Follow
Ira Weiss
Ira Weiss
Professor business
Verified email at ncsu.edu
Title
Cited by
Cited by
Year
Managing the risks associated with end-user computing
M Alavi, IR Weiss
Journal of Management Information Systems 2 (3), 5-20, 1985
2501985
Strategies for end-user computing: An integrative framework
M Alavi, RR Nelson, IR Weiss
Journal of Management Information Systems 4 (3), 28-49, 1987
1141987
Managing end-user computing as a value-added resource
M Alavi, R Ryan Nelson, IR Weiss
INFORMATION SYSTEM MANAGEMENT 5 (3), 26-35, 1988
311988
Auditability of software: A survey of techniques and costs
IR Weiss
MIS Quarterly, 39-50, 1980
211980
Cumulative financial statements
RP Brief, B Merino, I Weiss
The Continuing Debate Over Depreciation, Capital and Income (RLE Accounting …, 2014
152014
Application software maintenance: can it be controlled?
GL Helms, IR Weiss
ACM SIGMIS Database: the DATABASE for Advances in Information Systems 16 (2 …, 1984
121984
The cost of internally developed applications: analysis of problems and cost control methods
GL Helms, IR Weiss
Journal of Management Information Systems 3 (2), 5-21, 1986
101986
Trade-offs of secure processing in centralized versus distributed networks
BP Lientz, IR Weiss
Computer Networks (1976) 2 (1), 35-43, 1978
101978
Do bankers and CPAs have different views of reports on financial statements?
TP Edmonds, MC Potter, IR Weiss
Journal of Commercial Bank Lending 63 (10), 52-62, 1981
91981
Professional certification programs.
IR Weiss, AD Young
The Personnel Administrator 26 (4), 63-68, 1981
91981
88. Strategies for end-user computing: an integrative framework
M Alavi, RR Nelson, IR Weiss
Journal of Management Information Systems 4 (3), 1987-88, 1987
71987
Organizational connectivity systems: is function being effectively managed?
DA Adams, IR Weiss
ACM SIGMIS Database: the DATABASE for Advances in Information Systems 20 (1 …, 1989
31989
The Organizational Exchange of Talent: Rotating MIS Professionals
MC Lacity, IR Weiss
Journal of Information Systems, 1989
31989
The vulnerability of computer auditing
BP Lientz, IR Weiss
The CPA Journal (pre-1986) 47 (000003), 17, 1977
21977
On the Evaluation of Reliability and Security Measures in a Computer Network
BP Lientz, IR Weiss
New York University, Graduate School of Business Administration, 1977
11977
A Model for Performing Trade-offs in Computer-communication Networks
BP Lientz, IR Weiss, J Schenck
New York University, Graduate School of Business Administration, 1977
11977
Compaq’s Strategy for High Performance Technical Computing
I Weiss
High Performance Computing Systems and Applications, 4, 2003
2003
Issues and opportunities
LD Van Over, IR Weiss
ACM SIGMIS Database: the DATABASE for Advances in Information Systems 19 (3 …, 1988
1988
El programa de certificación de CISA:: una crítica
GL Helms, IR Weiss
I Congreso Iberoamericano de Informática y Auditoría:[actas]: 2 a 6 de …, 1988
1988
Compilation And Review Reports: Are They Understood?
TP Edmonds, MC Porter, IR Weiss
Woman CPA 44 (4), 8, 1982
1982
The system can't perform the operation now. Try again later.
Articles 1–20