
Dr. Robert E Davis
Robert E. Davis, MBA, DBA, CISA, CICA obtained a Bachelor of Business Administration in Accounting and Business Law, a Master of Business Administration in Management Information Systems, and a Doctor of Business Administration in Information Systems Management from Temple, West Chester, and Walden University; respectively. In addition, during his twenty years of involvement in education, Robert acquired Postgraduate and Professional Technical licenses in Computer Science and Computer Systems Technology. Robert also obtained the Certified Information Systems Auditor (CISA) certificate — after passing the 1988 Information Systems Audit and Control Association’s rigorous three hundred and fifty multiple-choice questions examination; and was conferred the Certified Internal Controls Auditor (CICA) certificate by the Institute for Internal Controls.
Since starting his career as an information systems (IS) auditor, Robert has provided data security consulting and IS auditing services to the United States Securities and Exchange Commission, United States Enrichment Corporation, Raytheon Company, United States Interstate Commerce Commission, Dow Jones & Company and Fidelity/First Fidelity (Wells Fargo) corporations as well as other organizations; in staff through management positions.
Prior to engaging in the practice of IS auditing and information security consulting; Robert (as a corporate employee) provided inventory as well as general accounting services to Philip Morris, USA and general accounting services to Philadelphia National Bank (Wells Fargo). Furthermore, he has prior experience as a freelance writer of IT audit and information security training material. Specifically, his published credits include:
•Assuring Information Security
•Assuring IT Governance
•Assuring IT Legal Compliance
•Ensuring Information Assets Protection
•IT Auditing: An Adaptive System
•IT Auditing: Assuring Information Assets Protection
•IT Auditing: Business Continuity and Disaster Recovery
•IT Auditing: Information Assets Protection
•IT Auditing: Information Security Governance
•IT Auditing: Irregular and Illegal Acts
•IT Auditing: IT Governance
•IT Auditing: IT Service Delivery and Support
•IT Auditing: Systems and Infrastructure Life Cycle Management
•IT Auditing: The Process
Robert has authored articles addressing IT issues for The Institute of Internal Auditors, IT Governance LTD and ISACA as well as peer reviewed Carnegie Mellon University’s technical report “Comparing eSCM-SP v2 and COBIT” and five chapters of Bloomsbury’s “Effective Auditing for Corporates”.
Dr. Davis is a member of the American Association of University Professors and The Institute for Internal Controls. He is also a college management information systems, computer science and mathematics instructor, having previously taught at Temple University, Cheyney University and Bryant & Stratton College.
In regards to training individuals in the information systems audit process; he has provided instruction to the Data Processing Management Association, ISACA-Philadelphia Chapter CISA Review Course participants, 3rd Annual Securasia Congress delegates and an Internet CISA study group.
Based on his accomplishments, Robert has been featured in Temple University’s Fox School of Business and Management Alumni Newsletter as well as The Institute for Internal Controls e-newsletter. Furthermore, he is listed as: a Temple University Master of Science in IT Auditing and Cyber-Security Advisory Council member, an IT Governance LTD expert panel member, a leading expert and specialist by The Compliance Authority as well as an International Association of IT Governance Standards honorary member. Dr. Davis is also an invited Golden Key International Honour Society and Delta Mu Delta International Honor Society member.
Supervisors: Dr. Lazo, Dr. Klein, and Dr. Taylor
Phone: 804.437.1930
Since starting his career as an information systems (IS) auditor, Robert has provided data security consulting and IS auditing services to the United States Securities and Exchange Commission, United States Enrichment Corporation, Raytheon Company, United States Interstate Commerce Commission, Dow Jones & Company and Fidelity/First Fidelity (Wells Fargo) corporations as well as other organizations; in staff through management positions.
Prior to engaging in the practice of IS auditing and information security consulting; Robert (as a corporate employee) provided inventory as well as general accounting services to Philip Morris, USA and general accounting services to Philadelphia National Bank (Wells Fargo). Furthermore, he has prior experience as a freelance writer of IT audit and information security training material. Specifically, his published credits include:
•Assuring Information Security
•Assuring IT Governance
•Assuring IT Legal Compliance
•Ensuring Information Assets Protection
•IT Auditing: An Adaptive System
•IT Auditing: Assuring Information Assets Protection
•IT Auditing: Business Continuity and Disaster Recovery
•IT Auditing: Information Assets Protection
•IT Auditing: Information Security Governance
•IT Auditing: Irregular and Illegal Acts
•IT Auditing: IT Governance
•IT Auditing: IT Service Delivery and Support
•IT Auditing: Systems and Infrastructure Life Cycle Management
•IT Auditing: The Process
Robert has authored articles addressing IT issues for The Institute of Internal Auditors, IT Governance LTD and ISACA as well as peer reviewed Carnegie Mellon University’s technical report “Comparing eSCM-SP v2 and COBIT” and five chapters of Bloomsbury’s “Effective Auditing for Corporates”.
Dr. Davis is a member of the American Association of University Professors and The Institute for Internal Controls. He is also a college management information systems, computer science and mathematics instructor, having previously taught at Temple University, Cheyney University and Bryant & Stratton College.
In regards to training individuals in the information systems audit process; he has provided instruction to the Data Processing Management Association, ISACA-Philadelphia Chapter CISA Review Course participants, 3rd Annual Securasia Congress delegates and an Internet CISA study group.
Based on his accomplishments, Robert has been featured in Temple University’s Fox School of Business and Management Alumni Newsletter as well as The Institute for Internal Controls e-newsletter. Furthermore, he is listed as: a Temple University Master of Science in IT Auditing and Cyber-Security Advisory Council member, an IT Governance LTD expert panel member, a leading expert and specialist by The Compliance Authority as well as an International Association of IT Governance Standards honorary member. Dr. Davis is also an invited Golden Key International Honour Society and Delta Mu Delta International Honor Society member.
Supervisors: Dr. Lazo, Dr. Klein, and Dr. Taylor
Phone: 804.437.1930
less
Related Authors
Prof Mark Watson-Gandy O.B.E
University of Westminster
Heidi Rimke
The University of Winnipeg
Naim Kapucu
University of Central Florida
Nikhil Chandra Shil, FCMA
East West University
Dr Yusri Arshad
Universiti Teknikal Malaysia Melaka
Abd Rahman Ahlan
International Islamic University Malaysia
Steffen Boehm
University of Exeter
Colin Williams
The University of Sheffield
Armando Marques-Guedes
UNL - New University of Lisbon
Prof. Aruwa, Suleiman A.S.
NASARAWA STATE UNIVERSITY, KEFFI, NASARAWA STATE-NIGERIA
InterestsView All (19)
Uploads
Books by Dr. Robert E Davis
IT Auditing Using a System Perspective is an essential reference source that discusses advancing approaches within the IT auditing process, as well as the necessary tasks in sufficiently initiating, inscribing, and completing IT audit engagement. Applying the recommended practices contained in this book will help IT leaders improve IT audit practice areas to safeguard information assets more effectively with a concomitant reduction in engagement area risks. Featuring research on topics such as statistical testing, management response, and risk assessment, this book is ideally designed for managers, researchers, auditors, practitioners, analysts, IT professionals, security officers, educators, policymakers, and students seeking coverage on modern auditing approaches within information systems and technology.
Foundationally paraphrasing from Title 44, Chapter 35, Subchapter III, Section 3542(b)(1) of the United States Code; the term “information security” is defined as the protecting of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. Correspondingly, as suggested in Chapter 1 of IT Auditing: Assuring Information Assets Protection, information security is typically a complex and dynamic safeguarding subject. Given the descriptive attributes normally associated with information security, IT auditors usually have a vast array of sub-topics to contemplate when performing information assets protection (IAP) related audits, reviews, or agreed-upon procedures.
“Assuring Information Security” was written with the intent to create quality quick reference material for assurance service practitioners to enable addressing protection mandates. Therefore, this pocket guide is appropriate for entity employees interested in ensuring, or verifying, the design and deployment of effective information security controls. As for content; Audit Managers, Chief Security Officers, Chief Compliance Officers, Chief Information Officers, Chief Information Security Officers, Auditors, Information Technology professionals, and Control Self-Assessment personnel will find this pocket guide an informative, and authoritative, information security document.
Effective Auditing for Corporates provides you with proactive advice-to help you safeguard core value within a corporation and to ensure that auditing processes and key personnel meet the expectations of management, compliance, and stockholders alike.
Aimed primarily at auditors (both external and internal), risk managers, accountants, CFOs, and consultants, Effective Auditing for Corporates covers:
* Compliance and the corporate audit
* Fraud detection
* Risk-based auditing
* The development of Sarbanes-Oxley
* Cultural changes in external auditing
* Auditing management information systems"
Whatever your perspective may be, the importance of effective and efficient IT governance cannot be overlooked in the current global high technology environment. Considering what is at stake politically, economically and technically for most organizations; usually justifying IT governance deployment based on one viewpoint narrows suitability and expected benefits. In the final analysis, combining the potential individual abstraction levels may be the most appropriate support for implementing IT governance.
“Assuring IT Governance” was written with the intent to create quality quick reference material for assurance service practitioners. Therefore, this pocket guide is appropriate for entity employees interested in ensuring, or verifying, the design and deployment of IT Governance. As for content; Audit Managers, Chief Compliance Officers, Chief Information Officers, Auditors, Information Technology professionals, and Control Self Assessment personnel will find this pocket guide an informative, and authoritative, IT Governance document.
"Assuring IT Legal Compliance" was written with the intent to create quality quick reference material for assurance service practitioners. Therefore, this pocket guide is appropriate for entity employees interested in ensuring, or verifying, IT legal compliance in any industry or geographic location. As for content; Audit Managers, Chief Compliance Officers, Chief Information Officers, Chief Information Security Officers, Auditors, Information Security professionals, and Control Self Assessment personnel will find this pocket guide an informative, and authoritative, IT legal compliance document.
"IT Auditing: Assuring Information Assets Protection" provides a proven approach to assessing IT security frameworks, architectures, methods, and techniques. In terms of content, this publication converts selected audit standards and guidelines into practical applications using detailed examples and conceptual graphics. This publication also allows auditors and security professionals to understand various steps and processes required to adequately initiate, document, and compile information assets protection audit or review phases. Through this publication, auditors and security professionals will acquire an appreciation for the complexities associated with assuring information security programs.
Papers by Dr. Robert E Davis
Anticipating this potential scenario requires information security management to proactively construct incident response and forensic investigation capabilities, considering legal imperatives. Evidence at rest or in transit requires adequate security procedures to ensure evidential nonrepudiation. Consequently, procedures addressing the infrastructure and processes for incident handling should exist within the security response documentation inventory.
Talks by Dr. Robert E Davis
IT Auditing Using a System Perspective is an essential reference source that discusses advancing approaches within the IT auditing process, as well as the necessary tasks in sufficiently initiating, inscribing, and completing IT audit engagement. Applying the recommended practices contained in this book will help IT leaders improve IT audit practice areas to safeguard information assets more effectively with a concomitant reduction in engagement area risks. Featuring research on topics such as statistical testing, management response, and risk assessment, this book is ideally designed for managers, researchers, auditors, practitioners, analysts, IT professionals, security officers, educators, policymakers, and students seeking coverage on modern auditing approaches within information systems and technology.
Foundationally paraphrasing from Title 44, Chapter 35, Subchapter III, Section 3542(b)(1) of the United States Code; the term “information security” is defined as the protecting of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. Correspondingly, as suggested in Chapter 1 of IT Auditing: Assuring Information Assets Protection, information security is typically a complex and dynamic safeguarding subject. Given the descriptive attributes normally associated with information security, IT auditors usually have a vast array of sub-topics to contemplate when performing information assets protection (IAP) related audits, reviews, or agreed-upon procedures.
“Assuring Information Security” was written with the intent to create quality quick reference material for assurance service practitioners to enable addressing protection mandates. Therefore, this pocket guide is appropriate for entity employees interested in ensuring, or verifying, the design and deployment of effective information security controls. As for content; Audit Managers, Chief Security Officers, Chief Compliance Officers, Chief Information Officers, Chief Information Security Officers, Auditors, Information Technology professionals, and Control Self-Assessment personnel will find this pocket guide an informative, and authoritative, information security document.
Effective Auditing for Corporates provides you with proactive advice-to help you safeguard core value within a corporation and to ensure that auditing processes and key personnel meet the expectations of management, compliance, and stockholders alike.
Aimed primarily at auditors (both external and internal), risk managers, accountants, CFOs, and consultants, Effective Auditing for Corporates covers:
* Compliance and the corporate audit
* Fraud detection
* Risk-based auditing
* The development of Sarbanes-Oxley
* Cultural changes in external auditing
* Auditing management information systems"
Whatever your perspective may be, the importance of effective and efficient IT governance cannot be overlooked in the current global high technology environment. Considering what is at stake politically, economically and technically for most organizations; usually justifying IT governance deployment based on one viewpoint narrows suitability and expected benefits. In the final analysis, combining the potential individual abstraction levels may be the most appropriate support for implementing IT governance.
“Assuring IT Governance” was written with the intent to create quality quick reference material for assurance service practitioners. Therefore, this pocket guide is appropriate for entity employees interested in ensuring, or verifying, the design and deployment of IT Governance. As for content; Audit Managers, Chief Compliance Officers, Chief Information Officers, Auditors, Information Technology professionals, and Control Self Assessment personnel will find this pocket guide an informative, and authoritative, IT Governance document.
"Assuring IT Legal Compliance" was written with the intent to create quality quick reference material for assurance service practitioners. Therefore, this pocket guide is appropriate for entity employees interested in ensuring, or verifying, IT legal compliance in any industry or geographic location. As for content; Audit Managers, Chief Compliance Officers, Chief Information Officers, Chief Information Security Officers, Auditors, Information Security professionals, and Control Self Assessment personnel will find this pocket guide an informative, and authoritative, IT legal compliance document.
"IT Auditing: Assuring Information Assets Protection" provides a proven approach to assessing IT security frameworks, architectures, methods, and techniques. In terms of content, this publication converts selected audit standards and guidelines into practical applications using detailed examples and conceptual graphics. This publication also allows auditors and security professionals to understand various steps and processes required to adequately initiate, document, and compile information assets protection audit or review phases. Through this publication, auditors and security professionals will acquire an appreciation for the complexities associated with assuring information security programs.
Anticipating this potential scenario requires information security management to proactively construct incident response and forensic investigation capabilities, considering legal imperatives. Evidence at rest or in transit requires adequate security procedures to ensure evidential nonrepudiation. Consequently, procedures addressing the infrastructure and processes for incident handling should exist within the security response documentation inventory.
Purpose of the Study,
Presentation of Findings,
Data relationship to professional practice,
Implications of data for social change,
Recommendations for action, and the
Study Abstract
Background,
Problem Statement,
Purpose Statement,
Research Question,
Central Hypotheses,
Theoretical Framework,
Research Method and Design,
Participants and sample size,
Data Collection Instruments, and
Data Analysis