management systems: a case from the nuclear industry”, Managerial Auditing Journal, Volume 18, Issue 6/7, Page 560-568. [10]Boehm B., Egyed A., Kwan J., Port D., Shah A., Madachy R., Jul. 1998, “Using the WinWin spiral model: a case study” , Volume 31, Issue 7, Page 33-44, Computer. [11]Braun Robert L, Davis Harold E., Sep. 2003, “Computer-assisted audit tools and techniques: analysis and perspectives”, Managerial Auditing Journal, Page 725-731. [12]Bryans Jeremy W., Koutny Maciej, Ryan Peter Y. A., 2005, “Modeling Opacity Using Petri-Nets”, Electronic Notes in Theoretical Computer Science, Volume 121, Page 101-115. [13]Buhler Paul A., Vidal José M.., Jan. 2005, ”Towards Adaptive Workflow Enactment Using Multi-agent Systems”, Information Technology and Management, Volume 6, Issue 1. [14]Chan Sally, Feb. 2004, “Sarbanes-Oxley: The IT Dimension”, The Internal Auditor, Volume 61, Issue 1, Page 31-33. [15]Christensen Jo Ann and Byington J. Ralph, Jun. 2003, “The Computer: An Essential Fraud Detection Tool”, Journal of Corporate Accounting & Finance, Volume 14, Issue 5, Page 23-27. [16]Cook Glenn R. and Housel Tom, 2005, “Where to Invest in Information Systems: A CRM Case Study”, Proceedings of the 38th Hawaii International Conference on System Sciences. [17]Costello Claire and Molloy Owen, 2003, “A Rules Based Approach to Business Process Management”, Proceedings of the 2003 International Conference on Internet Computing. [18]Debreceny Roger, Lee Sook-Leng, Neo Willy, Toh Jocelyn Shuling, Aug. 2005, “Employing generalized audit software in the financial services sector: Challenges and opportunities”, Managerial Auditing Journal, Volume 20, Issue 6, Page 605-618. [19]Debreceny Roger S., Gray Glen L., Ng Jun-Jin Joeson, Lee Siow-Ping Kevin, Yau Woon-Foong, 2005, “Embedded Audit Modules in Enterprise Resource Planning Systems: Implementation and Functionality”, Journal of Information Systems, Volume 19, Issue 2, Page 7-27. [20]Dowlatshahi S., Sep. 2005, “Strategic success factors in enterprise resource-planning design and implementation: a case-study approach”, International Journal of Production Research, Volume 43, Issue 18, Page 3745–3771. [21]Elnaffar Said, Powley Wendy, Benoit Darcy, Martin Pat, 2003, “Today’s DBMSs: How autonomic are they?”, Proceedings of the 14th International Workshop on Database and Expert Systems Applications. [22]Farwer Berndt, Varea Mauricio, Mar. 2005, “Object-based Control/Data-flow Analysis”, Declarative Systems and Software Engineering Group Technical Report DSSE-TR-2005-1. [23]Gardiner Stanley C., Hanna Joe B., LaTour Michael S., Jul. 2002, “ERP and the reengineering of industrial marketing processes A prescriptive overview for the new-age marketing manager”, Industrial Marketing Management, Volume 31, Issue 4, Page 357-365. [24]Gelinas Ulric J., Levy Elliott S., Thibodeau Jay C., Nov. 2001, “Norwood Office Supplies, Inc.: A Teaching Case to Integrate Computer-Assisted uditing Techniques into the Auditing Course”, Volume: 16, Issue: 4, Page 603-636. [25]Groomer S. Michael, Murthy Uday S., Spr. 1989, “Continus Auditing of Database Applications: An Embedded Audit Module Approach”, Journal of Information Systems, Volume 3, Issue 2, Page 53-69. [26]Hevner Alan R., March Salvatore T., Park Jinsoo, Ram Sudha, Mar. 2004, “Design Science in Information Systems Research”, MIS Quarterly, Volume 28, Issue 1, Page75-106. [27]IEEE-SA Standards Board, Feb. 1999, “IEEE Standard for Conceptual Modeling Language Syntax and Semantics for IDEF1X 97(IDEF object)”, IEEE Std 1320.2-1998. [28]ISACA Standards Board, 2002, “Continuous Auditing: Is It Fantasy or Reality?”, Information System Control Journal, Volume 5. [29]Jeffrey T., Zimbelman Mark F., Sep. 2004, “Using Game Theory and Strategic Reasoning Concepts to Prevent and Detect Fraud”, Accounting Horizons, Volume 18, Issue 3, Page173-184. [30]Juan Y. C. and Yang C. O., Apr. 2004, “Systematic approach for the gap analysis of business processes”, International Journal of Production Research, Volume 42, Issue 7, Page 1325–1364. [31]Kaarst-Brown Michelle L. and Kelly Shirley, 2005, “IT Governance and Sarbanes-Oxley: The latest sales pitch or real challenges for the IT Function?”, Proceedings of the 38th Hawaii International Conference on System Sciences. [32]Kim C. H., Yim D. S., Weston R. H., Nov. 2001, “An integrated use of IDEF0, IDEF3 and Petri-Net methods in support of business process modeling”, Journal of Process Mechanical Engineering, Volume 215, Issue 4, Page 317-329. [33]Koch Ina, Junker Bjorn H., Heiner Monika, 2005, “Application of Petri-Net for modeling and validation of the sucrose breakdown pathway in the potato tuber”, Bioinformatics, Volume 21, Issue 7, Page 1219-1226. [34]Lee Kichang, Jeong Hanil, Park Chankwon, Park Jinwoo, Jan. 2004, “Construction and performance analysis of a Petri-Net model based on a functional model in a CIM system”, International Journal of Advanced Manufacturing Technology, Volume 23, Issue 1-2, Page 139-147. [35]Lee, P. T., Tan K. P., Jan.1992, “Modelling of visualised data-flow diagrams using Petri net model”, Software Engineering Journal, Volume 7, Issue 1, Page: 4-12. [36]Marchetti Anne M. , Oct. 2005, “How to Set Up an ERM Program”, Journal of Corporate Accounting & Finance, Volume 17, Issue 1, Page 57-59. [37]Marnewick Carl, Labuschagne Lessing, 2005, “A conceptual model for enterprise resource planning”, ERP Information Management & Computer Security, Volume 13, Issue 2, Page 144-156. [38]Meena Hemant Kr., Saha Indradeep, Mondal Joushik Kr., T.V. Prabhakar, Nov. 2001, “An Approach to Workflow Modeling and Analysis”, Proceedings of the Institution of Mechanical Engineers - Part E - Journal of Process Mechanical Engineering, Volume 215, Issue 4, Page 317-329. [39]Mooney J.Lowell, Harrell Horace W., Ludwig Stephen E., May. 2000, “Audit Software that helps your company stop fraud”, Journal of Corporate Accounting & Finance, Volume 11, Issue 4, Page 17-23. [40]Murata TaDao, Apr. 1989, “Petri-Nets: Properties, Analysis and Applications”, Proceedings of the IEEE, Volume 77, Issue 4, Page541-580. [41]Petri C.A., 1966, “Communication with Automata”, Griffiss Air Force Base Tech. Report RADC-TR-65377, Volume 1. [42]Petterson Mark, Jul. 2005, “The Keys to Effective IT auditing”, Journal of Corporate Accounting & Finance, Volume 16, Issue 5, Page 41-46. [43]Rezaee Zabihollah, Reinstein Alan, Nov. 1998, “The impact of emerging information technology on auditing”, Managerial Auditing Journal, Volume 13 Issue 8 Page 465-471. [44]Rezaee Z., Sharbatoghlie A., Elam R., McMickle P. L., 2002, “Continuous Auditing: Building Automated Auditing Capability,” Auditing, Volume 21, Issue 1, Page 147-163. [45]Rezaee Zabihollah, Elam Rick, Sharbatoghlie Ahmad, 2001, “Continus auditing: the audit of the future”, Managerial Auditing Journal, Volume 16, Issue 3, Page 150-158. [46]Schattkowsky Tim, 2005, “UML 2.0 - Overview and Perspectives in SoC Design”, Proceedings of the Design, Automation and Test in Europe Conference and Exhibition. [47]Song Yujin and Lee Jongjun, 2002 “Deadlock Analysis of Petri-Nets Using the Transitive Matrix”, Proceedings of the 41st SICE Annual Conference, Volume 2, Page 689-694. [48]Stefanov Veronika and List Beate, 2005, “A Performance Measurement Perspective for Event-driven Process Chains”, Proceedings of the 16th International Workshop on Database and Expert Systems Applications. [49]Turetke Ozgur n, Schuff David, Sharda Ramesh, Ow Terence T., Sep. 2004, “Supporting Systems Analysis and Design Through Fisheye Views” Communications of The ACM, Volume 47, Issue 9, Page 72-77. [50]Weidenmier Marcia L., Herron Terri L., 2004, “Selecting an Audit Software Package for Classroom Use”, Journal of Information Systems, Volume 18 , Issue 1 , Page 95-110. [51]Wright Sally and Wright Arnold M., Spr. 2002, “Information System Assurance for Enterprise Resource Planning Systems: Unique Risk Considerations”, Journal of Information Systems, Volume 16, Issue 1, Page 99-113. [52]Yang David C. and Guan Liming, 2004, “The evolution of IT auditing and internal control standards in financial statement audits: The case of the United States”, Managerial Auditing Journal, Volume 19, Issue 4, Page 544-555. [53]Yao Albert Wen-Long, Liao Hsin-Te, Chi Jessica Shu-Chuan, Peng Shih-Sen, 2005, “A Petri-Net based Offline Simulation and Online Diagnostic Platform for Manufacturing Systems”, Journal of Chinese Institute of Industrial Engineers, Volume 22, Issue 1, Page 64-75. [54]Young R. E. and Vesterager J., 1991, “An approach to CIM system development whereby manufactoring people can design and build their own ClM system”, International Journal of Computer Integrated Manufacturing, Volume 4, Issue5, Page 288-299. [55]Yu Yuan-Chen, Chen Wei-Hao, and Liu Kun-Peng, Mar. 2004, “Integration of EPC and A Modularized Colored Petri-Net through Events for Agile Manufacturing Cell Control”, Proceedings of the 2004 IEEE International Conference on Networking, Sensing &- Control, Taipei, Taiwan. [56]Zhao Ning, Yen David C., Chang I-Chiu, Dec. 2004, “Auditing in the e-commerce era”, Information Management & Computer Security, Volume 12, Issue 5, Page 389-400.
References from Text Book [1]Booch Grady, Rumbaugh James, Jacobson Ivar, 1999, “Unified Software Development Process”, Addison-Wesley. [2]Booch Grady, Rumbaugh James, Jacobson Ivar, Feb. 2002, “The Unified Modeling Language User Guide”, Addison-Wesley. [3]Champlain Jack J., 2003, “Auditing Information Systems 2nd.”, John Wiley & Sons. [4]Harrington, J. H., Esseling E. K. C., Van Nimwegen H., 1998, “Business process improvement workbook: documatation, analysis, design, and management of business process improvement” New York:McGrawHill. [5]Kruchten Philippe, 1999, “Rational Unified Process-An Introduction”, Addison-Wesley. [6]Keller G., Teufel T., Jul. 1998, “SAP R/3 Process Oriented Implementation”, Addison-Wesley. [7]Rob Peter, Coronel Carlos M., Jan. 2004, “Database Systems: Design, Implementation, and Management 6th.”, Course-Technology. [8]Romney Marshall and Steinbart Paul, 2005, “Accounting Information Systems 10th.”, Prentice Hall. [9]Scheer A. W., 2001, “Aris - Modellierungsmethoden, Metamodelle, Anwendungen”, Spinger. [10]Ullman Jefferey D., Widom Jennifer, 2002, “A First Course In Database Systems 2nd”, Prentice Hall. [11]Williams Glynn C., 2000, “Implementing SAP Sales and Distribution”, New York:McGrawHill. [12]Witten Jeffrey L., Bentley Lonnie D., Dittman Kevin C., 2005, “System Analysis & Design Methods 7th.”, McGrawHill. [13]Yin Robert K., Campbell Donald T., 2003, ” Case Study Research: Design and Methods 3rd ”, Sage Publications.
References from World Wide Web [1]Andrews, T., Curbera, F., Dholakia, H., Goland, Y., Klein, J., Leymann, F., Liu, K., Roller, D., Smith, D., Thatte, S., Trickovic, I., and Weerawarana, S., 2003, “Business Process Execution Language for Web Services”, http://ifr.sap.com/bpel4ws. [2]ApexSQL.com, 2005, http://www.apexsql.com/sql_tools_log.asp. [3]Baker J., Nov. 2002, “Business Process Management Language (BPML): Automating Business Relationships”, eAI Journal, http://www.eaijournal.com, Page28-31. [4]Bek Jon, 2004, ZFPAudit: A Computer-assisted Audit Tool for Evaluation of Microsoft Operating Systems, http://www.isaca.org/. [5]Computer Security Institute (CSI) and San Francisco Federal Bureau of Investigation's (FBI) Computer Intrusion Squad, 2005, “2005 Computer Crime and Security Survey”, http://www.GoCSI.com. [6]Gupta.com, 2005, “Gupta Team Developer”, http://www.guptaworldwide.com/Products/TD.aspx. [7]Hanrahan Robert P., 1995 ,“The IDEF Process Modeling Methodology”, http://www.stsc.hill.af.mil/crosstalk/1995/06/IDEF.asp. [8]Lumigent.com 2005, http://www.lumigent.com/. [9]Microsoft.com, 2005” MSDN:Introduction to Transaction Logs”, http://msdn2.microsoft.com/en-us/library/ms190925.aspx. [10]Microsoft.com, 2005 “Microsoft Visual C# Developer Center”, http://msdn.microsoft.com/vcsharp. [11]Oracle.com, , Oct. 2005, “Oracle Database Concepts 10g Release 2 (10.2) B14220-02”,http://download-west.oracle.com/docs/cd/B19306_01/server.102/b14220/toc.htm. [12]White Stephen A., May. 2004, “Business Process Modeling Notation (BPMN) Version 1.0”, BPMI.org.
|