Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology
IT Governance is finally getting the Board's and top management's attention. The value that IT needs to return and the associated risks that need to be managed, have become so important in many industries that enterprise survival depends on it. Information integrity is a significant part o...
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer US
2002
|
Ausgabe: | 1st ed. 2002 |
Schriftenreihe: | IFIP Advances in Information and Communication Technology
83 |
Schlagworte: | |
Online-Zugang: | UBY01 Volltext |
Zusammenfassung: | IT Governance is finally getting the Board's and top management's attention. The value that IT needs to return and the associated risks that need to be managed, have become so important in many industries that enterprise survival depends on it. Information integrity is a significant part of the IT Governance challenge. Among other things, this conference will explore how Information Integrity contributes to the overall control and governance frameworks that enterprises need to put in place for IT to deliver business value and for corporate officers to be comfortable about the IT risks the enterprise faces. The goals for this international working conference are to find answers to the following questions: • what precisely do business managers need in order to have confidence in the integrity of their information systems and their data; • what is the status quo of research and development in this area; • where are the gaps between business needs on the one hand and research I development on the other; what needs to be done to bridge these gaps. The contributions have been divided in the following sections: • Refereed papers. These are papers that have been selected through a blind refereeing process by an international programme committee. • Invited papers. Well known experts present practice and research papers upon invitation by the programme committee. • Tutorial. Two papers describe the background, status quo and future development of CobiT as well as a case of an implementation of Co biT. |
Beschreibung: | 1 Online-Ressource (X, 204 p) |
ISBN: | 9780387355832 |
DOI: | 10.1007/978-0-387-35583-2 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV047064538 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2002 |||| o||u| ||||||eng d | ||
020 | |a 9780387355832 |9 978-0-387-35583-2 | ||
024 | 7 | |a 10.1007/978-0-387-35583-2 |2 doi | |
035 | |a (ZDB-2-SCS)978-0-387-35583-2 | ||
035 | |a (OCoLC)1227481769 | ||
035 | |a (DE-599)BVBBV047064538 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 005.74 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a Integrity, Internal Control and Security in Information Systems |b Connecting Governance and Technology |c edited by Michael Gertz, Erik Guldentops, Leon A.M. Strous |
250 | |a 1st ed. 2002 | ||
264 | 1 | |a New York, NY |b Springer US |c 2002 | |
300 | |a 1 Online-Ressource (X, 204 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a IFIP Advances in Information and Communication Technology |v 83 | |
520 | |a IT Governance is finally getting the Board's and top management's attention. The value that IT needs to return and the associated risks that need to be managed, have become so important in many industries that enterprise survival depends on it. Information integrity is a significant part of the IT Governance challenge. Among other things, this conference will explore how Information Integrity contributes to the overall control and governance frameworks that enterprises need to put in place for IT to deliver business value and for corporate officers to be comfortable about the IT risks the enterprise faces. The goals for this international working conference are to find answers to the following questions: • what precisely do business managers need in order to have confidence in the integrity of their information systems and their data; • what is the status quo of research and development in this area; • where are the gaps between business needs on the one hand and research I development on the other; what needs to be done to bridge these gaps. The contributions have been divided in the following sections: • Refereed papers. These are papers that have been selected through a blind refereeing process by an international programme committee. • Invited papers. Well known experts present practice and research papers upon invitation by the programme committee. • Tutorial. Two papers describe the background, status quo and future development of CobiT as well as a case of an implementation of Co biT. | ||
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Theory of Computation | |
650 | 4 | |a Information Systems Applications (incl. Internet) | |
650 | 4 | |a Accounting/Auditing | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computers | |
650 | 4 | |a Application software | |
650 | 4 | |a Accounting | |
650 | 4 | |a Bookkeeping | |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 1 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Gertz, Michael |4 edt | |
700 | 1 | |a Guldentops, Erik |4 edt | |
700 | 1 | |a Strous, Leon A.M. |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781475755374 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781402070051 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781475755367 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-0-387-35583-2 |x Verlag |z URL des Eerstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032471650 | ||
966 | e | |u https://doi.org/10.1007/978-0-387-35583-2 |l UBY01 |p ZDB-2-SCS |q ZDB-2-SCS_2000/2004 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182062716944384 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Gertz, Michael Guldentops, Erik Strous, Leon A.M |
author2_role | edt edt edt |
author2_variant | m g mg e g eg l a s la las |
author_facet | Gertz, Michael Guldentops, Erik Strous, Leon A.M |
building | Verbundindex |
bvnumber | BV047064538 |
classification_rvk | ST 277 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-0-387-35583-2 (OCoLC)1227481769 (DE-599)BVBBV047064538 |
dewey-full | 005.74 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.74 |
dewey-search | 005.74 |
dewey-sort | 15.74 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-0-387-35583-2 |
edition | 1st ed. 2002 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03859nmm a2200625zcb4500</leader><controlfield tag="001">BV047064538</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2002 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387355832</subfield><subfield code="9">978-0-387-35583-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-0-387-35583-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-0-387-35583-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227481769</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047064538</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.74</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Integrity, Internal Control and Security in Information Systems</subfield><subfield code="b">Connecting Governance and Technology</subfield><subfield code="c">edited by Michael Gertz, Erik Guldentops, Leon A.M. Strous</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2002</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer US</subfield><subfield code="c">2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (X, 204 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IFIP Advances in Information and Communication Technology</subfield><subfield code="v">83</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">IT Governance is finally getting the Board's and top management's attention. The value that IT needs to return and the associated risks that need to be managed, have become so important in many industries that enterprise survival depends on it. Information integrity is a significant part of the IT Governance challenge. Among other things, this conference will explore how Information Integrity contributes to the overall control and governance frameworks that enterprises need to put in place for IT to deliver business value and for corporate officers to be comfortable about the IT risks the enterprise faces. The goals for this international working conference are to find answers to the following questions: • what precisely do business managers need in order to have confidence in the integrity of their information systems and their data; • what is the status quo of research and development in this area; • where are the gaps between business needs on the one hand and research I development on the other; what needs to be done to bridge these gaps. The contributions have been divided in the following sections: • Refereed papers. These are papers that have been selected through a blind refereeing process by an international programme committee. • Invited papers. Well known experts present practice and research papers upon invitation by the programme committee. • Tutorial. Two papers describe the background, status quo and future development of CobiT as well as a case of an implementation of Co biT.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Theory of Computation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems Applications (incl. Internet)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Accounting/Auditing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Accounting</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Bookkeeping </subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gertz, Michael</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Guldentops, Erik</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Strous, Leon A.M.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781475755374</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781402070051</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781475755367</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-0-387-35583-2</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471650</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-0-387-35583-2</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047064538 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:12:22Z |
indexdate | 2024-07-10T09:01:35Z |
institution | BVB |
isbn | 9780387355832 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032471650 |
oclc_num | 1227481769 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (X, 204 p) |
psigel | ZDB-2-SCS ZDB-2-SCS_2000/2004 ZDB-2-SCS ZDB-2-SCS_2000/2004 |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Springer US |
record_format | marc |
series2 | IFIP Advances in Information and Communication Technology |
spelling | Integrity, Internal Control and Security in Information Systems Connecting Governance and Technology edited by Michael Gertz, Erik Guldentops, Leon A.M. Strous 1st ed. 2002 New York, NY Springer US 2002 1 Online-Ressource (X, 204 p) txt rdacontent c rdamedia cr rdacarrier IFIP Advances in Information and Communication Technology 83 IT Governance is finally getting the Board's and top management's attention. The value that IT needs to return and the associated risks that need to be managed, have become so important in many industries that enterprise survival depends on it. Information integrity is a significant part of the IT Governance challenge. Among other things, this conference will explore how Information Integrity contributes to the overall control and governance frameworks that enterprises need to put in place for IT to deliver business value and for corporate officers to be comfortable about the IT risks the enterprise faces. The goals for this international working conference are to find answers to the following questions: • what precisely do business managers need in order to have confidence in the integrity of their information systems and their data; • what is the status quo of research and development in this area; • where are the gaps between business needs on the one hand and research I development on the other; what needs to be done to bridge these gaps. The contributions have been divided in the following sections: • Refereed papers. These are papers that have been selected through a blind refereeing process by an international programme committee. • Invited papers. Well known experts present practice and research papers upon invitation by the programme committee. • Tutorial. Two papers describe the background, status quo and future development of CobiT as well as a case of an implementation of Co biT. Management of Computing and Information Systems Theory of Computation Information Systems Applications (incl. Internet) Accounting/Auditing Management information systems Computer science Computers Application software Accounting Bookkeeping Datenschutz (DE-588)4011134-9 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Datensicherung (DE-588)4011144-1 s Datenschutz (DE-588)4011134-9 s DE-604 Gertz, Michael edt Guldentops, Erik edt Strous, Leon A.M. edt Erscheint auch als Druck-Ausgabe 9781475755374 Erscheint auch als Druck-Ausgabe 9781402070051 Erscheint auch als Druck-Ausgabe 9781475755367 https://doi.org/10.1007/978-0-387-35583-2 Verlag URL des Eerstveröffentlichers Volltext |
spellingShingle | Integrity, Internal Control and Security in Information Systems Connecting Governance and Technology Management of Computing and Information Systems Theory of Computation Information Systems Applications (incl. Internet) Accounting/Auditing Management information systems Computer science Computers Application software Accounting Bookkeeping Datenschutz (DE-588)4011134-9 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4011134-9 (DE-588)4011144-1 |
title | Integrity, Internal Control and Security in Information Systems Connecting Governance and Technology |
title_auth | Integrity, Internal Control and Security in Information Systems Connecting Governance and Technology |
title_exact_search | Integrity, Internal Control and Security in Information Systems Connecting Governance and Technology |
title_exact_search_txtP | Integrity, Internal Control and Security in Information Systems Connecting Governance and Technology |
title_full | Integrity, Internal Control and Security in Information Systems Connecting Governance and Technology edited by Michael Gertz, Erik Guldentops, Leon A.M. Strous |
title_fullStr | Integrity, Internal Control and Security in Information Systems Connecting Governance and Technology edited by Michael Gertz, Erik Guldentops, Leon A.M. Strous |
title_full_unstemmed | Integrity, Internal Control and Security in Information Systems Connecting Governance and Technology edited by Michael Gertz, Erik Guldentops, Leon A.M. Strous |
title_short | Integrity, Internal Control and Security in Information Systems |
title_sort | integrity internal control and security in information systems connecting governance and technology |
title_sub | Connecting Governance and Technology |
topic | Management of Computing and Information Systems Theory of Computation Information Systems Applications (incl. Internet) Accounting/Auditing Management information systems Computer science Computers Application software Accounting Bookkeeping Datenschutz (DE-588)4011134-9 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Management of Computing and Information Systems Theory of Computation Information Systems Applications (incl. Internet) Accounting/Auditing Management information systems Computer science Computers Application software Accounting Bookkeeping Datenschutz Datensicherung |
url | https://doi.org/10.1007/978-0-387-35583-2 |
work_keys_str_mv | AT gertzmichael integrityinternalcontrolandsecurityininformationsystemsconnectinggovernanceandtechnology AT guldentopserik integrityinternalcontrolandsecurityininformationsystemsconnectinggovernanceandtechnology AT strousleonam integrityinternalcontrolandsecurityininformationsystemsconnectinggovernanceandtechnology |