Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


2016 | 11 | 1 | 55-61

Article title

Compliance Issues in Higher Education

Authors

Title variants

Languages of publication

EN

Abstracts

EN
Efficiency in the 1980’s, quality in the 1990’s, compliance in the 2010’s - private sector management techniques and mechanisms find their way to public services. This paper facilitates the understanding of how compliance management controls can improve operations and prevent or detect failure or wrongdoing. The last few years’ empirical research and benchmark studies demonstrate how organizations are confused about the use of compliance controls. In brief, better organized and integrated IT controls generally lead to better compliance all over the business.

Publisher

Year

Volume

11

Issue

1

Pages

55-61

Physical description

Dates

published
2016-02-01
received
2015-06-09
accepted
2015-10-30
online
2016-08-19

Contributors

author
  • University of Technology and Economics, Budapest, Hungary

References

  • Capitalizing on Complexity (2010). IBM. Retrieved from [30.06.2015].
  • Collet, H. (2008). IT Controls Automation and Database Management: Defending Against the Insider Threat. In: Governance, Risk, and Compliance Handbook: Technology, Finance, Environmental, and International Guidance and Best Practices (ed A. Tarantino), Hoboken: John Wiley & Sons. Ch. 23.
  • COSO (2015). Internal Control – Integrated Framework, Executive Summary. Retrieved from [30.06.2015].
  • Deloitte (2013). Felmérés a belső ellenőrzés és a compliance helyzetéről 2013. Retrieved from , [30.06.2015].
  • Lipton, M., Neff, D. A., Brownstein, A. R., Rosenblum, S. A., Emmerich, A. O., Fain, S. L., & Cohen, D. J. (2014). Risk Management and the Board of Directors – An update for 2014. Wachtell, Lipton, Rosen, Katz. Retrieved from [30.06.2015].
  • Ponemon Institute (2011). The True Cost of Compliance, A Benchmark Study of Multinational Organizations. Retrieved from [30.06.2015].
  • Silverman, M. (2008). Compliance management for Public, Private, and Nonprofit Organizations. New York: Mc Graw Hill.
  • The Institute of Internal Auditors (2012). Global Technology Audit Guide, Information Technology Risk and Controls. [2nd Edition]. Retrieved from [30.06.2015].
  • Verizon, 2013: 2013 Data Breach Investigation Report, , 30/06/2015

Document Type

Publication order reference

Identifiers

YADDA identifier

bwmeta1.element.doi-10_1515_ptse-2016-0008
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.