(314) 504-0530 info@bac-mail.com

Publications

Preseneted here is a complete listing of publications by Dr. Albert Marcella.

Refereed Journals
  • Marcella, A. (2000). Cyber-terrorism, Part I: Is your company a target? September/October 2000, pg. 1, “Cyber-terrorism, Part II: An arsenal of damage” November/December 2000, pg. 6, AICPA Infotech Update.
  • Marcella, A. (1996). “Ethics and auditor judgment.” Futurics: A Journal of Futures Research, Vol. 20, Nos. 1 & 2, pp. 56-60.
  • Marcella, A. (1995). Is ethics education for audit professionals lacking? Audit and Control Journal, Vol. 11, No. 1, pp. 9-10.
  • Marcella, A., Rauff, J. (Winter 1994-1995). Utilizing expert systems to evaluate disaster recovery planning. The Journal of Applied Business Research, Vol. 11, No. 1, pp. 30-38.
  • Marcella, A. (Winter 1994). Keeping your computer virus free: Security and control recommendations. Journal of End User Computing, Vol. 6, No. 1, pp. 33-40.
Periodicals
  • Marcella, A., Renz G., Privacy Lost: A Trip to the Mall, Information Systems Security Association Journal, www.issa.org, January 2014, pages 12-24.
  • Marcella, A., If You Were The Ship’s Captain, What Would YOU Have Done?, Disaster Recovery Journal, Fall 2013, pages 32-36.
  • Marcella, A., IT Strike Force: Establishing a Cyber Forensic Response Strategy, Disaster Recovery Journal, Fall 2012, pages 36-38.
  • Marcella, A., Menendez, D., Mortimore, K., Cyber Forensics and the Changing Face of Criminal Behavior, Information Systems Security Association Journal, www.issa.org, March 2009, pages 22-26.
  • Marcella, A., Electronically Stored Information and Cyber Forensics, Information Systems Control Journal, www.isaca.org, Volume 5, 2008, pages 44-48.
  • Marcella, A. (Winter 2006), CERT: Protecting the Home Front, Disaster Recovery Journal, www.drj.com, Volume 19, Number 1, pages 40-46.
  • Marcella, A., (March/April 2006), “Incident Management Planning: Assessing a Workplace Violence Incident Management Plan,” Continuity Insights, www.continuityinsights.com, pages 29 – 34.
  • Marcella, A. (December 2005), Identity Theft 101: Be proactive to reduce risk of fraud, Saint Louis Small Business Monthly, www.sbmin.com, page 1.
  • Marcella, A. (Winter 2004), Cyber Crime: Is your company a potential target? Are you prepared? Disaster Recovery Journal, Volume 17, Number 1, pages 30-35.
  • Marcella, A. (October 2003), A Question of Preparedness: Cyber Extortion Case Study Internal Auditor, The Institute of Internal Auditors, Volume LX, No. 5, pgs. 67-69.
  • Marcella, A., Renz, G. (Winter 2000), Who Gets the Chairs When the Music Stops? New Perspectives on Health Care Auditing, Volume 19, No. 1, pg. 10-14.
  • Marcella, A. (May 1999), Controlling the ethical use of information in electronic commerce. EDPACS, (New York, NY: Auerbach Publishers, a division of Warren, Gorham & Lamont), Vol. 26, No. 11, pg. 1-14.
  • Marcella, A. (November 1995), Taking your company’s ethical pulse. The Business Journal of MidCentral Illinois, Vol. 1, No. 9, pg. 8.
  • Marcella, A., Sampias, W., and Kincaid, J. (1992), I’ll be watching you: The internal auditor’s view of EDI. EDI FORUM, Issue No. 1., pg. 48
  • Marcella, A. (April 1988), International travel – the terrorism threat, Office Systems 88, Georgetown, CT: Office Systems 88
  • Marcella, A. (May 1987), “Saving your life in a hotel fire.” Office Systems 87, Georgetown, CT: Office Systems 87.
  • Marcella, A. (Winter 1985), Disaster recovery planning business as usual. Corporate Accounting, New York: Warren, Gorham & Lamont.
  • Marcella, A. (Spring 1985), Disaster recovery planning the next step, Corporate Accounting, New York: Warren, Gorham & Lamont.
Professional Newsletters
  • Marcella, A. (January 2010), Digital Multifunctional Devices: Forensic Value and Corporate Exposure. EDPACS, (New York, NY: Auerbach Publishers, a division of Warren, Gorham & Lamont), Vol. 41, No. 1, pg. 1-11.
  • Marcella, A. (August 1993), Security and control considerations for a computer virus-free microcomputer. EDPACS, (New York, NY: Auerbach Publishers, a division of Warren, Gorham & Lamont), Vol. 21, No. 2, pg. 1-6.
  • Marcella, A. (November 1990), Auditing the customer information control system, EDPACS, (New York, NY: Auerbach Publishers, a division of Warren, Gorham & Lamont), Vol. 28, No. 5., p. 1.
  • Marcella, A. (January 1990), Application reviews of end-user spreadsheet designs,. Data Processing Digest.
  • Marcella, A. (October 1989), Application reviews of end-user spreadsheet designs. EDPACS, (New York, NY: Auerbach Publishers, a division of Warren, Gorham & Lamont), Vol. 26, No. 16, p. 10.
  • Marcella, A. (May 1989), Telecommunications: A control strategy. EDPACS, (New York, NY: Auerbach Publishers, a division of Warren, Gorham & Lamont), Vol. 26, No. 11, p. 1.
  • Marcella, A. (October 1986), Computer application reviews – Auditing spreadsheet design. Internal Audit Advisor, New Haven, CT: Prosell Publications, Inc.
  • Marcella, A. (September 1986), Systems software – a primer, Internal Audit Advisor, New Haven, CT: Prosell Publications, Inc.
  • Marcella, A. (November/December 1985), Online systems auditing IBM’s Customer Information Control System. Internal Audit Advisor, New Haven, CT: Prosell Publications, Inc.
  • Marcella, A. (June 1985), Focus on: Auditing end user computing. Internal Audit Advisor, New Haven, CT: Prosell Publications, Inc.

Request a Consultation Today

We provide a variety of consultation services and training options to fit the demanding and changing needs of our clients. Contact us today and we will help you determine the best way to meet your goals.

Business Automation Consultants LLC is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.nasbaregistry.org.

BAC is a vetted, current provider of training courses through the NICCS Education and Training Catalog. BAC’s courses are aligned to the specialty areas of the National Cybersecurity Workforce Framework.