|
![]() |
|||
|
||||
OverviewThis third volume in the series ""Integrity and Internal Control in Information Systems"" is a state-of-the-art collection of papers in the area of integrity within information systems, and the relationship between integrity in information systems and the overall internal control systems that are established in organizations to support corporate governance codes. Continuing the dialogue between information security specialists, internal control specialists and the business community, the objectives of this volume are: to present methods and techniques that will help business achieve the desired level of integrity in information systems and data; to present the results of research that may in the future be used to increase the level of integrity or help management maintain the desired level of integrity; and to investigate the shortcomings in the technologies presently in use, shortcomings that require attention in order to protect the integrity of systems in general. The book contains a collection of papers from the Third International Working Conference on Integrity and Internal Control in Information Systems, sponsored by the International Federation for Information Processing (IFIP) and held in Amsterdam, The Netherlands, in November 1999. Full Product DetailsAuthor: Margaret E. van Biene-Hershey , Leon A.M. StrousPublisher: Springer Imprint: Springer Edition: 2000 ed. Volume: 37 Dimensions: Width: 15.50cm , Height: 1.20cm , Length: 23.50cm Weight: 1.030kg ISBN: 9780792378211ISBN 10: 0792378210 Pages: 192 Publication Date: 30 April 2000 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of Contents1. COSO in the Worldbank.- 2. Control Models and Control Self Assessment: Results of a Survey of the IIA CSA Center.- 3. Implementing Information Integrity Technology — A Feedback Control System Approach.- 4. Efficient Methods for Checking Integrity: An Integrated Spreadsheet Engineering Methodology (ISEM).- 5. The Integrity Challenge.- 6. Integrity and Internal Control in a Statistical Environment.- 7. Definition of Integrity Policies for Web-based Applications.- 8. Firewall Policies Definition Tools: An Implementation Idea.- 9. Integrity Testing in WWW Environment.- 10. Complex IT Environments: Ascertaining Information Integrity.- 11. Integrity Problems in Distributed Accounting Systems with Semantic ACID Properties.- 12. DEMIDS: A Misuse Detection System for Database Systems.- 13. Application of Models from Epidemiology to Metrics for Computer Virus Risk — A Brief Update.- Index of contributors.- Index of keywords.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |