Integrity and Internal Control in Information Systems V

IFIP TC11 / WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS) November 11-12, 2002, Bonn, Germany

  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read
Not in Library

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read


Download Options

Buy this book

Last edited by ImportBot
March 1, 2022 | History

Integrity and Internal Control in Information Systems V

IFIP TC11 / WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS) November 11-12, 2002, Bonn, Germany

  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read

Integrity and Internal Control in Information Systems V represents a continuation of the dialogue between researchers, information security specialists, internal control specialists and the business community. The objectives of this dialogue are: -To present methods and techniques that will help business achieve the desired level of integrity in information systems and data; -To present the results of research that may be used in the near future to increase the level of integrity or help management maintain the desired level of integrity; -To investigate the shortcomings in the technologies presently in use, shortcomings that require attention in order to protect the integrity of systems in general. The book contains a collection of papers from the Fifth International Working Conference on Integrity and Internal Control in Information Systems (IICIS), sponsored by the International Federation for Information Processing (IFIP) and held in Bonn, Germany in November 2002.

Publish Date
Language
English
Pages
229

Buy this book

Previews available in: English

Book Details


Table of Contents

One. Refereed Papers
1. Concurrent Checking of Global Cross-database Integrity Constraints
2. Increasing the Accuracy of Time-tabled Condition Monitoring
3. Designing High Integrity Systems Using Aspects
4. Towards Effect Preservation of Updates with Loops
5. Application Controls in a Client/Server Environment
6. Protecting Java Component Integrity Against Trojan Horse Programs
7. Information Security: A Corporate Governance Issue
Two. Invited Papers
8. The Very Brief History of Digital Evidence Standards
9. Multi-representation: A New Paradigm for Databases
10. The Impact of Web Services on Audit
Three. Vendor White Papers
11. Integrity Mechanisms in German and International Payment Systems
12. Monitoring Mission Critical Data for Integrity and Availability
Four. Tutorial 'The Subversive Spreadsheet'
13. Stop that Subversive Spreadsheet!
14. A Typical Model Audit Approach
Five. Panel
15. Opportunities and Challenges in Tracing Security Breaches
Index of Contributors
Index of Keywords.

Edition Notes

Published in
Boston, MA
Series
IFIP -- The International Federation for Information Processing -- 124, International Federation for Information Processing (Series) -- 124.

Classifications

Dewey Decimal Class
005.74
Library of Congress
QA76.9.M3

The Physical Object

Format
[electronic resource] :
Pagination
1 online resource (x, 229 pages).
Number of pages
229

ID Numbers

Open Library
OL27046066M
Internet Archive
integrityinterna00bttc
ISBN 10
0387356932, 147575535X
ISBN 13
9780387356938, 9781475755350
OCLC/WorldCat
859583884

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON / OPDS | Wikipedia citation
March 1, 2022 Edited by ImportBot import existing book
February 26, 2022 Edited by ImportBot import existing book
July 1, 2019 Created by MARC Bot Imported from Internet Archive item record