Ebook: Integrity and Internal Control in Information Systems: Volume 1: Increasing the confidence in information systems
- Tags: Business Information Systems, Data Structures Cryptology and Information Theory, Information Storage and Retrieval, Systems Theory Control
- Series: IFIP — The International Federation for Information Processing
- Year: 1997
- Publisher: Springer US
- Edition: 1
- Language: English
- pdf
Dear readers, Although it is well-known that confidentiality, integrity and availability are high level objectives of information security, much of the attention in the security arena has been devoted to the confidentiality and availability aspects of security. IFIP TC-ll Working Group 11. 5 has been charged with exploring the area of the integrity objective within information security and the relationship between integrity in information systems and the overall internal control systems that are established in organizations to support the corporate governance codes. In this collection you will not only find the papers that have been presented during the first working conference dedicated to the subject (section A) but also some of the papers that have formed the basis for the current activities of this working group (section B). Finally some information about IFIP TC-ll and its working groups is included (section C). This first working conference is the start for an ongoing dialog between the information security specialists and the internal control specialists so that both may work more effectively together to assist in creating effective business systems in the future.
Content:
Front Matter....Pages i-viii
Front Matter....Pages 1-4
Establishing an information security strategy....Pages 5-21
Towards Continuously Auditable Systems....Pages 23-41
Maintaining temporal integrity of World Wide Web pages....Pages 43-63
Dynamic integrity constraints definition and enforcement in databases: a classification framework....Pages 65-87
An Extensible Framework for Repairing Constraint Violations....Pages 89-111
Query Answering in Information Systems with Integrity Constraints....Pages 113-130
Optimistic Concurrency Control for Maintaining the Global Integrity Constraint in MDBSs....Pages 131-151
The Integrity of Electronic Evidence....Pages 153-186
Integrity: definition, subdivision, challenge....Pages 187-194
Managing with Less than Absolute Integrity....Pages 195-202
Integrity: Do You Know Where Your Objects Are?....Pages 203-215
A Model for Specifying Individual Integrity Constraints on Objects....Pages 217-235
View Constraints: an Interpretation of Integrity Constraints for Security....Pages 237-252
Control of Information and Communication Technology: an Integrity Problem....Pages 253-254
Changing Definitions of Internal Control and Information Systems Integrity....Pages 255-272
Information Integrity In End-user Systems....Pages 273-292
Front Matter....Pages 293-293
Integrity in Information Systems....Pages 295-340
Detecting Data Integrity Failures....Pages 341-348
The effects of Time on Integrity in Information Systems....Pages 349-358
IFIP TC-11....Pages 361-368
Back Matter....Pages 369-370
Content:
Front Matter....Pages i-viii
Front Matter....Pages 1-4
Establishing an information security strategy....Pages 5-21
Towards Continuously Auditable Systems....Pages 23-41
Maintaining temporal integrity of World Wide Web pages....Pages 43-63
Dynamic integrity constraints definition and enforcement in databases: a classification framework....Pages 65-87
An Extensible Framework for Repairing Constraint Violations....Pages 89-111
Query Answering in Information Systems with Integrity Constraints....Pages 113-130
Optimistic Concurrency Control for Maintaining the Global Integrity Constraint in MDBSs....Pages 131-151
The Integrity of Electronic Evidence....Pages 153-186
Integrity: definition, subdivision, challenge....Pages 187-194
Managing with Less than Absolute Integrity....Pages 195-202
Integrity: Do You Know Where Your Objects Are?....Pages 203-215
A Model for Specifying Individual Integrity Constraints on Objects....Pages 217-235
View Constraints: an Interpretation of Integrity Constraints for Security....Pages 237-252
Control of Information and Communication Technology: an Integrity Problem....Pages 253-254
Changing Definitions of Internal Control and Information Systems Integrity....Pages 255-272
Information Integrity In End-user Systems....Pages 273-292
Front Matter....Pages 293-293
Integrity in Information Systems....Pages 295-340
Detecting Data Integrity Failures....Pages 341-348
The effects of Time on Integrity in Information Systems....Pages 349-358
IFIP TC-11....Pages 361-368
Back Matter....Pages 369-370
....