Coverart for item
The Resource Integrity and Internal Control in Information Systems : IFIP TC11 Working Group 11.5 Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results Warrenton, Virginia, USA November 19–20, 1998, edited by Sushil Jajodia, William List, Graeme W. McGregor, Leon A. M. Strous, (electronic resource)

Integrity and Internal Control in Information Systems : IFIP TC11 Working Group 11.5 Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results Warrenton, Virginia, USA November 19–20, 1998, edited by Sushil Jajodia, William List, Graeme W. McGregor, Leon A. M. Strous, (electronic resource)

Label
Integrity and Internal Control in Information Systems : IFIP TC11 Working Group 11.5 Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results Warrenton, Virginia, USA November 19–20, 1998
Title
Integrity and Internal Control in Information Systems
Title remainder
IFIP TC11 Working Group 11.5 Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results Warrenton, Virginia, USA November 19–20, 1998
Statement of responsibility
edited by Sushil Jajodia, William List, Graeme W. McGregor, Leon A. M. Strous
Creator
Contributor
Editor
Provider
Subject
Language
eng
Summary
Integrity and Internal Control in Information Systems is a state-of-the-art book that establishes the basis for an ongoing dialogue between the IT security specialists and the internal control specialists so that both may work more effectively together to assist in creating effective business systems in the future. Building on the issues presented in the preceding volume of this series, this book seeks further answers to the following questions: What precisely do business managers need in order to have confidence in the integrity of their information systems and their data? What is the status quo of research and development in this area? Where are the gaps between business needs on the one hand and research/development on the other; what needs to be done to bridge these gaps? Integrity and Internal Control in Information Systems contains the selected proceedings of the Second Working Conference on Integrity and Internal Control in Information Systems, sponsored by the International Federation for Information Processing (IFIP) and held in Warrenton, Virginia, USA, in November 1998. It will be essential reading for academics and practitioners in computer science, information technology, business informatics, accountancy and edp-auditing
Member of
http://library.link/vocab/creatorName
Jajodia, Sushil
Image bit depth
0
LC call number
HF54.5-54.56
Literary form
non fiction
http://library.link/vocab/relatedWorkOrContributorName
  • List, William.
  • McGregor, Graeme W.
  • Strous, Leon A. M.
  • SpringerLink
Series statement
IFIP — The International Federation for Information Processing,
Series volume
9
http://library.link/vocab/subjectName
  • Economics
  • Data structures (Computer science)
  • Information storage and retrieval systems
  • Systems theory
  • Management information systems
  • Economics/Management Science
  • Business Information Systems
  • Data Structures, Cryptology and Information Theory
  • Information Storage and Retrieval
  • Systems Theory, Control
Label
Integrity and Internal Control in Information Systems : IFIP TC11 Working Group 11.5 Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results Warrenton, Virginia, USA November 19–20, 1998, edited by Sushil Jajodia, William List, Graeme W. McGregor, Leon A. M. Strous, (electronic resource)
Instantiates
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
1 Propagating integrity information among interrelated databases -- 2 Integrity constraint enforcement in a multidatabase using distributed active rules -- 3 The constraint operator of MedLan: its efficient implementation and use -- 4 Growing dependency on IT: the consequences thereof for the organization and for IT-auditors -- 5 TOP: an example of complex application controls -- 6 Algebra for databases with explicit markings of damaged data -- 7 Application of models from epidemiology to metrics for computer virus risk -- 8 Integrity control of spreadsheets: organisation & tools -- 9 Design basis for achieving information integrity — a feedback control system approach -- 10 Modification of integrity constraints through knowledge discovery -- 11 Managing data quality and integrity in federated databases -- 12 A logical formalization of integrity policies for database management systems -- 13 Maintaining integrity constraints and security in real-time database systems -- 14 Assurance — what is it? -- Two: General Information -- Index of contributors -- Keyword index
Dimensions
unknown
Extent
VIII, 292 p.
File format
multiple file formats
Form of item
electronic
Isbn
9780387353968
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-0-387-35396-8
Other physical details
online resource.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(DE-He213)978-0-387-35396-8
Label
Integrity and Internal Control in Information Systems : IFIP TC11 Working Group 11.5 Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results Warrenton, Virginia, USA November 19–20, 1998, edited by Sushil Jajodia, William List, Graeme W. McGregor, Leon A. M. Strous, (electronic resource)
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
1 Propagating integrity information among interrelated databases -- 2 Integrity constraint enforcement in a multidatabase using distributed active rules -- 3 The constraint operator of MedLan: its efficient implementation and use -- 4 Growing dependency on IT: the consequences thereof for the organization and for IT-auditors -- 5 TOP: an example of complex application controls -- 6 Algebra for databases with explicit markings of damaged data -- 7 Application of models from epidemiology to metrics for computer virus risk -- 8 Integrity control of spreadsheets: organisation & tools -- 9 Design basis for achieving information integrity — a feedback control system approach -- 10 Modification of integrity constraints through knowledge discovery -- 11 Managing data quality and integrity in federated databases -- 12 A logical formalization of integrity policies for database management systems -- 13 Maintaining integrity constraints and security in real-time database systems -- 14 Assurance — what is it? -- Two: General Information -- Index of contributors -- Keyword index
Dimensions
unknown
Extent
VIII, 292 p.
File format
multiple file formats
Form of item
electronic
Isbn
9780387353968
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-0-387-35396-8
Other physical details
online resource.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(DE-He213)978-0-387-35396-8

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...