Research Article
BibTex RIS Cite

İletişim Teknolojilerindeki Gelişmeler, Riskler Ve İç Denetimin Rolü

Year 2018, , 625 - 639, 28.12.2018
https://doi.org/10.18657/yonveek.477585

Abstract

Gelişen bilgi teknolojileri işletmenin tüm
fonksiyonlarını etkilerken denetim fonksiyonu da doğal olarak bu gelişmelerden yoğun
biçimde etkilenmiştir. İç denetimin görevi; işletmeye değer katmak ve işletme
bünyesinde bağımsız olarak danışmanlık hizmeti sunmaktır. Aynı zamanda iç denetim,
işletmenin karşılaşabileceği riskleri önceden belirleyerek ü
st yönetimin tedbir almasını sağlamalıdır. Bilgi teknolojilerindeki
değişimin ortaya çıkardığı yeni riskler
işletmenin
kurumsal yapısını
, güvenliğini ve veri gizliliğini tehdit etmektedir.
Bütün bu gelişmeler
çerçevesinde, 
yeni risklere karşı iç denetim fonksiyonu da yapısını değiştirirken,
risklerle etkin mücadele i
çin gelişen
bilgi teknolojilerine uuyumlu çalışması gerekmektedir.                                                                        



Sosyal medya, mobil cihazlar, büyük veri ve bulut
bilişim teknolojilerinin işletme sistemlerine entegre olması, işletmelere
sistem verimliliği açısından önemli katkı sağlamakla birlikte yeni nesil
risklerin ortaya çıkmasına neden olmuştur. Nitekim ortaya çıkan bu durum,
işletmeleri riskleri yönetme konusunda zorlamaktadır.
Bu çerçevede iç denetim,
gelişen risklerin yönetiminde bilgi teknolojilerinden de yararlanarak işletmeyi
koruma altına alabilecektir
.



 Bilgi
güvenliği artık, tüm iç denet
çilerin çalışmalarında önem vermeleri gereken bir risk
haline gelmiş ve işletmelerin geleceği tehdit etmektedir. Çalışmada gelişen
bilgi teknolojisinin işletmelere getirdiği risklerin neler olduğu
tanımlandıktan sonra iç denetimin bu risklerle mücadelesi ve yeni duruma nasıl
adapte olması gerektiği tartışılmıştır. 

References

  • Akay, E. Ç. Ekonometride Yeni Bir Ufuk: Büyük Veri ve Makine Öğrenmesi. Sosyal Bilimler Araştırma Dergisi, 7(2), 41-53. http://dergipark.gov.tr/download/article-file/482721
  • Anderson, D. J., & Eubanks, G. (2015). Leveraging COSO across the three lines of defense. COSO, https://www.coso.org/Documents/COSO-2015-3LOD.pdf
  • Chou, D. C. (2015). Cloud computing risk and audit issues. Computer Standards & Interfaces, 42, 137-142. Doi: 10.1016/j.csi.2015.06.005
  • Chou, D. C. (2015). Cloud computing: A value creation model. Computer Standards & Interfaces, 38, 72-77. https://doi.org/10.1016/j.csi.2014.10.001
  • Cox, M., & Ellsworth, D. (1997, October). Application-controlled demand paging for out-of-core visualization. In Visualization'97., Proceedings (pp. 235-244). IEEE. https://www.nas.nasa.gov/assets/pdf/techreports/1997/nas-97-010.pdf
  • Deloitte 2015 “Cybersecurity: The changing role of audit committee and internal audit” https://www2.deloitte.com/content/dam/Deloitte/sg/Documents/risk/sea-risk-cyber-security-changing-role-in-audit-noexp.pdf
  • E&Y (2015) “Big data and analytics in the audit process”, BoardMatters Quarterly Volume 9, https://www.ey.com/Publication/vwLUAssets/ey-big-data-and-analytics-in-the-audit-process/$FILE/ey-big-data-and-analytics-in-the-audit-process.pdfExecutive Summary World Robotics 2018, Industrial Robots, https://www.ifr.org/downloads/press2018/Executive_Summary_WR_2018_Industrial_Robots.pdf
  • FERMA, E. Guidance on the 8th EU Company Law Directive, article 41-2b. http://www.eciia.eu/wp-content/uploads/2013/09/Blog-4.4-Avoid-reg-part-2.pdf
  • Gandomi, A., & Haider, M. (2015). Beyond the hype: Big data concepts, methods, and analytics. International Journal of Information Management, 35(2), 137-144. https://doi.org/10.1016/j.ijinfomgt.2014.10.007
  • Gartner IT Glossary (n.d.). Retrieved from http://www.gartner.com/it-glossary/big-data/
  • https://assets.kpmg.com/content/dam/kpmg/bh/pdf/cyber-security-and-the-role-of-internal-auditors.pdf
  • https://wearesocial.com/uk/special-reports/digital-in-2017-global-overview
  • Hu, K. H., Chen, F. H., & We, W. J. (2016). Exploring the key risk factors for application of cloud computing in auditing. Entropy, 18(8), 401. Doi:10.3390/e18080401
  • IIA, (2013) “7 Tips For Governing Social Media,” Tone at the Top, Sayı:64,https://global.theiia.org/knowledge/Public%20Documents/TaT_October_2013.pdf
  • IIA, (2016) “Global Perspektiflerve Anlayışlar: Güvenilir Siber Danışman olarak İç Denetim,” https://www.theiia. org/gpi
  • IIA, (2017) “ GTAG / Understanding and Auditing Big Data”
  • Institute of Internal Auditors. (2013). The three lines of defense in effective risk management and control. Position paper. https://na.theiia.org/standardsguidance/Public%20Documents/PP%20The%20Three%20Lines%20of%20Defense%20in%20Effective%20Risk%20Management%20and%20Control.pdf
  • Katal, A., Wazid, M., & Goudar, R. H. (2013, August). Big data: issues, challenges, tools and good practices. In Contemporary Computing (IC3), 2013 Sixth International Conference on (pp. 404-409). IEEE. http://www.stat.purdue.edu/~doerge/BIOINFORM.D/SPRING16/KatalWazidGoudar_2013.pdf
  • Kim, H. J., Mannino, M., & Nieschwietz, R. J. (2009). Information technology acceptance in the internal audit profession: Impact of technology features and complexity. International Journal of Accounting Information Systems, 10(4), 214-228. Doi:10.1016/j.accinf.2009.09.001
  • KPMG (2017), “The Future is Now”, Forbes Insights, https://i.forbesimg.com/forbesinsights/kpmg_audit2025/KPMG_Audit_2025.pdf, Erişim Tarihi:22.10.2018
  • KPMG (2018), “Guardians of Trust, Who is Responsible for Trusted Analytics in the Digital Age?”, https://assets.kpmg.com/content/dam/kpmg/xx/pdf/2018/02/guardians-of-trust.pdf, Erişim Tarihi:22.10.2018
  • Mell, P., & Grance, T. (2011). The NIST definition of cloud computing. https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-145.pdf
  • PWC, (2015). İç Denetimin Gelişen Teknolojideki Yeni Rolü, https://www.pwc.com.tr/tr/risk-surec-teknoloji-hizmetleri/ic-denetim-ve-kontrol-hizmetleri-yayinlari/ic-denetimin-gelisen-teknolojideki-yeni-rolu-web.pdf
  • Sayımer İ. (2008). Sanal Ortamda Halkla İlişkiler, Beta Yayınları, İstanbul.
  • Steinbart, P. J., Raschke, R., Gal, G., & Dilla, W. N. (2015). The Influence of Internal Audit on Information System Effectiveness: Perceptions of Internal Auditors. https://doi.org/10.1016/j.aos.2018.04.005
  • TechAmerica Foundation’s Federal Big Data Commission. (2012). Demystifying bigdata: A practical guide to transforming the business of Government. https://bigdatawg.nist.gov/_uploadfiles/M0068_v1_3903747095.pdf
  • Uzel, M. N., Hasanefendioglu, B., & Durmus, C. N. (2016). 3'LÜ SAVUNMA Hattının Coso İç Kontrol Sisteminin Etkinliğinin Arttırılmasında Kaldıraç Etkisi. Mali Çözüm Dergisi, 26, 199. http://archive.ismmmo.org.tr/docs/malicozum/136malicozum/16.pdf
  • Uzun, A.K, Usluer, T. (2017). İç Denetimde Dönüşüm ve 2017 Yılında Öne Çıkan Konuların Değerlendirilmesi. TIDE
  • Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. computers & security, 38, 97-102. http://dx.doi.org/10.1016/j.cose.2013.04.004
  • Wang, Y., Kung, L., & Byrd, T. A. (2018). Big data analytics: Understanding its capabilities and potential benefits for healthcare organizations. Technological Forecasting and Social Change, 126, 3-13. https://doi.org/10.1016/j.techfore.2015.12.019
  • White, N., & Bond, R. (2014). Analytics refresher: internal audit can be a catalyst for expanding the use of analytics through the company to provide greater, more holistic business insights. Internal Auditor, 71(5), 19-21.
  • Yoon, K., Hoogduin, L., & Zhang, L. (2015). Big Data as complementary audit evidence. Accounting Horizons, 29(2), 431-438 https://doi.org/10.2308/acch-51076
  • Zhu, Y., Hu, H., Ahn, G. J., & Yau, S. S. (2012). Efficient audit service outsourcing for data integrity in clouds. Journal of Systems and Software, 85(5), 1083-1095. Doi: 10.1016/j.jss.2011.12.024
Year 2018, , 625 - 639, 28.12.2018
https://doi.org/10.18657/yonveek.477585

Abstract

References

  • Akay, E. Ç. Ekonometride Yeni Bir Ufuk: Büyük Veri ve Makine Öğrenmesi. Sosyal Bilimler Araştırma Dergisi, 7(2), 41-53. http://dergipark.gov.tr/download/article-file/482721
  • Anderson, D. J., & Eubanks, G. (2015). Leveraging COSO across the three lines of defense. COSO, https://www.coso.org/Documents/COSO-2015-3LOD.pdf
  • Chou, D. C. (2015). Cloud computing risk and audit issues. Computer Standards & Interfaces, 42, 137-142. Doi: 10.1016/j.csi.2015.06.005
  • Chou, D. C. (2015). Cloud computing: A value creation model. Computer Standards & Interfaces, 38, 72-77. https://doi.org/10.1016/j.csi.2014.10.001
  • Cox, M., & Ellsworth, D. (1997, October). Application-controlled demand paging for out-of-core visualization. In Visualization'97., Proceedings (pp. 235-244). IEEE. https://www.nas.nasa.gov/assets/pdf/techreports/1997/nas-97-010.pdf
  • Deloitte 2015 “Cybersecurity: The changing role of audit committee and internal audit” https://www2.deloitte.com/content/dam/Deloitte/sg/Documents/risk/sea-risk-cyber-security-changing-role-in-audit-noexp.pdf
  • E&Y (2015) “Big data and analytics in the audit process”, BoardMatters Quarterly Volume 9, https://www.ey.com/Publication/vwLUAssets/ey-big-data-and-analytics-in-the-audit-process/$FILE/ey-big-data-and-analytics-in-the-audit-process.pdfExecutive Summary World Robotics 2018, Industrial Robots, https://www.ifr.org/downloads/press2018/Executive_Summary_WR_2018_Industrial_Robots.pdf
  • FERMA, E. Guidance on the 8th EU Company Law Directive, article 41-2b. http://www.eciia.eu/wp-content/uploads/2013/09/Blog-4.4-Avoid-reg-part-2.pdf
  • Gandomi, A., & Haider, M. (2015). Beyond the hype: Big data concepts, methods, and analytics. International Journal of Information Management, 35(2), 137-144. https://doi.org/10.1016/j.ijinfomgt.2014.10.007
  • Gartner IT Glossary (n.d.). Retrieved from http://www.gartner.com/it-glossary/big-data/
  • https://assets.kpmg.com/content/dam/kpmg/bh/pdf/cyber-security-and-the-role-of-internal-auditors.pdf
  • https://wearesocial.com/uk/special-reports/digital-in-2017-global-overview
  • Hu, K. H., Chen, F. H., & We, W. J. (2016). Exploring the key risk factors for application of cloud computing in auditing. Entropy, 18(8), 401. Doi:10.3390/e18080401
  • IIA, (2013) “7 Tips For Governing Social Media,” Tone at the Top, Sayı:64,https://global.theiia.org/knowledge/Public%20Documents/TaT_October_2013.pdf
  • IIA, (2016) “Global Perspektiflerve Anlayışlar: Güvenilir Siber Danışman olarak İç Denetim,” https://www.theiia. org/gpi
  • IIA, (2017) “ GTAG / Understanding and Auditing Big Data”
  • Institute of Internal Auditors. (2013). The three lines of defense in effective risk management and control. Position paper. https://na.theiia.org/standardsguidance/Public%20Documents/PP%20The%20Three%20Lines%20of%20Defense%20in%20Effective%20Risk%20Management%20and%20Control.pdf
  • Katal, A., Wazid, M., & Goudar, R. H. (2013, August). Big data: issues, challenges, tools and good practices. In Contemporary Computing (IC3), 2013 Sixth International Conference on (pp. 404-409). IEEE. http://www.stat.purdue.edu/~doerge/BIOINFORM.D/SPRING16/KatalWazidGoudar_2013.pdf
  • Kim, H. J., Mannino, M., & Nieschwietz, R. J. (2009). Information technology acceptance in the internal audit profession: Impact of technology features and complexity. International Journal of Accounting Information Systems, 10(4), 214-228. Doi:10.1016/j.accinf.2009.09.001
  • KPMG (2017), “The Future is Now”, Forbes Insights, https://i.forbesimg.com/forbesinsights/kpmg_audit2025/KPMG_Audit_2025.pdf, Erişim Tarihi:22.10.2018
  • KPMG (2018), “Guardians of Trust, Who is Responsible for Trusted Analytics in the Digital Age?”, https://assets.kpmg.com/content/dam/kpmg/xx/pdf/2018/02/guardians-of-trust.pdf, Erişim Tarihi:22.10.2018
  • Mell, P., & Grance, T. (2011). The NIST definition of cloud computing. https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-145.pdf
  • PWC, (2015). İç Denetimin Gelişen Teknolojideki Yeni Rolü, https://www.pwc.com.tr/tr/risk-surec-teknoloji-hizmetleri/ic-denetim-ve-kontrol-hizmetleri-yayinlari/ic-denetimin-gelisen-teknolojideki-yeni-rolu-web.pdf
  • Sayımer İ. (2008). Sanal Ortamda Halkla İlişkiler, Beta Yayınları, İstanbul.
  • Steinbart, P. J., Raschke, R., Gal, G., & Dilla, W. N. (2015). The Influence of Internal Audit on Information System Effectiveness: Perceptions of Internal Auditors. https://doi.org/10.1016/j.aos.2018.04.005
  • TechAmerica Foundation’s Federal Big Data Commission. (2012). Demystifying bigdata: A practical guide to transforming the business of Government. https://bigdatawg.nist.gov/_uploadfiles/M0068_v1_3903747095.pdf
  • Uzel, M. N., Hasanefendioglu, B., & Durmus, C. N. (2016). 3'LÜ SAVUNMA Hattının Coso İç Kontrol Sisteminin Etkinliğinin Arttırılmasında Kaldıraç Etkisi. Mali Çözüm Dergisi, 26, 199. http://archive.ismmmo.org.tr/docs/malicozum/136malicozum/16.pdf
  • Uzun, A.K, Usluer, T. (2017). İç Denetimde Dönüşüm ve 2017 Yılında Öne Çıkan Konuların Değerlendirilmesi. TIDE
  • Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. computers & security, 38, 97-102. http://dx.doi.org/10.1016/j.cose.2013.04.004
  • Wang, Y., Kung, L., & Byrd, T. A. (2018). Big data analytics: Understanding its capabilities and potential benefits for healthcare organizations. Technological Forecasting and Social Change, 126, 3-13. https://doi.org/10.1016/j.techfore.2015.12.019
  • White, N., & Bond, R. (2014). Analytics refresher: internal audit can be a catalyst for expanding the use of analytics through the company to provide greater, more holistic business insights. Internal Auditor, 71(5), 19-21.
  • Yoon, K., Hoogduin, L., & Zhang, L. (2015). Big Data as complementary audit evidence. Accounting Horizons, 29(2), 431-438 https://doi.org/10.2308/acch-51076
  • Zhu, Y., Hu, H., Ahn, G. J., & Yau, S. S. (2012). Efficient audit service outsourcing for data integrity in clouds. Journal of Systems and Software, 85(5), 1083-1095. Doi: 10.1016/j.jss.2011.12.024
There are 33 citations in total.

Details

Primary Language Turkish
Journal Section Articles
Authors

Batuhan Mollaoğulları 0000-0002-7218-1299

Burak Özdoğan 0000-0002-8504-5085

Publication Date December 28, 2018
Published in Issue Year 2018

Cite

APA Mollaoğulları, B., & Özdoğan, B. (2018). İletişim Teknolojilerindeki Gelişmeler, Riskler Ve İç Denetimin Rolü. Journal of Management and Economics, 25(3), 625-639. https://doi.org/10.18657/yonveek.477585