Buch, Englisch, Band 9, 294 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 464 g
Reihe: IFIP Advances in Information and Communication Technology
IFIP TC11 Working Group 11.5 Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results Warrenton, Virginia, USA November 19-20, 1998
Buch, Englisch, Band 9, 294 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 464 g
Reihe: IFIP Advances in Information and Communication Technology
ISBN: 978-1-4757-5533-6
Verlag: Springer US
Integrity and Internal Control in Information Systems contains the selected proceedings of the Second Working Conference on Integrity and Internal Control in Information Systems, sponsored by the International Federation for Information Processing (IFIP) and held in Warrenton, Virginia, USA, in November 1998. It will be essential reading for academics and practitioners in computer science, information technology, business informatics, accountancy and edp-auditing.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Algorithmen & Datenstrukturen
- Mathematik | Informatik EDV | Informatik Professionelle Anwendung
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Information Retrieval
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Data Warehouse
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Software Engineering
- Wirtschaftswissenschaften Betriebswirtschaft Wirtschaftsmathematik und -statistik
- Mathematik | Informatik Mathematik Numerik und Wissenschaftliches Rechnen Angewandte Mathematik, Mathematische Modelle
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
Weitere Infos & Material
1 Propagating integrity information among interrelated databases.- 2 Integrity constraint enforcement in a multidatabase using distributed active rules.- 3 The constraint operator of MedLan: its efficient implementation and use.- 4 Growing dependency on IT: the consequences thereof for the organization and for IT-auditors.- 5 TOP: an example of complex application controls.- 6 Algebra for databases with explicit markings of damaged data.- 7 Application of models from epidemiology to metrics for computer virus risk.- 8 Integrity control of spreadsheets: organisation & tools.- 9 Design basis for achieving information integrity — a feedback control system approach.- 10 Modification of integrity constraints through knowledge discovery.- 11 Managing data quality and integrity in federated databases.- 12 A logical formalization of integrity policies for database management systems.- 13 Maintaining integrity constraints and security in real-time database systems.- 14 Assurance — what is it?.- Two: General Information.- Index of contributors.- Keyword index.