메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 81-90

Enforcing business rules and information security policies through compliance audits

Author keywords

Audit; Compliance; Information security policies; Information security specifications

Indexed keywords

COMPUTATIONAL COMPLEXITY; INFORMATION MANAGEMENT; RISK ASSESSMENT; SECURITY OF DATA; STANDARDS;

EID: 33847152561     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (10)

References (17)
  • 1
    • 33847106990 scopus 로고    scopus 로고
    • ISACA, IT Control Objectives for Sarbanes-Oxley: The importance of IT in the design, implementation and sustainability of internal control over disclosure and financial reporting. 2004, Accessed on December 2005.
    • ISACA, "IT Control Objectives for Sarbanes-Oxley: The importance of IT in the design, implementation and sustainability of internal control over disclosure and financial reporting." 2004, Accessed on December 2005.
  • 2
    • 33847164323 scopus 로고    scopus 로고
    • SEC, Sarbanes Oxley Act 2002, U.S. Securities and Exchange Commission. Accessed on October 2005.
    • SEC, "Sarbanes Oxley Act 2002", U.S. Securities and Exchange Commission. Accessed on October 2005.
  • 3
    • 33847165567 scopus 로고    scopus 로고
    • Office of Government, Information Technology Infrastructure Library ITIL
    • Office of Government. Commerce (OGC), "Information Technology Infrastructure Library (ITIL)", 2005.
    • (2005) Commerce (OGC)
  • 4
    • 84864532762 scopus 로고    scopus 로고
    • Creating and Enforcing an Effective Information Security Policy
    • Ungerman, M., "Creating and Enforcing an Effective Information Security Policy.", Information Systems Control Journal, 2005.
    • (2005) Information Systems Control Journal
    • Ungerman, M.1
  • 6
    • 33847116012 scopus 로고    scopus 로고
    • E-Commerce PKI, E-Commerce PKI CA Glossary, http://www.ecommercepki.com/cps/glossary.htm, Accessed on January 2006.
    • E-Commerce PKI, "E-Commerce PKI CA Glossary", http://www.ecommercepki.com/cps/glossary.htm, Accessed on January 2006.
  • 7
    • 33847149105 scopus 로고    scopus 로고
    • Global Information Security Survey 2005
    • Ernst & Young, "Global Information Security Survey 2005", 2005.
    • (2005)
    • Ernst1    Young2
  • 15
    • 29744442262 scopus 로고    scopus 로고
    • Software Engineering Institute, SW-CMM, Accessed on December 2005
    • Software Engineering Institute, "Capability Maturity Model for Software (SW-CMM)", http://www.sei.cmu.edu/cmm/cmm.html. Accessed on December 2005
    • Capability Maturity Model for Software
  • 17
    • 33847128198 scopus 로고    scopus 로고
    • Meta Group, Accessed on December 2005
    • Meta Group, http://www.metagroup.com, Accessed on December 2005.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.