Information Systems Audit Trails; An Australian Government Survey

نویسنده

  • Caroline Allinson
چکیده

Journal of Research and Practice in Information Technology, Vol. 34, No. 1, February 2002 47 Information Systems Audit Trails; An Australian Government Survey Caroline Allinson Manager Information Security, Information Management Division, Queensland Police Service, GPO Box 1440, BRISBANE Qld 4001, Australia. and Information Security Research Centre (ISRC), Queensland University of Technology, Brisbane. Queensland. Australia.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and Implementation of Verifiable Audit Trails for a Versioning File System

We present constructs that create, manage, and verify digital audit trails for versioning file systems. Based upon a small amount of data published to a third party, a file system commits to a version history. At a later date, an auditor uses the published data to verify the contents of the file system at any point in time. Digital audit trails create an analog of the paper audit process for fi...

متن کامل

Real-time workflow audit data integration into data warehouse systems

Workflow management systems are being increasingly used by many organizations to automate business processes and decrease costs. Audit trails from workflow management systems include significant amounts of information that can be used to analyze and monitor the performance of business processes in order to improve the efficiency. Traditional approaches for using workflow audit trail for decisio...

متن کامل

From IHE Audit Trails to XES Event Logs Facilitating Process Mining

Recently Business Intelligence approaches like process mining are applied to the healthcare domain. The goal of process mining is to gain process knowledge, compliance and room for improvement by investigating recorded event data. Previous approaches focused on process discovery by event data from various specific systems. IHE, as a globally recognized basis for healthcare information systems, ...

متن کامل

Diagnosing Advanced Persistent Threats: A Position Paper

When a computer system is hacked, analyzing the root-cause (for example entry-point of penetration) is a diagnostic process. An audit trail, as defined in the National Information Assurance Glossary, is a securityrelevant chronological (set of) record(s), and/or destination and source of records that provide evidence of the sequence of activities that have affected, at any time, a specific oper...

متن کامل

Continuous Fraud Detection in Enterprise Systems through Audit Trail Analysis

Enterprise systems, real time recording and real time reporting pose new and significant challenges to the accounting and auditing professions. This includes developing methods and tools for continuous assurance and fraud detection. In this paper we propose a methodology for continuous fraud detection that exploits security audit logs, changes in master records and accounting audit trails in en...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Journal of Research and Practice in Information Technology

دوره 34  شماره 

صفحات  -

تاریخ انتشار 2002