INTERNE REVISIONdigital
  • Kontakt
  • |
  • Impressum
  • |
  • Datenschutz
  • |
  • AGB
  • |
  • Hilfe
Hilfe zur Suche
Ihr Warenkorb ist leer
Login | Registrieren
Sie sind Gast
  • Home
    • Nachrichten
    • Neu auf
    • Top Themen
  • Inhalt
    • eJournal
    • eBooks
    • Mediathek
    • Lexikon
    • Partner-Know-how
    • Standards/Methoden
  • Service
    • Infodienst
    • Kontakt
    • Stellen
    • Veranstaltungen
  • Bestellen
  • Über
    • Kurzporträt
    • Mediadaten
    • Benutzerhinweise

Suche verfeinern

Nutzen Sie die Filter, um Ihre Suchanfrage weiter zu verfeinern.

… nach Suchfeldern

  • Inhalt (1284)
  • Titel (13)

… nach Dokumenten-Typ

  • eBook-Kapitel (669)
  • eJournal-Artikel (556)
  • News (32)
  • Partner-KnowHow (12)
  • Lexikon (8)
  • eBooks (8)

… nach Jahr

  • 2025 (27)
  • 2024 (39)
  • 2023 (34)
  • 2022 (50)
  • 2021 (52)
  • 2020 (44)
  • 2019 (57)
  • 2018 (64)
  • 2017 (58)
  • 2016 (43)
  • 2015 (120)
  • 2014 (103)
  • 2013 (57)
  • 2012 (74)
  • 2011 (71)
  • 2010 (138)
  • 2009 (122)
  • 2008 (29)
  • 2007 (41)
  • 2006 (17)
  • 2005 (24)
  • 2004 (21)

Alle Filter anzeigen

DIIR

Logo DIIR

INTERNE REVISIONdigital Partner

Logo BRL

INTERNE REVISIONdigital Partner

zum Puhnani Podcast

INTERNE REVISIONdigital

ist ein Angebot des

Erich Schmidt Verlag GmbH & Co. KG
Instagram LinkedIn X Xing YouTube

Am häufigsten gesucht

Governance Meldewesen Prüfung Datenschutz Checklisten cobit Management Interne Grundlagen der Internen Revision Datenanalyse Revision Standards Auditing Leitfaden zur Prüfung von Projekten Risk Ziele und Aufgaben der Internen Revision Funktionstrennung

Suchergebnisse

1285 Treffer, Seite 10 von 129, sortieren nach: Relevanz Datum
  • eBook-Kapitel aus dem Buch Elektronische Rechnungsstellung und digitale Betriebsprüfung

    EG-rechtliche Vorgaben

    Peter Eller
    …entwickeln, dies in erster Linie mit Hilfe der Informationstechnologie. 2. Richtlinien im Umsatzsteuerrecht 16Die 6. EG-Umsatzsteuer-Richtlinie ist die Magna…
  • eJournal-Artikel aus "Zeitschrift Interne Revision" Ausgabe 1/2015

    Continuous Auditing zwischen Theorie und Praxis

    Bewertung der praktischen Bedeutung des Continuous Auditing-Ansatzes für die Internen Revision
    M.Sc. Artur Kalinichenko, Prof. Dr. Marc Eulerich
    …Entwicklung der Unternehmenswelt stellen. Hierzu zählt nicht nur die Prüfung von IT-Systemen, sondern auch die Nutzung von Informationstechnologie zur… …soll. 7 Die Informationstechnologie, deren rasante Entwicklung in den letzten Jahrzehnten sowohl Notwendigkeit als auch Voraussetzung für kontinuierliche… …Continuous Auditing, IT Audit, 6, Available online: http://www.theiia.org/itaudit/index. cfm?fuseaction=forum&fid=5458. Rezaee, Zabihollah/Sharbatioghlie…
    Alle Treffer im Inhalt anzeigen
  • eJournal-Artikel aus "Zeitschrift Interne Revision" Ausgabe 5/2008

    Modell zur Visualisierung revisionsspezifischer Potenzialbereiche – mit dem Ziel eines einprägsamen und überzeugenden unternehmensinternen Marketings

    Dr. Michael Schneider, Wolf-Christian Bennecke
    …., Sydney (Australien). This paper shows a method to improve perception and standing of the internal audit department of any company. It is an extended… …more effective and efficient? The model can also be used to visualize findings and recommendations identified during specific audits. Using it day-to-day… …visualisieren lassen. Visualisierung ist in der Regel keine der Stärken einer Internen Revision. Auch hier gilt „Keep it short and simple“. Doch vor die griffige…
    Alle Treffer im Inhalt anzeigen
  • eBook-Kapitel aus dem Buch Accounting Fraud

    Case 15: Xerox (2002)

    Prof. Dr. Klaus Henselmann, Dr. Stefan Hofmann
    …copier). Xerox was defined as “the copier company” in its very DNA, and it was even in the dictionary as a syno- nym for photocopy. The copiers were “money… …machines” nonpareil. The 1990s, however, would be a time of crisis for the company. It was confronting intense product and price competition from its… …focus on high-margin, high-end copying equipment. To succeed in the new digital age, the company needed to reinvent itself. However, it was far better at… …management. In May 2000, Xerox made a public announcement that it had discovered accounting irregularities associated with its Mexican operations. CEO… …outside auditors. KPMG was so concerned about ROE and margin normalization that it internally referred to these methodologies as “half-baked revenue… …“Rank reserve” for items unrelated to any risks arising from the acquisition. It continued to draw down on this reserve for unrelated expenses each… …quarter until it was exhausted at the end of 1999. Internally, Xerox regarded the reserve as “interdivisional opportunity” or “unencumbered reserve”… …receivables at a deep discount. In other words, it sold its future stream of cash at far less than its full value to realize instant cash.) – In certain… …the lease term. US-GAAP prohibited increasing the estimated residual value for any reason after it was first established. However, Xerox often… …actions to “close the gap” between its actual results and the numbers it wished to and did report to the public. Yet the company continued to portray…
    Alle Treffer im Inhalt anzeigen
  • eBook-Kapitel aus dem Buch Accounting Fraud

    Case 26: Juergen Schneider (Germany, 1994)

    Prof. Dr. Klaus Henselmann, Dr. Stefan Hofmann
    …behaviour as a serious and important businessman. It also appeared that they were seduced into taking the risk by the promise of big profits. The scam ran… …verified something as basic as the size of the property it was lending on. Accounting Fraud in European Companies 166 Schneider also appeared… …explic- itly whether there were any supplementary contracts. Deutsche Bank claimed that it was the victim of systematic fraud. Hilmar Kopper, at the… …the affair proved to be very embarrassing for the bank. The report from the auditors, Wollert-Ellmendorff, supported Deutsche Bank’s argument that it… …had been crimi- nally deceived. But it also made clear that there had been complacency in the deal- ings with the property tycoon. There were several… …ensure that it was technically possible to construct a particular building and that the building costs were in relation to what was required. – All… …asked for a “transitional loan” in a letter received on April 7, 1994. It was in the spring of this year that Schneider began to face a string of… …it is possible that one individual can collect such a volume of debt in such a short time”. Schnei- der was arrested in Miami, Florida, in January… …1995. When he was returned to Germany in February 1996, the mass-circulation newspapers made it the big story of the day. “Hello, Mr. Schneider, Your… …just before it became impossible to stave off his creditors. The German media portrayed Juergen Schneider as a sophisticated con artist. But…
    Alle Treffer im Inhalt anzeigen
  • eBook-Kapitel aus dem Buch Accounting Fraud

    Case 18: Qwest Communications International (2002)

    Prof. Dr. Klaus Henselmann, Dr. Stefan Hofmann
    …capacity as an investment. Doing so had the effect of inflating reve- nues, making it seem as if the communications markets were far more robust than they… …aries even further: instead of accounting for revenue from these deals over the life of the contracts, Qwest accounted for much of it upfront, producing… …of USD 1.9 billion in August 2002, a 98% decline for the period. In September 2002, the company announced that it would restate its financial… …Wall Street that it used any means necessary to meet its “outrageously optimistic revenue projec- tions”. “Qwest senior management created a… …employees inter- nally referred to such transactions as “one hit wonders”). When senior management realized that it could not meet the projected growth… …through increases in recurring revenue, it directed the sale of portions of Qwest’s fiber optic network originally held for own use. Thus, Qwest began… …fourth- largest long-distance telephone service provider, he had been ultimately swayed by greed. In 1999 and 2000, it had become apparent that the revenue…
    Alle Treffer im Inhalt anzeigen
  • eBook-Kapitel aus dem Buch Accounting Fraud

    Case 23: Computer Associates International (2004)

    Prof. Dr. Klaus Henselmann, Dr. Stefan Hofmann
    …corporations used its software products to run and manage their IT technology. At the time, Islandia, New York-based Computer Associates was the world’s… …began slowly (mainly because of the obstruction led by Computer Asso- ciates’ senior management), it steadily gained momentum in 2004. In January 2004… …participated in a scheme to inflate revenues and then lied to cover it up. He said senior management pressured him to lie, although he didn’t name names. In… …after the end of the quarter so that revenues could be counted a quarter earlier than it ought to have been. In all, the company prematurely reported… …, Accounting Fraud in U.S. Companies 150 when the company reported USD 557 million in revenues beyond the USD 1.047 billion it could properly claim. Thus… …kept scoring until it had all the points it needed to make every quarter look like a win.” Employees at Computer Associates also called the Extended… …million soft- ware license deal with a nearly insolvent customer. It then backdated the contract so it could be recorded in the prior quarter. In the next… …quarter, knowing that it would not be able to collect on the contract, Computer Associates reversed its internal records but did not publicly restate… …the first quarter of fiscal year 2001, it fell short of the Wall Street earnings estimate, and the share price dropped by more than 43% in a single day… …. This was only the second time in the company’s history that it missed Wall Street estimates. Until June 2000, Computer Associates also…
    Alle Treffer im Inhalt anzeigen
  • eBook-Kapitel aus dem Buch Risk Management Practices of SMEs

    Types of Risk Management Practices Derived from Questionnaire and Interview Scoring

    Thomas Henschel
    …(Section 6.1). It draws on the type terminology of Miles and Snow (1978, 2003), by relating a type with certain sets of scoring figures. After the… …. The Miles and Snow approach has inspired the author of the present thesis to make it applicable for the identification of types of risk management… …terns (Section 3.5). Similarity of scoring patterns is not defined in a mathe- matical way; it is due to a classification by the investigator, according… …prepared externally. No sophisti- cated perform- ance meas- urement tools. Identifies only very specific risks, which it is familiar with. Short-term risk… …strategy at all since the business sector is declining and no improvement is in sight. The companies are looking for new business opportunities. It would be… …adapt is by modifying the price. It is noticeable that banks put an increased pressure on reactors to improve their management systems. Business… …planning. All that they actually execute is a rudimentary annual sales plan. In preparing it, the data from the preceding year’s annual financial statement… …contingencies are defective. Where an contingency plan does exist, as a rule it only concerns the data proc- essing systems. Project Risk Management Reactors do… …, although it is carried out in a very informal manner. In general, a Types of Risk Management Practices 212 written documentation of the risks being… …. Also some consid- eration of strategic risks. Without con- sidering all risks, it can rush into costly failures. Risk assess- ment fre- quency and time…
    Alle Treffer im Inhalt anzeigen
  • eBook-Kapitel aus dem Buch Accounting Fraud

    Case 24: AIG (2005)

    Prof. Dr. Klaus Henselmann, Dr. Stefan Hofmann
    …“Hank” Greenberg was credited with vastly expanding the company, turning it into one of the world’s largest and most revered insurance firms. For decades… …AIG were three primary areas of fraud (see SEC 2009): – Sham reinsurance transactions with General Re Corp. (“Gen Re”), in order to make it appear… …that AIG had increased its general loss reserves, when in fact it had not – A deal with an offshore special purpose entity called Capco Reinsurance Co… …boosted AIG’s net investment income and allowed it to improperly recognize capital gains Accounting Fraud in U.S. Companies 156 The “Gen… …it appear that Gen Re was paying AIG to share some of its claim risk. But investigators found no evidence of risk transfer from Gen Re to AIG. In… …analysts. The move helped AIG to persuade analysts that it was in better shape to pay claims, and helped to increase its share price. Without the phony… …. The SEC complaint said that AIG even lent the investors the money, hiding the loan by channelling it through various AIG subsidiaries. Using Capco to… …transactions in which it – appeared to redeem a portion of its interest in certain hedge funds back to the funds, – recorded the resulting cash payments… …financial results.” According to Spitzer, CFO Howard Smith ordered so-called “top-level adjustments” to AIG’s financial statements each quarter, to help it… …, after Greenberg and Smith were forced out by the board, AIG announced that it would restate many of its prior transactions. In addition, AIG stated that…
    Alle Treffer im Inhalt anzeigen
  • eBook-Kapitel aus dem Buch IT-Compliance

    Wesentliche Maßnahmen der IT-Compliance

    Dr. Michael Rath, Rainer Sponholz
    …, Center for Information Systems Research (CISR), Juni 2006334 In diesem Kapitel werden die wesentlichen Schutzmaßnahmenbereiche der IT- Compliance gemäß… …IT-Compliance-Anforderungen des UFC. 342 O.V.: „IT Impact Zones: How the information in the UCF is organized“; https://support… …gefordert werden. 354 Klotz, Michael: „Das Unified Compliance Framework (UCF) – Hilfestellung für die IT- Compliance“, IT-Governance 18, Juli 2014, S. 25… …. 353 „IT Impact Zones: How the information in the UCF is organized“; https://support… …Impact Zones stellen für die Ersteller des UCF dreizehn „natürliche“ Prozess- oder Kon- trollbereiche der IT dar. Die folgende Aufzählung listet die… …Sicherheit des IT- Betriebs und dessen Überwachung am Wichtigsten sind. Die nächsten wichtigen Bereiche umfassen Kontrollen der Entwicklung sowie der… …Informationsschutzes fallen alle Anforderungen und Maß- nahmen, die darauf abzielen, dass nur Personen Zugriff auf Informationen in IT- Systemen haben, die diese auch… …. Computerviren). Zu 4.Prozessstabilität und -sicherheit der IT-Prozesse Prozessstabilität und Prozesssicherheit in der Informationstechnologie sind der Schlüssel… …Hinblick auf IT-Sicherheit Der Mensch ist eine sehr große, wenn nicht gar die größte Bedrohung für ein IT- System. Neben dem reinen „Human Resources… …der Beitrag der Informationstechnologie zur Umset- zung von Geschäftsstrategien werden dem Bereich der IT-Governance und auch der IT-Compliance…
    Alle Treffer im Inhalt anzeigen
◄ zurück 8 9 10 11 12 weiter ►
  • Kontakt
  • |
  • Impressum
  • |
  • Datenschutz
  • |
  • Cookie-Einstellung
  • |
  • AGB
  • |
  • Hilfe

Die Nutzung für das Text und Data Mining ist ausschließlich dem Erich Schmidt Verlag GmbH & Co. KG vorbehalten. Der Verlag untersagt eine Vervielfältigung gemäß §44b UrhG ausdrücklich.
The use for text and data mining is reserved exclusively for Erich Schmidt Verlag GmbH & Co. KG. The publisher expressly prohibits reproduction in accordance with Section 44b of the Copy Right Act.

© 2025 Erich Schmidt Verlag GmbH & Co. KG, Genthiner Straße 30 G, 10785 Berlin
Telefon: +49 30 25 00 85-0, Telefax: +49 30 25 00 85-305 E- Mail: ESV@ESVmedien.de
Erich Schmidt Verlag        CONSULTINGBAY        Zeitschrift Interne Revision

Wir verwenden Cookies.

Um Ihnen ein optimales Webseitenerlebnis zu bieten, verwenden wir Cookies. Mit dem Klick auf „Alle akzeptieren“ stimmen Sie der Verwendung von allen Cookies zu. Für detaillierte Informationen über die Nutzung und Verwaltung von Cookies klicken Sie bitte auf „Anpassen“. Mit dem Klick auf „Cookies ablehnen“ untersagen Sie die Verwendung von zustimmungspflichtigen Cookies. Sie haben die Möglichkeit, Ihre Einstellungen jederzeit individuell anzupassen. Weitere Informationen finden Sie in unserer Datenschutzerklärung.


Anpassen Cookies ablehnen Alle akzeptieren

Cookie-Einstellungen individuell konfigurieren

Bitte wählen Sie aus folgenden Optionen:




zurück