- 2001
- Charles Bain, Donald B. Faatz, Amgad Fayad, Douglas E. Williams:
Diversity as a defense strategy in information systems. Does evidence from previous events support such an approach?. IICIS 2001: 77-94 - Alfred C. E. van Gils:
Implementation of the COBIT-3 maturity model in Royal Philips Electronics. IICIS 2001: 161-174 - Erik Guldentops:
Governing information technology through COBIT. IICIS 2001: 115-160 - Cynthia E. Irvine, Timothy E. Levin:
A cautionary note regarding the data integrity capacity of certain secure systems. IICIS 2001: 3-26 - Jim Jones:
Integrity and internal control in modern banking systems. IICIS 2001: 57-76 - Naftaly H. Minsky:
Establishing accounting principles as invariants of financial systems. IICIS 2001: 41-56 - Madhavan K. Nayar:
The information integrity imperative. IICIS 2001: 187-194 - Frank Piessens, Bart De Decker, Bart De Win:
Developing secure software. A survey and classification of common software vulnerabilities. IICIS 2001: 27-40 - Leon Strous:
The way forward. IICIS 2001: 197-200 - Bhavani Thuraisingham, Eric Hughes:
Data quality: developments and directions. IICIS 2001: 97-102 - Mike Ward:
Security in electronic payment systems EMV and CEPs. IICIS 2001: 103-112 - BartJan Wattel:
Business process security. Managing the new security challenge with X-Tra Secure. IICIS 2001: 177-186 - 1999
- Paul Ammann, Sushil Jajodia:
The Integrity Challenge. IICIS 1999: 59-70 - Joan L. Aron, Ronald A. Gove:
Application of Models from Epidemiology to Metrics for Computer Virus Risk - A Brief Update. IICIS 1999: 179-184 - Patrizia Asirelli, Fabrizio Fabbrini:
Firewall Policies Definition Tools: An Implementation Idea. IICIS 1999: 99-110 - Fayezul H. Choudhury, Philip Mitchell:
COSO in the Worldbank. IICIS 1999: 1-10 - Christina Yip Chung, Michael Gertz, Karl N. Levitt:
DEMIDS: A Misuse Detection System for Database Systems. IICIS 1999: 159-178 - Paloma Díaz, Ignacio Aedo, Fivos Panetsos:
Definition of Integrity Policies For Web-based Applications. IICIS 1999: 85-98 - Lars Frank:
Integrity Problems in Distributed Accounting Systems with Semantic ACID Properties. IICIS 1999: 147-158 - Wouter J. Keller, Roel G. J. Rot:
Integrity and Internal Control in a Statistical Environment. IICIS 1999: 71-84 - Vijay V. Mandke, Madhavan K. Nayar:
Implementing Information Integrity Technology - A Feedback Control System Approach. IICIS 1999: 23-40 - Robert Melville, Michael Hafen:
Control Models and Control Self Assessment: Results of a Survey of the IIA CSA Center. IICIS 1999: 11-22 - Piet J. M. Poos:
Complex IT Environments: Ascertaining Information Integrity. IICIS 1999: 121-146 - Kamalasen Rajalingham, David Chadwick, Brian Knight, Dilwyn Edwards:
Efficient Methods for Checking Integrity: An Integrated Spreadsheet Engineering Methodology (ISEM). IICIS 1999: 41-58 - Martin Stanek, Daniel Olejár:
Integrity Testing in WWW Environment. IICIS 1999: 111-120 - Margaret E. van Biene-Hershey, Leon Strous:
Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Third Working Conference on Integrity and Internal Control in Information Systems: Strategic Views on the Need for Control, Amsterdam, The Netherlands, November 18-19, 1999. IFIP Conference Proceedings 165, Kluwer 1999, ISBN 0-7923-7821-0 [contents] - 1998
- Marshall D. Abrams, Douglas J. Landoll, Gary Stoneburner:
Assurance - What is it? IICIS 1998: 271-284 - Quazi N. Ahmed, Susan V. Vrbsky:
Maintaining Integrity Constraints and Security in real-Time Database Systems. IICIS 1998: 255-270 - Joan L. Aron, Ronald A. Gove:
Application of Models from Epidemiology to Metrics for Computer Virus Risk. IICIS 1998: 131-145 - Patrizia Asirelli, Chiara Renso, Franco Turini:
The Constraint Operator of MedLan: Its Efficient Implementation and Use. IICIS 1998: 41-55