Integrity, internal control and security in information systems connecting governance and technology

Includes bibliographical references and index

Gespeichert in:
Bibliographische Detailangaben
Körperschaften: International Federation for Information Processing Working Group Integrity and Internal Control (BerichterstatterIn), Working Conference on Integrity and Internal Control in Information Systems (BerichterstatterIn)
Weitere Verfasser: Gertz, Michael (BerichterstatterIn), Guldentops, Erik (BerichterstatterIn), Strous, Leon (BerichterstatterIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: Boston, Mass. u.a. Kluwer Akademic Publ. c 2002
Schriftenreihe:International Federation for Information Processing 83
Schlagworte:
Online Zugang:Inhaltsverzeichnis
Verlagsangaben
Inhaltstext
Table of contents
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Includes bibliographical references and index
Machine generated contents note: Part one. Refereed papers 1 -- 1. A cautionary note regarding the data integrity capacity 3 -- of certain secure systems -- Cynthia E. Irvine and Timothy E. Levin -- 2. Developing secure software 27 -- A survey and classification of common software vulnerabilities -- Frank Piessens, Bart de Decker and Bart de Win -- 3. Establishing accounting principles as invariants of financial systems 41 -- Naftaly H. Minsky -- 4. Integrity and internal control in modem banking systems 57 -- Jim Jones -- 5. Diversity as a defense strategy in information systems 77 -- Does evidence from previous events support such an approach? -- Charles Bain, Donald Faatz, Amgad Fayad and Douglas Williams -- Part two. Invited papers 95 -- 6. Data quality: developments and directions 97 -- Bhavani Thuraisingham and Eric Hughes -- 7. Developments in electronic payment systems security 103 -- EMV and CEPS -- Mike Ward -- Part three. Tutorial "COBIT and IT Governance" 113 -- 8. Governing information technology through COBIT 115 -- Erik Guldentops -- 9. Implementation of the COBIT-3 maturity model in 161 -- Royal Philips Electronics -- Alfred C.E. van Gils -- Part four. Vendor white papers 175 -- 10. Business process security 177 -- Managing the new security challenge with X-Tra Secure -- BartJan Wattel -- 11. The information integrity imperative 187 -- Madhavan K. Nayar -- Part five. Panel session 195 -- 12. The way forward 197 -- Leon Strous
Beschreibung:X, 204 S
graph. Darst
25 cm
ISBN:1402070055
1-4020-7005-5