Computer Audit Update
Title discontinued as of 1998.
- Impact factor0.00
- 5-year impact0.00
- Cited half-life0.00
- Immediacy index0.00
- Article influence0.00
- WebsiteComputer Audit Update website
- Other titlesComputer audit update (Online)
- Material typeDocument, Periodical, Internet resource
- Document typeInternet Resource, Computer File, Journal / Magazine / Newspaper
- Author can archive a pre-print version
- Author can archive a post-print version
- Voluntary deposit by author of pre-print allowed on Institutions open scholarly website and pre-print servers
- Voluntary deposit by author of authors post-print allowed on institutions open scholarly website including Institutional Repository
- Deposit due to Funding Body, Institutional and Governmental mandate only allowed where separate agreement between repository and publisher exists
- Set statement to accompany deposit
- Published source must be acknowledged
- Must link to journal home page or articles' DOI
- Publisher's version/PDF cannot be used
- Articles in some journals can be made Open Access on payment of additional charge
- NIH Authors articles will be submitted to PMC after 12 months
- Authors who are required to deposit in subject repositories may also use Sponsorship Option
- Pre-print can not be deposited for The Lancet
- Classification green
Publications in this journal
- Computer Audit Update 12/1997; 1997(12):25–29.
- Computer Audit Update 12/1997; 1997(12):9–24.
- Computer Audit Update 11/1997; 1997(11):30–35.
- Computer Audit Update 11/1997; 1997(11):2–4.
- [Show abstract] [Hide abstract]
ABSTRACT: Securing data in Cyber-space can frequently prove difficult. It can also prove costly, especially where high-tech security systems are involved. A meaningful data security program must, by necessity, also incorporate an array of personnel safeguards.Computer Audit Update 10/1997; 1997(10):25–27.
Article: Neural networks and the auditorComputer Audit Update 10/1997; 1997(10):20–24.
- [Show abstract] [Hide abstract]
ABSTRACT: In closing, data crime can safely be said to be the wave of the future. Databases and not banks, will increasingly attract the attention of criminal cartels. Unlike bank robbers who, if apprehended and prosecuted, stand to face life imprisonment; data criminals rarely ever see the inside of a prison. Management, more than ever, needs to play a role in ensuring that data thefts do not pay.Computer Audit Update 09/1997; 1997(9):28–32.
- Computer Audit Update 08/1997; 1997(8):31–34.
Article: You've been framed!Computer Audit Update 07/1997; 1997(7):34–35.
- Computer Audit Update 07/1997; 1997(7):30–33.
Article: Artificial neural networksComputer Audit Update 07/1997; 1997(7):25–29.
Article: Surviving a disasterComputer Audit Update 06/1997; 1997(6):20–24.
- Computer Audit Update 06/1997; 1997(6):25–29.
- Computer Audit Update 05/1997; 1997(5):25–29.
- Computer Audit Update 04/1997; 1997(4):25–29.
- Computer Audit Update 03/1997; 1997(3):33–36.
Article: Business continuity planningComputer Audit Update 02/1997; 1997(2):2–5.
Article: Learning from failure and successComputer Audit Update 02/1997; 1997(2):27–29.
- Computer Audit Update 02/1997; 1997(2):18–21.
- Computer Audit Update 01/1997; 1997(4):35-37.
Data provided are for informational purposes only. Although carefully collected, accuracy cannot be guaranteed. The impact factor represents a rough estimation of the journal's impact factor and does not reflect the actual current impact factor. Publisher conditions are provided by RoMEO. Differing provisions from the publisher's actual policy or licence agreement may be applicable.
ISSN: 2152-2723, Impact factor: 1.84
ISSN: 1996-3599, Impact factor: 0.65
Institute of Electrical and...
Association of Operating Room...
ISSN: 1873-6327, Impact factor: 2.25
American College of Obstetricians...
ISSN: 1873-233X, Impact factor: 4.8
International Society for Quality of...
ISSN: 1871-2584, Impact factor: 0.74
ISSN: 1861-6410, Impact factor: 1.36