Integrity, Internal Control and Security in Information Systems

Connecting Governance and Technology

Nonfiction, Computers, Advanced Computing, Computer Science, Business & Finance, Industries & Professions, Information Management, General Computing
Cover of the book Integrity, Internal Control and Security in Information Systems by , Springer US
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9780387355832
Publisher: Springer US Publication: November 11, 2013
Imprint: Springer Language: English
Author:
ISBN: 9780387355832
Publisher: Springer US
Publication: November 11, 2013
Imprint: Springer
Language: English

IT Governance is finally getting the Board's and top management's attention. The value that IT needs to return and the associated risks that need to be managed, have become so important in many industries that enterprise survival depends on it. Information integrity is a significant part of the IT Governance challenge. Among other things, this conference will explore how Information Integrity contributes to the overall control and governance frameworks that enterprises need to put in place for IT to deliver business value and for corporate officers to be comfortable about the IT risks the enterprise faces. The goals for this international working conference are to find answers to the following questions: • what precisely do business managers need in order to have confidence in the integrity of their information systems and their data; • what is the status quo of research and development in this area; • where are the gaps between business needs on the one hand and research I development on the other; what needs to be done to bridge these gaps. The contributions have been divided in the following sections: • Refereed papers. These are papers that have been selected through a blind refereeing process by an international programme committee. • Invited papers. Well known experts present practice and research papers upon invitation by the programme committee. • Tutorial. Two papers describe the background, status quo and future development of CobiT as well as a case of an implementation of Co biT.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

IT Governance is finally getting the Board's and top management's attention. The value that IT needs to return and the associated risks that need to be managed, have become so important in many industries that enterprise survival depends on it. Information integrity is a significant part of the IT Governance challenge. Among other things, this conference will explore how Information Integrity contributes to the overall control and governance frameworks that enterprises need to put in place for IT to deliver business value and for corporate officers to be comfortable about the IT risks the enterprise faces. The goals for this international working conference are to find answers to the following questions: • what precisely do business managers need in order to have confidence in the integrity of their information systems and their data; • what is the status quo of research and development in this area; • where are the gaps between business needs on the one hand and research I development on the other; what needs to be done to bridge these gaps. The contributions have been divided in the following sections: • Refereed papers. These are papers that have been selected through a blind refereeing process by an international programme committee. • Invited papers. Well known experts present practice and research papers upon invitation by the programme committee. • Tutorial. Two papers describe the background, status quo and future development of CobiT as well as a case of an implementation of Co biT.

More books from Springer US

Cover of the book Business Process Reengineering by
Cover of the book Brain Plasticity, Learning, and Memory by
Cover of the book Ultra-Wideband and 60 GHz Communications for Biomedical Applications by
Cover of the book Languages for Digital Embedded Systems by
Cover of the book Theories of Alienation by
Cover of the book Archaeology and Created Memory by
Cover of the book Technological Systems in the Bio Industries by
Cover of the book Studies in Consumer Demand — Econometric Methods Applied to Market Data by
Cover of the book Passivity and Protection of Metals Against Corrosion by
Cover of the book Infant and Early Childhood Neuropsychology by
Cover of the book Infectious Complications of Cancer by
Cover of the book The Group Effect by
Cover of the book ICTs and the Millennium Development Goals by
Cover of the book Mucosal Delivery of Biopharmaceuticals by
Cover of the book Small Enterprise Development in South-East Europe by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy