Security Management, Integrity, and Internal Control in Information Systems

IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference

ISBN: 978-0-387-29826-9 (Print) 978-0-387-31167-8 (Online)

Table of contents (24 chapters)

previous Page of 2
  1. Security Standards

    1. Front Matter

      Pages xiii-xiii

    2. No Access

      Book Chapter

      Pages 1-20

      Information Security Standards: Adoption Drivers (Invited Paper)

    3. No Access

      Book Chapter

      Pages 21-39

      Data Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper)

    4. No Access

      Book Chapter

      Pages 41-55

      From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper)

  2. Security Culture

    1. Front Matter

      Pages 57-57

    2. No Access

      Book Chapter

      Pages 59-69

      How Much Should We Pay for Security? (Invited Paper)

    3. No Access

      Book Chapter

      Pages 71-82

      Do Not Ship, or Receive, Trojan Horses

    4. No Access

      Book Chapter

      Pages 83-92

      Employee Security Perception in Cultivating Information Security Culture

  3. Access Management

    1. Front Matter

      Pages 93-93

    2. No Access

      Book Chapter

      Pages 95-120

      A Policy Framework for Access Management in Federated Information Sharing

    3. No Access

      Book Chapter

      Pages 121-137

      A Hierarchical Release Control Policy Framework

  4. Risk Management

    1. Front Matter

      Pages 139-139

    2. No Access

      Book Chapter

      Pages 141-156

      Managing Uncertainty in Security Risk Model Forecasts with RAPSA/MC

    3. No Access

      Book Chapter

      Pages 157-173

      The Mitigation of ICT Risks Using Emitl Tool: An Empirical Study

    4. No Access

      Book Chapter

      Pages 175-184

      Risk Communication, Risk Perception and Information Security

    5. No Access

      Book Chapter

      Pages 185-202

      A Holistic Risk Analysis Method for Identifying Information Security Risks

  5. Security Culture

    1. Front Matter

      Pages 203-203

    2. No Access

      Book Chapter

      Pages 205-221

      A Responsibility Framework for Information Security

    3. No Access

      Book Chapter

      Pages 223-236

      Information Security Governance - A Re-Definition

    4. No Access

      Book Chapter

      Pages 237-245

      Can We Tune Information Security Management Into Meeting Corporate Governance Needs? (Invited Paper)

  6. Security Management

    1. Front Matter

      Pages 247-247

    2. No Access

      Book Chapter

      Pages 249-265

      Measurement of Information Security in Processes and Products

    3. No Access

      Book Chapter

      Pages 267-283

      A Protection Profiles Approach to Risk Analysis for Small and Medium Enterprises

    4. No Access

      Book Chapter

      Pages 285-297

      A UML Approach in the ISMS Implementation

  7. Applications

    1. Front Matter

      Pages 299-299

    2. No Access

      Book Chapter

      Pages 301-301

      Attack Aware Integrity Control in Databases (Invited Abstract)

    3. No Access

      Book Chapter

      Pages 303-318

      Characteristics and Measures for Mobile-Masquerader Detection

previous Page of 2