Integrity and Internal Control in Information Systems PDF ePub eBook

Books Info:

Integrity and Internal Control in Information Systems free pdf Dear readers, Although it is well-known that confidentiality, integrity and availability are high- level objectives of information security, much of the attention in the security arena has been devoted to the confidentiality and availability aspects of security. IFIP TC-ll Working Group 11. 5 has been charged with exploring the area of the integrity objective within information security and the relationship between integrity in information systems and the overall internal control systems that are established in organizations to support the corporate governance codes. In this collection you will not only find the papers that have been presented during the first working conference dedicated to the subject (section A) but also some of the papers that have formed the basis for the current activities of this working group (section B). Finally some information about IFIP TC-ll and its working groups is included (section C). This first working conference is the start for an ongoing dialog between the information security specialists and the internal control specialists so that both may work more effectively together to assist in creating effective business systems in the future.

About Sushil Jajodia

Dr. Sushil Jajodia is Professor and Chairman of the Dept. of Information and Software Engineering, and Director of the Center for Secure Information Systems at the George Mason University, Fairfax, Virginia, USA

Details Book

Author : Sushil Jajodia
Publisher : Springer-Verlag New York Inc.
Data Published : 06 January 2013
ISBN : 1475755295
EAN : 9781475755299
Format Book : PDF, Epub, DOCx, TXT
Number of Pages : 370 pages
Age + : 15 years
Language : English
Rating :

Reviews Integrity and Internal Control in Information Systems



17 Comments Add a comment




Related eBooks Download


  • Integrity and Internal Control in Information Systems free pdfIntegrity and Internal Control in Information Systems

    The development and integration of integrity and internal control mechanisms into information system infrastructures is a challenge for researchers. IT personnel and auditors..


  • Advances in Information Security Management and Small Systems Security free pdfAdvances in Information Security Management and Small Systems Security

    This book presents a state-of-the-art review of current perspectives in information security. focusing on technical as well as functional issues. The topics in this volume include the latest developments in: Information security management issues- Network security and protocols- Information security aspects of E-commerce- Distributed computing and access control- Security in mobile environments- Advances in intrusion detection- and..


  • Information Security for Global Information Infrastructures free pdfInformation Security for Global Information Infrastructures

    This book presents a state-of-the-art review of current perspectives in information security. focusing on technical as well as functional issues. It contains the selected proceedings of the Sixteenth Annual Working Conference on Information Security (SEC2000)..


  • Information Security free pdfInformation Security

    This is your expert guide to information security. As businesses and consumers become more dependent on complex multinational information systems. the need to understand and devise sound information security systems has never been greater..


  • Information Security Management and Small Systems Security free pdfInformation Security Management and Small Systems Security

    This book presents a state-of-the-art review of current perspectives in information security management and small systems security. focusing on technical and functional as well as managerial issues..


  • Integrity and Internal Control in Information Systems free pdfIntegrity and Internal Control in Information Systems

    . Dear readers, Although it is well-known that confidentiality, integrity and availability are high- level objectives of information security, much of the attention in the security arena has been devo