Integrity and Internal Control in Information Systems Strategic Views on the Need for Control

This publication is a collection of papers from the Third International Working Conference of IFIP TC-11 Working group 11.5 on "Integrity and Internal Control in Information systems". IFIP TC-11 Working Group 11.5 explores the area of integrity within information systems and the relationsh...

Full description

Bibliographic Details
Other Authors: van Biene-Hershey, Margaret E. (Editor), Strous, Leon A.M. (Editor)
Format: eBook
Language:English
Published: New York, NY Springer US 2000, 2000
Edition:1st ed. 2000
Series:IFIP Advances in Information and Communication Technology
Subjects:
Online Access:
Collection: Springer Book Archives -2004 - Collection details see MPG.ReNa
LEADER 03991nmm a2200445 u 4500
001 EB000615244
003 EBX01000000000000000468326
005 00000000000000.0
007 cr|||||||||||||||||||||
008 140122 ||| eng
020 |a 9780387355016 
100 1 |a van Biene-Hershey, Margaret E.  |e [editor] 
245 0 0 |a Integrity and Internal Control in Information Systems  |h Elektronische Ressource  |b Strategic Views on the Need for Control  |c edited by Margaret E. van Biene-Hershey, Leon A.M. Strous 
250 |a 1st ed. 2000 
260 |a New York, NY  |b Springer US  |c 2000, 2000 
300 |a XII, 192 p  |b online resource 
505 0 |a 1. COSO in the Worldbank -- 2. Control Models and Control Self Assessment: Results of a Survey of the IIA CSA Center -- 3. Implementing Information Integrity Technology — A Feedback Control System Approach -- 4. Efficient Methods for Checking Integrity: An Integrated Spreadsheet Engineering Methodology (ISEM) -- 5. The Integrity Challenge -- 6. Integrity and Internal Control in a Statistical Environment -- 7. Definition of Integrity Policies for Web-based Applications -- 8. Firewall Policies Definition Tools: An Implementation Idea -- 9. Integrity Testing in WWW Environment -- 10. Complex IT Environments: Ascertaining Information Integrity -- 11. Integrity Problems in Distributed Accounting Systems with Semantic ACID Properties -- 12. DEMIDS: A Misuse Detection System for Database Systems -- 13. Application of Models from Epidemiology to Metrics for Computer Virus Risk — A Brief Update -- Index of contributors -- Index of keywords 
653 |a Leadership 
653 |a Computer science 
653 |a Computer Science 
653 |a Electronic data processing / Management 
653 |a Strategic planning 
653 |a Data Structures and Information Theory 
653 |a Control theory 
653 |a Systems Theory, Control 
653 |a IT in Business 
653 |a System theory 
653 |a Information theory 
653 |a Business Strategy and Leadership 
653 |a Data structures (Computer science) 
653 |a Business information services 
653 |a IT Operations 
700 1 |a Strous, Leon A.M.  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b SBA  |a Springer Book Archives -2004 
490 0 |a IFIP Advances in Information and Communication Technology 
028 5 0 |a 10.1007/978-0-387-35501-6 
856 4 0 |u https://doi.org/10.1007/978-0-387-35501-6?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 004 
520 |a This publication is a collection of papers from the Third International Working Conference of IFIP TC-11 Working group 11.5 on "Integrity and Internal Control in Information systems". IFIP TC-11 Working Group 11.5 explores the area of integrity within information systems and the relationship between integrity in information systems and the overall internal control systems that are established in organizations to support the corporate governance codes. We want to recommend this book to security specialists, IT auditors and researchers who want to learn more about the business concerns related to integrity. Those same security specialists, IT auditors and researchers will also value this book for the papers presenting research into new techniques and methods for obtaining the desired level of integrity. The third conference represents a continuation of the dialogue between information security specialists, internal control specialists and the business community. The conference objectives are: • To present methods and techniques that will help business achieve the desired level of integrity in information systems and data; • To present the results of research that may in future be used to increase the level of integrity or help management maintain the desired level of integrity; • To investigate the shortcomings in the technologies presently in use, shortcomings that require attention in order to protect the integrity of systems in general