登入
選單
返回
Google圖書搜尋
Integrity and Internal Control in Information Systems
Margaret E. van Biene-Hershey
Leon A.M. Strous
其他書名
Strategic Views on the Need for Control
出版
Springer
, 2013-04-17
主題
Computers / Computer Science
Business & Economics / Management
Business & Economics / Information Management
Computers / Information Theory
Science / System Theory
Computers / General
Business & Economics / Strategic Planning
Computers / Computer Architecture
Computers / Programming / Algorithms
Language Arts & Disciplines / Library & Information Science / General
Business & Economics / Business Mathematics
ISBN
0387355014
9780387355016
URL
http://books.google.com.hk/books?id=BMp9BwAAQBAJ&hl=&source=gbs_api
EBook
SAMPLE
註釋
This publication is a collection of papers from the Third International Working Conference of IFIP TC-11 Working group 11.5 on "Integrity and Internal Control in Information systems". IFIP TC-11 Working Group 11.5 explores the area of integrity within information systems and the relationship between integrity in information systems and the overall internal control systems that are established in organizations to support the corporate governance codes. We want to recommend this book to security specialists, IT auditors and researchers who want to learn more about the business concerns related to integrity. Those same security specialists, IT auditors and researchers will also value this book for the papers presenting research into new techniques and methods for obtaining the desired level of integrity. The third conference represents a continuation of the dialogue between information security specialists, internal control specialists and the business community. The conference objectives are: • To present methods and techniques that will help business achieve the desired level of integrity in information systems and data; • To present the results of research that may in future be used to increase the level of integrity or help management maintain the desired level of integrity; • To investigate the shortcomings in the technologies presently in use, shortcomings that require attention in order to protect the integrity of systems in general.