Search results

1 – 10 of over 9000

Abstract

Details

Database Management Systems
Type: Book
ISBN: 978-1-78756-695-8

Abstract

Details

Database Management Systems
Type: Book
ISBN: 978-1-78756-695-8

Abstract

Details

Database Management Systems
Type: Book
ISBN: 978-1-78756-695-8

Abstract

Details

Advances in Librarianship
Type: Book
ISBN: 978-0-12024-617-5

Book part
Publication date: 8 March 2018

S. Michael Groomer and Uday S. Murthy

This paper demonstrates an approach to address the unique control and security concerns in database environments by using audit modules embedded into application programs…

Abstract

This paper demonstrates an approach to address the unique control and security concerns in database environments by using audit modules embedded into application programs. Embedded audit modules (EAM) are sections of code built into application programs that capture information of audit significance on a continuous basis. The implementation of EAMs is presented using INGRESS a relational database management system. An interface which enables the auditor to access audit-related information stored in the database is also presented. The use of EAMs as an audit tool for compliance and substantive testing is discussed. Advantages and disadvantages of employing EAMs in database environments and future directions in this line of research are discussed.

Details

Continuous Auditing
Type: Book
ISBN: 978-1-78743-413-4

Abstract

Details

Database Management Systems
Type: Book
ISBN: 978-1-78756-695-8

Abstract

Details

Database Management Systems
Type: Book
ISBN: 978-1-78756-695-8

Abstract

Details

Advances in Librarianship
Type: Book
ISBN: 978-0-12024-616-8

Abstract

Details

Advances in Librarianship
Type: Book
ISBN: 978-0-12024-615-1

Book part
Publication date: 30 January 2023

Anastasija Nikiforova, Artjoms Daskevics and Otmane Azeroual

Nowadays, there are billions interconnected devices forming Cyber-Physical Systems (CPS), Internet of Things (IoT) and Industrial Internet of Things (IIoT) ecosystems. With an…

Abstract

Nowadays, there are billions interconnected devices forming Cyber-Physical Systems (CPS), Internet of Things (IoT) and Industrial Internet of Things (IIoT) ecosystems. With an increasing number of devices and systems in use, amount and the value of data, the risks of security breaches increase. One of these risks is posed by open data sources, which are databases that are not properly protected. These poorly protected databases are accessible to external actors, which poses a serious risk to the data holder and the results of data-related activities such as analysis, forecasting, monitoring, decision-making, policy development, and the whole contemporary society. This chapter aims at examining the state of the security of open data databases representing both relational databases and NoSQL, with a particular focus on a later category.

Details

Big Data and Decision-Making: Applications and Uses in the Public and Private Sector
Type: Book
ISBN: 978-1-80382-552-6

Keywords

1 – 10 of over 9000