The proceedings from the IFIP TC-11 WG 11.1 and WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems address the increasing need for ensuring proper standards of integrity and control in information systems in an organizational context. The aim of this research is to guarantee that data, software, and the business processes are complete, adequate, and valid for the intended functionality and expectations of the owner (i.e. the user organization).
The proceedings from the IFIP TC-11 WG 11.1 and WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems address the increasing need for ensuring proper standards of integrity and control in information systems in an organizational context. The aim of this research is to guarantee that data, software, and the business processes are complete, adequate, and valid for the intended functionality and expectations of the owner (i.e. the user organization).Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
Produktdetails
International Federation for Information Processing (IFIP) Vol.193
Paul Dowland, University of Plymouth, UK / Steve Furnell, University of Plymouth, UK / Bhavani Thuraisingham, University of Texas at Dallas, TX, USA / X. Sean Wang, The University of Vermont, Burlington, VT, USA
Inhaltsangabe
Information Security Standards: Adoption Drivers.- Data Quality Dimensions for Information Systems Security: A Theoretical Exposition.- How Much Should We Pay for Security?.- Employee Security Perception in Cultivating Information Security Culture.- A Policy Framework for Access Management in Federated Information Sharing.- A Heirarchical Release Control Policy Framework.- Risk Communication, Risk Perception, and Information Security.- A Holistic Risk Analysis Method for Identifying Information Security Risks.- A Responsibility Framework for Information Security.- Attack Aware Integrity Control in Databases.- Scalable Access Policy Administration.
Information Security Standards: Adoption Drivers.- Data Quality Dimensions for Information Systems Security: A Theoretical Exposition.- How Much Should We Pay for Security?.- Employee Security Perception in Cultivating Information Security Culture.- A Policy Framework for Access Management in Federated Information Sharing.- A Heirarchical Release Control Policy Framework.- Risk Communication, Risk Perception, and Information Security.- A Holistic Risk Analysis Method for Identifying Information Security Risks.- A Responsibility Framework for Information Security.- Attack Aware Integrity Control in Databases.- Scalable Access Policy Administration.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826