Managing Enterprise Information Integrity: Security, Control and Audit Issues

Managing Enterprise Information Integrity: Security, Control and Audit Issues by IT Governance Institute epub pdf fb2

Title: Managing Enterprise Information Integrity: Security, Control and Audit Issues
Author: IT Governance Institute
ISBN10: 1893209636
ISBN13: 978-1893209633
Publisher: Isaca (November 1, 2004)
Language: English
Subcategory: Certification
Size PDF: 1827 kb
Size Fb2: 1485 kb
Rating: 4.8/5
Votes: 419
Pages: 146 pages
Other Format: docx lrf mbr azw

Managing Enterprise Information Integrity: Security, Control and Audit Issues by IT Governance Institute


pdf epub fb2 djvu



A limitation of today s control and assurance efforts, related to information integrity, is that the frameworks of the accounting and auditing profession have focused almost exclusively on financial information. As the focus of information integrity control and assurance efforts expands to other performance management and reporting information and decision-related information beyond financial information, a need arises for a comprehensive understanding of information integrity issues. The findings of this research, which are highlighted in the document, identify and validate the key dimensions of information integrity and key information integrity risk areas. Recommendations are provided throughout that will be of interest to data/information quality managers, assurance providers and acamadics. Some of the highlights of the publication include:

A set of definitions and distinctions to focus on the meaning of information integrity defined as representational faithfulness to the subject matter of the information and distinguish this concept from other conceptions about information quality A framework idenfying four key attributes of information integrity (completeness, currency, accuracy and validity) and seven key enablers (security, availability, understandability, consistency, dependability, verifiability and credibility). This framework extends the professional literature which does not currently contain a comprehensive, generally accepted information integrity framework, as described more fully in this document. A decomposition of system processing phases and system development life cycle phases that enables linking information integrity attributes and enablers to sources of error, and likewise linking countermeasures to specific information integrity attributes and enablers