Computer Audit Update
Title discontinued as of 1998.
- Impact factor0.00
- 5-year impact0.00
- Cited half-life0.00
- Immediacy index0.00
- Article influence0.00
- WebsiteComputer Audit Update website
- Other titlesComputer audit update (Online)
- Material typeDocument, Periodical, Internet resource
- Document typeInternet Resource, Computer File, Journal / Magazine / Newspaper
- Author can archive a pre-print version
- Author can archive a post-print version
- Pre-print allowed on any website or open access repository
- Voluntary deposit by author of authors post-print allowed on authors' personal website, arXiv.org or institutions open scholarly website including Institutional Repository, without embargo, where there is not a policy or mandate
- Deposit due to Funding Body, Institutional and Governmental policy or mandate only allowed where separate agreement between repository and the publisher exists.
- Permitted deposit due to Funding Body, Institutional and Governmental policy or mandate, may be required to comply with embargo periods of 12 months to 48 months .
- Set statement to accompany deposit
- Published source must be acknowledged
- Must link to journal home page or articles' DOI
- Publisher's version/PDF cannot be used
- Articles in some journals can be made Open Access on payment of additional charge
- NIH Authors articles will be submitted to PubMed Central after 12 months
- Publisher last contacted on 18/10/2013
- Classification green
Publications in this journal
- Computer Audit Update 12/1997; 1997(12):25–29.
- Computer Audit Update 12/1997; 1997(12):9–24.
- Computer Audit Update 11/1997; 1997(11):2–4.
- [Show abstract] [Hide abstract]
ABSTRACT: Securing data in Cyber-space can frequently prove difficult. It can also prove costly, especially where high-tech security systems are involved. A meaningful data security program must, by necessity, also incorporate an array of personnel safeguards.Computer Audit Update 10/1997; 1997(10):25–27.
Article: Neural networks and the auditorComputer Audit Update 10/1997; 1997(10):20–24.
- [Show abstract] [Hide abstract]
ABSTRACT: In closing, data crime can safely be said to be the wave of the future. Databases and not banks, will increasingly attract the attention of criminal cartels. Unlike bank robbers who, if apprehended and prosecuted, stand to face life imprisonment; data criminals rarely ever see the inside of a prison. Management, more than ever, needs to play a role in ensuring that data thefts do not pay.Computer Audit Update 09/1997; 1997(9):28–32.
- Computer Audit Update 08/1997; 1997(8):31–34.
Article: You've been framed!Computer Audit Update 07/1997; 1997(7):34–35.
Article: Artificial neural networksComputer Audit Update 07/1997; 1997(7):25–29.
- Computer Audit Update 07/1997; 1997(7):30–33.
Article: Surviving a disasterComputer Audit Update 06/1997; 1997(6):20–24.
- Computer Audit Update 06/1997; 1997(6):25–29.
- Computer Audit Update 05/1997; 1997(5):25–29.
- Computer Audit Update 04/1997; 1997(4):25–29.
- Computer Audit Update 03/1997; 1997(3):33–36.
Article: Learning from failure and successComputer Audit Update 02/1997; 1997(2):27–29.
- Computer Audit Update 02/1997; 1997(2):18–21.
Article: Business continuity planningComputer Audit Update 02/1997; 1997(2):2–5.
Article: Database protectionComputer Audit Update 01/1997; 1997(12):32-34.
- Computer Audit Update 01/1997; 1997(4):35-37.
Data provided are for informational purposes only. Although carefully collected, accuracy cannot be guaranteed. The impact factor represents a rough estimation of the journal's impact factor and does not reflect the actual current impact factor. Publisher conditions are provided by RoMEO. Differing provisions from the publisher's actual policy or licence agreement may be applicable.