Integrity and Internal Control in Information Systems V: IFIP TC11 / WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS) November 11–12, 2002, Bonn, Germany
Integrity and Internal Control in Information Systems V represents a continuation of the dialogue between researchers, information security specialists, internal control specialists and the business community. The objectives of this dialogue are: -To present methods and techniques that will help bus...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer US
2003
|
Ausgabe: | 1st ed. 2003 |
Schriftenreihe: | IFIP Advances in Information and Communication Technology
124 |
Schlagworte: | |
Online-Zugang: | UBY01 Volltext |
Zusammenfassung: | Integrity and Internal Control in Information Systems V represents a continuation of the dialogue between researchers, information security specialists, internal control specialists and the business community. The objectives of this dialogue are: -To present methods and techniques that will help business achieve the desired level of integrity in information systems and data; -To present the results of research that may be used in the near future to increase the level of integrity or help management maintain the desired level of integrity; -To investigate the shortcomings in the technologies presently in use, shortcomings that require attention in order to protect the integrity of systems in general. The book contains a collection of papers from the Fifth International Working Conference on Integrity and Internal Control in Information Systems (IICIS), sponsored by the International Federation for Information Processing (IFIP) and held in Bonn, Germany in November 2002 |
Beschreibung: | 1 Online-Ressource (XII, 232 p) |
ISBN: | 9780387356938 |
DOI: | 10.1007/978-0-387-35693-8 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV047064027 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2003 |||| o||u| ||||||eng d | ||
020 | |a 9780387356938 |9 978-0-387-35693-8 | ||
024 | 7 | |a 10.1007/978-0-387-35693-8 |2 doi | |
035 | |a (ZDB-2-SCS)978-0-387-35693-8 | ||
035 | |a (OCoLC)1227478218 | ||
035 | |a (DE-599)BVBBV047064027 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 005.74 |2 23 | |
245 | 1 | 0 | |a Integrity and Internal Control in Information Systems V |b IFIP TC11 / WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS) November 11–12, 2002, Bonn, Germany |c edited by Michael Gertz |
250 | |a 1st ed. 2003 | ||
264 | 1 | |a New York, NY |b Springer US |c 2003 | |
300 | |a 1 Online-Ressource (XII, 232 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a IFIP Advances in Information and Communication Technology |v 124 | |
520 | |a Integrity and Internal Control in Information Systems V represents a continuation of the dialogue between researchers, information security specialists, internal control specialists and the business community. The objectives of this dialogue are: -To present methods and techniques that will help business achieve the desired level of integrity in information systems and data; -To present the results of research that may be used in the near future to increase the level of integrity or help management maintain the desired level of integrity; -To investigate the shortcomings in the technologies presently in use, shortcomings that require attention in order to protect the integrity of systems in general. The book contains a collection of papers from the Fifth International Working Conference on Integrity and Internal Control in Information Systems (IICIS), sponsored by the International Federation for Information Processing (IFIP) and held in Bonn, Germany in November 2002 | ||
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Theory of Computation | |
650 | 4 | |a Information Systems Applications (incl. Internet) | |
650 | 4 | |a Accounting/Auditing | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computers | |
650 | 4 | |a Application software | |
650 | 4 | |a Accounting | |
650 | 4 | |a Bookkeeping | |
700 | 1 | |a Gertz, Michael |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781475755350 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781402074738 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781475755343 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-0-387-35693-8 |x Verlag |z URL des Eerstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032471139 | ||
966 | e | |u https://doi.org/10.1007/978-0-387-35693-8 |l UBY01 |p ZDB-2-SCS |q ZDB-2-SCS_2000/2004 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182061510033408 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Gertz, Michael |
author2_role | edt |
author2_variant | m g mg |
author_facet | Gertz, Michael |
building | Verbundindex |
bvnumber | BV047064027 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-0-387-35693-8 (OCoLC)1227478218 (DE-599)BVBBV047064027 |
dewey-full | 005.74 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.74 |
dewey-search | 005.74 |
dewey-sort | 15.74 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-0-387-35693-8 |
edition | 1st ed. 2003 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03008nmm a2200529zcb4500</leader><controlfield tag="001">BV047064027</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2003 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387356938</subfield><subfield code="9">978-0-387-35693-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-0-387-35693-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-0-387-35693-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227478218</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047064027</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.74</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Integrity and Internal Control in Information Systems V</subfield><subfield code="b">IFIP TC11 / WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS) November 11–12, 2002, Bonn, Germany</subfield><subfield code="c">edited by Michael Gertz</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2003</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer US</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XII, 232 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IFIP Advances in Information and Communication Technology</subfield><subfield code="v">124</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Integrity and Internal Control in Information Systems V represents a continuation of the dialogue between researchers, information security specialists, internal control specialists and the business community. The objectives of this dialogue are: -To present methods and techniques that will help business achieve the desired level of integrity in information systems and data; -To present the results of research that may be used in the near future to increase the level of integrity or help management maintain the desired level of integrity; -To investigate the shortcomings in the technologies presently in use, shortcomings that require attention in order to protect the integrity of systems in general. The book contains a collection of papers from the Fifth International Working Conference on Integrity and Internal Control in Information Systems (IICIS), sponsored by the International Federation for Information Processing (IFIP) and held in Bonn, Germany in November 2002</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Theory of Computation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems Applications (incl. Internet)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Accounting/Auditing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Accounting</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Bookkeeping </subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gertz, Michael</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781475755350</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781402074738</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781475755343</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-0-387-35693-8</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471139</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-0-387-35693-8</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047064027 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:12:21Z |
indexdate | 2024-07-10T09:01:34Z |
institution | BVB |
isbn | 9780387356938 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032471139 |
oclc_num | 1227478218 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (XII, 232 p) |
psigel | ZDB-2-SCS ZDB-2-SCS_2000/2004 ZDB-2-SCS ZDB-2-SCS_2000/2004 |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Springer US |
record_format | marc |
series2 | IFIP Advances in Information and Communication Technology |
spelling | Integrity and Internal Control in Information Systems V IFIP TC11 / WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS) November 11–12, 2002, Bonn, Germany edited by Michael Gertz 1st ed. 2003 New York, NY Springer US 2003 1 Online-Ressource (XII, 232 p) txt rdacontent c rdamedia cr rdacarrier IFIP Advances in Information and Communication Technology 124 Integrity and Internal Control in Information Systems V represents a continuation of the dialogue between researchers, information security specialists, internal control specialists and the business community. The objectives of this dialogue are: -To present methods and techniques that will help business achieve the desired level of integrity in information systems and data; -To present the results of research that may be used in the near future to increase the level of integrity or help management maintain the desired level of integrity; -To investigate the shortcomings in the technologies presently in use, shortcomings that require attention in order to protect the integrity of systems in general. The book contains a collection of papers from the Fifth International Working Conference on Integrity and Internal Control in Information Systems (IICIS), sponsored by the International Federation for Information Processing (IFIP) and held in Bonn, Germany in November 2002 Management of Computing and Information Systems Theory of Computation Information Systems Applications (incl. Internet) Accounting/Auditing Management information systems Computer science Computers Application software Accounting Bookkeeping Gertz, Michael edt Erscheint auch als Druck-Ausgabe 9781475755350 Erscheint auch als Druck-Ausgabe 9781402074738 Erscheint auch als Druck-Ausgabe 9781475755343 https://doi.org/10.1007/978-0-387-35693-8 Verlag URL des Eerstveröffentlichers Volltext |
spellingShingle | Integrity and Internal Control in Information Systems V IFIP TC11 / WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS) November 11–12, 2002, Bonn, Germany Management of Computing and Information Systems Theory of Computation Information Systems Applications (incl. Internet) Accounting/Auditing Management information systems Computer science Computers Application software Accounting Bookkeeping |
title | Integrity and Internal Control in Information Systems V IFIP TC11 / WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS) November 11–12, 2002, Bonn, Germany |
title_auth | Integrity and Internal Control in Information Systems V IFIP TC11 / WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS) November 11–12, 2002, Bonn, Germany |
title_exact_search | Integrity and Internal Control in Information Systems V IFIP TC11 / WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS) November 11–12, 2002, Bonn, Germany |
title_exact_search_txtP | Integrity and Internal Control in Information Systems V IFIP TC11 / WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS) November 11–12, 2002, Bonn, Germany |
title_full | Integrity and Internal Control in Information Systems V IFIP TC11 / WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS) November 11–12, 2002, Bonn, Germany edited by Michael Gertz |
title_fullStr | Integrity and Internal Control in Information Systems V IFIP TC11 / WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS) November 11–12, 2002, Bonn, Germany edited by Michael Gertz |
title_full_unstemmed | Integrity and Internal Control in Information Systems V IFIP TC11 / WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS) November 11–12, 2002, Bonn, Germany edited by Michael Gertz |
title_short | Integrity and Internal Control in Information Systems V |
title_sort | integrity and internal control in information systems v ifip tc11 wg11 5 fifth working conference on integrity and internal control in information systems iicis november 11 12 2002 bonn germany |
title_sub | IFIP TC11 / WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS) November 11–12, 2002, Bonn, Germany |
topic | Management of Computing and Information Systems Theory of Computation Information Systems Applications (incl. Internet) Accounting/Auditing Management information systems Computer science Computers Application software Accounting Bookkeeping |
topic_facet | Management of Computing and Information Systems Theory of Computation Information Systems Applications (incl. Internet) Accounting/Auditing Management information systems Computer science Computers Application software Accounting Bookkeeping |
url | https://doi.org/10.1007/978-0-387-35693-8 |
work_keys_str_mv | AT gertzmichael integrityandinternalcontrolininformationsystemsvifiptc11wg115fifthworkingconferenceonintegrityandinternalcontrolininformationsystemsiicisnovember11122002bonngermany |