Tables
3.1
The OSI and TCP/IP reference models
3.2
Examples of computer hardware
3.3
Programming language categories
4.1
Outline of a Software Requirements Specification document
6.1
Contextual factors of the BPM context and potential changes through Digital Transformation
6.2
Diagonal positioning of IT controls against general IT management functions
6.3
Basic principles for designing controls for digital business objects and their challenges through Digital Transformation
6.4
Example of an operational procedures documentation of security concept implementation
10.1
Risk factors
13.1
Opportunities with Big Data for management accounting
13.2
Challenges with Big Data for management accounting
14.1
Principles of good practice in investment appraisal
14.2
Integrated reporting framework
14.3
The principles of IR
14.4
IIRC definitions of the six capitals
15.1
Data security and quality objectives
17.1
Compliance effort summary
17.2
Summary of controls by type
19.1
List of interviewees
20.1
Conflict of visions on Digital Natives
21.1
Categories and determinants of user resistance in information systems projects
21.2
Software-as-a-Service security issues and challenges
21.3
High-level contractual issues and challenges in cloud computing agreements