Integrity and Internal Control in Information Systems

Strategic Views on the Need for Control

  • Margaret E. van Biene-Hershey
  • Leon Strous

Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT, volume 37)

Table of contents

  1. Front Matter
    Pages i-x
  2. Fayezul H. Choudhury, Philip Mitchell
    Pages 1-10
  3. Kamalasen Rajalingham, David Chadwick, Brian Knight, Dilwyn Edwards
    Pages 41-58
  4. Paul Ammann, Sushil Jajodia
    Pages 59-69
  5. Wouter J. Keller, Roel G. J. Rot
    Pages 71-83
  6. Paloma Díaz, Ignacio Aedo, Fivos Panetsos
    Pages 85-98
  7. Patrizia Asirelli, Fabrizio Fabbrini
    Pages 99-110
  8. Martin Stanek, Daniel Olejár
    Pages 111-120
  9. Christina Yip Chung, Michael Gertz, Karl Levitt
    Pages 159-178
  10. Margaret E. van Biene-Hershey, Leon Strous
    Pages E1-E1
  11. Back Matter
    Pages 185-188

About this book

Introduction

This publication is a collection of papers from the Third International Working Conference of IFIP TC-11 Working group 11.5 on "Integrity and Internal Control in Information systems". IFIP TC-11 Working Group 11.5 explores the area of integrity within information systems and the relationship between integrity in information systems and the overall internal control systems that are established in organizations to support the corporate governance codes. We want to recommend this book to security specialists, IT auditors and researchers who want to learn more about the business concerns related to integrity. Those same security specialists, IT auditors and researchers will also value this book for the papers presenting research into new techniques and methods for obtaining the desired level of integrity. The third conference represents a continuation of the dialogue between information security specialists, internal control specialists and the business community. The conference objectives are: • To present methods and techniques that will help business achieve the desired level of integrity in information systems and data; • To present the results of research that may in future be used to increase the level of integrity or help management maintain the desired level of integrity; • To investigate the shortcomings in the technologies presently in use, shortcomings that require attention in order to protect the integrity of systems in general.

Keywords

Audit computer science data security information information processing information security information system linear optimization organization tools

Editors and affiliations

  • Margaret E. van Biene-Hershey
    • 1
  • Leon Strous
    • 2
  1. 1.Vrije UniversiteitThe Netherlands
  2. 2.De Nederlandsche Bank NVThe Netherlands

Bibliographic information

  • DOI https://doi.org/10.1007/978-0-387-35501-6
  • Copyright Information IFIP International Federation for Information Processing 2000
  • Publisher Name Springer, Boston, MA
  • eBook Packages Springer Book Archive
  • Print ISBN 978-1-4757-5531-2
  • Online ISBN 978-0-387-35501-6
  • Series Print ISSN 1868-4238
  • Series Online ISSN 1868-422X
  • About this book