Skip to main content
  • Conference proceedings
  • © 2005

Security Management, Integrity, and Internal Control in Information Systems

IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference

  • Presents the most current research on security standards, management, and policy in information systems
  • Includes supplementary material: sn.pub/extras

Conference proceedings info: IICIS 2004.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (24 papers)

  1. Front Matter

    Pages i-xi
  2. Security Standards

    1. Front Matter

      Pages xiii-xiii
    2. Information Security Standards: Adoption Drivers (Invited Paper)

      • Jean-Noel Ezingeard, David Birchall
      Pages 1-20
    3. Data Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper)

      • Gurvirender Tejay, Gurpreet Dhillon, Amita Goyal Chin
      Pages 21-39
    4. From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper)

      • C. Farkas, V. Gowadia, A. Jain, D. Roy
      Pages 41-55
  3. Security Culture

    1. Front Matter

      Pages 57-57
    2. How Much Should We Pay for Security? (Invited Paper)

      • Sokratis K. Katsikas, Athanasios N. Yannacopoulos, Stefanos Gritzalis, Costas Lambrinoudakis, Peter Hatzopoulos
      Pages 59-69
    3. Do Not Ship, or Receive, Trojan Horses

      • Corey Hirsch
      Pages 71-82
  4. Access Management

    1. Front Matter

      Pages 93-93
    2. A Policy Framework for Access Management in Federated Information Sharing

      • Rafae Bhatti, Elisa Bertino, Arif Ghafoor
      Pages 95-120
    3. A Hierarchical Release Control Policy Framework

      • Chao Yao, William H. Winsborough, Sushil Jajodia
      Pages 121-137
  5. Risk Management

    1. Front Matter

      Pages 139-139
    2. Managing Uncertainty in Security Risk Model Forecasts with RAPSA/MC

      • James R. Conrad, Paul Oman, Carol Taylor
      Pages 141-156
    3. The Mitigation of ICT Risks Using Emitl Tool: An Empirical Study

      • Jabiri Kuwe Bakari, Christer Magnusson, Charles N. Tarimo, Louise Yngström
      Pages 157-173
    4. Risk Communication, Risk Perception and Information Security

      • Malcolm Pattinson, Grantley Anderson
      Pages 175-184
  6. Security Culture

    1. Front Matter

      Pages 203-203
    2. A Responsibility Framework for Information Security

      • Shaun Posthumus, Rossouw von Solms
      Pages 205-221
    3. Information Security Governance - A Re-Definition

      • Rahul Rastogi, Rossouw von Solms
      Pages 223-236

Other Volumes

  1. Security Management, Integrity, and Internal Control in Information Systems

About this book

This is the first joint working conference between the IFIP Working Groups 11. 1 and 11. 5. We hope this joint conference will promote collaboration among researchers who focus on the security management issues and those who are interested in integrity and control of information systems. Indeed, as management at any level may be increasingly held answerable for the reliable and secure operation of the information systems and services in their respective organizations in the same manner as they are for financial aspects of the enterprise, there is an increasing need for ensuring proper standards of integrity and control in information systems in order to ensure that data, software and, ultimately, the business processes are complete, adequate and valid for intended functionality and expectations of the owner (i. e. the user organization). As organizers, we would like to thank the members of the international program committee for their review work during the paper selection process. We would also like to thank the authors of the invited papers, who added valuable contribution to this first joint working conference. Paul Dowland X. Sean Wang December 2005 Contents Preface vii Session 1 - Security Standards Information Security Standards: Adoption Drivers (Invited Paper) 1 JEAN-NOEL EZINGEARD AND DAVID BIRCHALL Data Quality Dimensions for Information Systems Security: A Theorectical Exposition (Invited Paper) 21 GURVIRENDER TEJAY, GURPREET DHILLON, AND AMITA GOYAL CHIN From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper) 41 C. FARKAS, V. GowADiA, A. JAIN, AND D.

Editors and Affiliations

  • University of Plymouth, Plymouth

    Paul Dowland, Steve Furnell

  • University of Texas, Dallas

    Bhavani Thuraisingham

  • The University of Vermont

    X. Sean Wang

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access