|
![]() |
|||
|
||||
OverviewThis fourth volume in the series ""Integrity and Internal Control in Information Systems"" is a state-of-the-art collection of papers in the area of integrity within information systems and the relationship between this and the overall internal control systems that are established in organizations to support corporate governance codes. The volume represents a continuation ofthe dialogue between information security specialists, internal control specialists and the business community. The objectives of this dialogue are: to present methods and techniques that will help business achieve the desired level of integrity in information systems and data; to present the results of research that may in future be used to increase the level of integrity or help management maintain the desired level of integrity; to investigate the shortcomings in the technologies presently in use, shortcomings that require attention in order to protect the integrity of systems in general. The papers are from the Fourth International Working Conference on Integrity and Internal Control in Information Systems (IICIS), which was sponsored by the International Federation for Information Processing (IFIP) and held in Brussels, Belgium in November 2001. Full Product DetailsAuthor: Michael Gertz , Erik Guldentops , Leon A.M. StrousPublisher: Springer-Verlag New York Inc. Imprint: Springer-Verlag New York Inc. Edition: 2002 ed. Volume: 83 Dimensions: Width: 15.50cm , Height: 1.40cm , Length: 23.50cm Weight: 1.080kg ISBN: 9781402070051ISBN 10: 1402070055 Pages: 204 Publication Date: 31 March 2002 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of Contentsone. Refereed papers.- 1. A cautionary note regarding the data integrity capacity of certain secure systems.- 2. Developing secure software: A survey and classification of common software vulnerabilities.- 3. Establishing accounting principles as invariants of financial systems.- 4. Integrity and internal control in modern banking systems.- 5. Diversity as a defense strategy in information systems: Does evidence from previous events support such an approach?.- two. Invited papers.- 6. Data quality: developments and directions.- 7. Developments in electronic payment systems security: EMV and CEPS.- three. Tutorial “CobiT and IT Governance”.- 8. Governing information technology through CobiT.- 9. Implementation of the COBIT-3 maturity model in Royal Philips Electronics.- four. Vendor white papers.- 10. Business process security: Managing the new security challenge with X-Tra Secure.- 11. The information integrity imperative.- five. Panel session.- 12. The way forward.- Index of contributors.- Index of keywords.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |