๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology

โœ Scribed by Cynthia E. Irvine, Timothy E. Levin (auth.), Michael Gertz, Erik Guldentops, Leon Strous (eds.)


Publisher
Springer US
Year
2002
Tongue
English
Leaves
203
Series
IFIP โ€” The International Federation for Information Processing 83
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


IT Governance is finally getting the Board's and top management's attention. The value that IT needs to return and the associated risks that need to be managed, have become so important in many industries that enterprise survival depends on it. Information integrity is a significant part of the IT Governance challenge. Among other things, this conference will explore how Information Integrity contributes to the overall control and governance frameworks that enterprises need to put in place for IT to deliver business value and for corporate officers to be comfortable about the IT risks the enterprise faces. The goals for this international working conference are to find answers to the following questions: โ€ข what precisely do business managers need in order to have confidence in the integrity of their information systems and their data; โ€ข what is the status quo of research and development in this area; โ€ข where are the gaps between business needs on the one hand and research I development on the other; what needs to be done to bridge these gaps. The contributions have been divided in the following sections: โ€ข Refereed papers. These are papers that have been selected through a blind refereeing process by an international programme committee. โ€ข Invited papers. Well known experts present practice and research papers upon invitation by the programme committee. โ€ข Tutorial. Two papers describe the background, status quo and future development of CobiT as well as a case of an implementation of Co biT.

โœฆ Table of Contents


Front Matter....Pages i-x
Front Matter....Pages 1-1
A Cautionary Note Regarding the Data Integrity Capacity of Certain Secure Systems....Pages 3-25
Developing Secure Software....Pages 27-40
Establishing Accounting Principles as Invariants of Financial Systems....Pages 41-55
Integrity and Internal Control in Modern Banking Systems....Pages 57-76
Diversity as a Defense Strategy in Information Systems....Pages 77-93
Front Matter....Pages 95-95
Data Quality: Developments and Directions....Pages 97-102
Developments in Electronic Payment Systems Security....Pages 103-111
Front Matter....Pages 113-113
Governing Information Technology Through C obi T....Pages 115-159
Implementation of the COBIT-3 Maturity Model in Royal Philips Electronics....Pages 161-174
Front Matter....Pages 175-175
Business Process Security....Pages 177-186
The Information Integrity Imperative....Pages 187-193
Front Matter....Pages 195-195
The way forward....Pages 197-200
Back Matter....Pages 201-204

โœฆ Subjects


Management of Computing and Information Systems; Theory of Computation; Information Systems Applications (incl. Internet); Accounting/Auditing


๐Ÿ“œ SIMILAR VOLUMES


Integrity and Internal Control in Inform
โœ Sushil Jajodia, Graeme W. McGregor, William List, Leon A.M. Strous ๐Ÿ“‚ Library ๐Ÿ“… 1997 ๐Ÿ› Springer ๐ŸŒ English

This sixth volume in the series "Integrity and Internal Control in Information Systems" is a state-of-the-art collection of papers in the area of integrity within information systems and the relationship between integrity in information systems and the overall internal control systems that are estab

Integrity and Internal Control in Inform
โœ Erik Guldentops CISA (auth.), Sushil Jajodia, William List, Graeme McGregor, Leo ๐Ÿ“‚ Library ๐Ÿ“… 1997 ๐Ÿ› Springer US ๐ŸŒ English

<p>Dear readers, Although it is well-known that confidentiality, integrity and availability are highยญ level objectives of information security, much of the attention in the security arena has been devoted to the confidentiality and availability aspects of security. IFIP TC-ll Working Group 11. 5 has

Integrity and Internal Control in Inform
โœ Sushil Jajodia and Leon A. M. Strous ๐Ÿ“‚ Library ๐Ÿ“… 2004 ๐ŸŒ English

This sixth volume in the series "Integrity and Internal Control in Information Systems" is a state-of-the-art collection of papers in the area of integrity within information systems and the relationship between integrity in information systems and the overall internal control systems that are estab

Integrity and Internal Control in Inform
โœ Sushil Jajodia and Leon A. M. Strous ๐Ÿ“‚ Library ๐Ÿ“… 2004 ๐ŸŒ English

This sixth volume in the series "Integrity and Internal Control in Information Systems" is a state-of-the-art collection of papers in the area of integrity within information systems and the relationship between integrity in information systems and the overall internal control systems that are estab

Intelligence and Security Informatics fo
โœ Hsinchun Chen ๐Ÿ“‚ Library ๐Ÿ“… 2006 ๐Ÿ› Springer ๐ŸŒ English

<p><span>On September 11, 2001 the World became cognizant of the security challenges it faces on an international scale. With this awareness a commitment has come from the scientific, engineering, and health communities to help the world meet an array of security challenges. From these activities th