1997 journal article

International Cooperation: Lessons in Management Education

Management, 6.

By: J. Aram, R. Clark & I. Weiss

Source: NC State University Libraries
Added: December 15, 2020

1996 journal article

Trends in international business thought and literature: Traversing the path to insolvency: Lessons from an international alliance in management education

The International Executive, 38(2), 273–286.

By: J. Aram*, R. Clarke* & I. Weiss*

Source: NC State University Libraries
Added: December 15, 2020

1993 journal article

How to Integrate Software Without A Hitch

Journal of Accounting, 175(4), 67.

By: I. Weiss & D. Asaithambi

Source: NC State University Libraries
Added: August 16, 2021

1992 journal article

Information Resource Management within Multinational Corporations: A Cross-Cultural Comparison of the U.S and Japan

International Information Systems, 1(4).

By: I. Weiss, R. Nelson & K. Yamazaki

Source: NC State University Libraries
Added: August 16, 2021

1989 journal article

Organizational connectivity systems: is function being effectively managed?

ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 20(1), 16–20.

By: D. Adams & I. Weiss*

TL;DR: The function of the information systems (IS) department traditionally has been data stewardship, but as systems development an d processing moves out to the functional areas, IS ha s become more delivery oriented. (via Semantic Scholar)
Source: Crossref
Added: April 8, 2021

1989 journal article

The Organizational Exchange of Talent: Rotating MIS Professionals into User Areas

The Journal of Information Systems, 4(1).

By: I. Weiss & M. Lacity

Source: NC State University Libraries
Added: August 16, 2021

1988 journal article

Managing End-User Computing as a Value-Added Resource

Journal of Information Systems Management, 5(3), 26–35.

By: M. Alavi, R. Nelson & I. Weiss*

TL;DR: End-user computing and its associated technologies should be viewed as a set of distinct value activities — that is, activities that contribute to an organizations competitive advantage. (via Semantic Scholar)
Source: Crossref
Added: April 8, 2021

1988 journal article

Managing the application maintenance function: Problems, issues and opportunities

ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 19(3-4), 42–48.

By: L. van Over & I. Weiss*

TL;DR: The objective of the session was to establish the key elements of a mission statement for the information system (IS) maintenanc e function and list a set of critical success factors for the maintenance functio n identified by the group. (via Semantic Scholar)
Source: Crossref
Added: April 8, 2021

1987 journal article

Strategies for End-User Computing: An Integrative Framework

Journal of Management Information Systems, 4(3), 28–49.

By: M. Alavi*, R. Nelson* & I. Weiss*

TL;DR: This paper develops a framework consisting of five core strategies or organizational postures vis-a-vis end-user computing (euc), following a descrip- tion of each of the strategies. (via Semantic Scholar)
Source: Crossref
Added: April 8, 2021

1987 conference paper

The Management of End-User Computing: Critical Attributes for Organizational Success

Proceedings of the 20th Annual meeting of the Hawaii International Conference on Systems Sciences.

By: I. Weiss, M. Alavi & R. Nelson

Source: NC State University Libraries
Added: August 16, 2021

1986 journal article

The CISA Examination: A Critique

EDP Auditor, 1.

By: I. Weiss & G. Helms

Source: NC State University Libraries
Added: December 27, 2021

1986 journal article

The Cost of Internally Developed Applications: Analysis of Problems and Cost Control Methods

Journal of Management Information Systems, 3(2), 5–21.

By: G. Helms & I. Weiss*

TL;DR: The research reported in this article indicates that few of these methods have assisted in bringing costs under control and actually some have caused greater cost overruns. (via Semantic Scholar)
Source: Crossref
Added: April 8, 2021

1985 journal article

Look Before You Leap on the Micro-Computer Bandwagon

Computers and Accounting, 1(2).

By: I. Weiss & D. Asaithambi

Source: NC State University Libraries
Added: December 27, 2021

1985 journal article

Managing the Risks Associated with End-User Computing

Journal of Management Information Systems, 2(3), 5–20.

By: M. Alavi & I. Weiss*

TL;DR: Generic controls are introduced that address each of the risks of euc associated with different stages of the end-user applications life cycle and allow euc management to select those most appropriate to their euc environment. (via Semantic Scholar)
Source: Crossref
Added: April 8, 2021

1984 journal article

Application software maintenance: can it be controlled?

ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 16(2), 16–18.

By: G. Helms* & I. Weiss*

TL;DR: Numerous studies have found that subsequent application software maintenance requires a significant amount of a data processing department's resources. (via Semantic Scholar)
Source: Crossref
Added: April 8, 2021

1984 book

Certification of Information Systems Auditors: An Update

Pennsauken, NJ: Auerbach Publishers.

By: I. Weiss

Source: NC State University Libraries
Added: December 27, 2021

1984 book

The CISA Examination

Auditing Computer Systems, FAIM Publications.

By: I. Weiss

Source: NC State University Libraries
Added: December 27, 2021

1983 journal article

Audit Involvement in the Systems Development Life Cycle

The Internal Auditor, XL(6).

By: I. Weiss & G. Helms

Source: NC State University Libraries
Added: December 27, 2021

1983 book

Practice Problem in Managerial Accounting

United States: Clean As Air Systems, Dame Publications.

By: I. Weiss & M. Friedman

Source: NC State University Libraries
Added: December 27, 2021

1982 journal article

Compilation and Review Reports

The Woman CPA, 44(4).

By: I. Weiss, T. Edmonds & M. Porter

Source: NC State University Libraries
Added: December 27, 2021

1982 journal article

Critical Factors in the Selection and Use of Financial Planning Systems

MAS Communications, 6(2).

By: I. Weiss

Source: NC State University Libraries
Added: December 27, 2021

1982 journal article

Current Information Systems Auditor Involvement in Systems Development: A Survey

The EDP Auditor.

By: I. Weiss & G. Helms

Source: NC State University Libraries
Added: December 27, 2021

1982 book

Practice Problem in Cost Accounting

United States: Hard B Nails Company, Dame Publications.

By: I. Weiss & M. Friedman

Source: NC State University Libraries
Added: December 27, 2021

1982 journal article

The Certified Information Systems Auditor Examination: A Description of Exam Development and Analysis of Result

The EDP Auditor.

By: I. Weiss

Source: NC State University Libraries
Added: December 27, 2021

1982 journal article

The Implication of Changes in U.S. Financial Reporting Standards on Great Britain

Certified Accountant.

By: I. Weiss, T. Edmonds & M. Porter

Source: NC State University Libraries
Added: December 27, 2021

1982 journal article

Why do Management Accountants Feel Dislike?

Management Accounting, LXIII(9).

By: I. Weiss, R. Seiler & D. Pearson

Source: NC State University Libraries
Added: December 27, 2021

1981 journal article

Complimentary EDP Audit Technique

The EDP Auditor.

By: I. Weiss & K. Boockholdt

Source: NC State University Libraries
Added: December 28, 2021

1981 journal article

Do Bankers and CPAs Have Different Views of Reports on Financial Statements?

The Journal of Commercial Bank Lending, 62(10).

By: I. Weiss, T. Edmonds & M. Porter

Source: NC State University Libraries
Added: December 27, 2021

1981 journal article

Information Systems and Quantitative Methods in Accounting: An Analysis

MAS Communications, 5(3).

By: M. Friedman & I. Weiss

Source: NC State University Libraries
Added: December 27, 2021

1981 book review

Management Planning and Control of Information Systems

[Review of Management Planning and Control of Information Systems]. Journal of Accountancy, 151(1), 86.

By: I. Weiss

Source: NC State University Libraries
Added: December 27, 2021

1981 journal article

Professional Certification Programs

Personnel Administrator, 26(4).

By: I. Weiss & A. Young

Source: NC State University Libraries
Added: December 28, 2021

1980 journal article

Auditability of Software: A Survey of Techniques and Costs

MIS Quarterly, 4(4), 39–50.

By: I. Weiss*

author keywords: EDP auditing; auditability of software; software integrity; software reliability
Source: Crossref
Added: April 8, 2021

1980 conference paper

Computer Utilization by Accounting Firms: A Survey

1980 Proceedings Southwest American Accounting Association. Presented at the 1980 Southwest American Accounting Association, San Antonio, Texas.

Ira Weiss

Event: 1980 Southwest American Accounting Association at San Antonio, Texas

Source: NC State University Libraries
Added: December 28, 2021

1980 journal article

Computing Within the Accounting Curriculum: A Methodology for Integration

Interface, 2(1).

By: I. Weiss & M. Friedman

Source: NC State University Libraries
Added: December 28, 2021

1980 journal article

Cumulative Financial Statements

The Accounting Review, LV(3).

By: I. Weiss, R. Brief & B. Merino

Source: NC State University Libraries
Added: December 28, 2021

1979 conference paper

Computer Based Auditing: Where is the University?

EDP Audit Symposium 1978 Proceedings. Presented at the EDP Audit Symposium, Amherst, Massachusetts.

By: I. Weiss

Event: EDP Audit Symposium at Amherst, Massachusetts

Source: NC State University Libraries
Added: December 28, 2021

1979 chapter

The Vulnerability of Computer Auditing

In T. D. Hubbard, D. J. Ellison, & R. H. Strawser (Eds.), Readings and Cases in Auditing. Houston, Texas: Dame Publications.

By: I. Weiss & B. Lientz

Ed(s): T. Hubbard, D. Ellison & R. Strawser

Source: NC State University Libraries
Added: December 28, 2021

1978 journal article

Trade-offs of secure processing in centralized versus distributed networks

Computer Networks, 2(1), 35–43.

By: B. Lientz* & I. Weiss*

TL;DR: Simulation results indicate that economies of scale shift from centralized to semicentralized configurations for a fixed I/O bound workload when throughput degrades, due to the imposition of security measures. (via Semantic Scholar)
Source: Crossref
Added: April 8, 2021

1977 chapter

On the Evaluation of Reliability and Security Measures in a Computer Network

In M. D. Abrams (Ed.), Tutorial on Computer Security and Integrity. Long Beach, California: IEEE Computer Society.

By: I. Weiss & B. Lientz

Ed(s): M. Abrams

Source: NC State University Libraries
Added: December 28, 2021

1977 journal article

Vulnerability of Computer Auditing

CPA Journal, XLVII(3).

By: I. Weiss & B. Lientz

Source: NC State University Libraries
Added: December 28, 2021

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.