Ira Weiss Aram, J., Clark, R., & Weiss, I. (1997). International Cooperation: Lessons in Management Education. Management, 6. Aram, J. D., Clarke, R., & Weiss, I. R. (1996). Trends in international business thought and literature: Traversing the path to insolvency: Lessons from an international alliance in management education. The International Executive, 38(2), 273–286. https://doi.org/10.1002/tie.5060380207 Weiss, I., & Asaithambi, D. (1993). How to Integrate Software Without A Hitch. Journal of Accounting, 175(4), 67. Weiss, I., Nelson, R. R., & Yamazaki, K. (1992). Information Resource Management within Multinational Corporations: A Cross-Cultural Comparison of the U.S and Japan. International Information Systems, 1(4). Adams, D. A., & Weiss, I. R. (1989). Organizational connectivity systems: is function being effectively managed? ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 20(1), 16–20. https://doi.org/10.1145/71232.71236 Weiss, I., & Lacity, M. (1989). The Organizational Exchange of Talent: Rotating MIS Professionals into User Areas. The Journal of Information Systems, 4(1). Alavi, M., Nelson, R. R., & Weiss, I. R. (1988). Managing End-User Computing as a Value-Added Resource. Journal of Information Systems Management, 5(3), 26–35. https://doi.org/10.1080/07399018808962923 van Over, L. D., & Weiss, I. R. (1988). Managing the application maintenance function: Problems, issues and opportunities. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 19(3-4), 42–48. https://doi.org/10.1145/65766.65772 Alavi, M., Nelson, R. R., & Weiss, I. R. (1987). Strategies for End-User Computing: An Integrative Framework. Journal of Management Information Systems, 4(3), 28–49. https://doi.org/10.1080/07421222.1987.11517799 Weiss, I., Alavi, M., & Nelson, R. R. (1987). The Management of End-User Computing: Critical Attributes for Organizational Success. Proceedings of the 20th Annual meeting of the Hawaii International Conference on Systems Sciences. Weiss, I., & Helms, G. L. (1986). The CISA Examination: A Critique. EDP Auditor, 1. Helms, G. L., & Weiss, I. R. (1986). The Cost of Internally Developed Applications: Analysis of Problems and Cost Control Methods. Journal of Management Information Systems, 3(2), 5–21. https://doi.org/10.1080/07421222.1986.11517759 Weiss, I., & Asaithambi, D. (1985). Look Before You Leap on the Micro-Computer Bandwagon. Computers and Accounting, 1(2). Alavi, M., & Weiss, I. R. (1985). Managing the Risks Associated with End-User Computing. Journal of Management Information Systems, 2(3), 5–20. https://doi.org/10.1080/07421222.1985.11517734 Helms, G. L., & Weiss, I. R. (1984). Application software maintenance: can it be controlled? ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 16(2), 16–18. https://doi.org/10.1145/1040688.1040691 Weiss, I. (1984). Certification of Information Systems Auditors: An Update. Pennsauken, NJ: Auerbach Publishers. Weiss, I. (1984). The CISA Examination. Auditing Computer Systems, FAIM Publications. Weiss, I., & Helms, G. (1983). Audit Involvement in the Systems Development Life Cycle. The Internal Auditor, XL(6). Weiss, I., & Friedman, M. E. (1983). Practice Problem in Managerial Accounting. United States: Clean As Air Systems, Dame Publications. Weiss, I., Edmonds, T., & Porter, M. (1982). Compilation and Review Reports. The Woman CPA, 44(4). Weiss, I. (1982). Critical Factors in the Selection and Use of Financial Planning Systems. MAS Communications, 6(2). Weiss, I., & Helms, G. (1982). Current Information Systems Auditor Involvement in Systems Development: A Survey. The EDP Auditor. Weiss, I., & Friedman, M. E. (1982). Practice Problem in Cost Accounting. United States: Hard B Nails Company, Dame Publications. Weiss, I. (1982). The Certified Information Systems Auditor Examination: A Description of Exam Development and Analysis of Result. The EDP Auditor. Weiss, I., Edmonds, T., & Porter, M. (1982). The Implication of Changes in U.S. Financial Reporting Standards on Great Britain. Certified Accountant. Weiss, I., Seiler, R., & Pearson, D. (1982). Why do Management Accountants Feel Dislike? Management Accounting, LXIII(9). Weiss, I., & Boockholdt, K. (1981). Complimentary EDP Audit Technique. The EDP Auditor. Weiss, I., Edmonds, T., & Porter, M. (1981). Do Bankers and CPAs Have Different Views of Reports on Financial Statements? The Journal of Commercial Bank Lending, 62(10). Friedman, M. E., & Weiss, I. (1981). Information Systems and Quantitative Methods in Accounting: An Analysis. MAS Communications, 5(3). Weiss, I. (1981). Management Planning and Control of Information Systems [Review of Management Planning and Control of Information Systems]. Journal of Accountancy, 151(1), 86. Weiss, I., & Young, A. (1981). Professional Certification Programs. Personnel Administrator, 26(4). Weiss, I. R. (1980). Auditability of Software: A Survey of Techniques and Costs. MIS Quarterly, 4(4), 39–50. https://doi.org/10.2307/248959 Computer Utilization by Accounting Firms: A Survey. (1980). 1980 Proceedings Southwest American Accounting Association. Presented at the 1980 Southwest American Accounting Association, San Antonio, Texas. Weiss, I., & Friedman, M. E. (1980). Computing Within the Accounting Curriculum: A Methodology for Integration. Interface, 2(1). Weiss, I., Brief, R., & Merino, B. (1980). Cumulative Financial Statements. The Accounting Review, LV(3). Weiss, I. (1979). Computer Based Auditing: Where is the University? EDP Audit Symposium 1978 Proceedings. Presented at the EDP Audit Symposium, Amherst, Massachusetts. Weiss, I., & Lientz, B. (1979). The Vulnerability of Computer Auditing. In T. D. Hubbard, D. J. Ellison, & R. H. Strawser (Eds.), Readings and Cases in Auditing. Houston, Texas: Dame Publications. Lientz, B. P., & Weiss, I. R. (1978). Trade-offs of secure processing in centralized versus distributed networks. Computer Networks, 2(1), 35–43. https://doi.org/10.1016/0376-5075(78)90037-5 Weiss, I., & Lientz, B. P. (1977). On the Evaluation of Reliability and Security Measures in a Computer Network. In M. D. Abrams (Ed.), Tutorial on Computer Security and Integrity. Long Beach, California: IEEE Computer Society. Weiss, I., & Lientz, B. P. (1977). Vulnerability of Computer Auditing. CPA Journal, XLVII(3).