Advertisement

Integrity, Internal Control and Security in Information Systems

Connecting Governance and Technology

  • Michael Gertz
  • Erik Guldentops
  • Leon Strous

Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT, volume 83)

Table of contents

  1. Front Matter
    Pages i-x
  2. Refereed Papers

    1. Front Matter
      Pages 1-1
    2. Frank Piessens, Bart De Decker, Bart De Win
      Pages 27-40
    3. Charles Bain, Donald Faatz, Amgad Fayad, Douglas Williams
      Pages 77-93
  3. Invited Papers

    1. Front Matter
      Pages 95-95
    2. Bhavani Thuraisingham, Eric Hughes
      Pages 97-102
  4. Tutorial

    1. Front Matter
      Pages 113-113
    2. Erik Guldentops
      Pages 115-159
  5. Vendor White Papers

    1. Front Matter
      Pages 175-175
    2. Bartjan Wattel
      Pages 177-186
    3. Madhavan K. Nayar
      Pages 187-193
  6. Panel Session

    1. Front Matter
      Pages 195-195
    2. Leon Strous
      Pages 197-200
  7. Back Matter
    Pages 201-204

About this book

Introduction

IT Governance is finally getting the Board's and top management's attention. The value that IT needs to return and the associated risks that need to be managed, have become so important in many industries that enterprise survival depends on it. Information integrity is a significant part of the IT Governance challenge. Among other things, this conference will explore how Information Integrity contributes to the overall control and governance frameworks that enterprises need to put in place for IT to deliver business value and for corporate officers to be comfortable about the IT risks the enterprise faces. The goals for this international working conference are to find answers to the following questions: • what precisely do business managers need in order to have confidence in the integrity of their information systems and their data; • what is the status quo of research and development in this area; • where are the gaps between business needs on the one hand and research I development on the other; what needs to be done to bridge these gaps. The contributions have been divided in the following sections: • Refereed papers. These are papers that have been selected through a blind refereeing process by an international programme committee. • Invited papers. Well known experts present practice and research papers upon invitation by the programme committee. • Tutorial. Two papers describe the background, status quo and future development of CobiT as well as a case of an implementation of Co biT.

Keywords

Information Technology (IT) Processing classification computer computer science control data security information information security information system linear optimization management organization security technology

Editors and affiliations

  • Michael Gertz
    • 1
  • Erik Guldentops
    • 2
  • Leon Strous
    • 3
  1. 1.University of CaliforniaDavisUSA
  2. 2.University of Antwerp Management SchoolBelgium
  3. 3.De Nederlandsche Bank NVThe Netherlands

Bibliographic information

  • DOI https://doi.org/10.1007/978-0-387-35583-2
  • Copyright Information Springer-Verlag US 2002
  • Publisher Name Springer, Boston, MA
  • eBook Packages Springer Book Archive
  • Print ISBN 978-1-4757-5537-4
  • Online ISBN 978-0-387-35583-2
  • Series Print ISSN 1868-4238
  • Series Online ISSN 1868-422X
  • Buy this book on publisher's site