﻿<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="http://v.michm.ru/skins/common/feed.css?303"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="ru">
		<id>http://v.michm.ru/index.php?action=history&amp;feed=atom&amp;title=%D0%9F%D0%BE%D0%B8%D1%81%D0%BA_%28%D0%B0%29_%D0%93%D0%B5%D0%BE%D1%80%D0%B3%D0%B8%D0%B5%D0%B2%D1%81%D0%BA%D0%B0%D1%8F</id>
		<title>Поиск (а) Георгиевская - История изменений</title>
		<link rel="self" type="application/atom+xml" href="http://v.michm.ru/index.php?action=history&amp;feed=atom&amp;title=%D0%9F%D0%BE%D0%B8%D1%81%D0%BA_%28%D0%B0%29_%D0%93%D0%B5%D0%BE%D1%80%D0%B3%D0%B8%D0%B5%D0%B2%D1%81%D0%BA%D0%B0%D1%8F"/>
		<link rel="alternate" type="text/html" href="http://v.michm.ru/index.php?title=%D0%9F%D0%BE%D0%B8%D1%81%D0%BA_(%D0%B0)_%D0%93%D0%B5%D0%BE%D1%80%D0%B3%D0%B8%D0%B5%D0%B2%D1%81%D0%BA%D0%B0%D1%8F&amp;action=history"/>
		<updated>2026-04-05T05:34:08Z</updated>
		<subtitle>История изменений этой страницы в вики</subtitle>
		<generator>MediaWiki 1.19.23</generator>

	<entry>
		<id>http://v.michm.ru/index.php?title=%D0%9F%D0%BE%D0%B8%D1%81%D0%BA_(%D0%B0)_%D0%93%D0%B5%D0%BE%D1%80%D0%B3%D0%B8%D0%B5%D0%B2%D1%81%D0%BA%D0%B0%D1%8F&amp;diff=49325&amp;oldid=prev</id>
		<title>Георгиевская Анастасия в 12:50, 25 ноября 2024</title>
		<link rel="alternate" type="text/html" href="http://v.michm.ru/index.php?title=%D0%9F%D0%BE%D0%B8%D1%81%D0%BA_(%D0%B0)_%D0%93%D0%B5%D0%BE%D1%80%D0%B3%D0%B8%D0%B5%D0%B2%D1%81%D0%BA%D0%B0%D1%8F&amp;diff=49325&amp;oldid=prev"/>
				<updated>2024-11-25T12:50:28Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class='diff diff-contentalign-left'&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
			&lt;tr valign='top'&gt;
			&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;← Предыдущая&lt;/td&gt;
			&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;Версия 12:50, 25 ноября 2024&lt;/td&gt;
			&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Строка 39:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Строка 39:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Аудит ИТ-систем и кибербезопасность остаются актуальными и востребованными из-за увеличения количества киберугроз, необходимости соблюдать стандарты и следовать регуляторам. Аудит позволяет выявить уязвимости, снизить риски и вероятность инцидентов, связанных с человеческим фактором.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Вывод: Актуальность: &lt;/ins&gt;Аудит ИТ-систем и кибербезопасность остаются актуальными и востребованными из-за увеличения количества киберугроз, необходимости соблюдать стандарты и следовать регуляторам. Аудит позволяет выявить уязвимости, снизить риски и вероятность инцидентов, связанных с человеческим фактором. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Востребованность: &lt;/ins&gt;Практически аудит ИТ-систем применяется на предприятиях для оптимизации бизнес-процессов, соблюдения нормативных требований, а также помогает осуществлять управление рисками.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Практически аудит ИТ-систем применяется на предприятиях для оптимизации бизнес-процессов, соблюдения нормативных требований, а также помогает осуществлять управление рисками.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key wiki:diff:version:1.11a:oldid:48811:newid:49325 --&gt;
&lt;/table&gt;</summary>
		<author><name>Георгиевская Анастасия</name></author>	</entry>

	<entry>
		<id>http://v.michm.ru/index.php?title=%D0%9F%D0%BE%D0%B8%D1%81%D0%BA_(%D0%B0)_%D0%93%D0%B5%D0%BE%D1%80%D0%B3%D0%B8%D0%B5%D0%B2%D1%81%D0%BA%D0%B0%D1%8F&amp;diff=48811&amp;oldid=prev</id>
		<title>Георгиевская Анастасия в 11:21, 21 октября 2024</title>
		<link rel="alternate" type="text/html" href="http://v.michm.ru/index.php?title=%D0%9F%D0%BE%D0%B8%D1%81%D0%BA_(%D0%B0)_%D0%93%D0%B5%D0%BE%D1%80%D0%B3%D0%B8%D0%B5%D0%B2%D1%81%D0%BA%D0%B0%D1%8F&amp;diff=48811&amp;oldid=prev"/>
				<updated>2024-10-21T11:21:47Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class='diff diff-contentalign-left'&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
			&lt;tr valign='top'&gt;
			&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;← Предыдущая&lt;/td&gt;
			&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;Версия 11:21, 21 октября 2024&lt;/td&gt;
			&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Строка 7:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Строка 7:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;[[Файл:Ключ_2.png]]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;[[Файл:Ключ_2.png]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;[[Файл:Ключ_3.png]]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;[[Файл:Ключ_3.png]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;David G. Rosado, Enabling security risk assessment and management for business process models / David G. Rosado, Luis E. Sánchez, Ángel Jesús, Antonio Santos-Olmo // Journal of Information Security and Applications v.84, 2024 – United Kingdom, Guildford, 2024. ISSN: 2214-2126&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;David G. Rosado, Enabling security risk assessment and management for business process models / David G. Rosado, Luis E. Sánchez, Ángel Jesús, Antonio Santos-Olmo // Journal of Information Security and Applications v.84, 2024 – United Kingdom, Guildford, 2024. ISSN: 2214-2126&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;CiteScore 10.9, IF 3.8&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;CiteScore 10.9, IF 3.8&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;David G. Rosado h-index 10, Ángel Jesús h-index 11&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;David G. Rosado h-index 10, Ángel Jesús h-index 11&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Micheal Axelsen, Explaining the information systems auditor role in the public sector financial audit / Micheal Axelsen, Peter Green // International Journal of Accounting Information Systems v.24, 2017 – Australia, Adelaide, 2017. p15-31&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Micheal Axelsen, Explaining the information systems auditor role in the public sector financial audit / Micheal Axelsen, Peter Green // International Journal of Accounting Information Systems v.24, 2017 – Australia, Adelaide, 2017. p15-31&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;CiteScore 9.0, IF 4.1&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;CiteScore 9.0, IF 4.1&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Micheal Axelsen h-index 5, Peter Green h-index 30&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Micheal Axelsen h-index 5, Peter Green h-index 30&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Arno Nuijten, IT managers’ vs. IT auditors’ perceptions of risks: An actor–observer asymmetry perspective / Arno Nuijten, Mark Keil, Gert van der Pijl // Information &amp;amp; Management v.55, 2018 – United States of America, Atlanta, 2018. p80-93&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Arno Nuijten, IT managers’ vs. IT auditors’ perceptions of risks: An actor–observer asymmetry perspective / Arno Nuijten, Mark Keil, Gert van der Pijl // Information &amp;amp; Management v.55, 2018 – United States of America, Atlanta, 2018. p80-93&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;CiteScore 17.9 IF 8.2&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;CiteScore 17.9 IF 8.2&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Arno Nuijten h-index 6, Mark Keil h-index 55&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Arno Nuijten h-index 6, Mark Keil h-index 55&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Sukanto Bhattacharya, An ANN-based auditor decision support system using Benford's law / Sukanto Bhattacharya, Dongming Xu // Decision Support Systems v.50, 2011 – United States of America, Lawrence, 2011. p576-584&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Sukanto Bhattacharya, An ANN-based auditor decision support system using Benford's law / Sukanto Bhattacharya, Dongming Xu // Decision Support Systems v.50, 2011 – United States of America, Lawrence, 2011. p576-584&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;CiteScore 14.7 IF 6.7&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;CiteScore 14.7 IF 6.7&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Sukanto Bhattacharya h-index 11, Dongming Xu h-index 22&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Sukanto Bhattacharya h-index 11, Dongming Xu h-index 22&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Susanne Durst, The effect of environmental turbulence on cyber security risk management and organizational resilience / Susanne Durst, Christoph Hinteregger, Malgorzata Zieba // Computers &amp;amp; Security v.137, 2024 – United States of America, West Lafayette, 2024. ISSN: 0167-4048&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Susanne Durst, The effect of environmental turbulence on cyber security risk management and organizational resilience / Susanne Durst, Christoph Hinteregger, Malgorzata Zieba // Computers &amp;amp; Security v.137, 2024 – United States of America, West Lafayette, 2024. ISSN: 0167-4048&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;CiteScore 12.4 IF 4.8&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;CiteScore 12.4 IF 4.8&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Susanne Durst h-index 29, Christoph Hinteregger h-index 5, Malgorzata Zieba h-index 12&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Susanne Durst h-index 29, Christoph Hinteregger h-index 5, Malgorzata Zieba h-index 12&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Аудит ИТ-систем и кибербезопасность остаются актуальными и востребованными из-за увеличения количества киберугроз, необходимости соблюдать стандарты и следовать регуляторам. Аудит позволяет выявить уязвимости, снизить риски и вероятность инцидентов, связанных с человеческим фактором.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Аудит ИТ-систем и кибербезопасность остаются актуальными и востребованными из-за увеличения количества киберугроз, необходимости соблюдать стандарты и следовать регуляторам. Аудит позволяет выявить уязвимости, снизить риски и вероятность инцидентов, связанных с человеческим фактором.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Практически аудит ИТ-систем применяется на предприятиях для оптимизации бизнес-процессов, соблюдения нормативных требований, а также помогает осуществлять управление рисками.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Практически аудит ИТ-систем применяется на предприятиях для оптимизации бизнес-процессов, соблюдения нормативных требований, а также помогает осуществлять управление рисками.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Георгиевская Анастасия</name></author>	</entry>

	<entry>
		<id>http://v.michm.ru/index.php?title=%D0%9F%D0%BE%D0%B8%D1%81%D0%BA_(%D0%B0)_%D0%93%D0%B5%D0%BE%D1%80%D0%B3%D0%B8%D0%B5%D0%B2%D1%81%D0%BA%D0%B0%D1%8F&amp;diff=48810&amp;oldid=prev</id>
		<title>Георгиевская Анастасия: Новая страница: «Тема: Information System Audit of Business Process.  Ключевые слова IS audit всего - 23439 результатов. Ключевые слов…»</title>
		<link rel="alternate" type="text/html" href="http://v.michm.ru/index.php?title=%D0%9F%D0%BE%D0%B8%D1%81%D0%BA_(%D0%B0)_%D0%93%D0%B5%D0%BE%D1%80%D0%B3%D0%B8%D0%B5%D0%B2%D1%81%D0%BA%D0%B0%D1%8F&amp;diff=48810&amp;oldid=prev"/>
				<updated>2024-10-21T11:20:58Z</updated>
		
		<summary type="html">&lt;p&gt;Новая страница: «Тема: Information System Audit of Business Process.  Ключевые слова IS audit всего - 23439 результатов. Ключевые слов…»&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Новая страница&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Тема: Information System Audit of Business Process.&lt;br /&gt;
&lt;br /&gt;
Ключевые слова IS audit всего - 23439 результатов. Ключевые слова Cybersecurity всего - 16504 результата. Ключевые слова Security risk assessment and management 156698 результатов&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Файл:Ключ_1.png]]&lt;br /&gt;
[[Файл:Ключ_2.png]]&lt;br /&gt;
[[Файл:Ключ_3.png]]&lt;br /&gt;
&lt;br /&gt;
David G. Rosado, Enabling security risk assessment and management for business process models / David G. Rosado, Luis E. Sánchez, Ángel Jesús, Antonio Santos-Olmo // Journal of Information Security and Applications v.84, 2024 – United Kingdom, Guildford, 2024. ISSN: 2214-2126&lt;br /&gt;
CiteScore 10.9, IF 3.8&lt;br /&gt;
David G. Rosado h-index 10, Ángel Jesús h-index 11&lt;br /&gt;
&lt;br /&gt;
Micheal Axelsen, Explaining the information systems auditor role in the public sector financial audit / Micheal Axelsen, Peter Green // International Journal of Accounting Information Systems v.24, 2017 – Australia, Adelaide, 2017. p15-31&lt;br /&gt;
CiteScore 9.0, IF 4.1&lt;br /&gt;
Micheal Axelsen h-index 5, Peter Green h-index 30&lt;br /&gt;
&lt;br /&gt;
Arno Nuijten, IT managers’ vs. IT auditors’ perceptions of risks: An actor–observer asymmetry perspective / Arno Nuijten, Mark Keil, Gert van der Pijl // Information &amp;amp; Management v.55, 2018 – United States of America, Atlanta, 2018. p80-93&lt;br /&gt;
CiteScore 17.9 IF 8.2&lt;br /&gt;
Arno Nuijten h-index 6, Mark Keil h-index 55&lt;br /&gt;
&lt;br /&gt;
Sukanto Bhattacharya, An ANN-based auditor decision support system using Benford's law / Sukanto Bhattacharya, Dongming Xu // Decision Support Systems v.50, 2011 – United States of America, Lawrence, 2011. p576-584&lt;br /&gt;
CiteScore 14.7 IF 6.7&lt;br /&gt;
Sukanto Bhattacharya h-index 11, Dongming Xu h-index 22&lt;br /&gt;
&lt;br /&gt;
Susanne Durst, The effect of environmental turbulence on cyber security risk management and organizational resilience / Susanne Durst, Christoph Hinteregger, Malgorzata Zieba // Computers &amp;amp; Security v.137, 2024 – United States of America, West Lafayette, 2024. ISSN: 0167-4048&lt;br /&gt;
CiteScore 12.4 IF 4.8&lt;br /&gt;
Susanne Durst h-index 29, Christoph Hinteregger h-index 5, Malgorzata Zieba h-index 12&lt;br /&gt;
&lt;br /&gt;
Аудит ИТ-систем и кибербезопасность остаются актуальными и востребованными из-за увеличения количества киберугроз, необходимости соблюдать стандарты и следовать регуляторам. Аудит позволяет выявить уязвимости, снизить риски и вероятность инцидентов, связанных с человеческим фактором.&lt;br /&gt;
Практически аудит ИТ-систем применяется на предприятиях для оптимизации бизнес-процессов, соблюдения нормативных требований, а также помогает осуществлять управление рисками.&lt;/div&gt;</summary>
		<author><name>Георгиевская Анастасия</name></author>	</entry>

	</feed>