Integrity and Internal Control in Information Systems: Strategic Views on the Need for Control
This publication is a collection of papers from the Third International Working Conference of IFIP TC-11 Working group 11.5 on "Integrity and Internal Control in Information systems". IFIP TC-11 Working Group 11.5 explores the area of integrity within information systems and the relationsh...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer US
2000
|
Ausgabe: | 1st ed. 2000 |
Schriftenreihe: | IFIP Advances in Information and Communication Technology
37 |
Schlagworte: | |
Online-Zugang: | UBY01 Volltext |
Zusammenfassung: | This publication is a collection of papers from the Third International Working Conference of IFIP TC-11 Working group 11.5 on "Integrity and Internal Control in Information systems". IFIP TC-11 Working Group 11.5 explores the area of integrity within information systems and the relationship between integrity in information systems and the overall internal control systems that are established in organizations to support the corporate governance codes. We want to recommend this book to security specialists, IT auditors and researchers who want to learn more about the business concerns related to integrity. Those same security specialists, IT auditors and researchers will also value this book for the papers presenting research into new techniques and methods for obtaining the desired level of integrity. The third conference represents a continuation of the dialogue between information security specialists, internal control specialists and the business community. The conference objectives are: • To present methods and techniques that will help business achieve the desired level of integrity in information systems and data; • To present the results of research that may in future be used to increase the level of integrity or help management maintain the desired level of integrity; • To investigate the shortcomings in the technologies presently in use, shortcomings that require attention in order to protect the integrity of systems in general |
Beschreibung: | 1 Online-Ressource (XII, 192 p) |
ISBN: | 9780387355016 |
DOI: | 10.1007/978-0-387-35501-6 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV047064522 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2000 |||| o||u| ||||||eng d | ||
020 | |a 9780387355016 |9 978-0-387-35501-6 | ||
024 | 7 | |a 10.1007/978-0-387-35501-6 |2 doi | |
035 | |a (ZDB-2-SCS)978-0-387-35501-6 | ||
035 | |a (OCoLC)1227480466 | ||
035 | |a (DE-599)BVBBV047064522 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 004 |2 23 | |
245 | 1 | 0 | |a Integrity and Internal Control in Information Systems |b Strategic Views on the Need for Control |c edited by Margaret E. van Biene-Hershey, Leon A.M. Strous |
250 | |a 1st ed. 2000 | ||
264 | 1 | |a New York, NY |b Springer US |c 2000 | |
300 | |a 1 Online-Ressource (XII, 192 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a IFIP Advances in Information and Communication Technology |v 37 | |
520 | |a This publication is a collection of papers from the Third International Working Conference of IFIP TC-11 Working group 11.5 on "Integrity and Internal Control in Information systems". IFIP TC-11 Working Group 11.5 explores the area of integrity within information systems and the relationship between integrity in information systems and the overall internal control systems that are established in organizations to support the corporate governance codes. We want to recommend this book to security specialists, IT auditors and researchers who want to learn more about the business concerns related to integrity. Those same security specialists, IT auditors and researchers will also value this book for the papers presenting research into new techniques and methods for obtaining the desired level of integrity. The third conference represents a continuation of the dialogue between information security specialists, internal control specialists and the business community. The conference objectives are: • To present methods and techniques that will help business achieve the desired level of integrity in information systems and data; • To present the results of research that may in future be used to increase the level of integrity or help management maintain the desired level of integrity; • To investigate the shortcomings in the technologies presently in use, shortcomings that require attention in order to protect the integrity of systems in general | ||
650 | 4 | |a Computer Science, general | |
650 | 4 | |a Business Strategy/Leadership | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Data Structures and Information Theory | |
650 | 4 | |a Systems Theory, Control | |
650 | 4 | |a IT in Business | |
650 | 4 | |a Computer science | |
650 | 4 | |a Leadership | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a System theory | |
650 | 4 | |a Information technology | |
650 | 4 | |a Business—Data processing | |
700 | 1 | |a van Biene-Hershey, Margaret E. |4 edt | |
700 | 1 | |a Strous, Leon A.M. |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781475755312 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780792378211 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781475755305 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-0-387-35501-6 |x Verlag |z URL des Eerstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032471634 | ||
966 | e | |u https://doi.org/10.1007/978-0-387-35501-6 |l UBY01 |p ZDB-2-SCS |q ZDB-2-SCS_2000/2004 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182062634106880 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | van Biene-Hershey, Margaret E. Strous, Leon A.M |
author2_role | edt edt |
author2_variant | b h m e v bhme bhmev l a s la las |
author_facet | van Biene-Hershey, Margaret E. Strous, Leon A.M |
building | Verbundindex |
bvnumber | BV047064522 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-0-387-35501-6 (OCoLC)1227480466 (DE-599)BVBBV047064522 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-0-387-35501-6 |
edition | 1st ed. 2000 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03611nmm a2200577zcb4500</leader><controlfield tag="001">BV047064522</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2000 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387355016</subfield><subfield code="9">978-0-387-35501-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-0-387-35501-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-0-387-35501-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227480466</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047064522</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Integrity and Internal Control in Information Systems</subfield><subfield code="b">Strategic Views on the Need for Control</subfield><subfield code="c">edited by Margaret E. van Biene-Hershey, Leon A.M. Strous</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2000</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer US</subfield><subfield code="c">2000</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XII, 192 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IFIP Advances in Information and Communication Technology</subfield><subfield code="v">37</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This publication is a collection of papers from the Third International Working Conference of IFIP TC-11 Working group 11.5 on "Integrity and Internal Control in Information systems". IFIP TC-11 Working Group 11.5 explores the area of integrity within information systems and the relationship between integrity in information systems and the overall internal control systems that are established in organizations to support the corporate governance codes. We want to recommend this book to security specialists, IT auditors and researchers who want to learn more about the business concerns related to integrity. Those same security specialists, IT auditors and researchers will also value this book for the papers presenting research into new techniques and methods for obtaining the desired level of integrity. The third conference represents a continuation of the dialogue between information security specialists, internal control specialists and the business community. The conference objectives are: • To present methods and techniques that will help business achieve the desired level of integrity in information systems and data; • To present the results of research that may in future be used to increase the level of integrity or help management maintain the desired level of integrity; • To investigate the shortcomings in the technologies presently in use, shortcomings that require attention in order to protect the integrity of systems in general</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science, general</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business Strategy/Leadership</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems Theory, Control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IT in Business</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Leadership</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">System theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business—Data processing</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">van Biene-Hershey, Margaret E.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Strous, Leon A.M.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781475755312</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780792378211</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781475755305</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-0-387-35501-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471634</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-0-387-35501-6</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047064522 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:12:22Z |
indexdate | 2024-07-10T09:01:35Z |
institution | BVB |
isbn | 9780387355016 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032471634 |
oclc_num | 1227480466 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (XII, 192 p) |
psigel | ZDB-2-SCS ZDB-2-SCS_2000/2004 ZDB-2-SCS ZDB-2-SCS_2000/2004 |
publishDate | 2000 |
publishDateSearch | 2000 |
publishDateSort | 2000 |
publisher | Springer US |
record_format | marc |
series2 | IFIP Advances in Information and Communication Technology |
spelling | Integrity and Internal Control in Information Systems Strategic Views on the Need for Control edited by Margaret E. van Biene-Hershey, Leon A.M. Strous 1st ed. 2000 New York, NY Springer US 2000 1 Online-Ressource (XII, 192 p) txt rdacontent c rdamedia cr rdacarrier IFIP Advances in Information and Communication Technology 37 This publication is a collection of papers from the Third International Working Conference of IFIP TC-11 Working group 11.5 on "Integrity and Internal Control in Information systems". IFIP TC-11 Working Group 11.5 explores the area of integrity within information systems and the relationship between integrity in information systems and the overall internal control systems that are established in organizations to support the corporate governance codes. We want to recommend this book to security specialists, IT auditors and researchers who want to learn more about the business concerns related to integrity. Those same security specialists, IT auditors and researchers will also value this book for the papers presenting research into new techniques and methods for obtaining the desired level of integrity. The third conference represents a continuation of the dialogue between information security specialists, internal control specialists and the business community. The conference objectives are: • To present methods and techniques that will help business achieve the desired level of integrity in information systems and data; • To present the results of research that may in future be used to increase the level of integrity or help management maintain the desired level of integrity; • To investigate the shortcomings in the technologies presently in use, shortcomings that require attention in order to protect the integrity of systems in general Computer Science, general Business Strategy/Leadership Management of Computing and Information Systems Data Structures and Information Theory Systems Theory, Control IT in Business Computer science Leadership Management information systems Data structures (Computer science) System theory Information technology Business—Data processing van Biene-Hershey, Margaret E. edt Strous, Leon A.M. edt Erscheint auch als Druck-Ausgabe 9781475755312 Erscheint auch als Druck-Ausgabe 9780792378211 Erscheint auch als Druck-Ausgabe 9781475755305 https://doi.org/10.1007/978-0-387-35501-6 Verlag URL des Eerstveröffentlichers Volltext |
spellingShingle | Integrity and Internal Control in Information Systems Strategic Views on the Need for Control Computer Science, general Business Strategy/Leadership Management of Computing and Information Systems Data Structures and Information Theory Systems Theory, Control IT in Business Computer science Leadership Management information systems Data structures (Computer science) System theory Information technology Business—Data processing |
title | Integrity and Internal Control in Information Systems Strategic Views on the Need for Control |
title_auth | Integrity and Internal Control in Information Systems Strategic Views on the Need for Control |
title_exact_search | Integrity and Internal Control in Information Systems Strategic Views on the Need for Control |
title_exact_search_txtP | Integrity and Internal Control in Information Systems Strategic Views on the Need for Control |
title_full | Integrity and Internal Control in Information Systems Strategic Views on the Need for Control edited by Margaret E. van Biene-Hershey, Leon A.M. Strous |
title_fullStr | Integrity and Internal Control in Information Systems Strategic Views on the Need for Control edited by Margaret E. van Biene-Hershey, Leon A.M. Strous |
title_full_unstemmed | Integrity and Internal Control in Information Systems Strategic Views on the Need for Control edited by Margaret E. van Biene-Hershey, Leon A.M. Strous |
title_short | Integrity and Internal Control in Information Systems |
title_sort | integrity and internal control in information systems strategic views on the need for control |
title_sub | Strategic Views on the Need for Control |
topic | Computer Science, general Business Strategy/Leadership Management of Computing and Information Systems Data Structures and Information Theory Systems Theory, Control IT in Business Computer science Leadership Management information systems Data structures (Computer science) System theory Information technology Business—Data processing |
topic_facet | Computer Science, general Business Strategy/Leadership Management of Computing and Information Systems Data Structures and Information Theory Systems Theory, Control IT in Business Computer science Leadership Management information systems Data structures (Computer science) System theory Information technology Business—Data processing |
url | https://doi.org/10.1007/978-0-387-35501-6 |
work_keys_str_mv | AT vanbienehersheymargarete integrityandinternalcontrolininformationsystemsstrategicviewsontheneedforcontrol AT strousleonam integrityandinternalcontrolininformationsystemsstrategicviewsontheneedforcontrol |