IS

Boockholdt, J. L.

Topic Weight Topic Terms
0.215 internal external audit auditing results sources closure auditors study control bridging appears integrity manager effectiveness
0.200 mis problems article systems management edp managers organizations ;br> data survey application examines need experiences
0.152 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed
0.111 risk risks management associated managing financial appropriate losses expected future literature reduce loss approach alternative

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

data integrity 1 Data security 1 internal controls 1 micro-computers 1
personal computers 1

Articles (1)

Implementing Security and Integrity in Micro-Mainframe Networks. (MIS Quarterly, 1989)
Authors: Abstract:
    This article examines the impact on computer security and data integrity of linking personal computers in user departments with the corporate mainframe computer. It describes the results of a survey of experts in computer security and integrity. In this survey, participants identified those security and integrity controls that become critical because of the micro-mainframe link. The risks associated with three ways of implementing the link are evaluated and procedures for controlling these risks are suggested.