Abstract
The value of information depends upon its effective use. This in turn depends upon management’s confidence in the information received. Their confidence is based on the reliability and accuracy of the information. This is particularly true when this information is produced by computer systems. No system, however good, can be left for too long before it is checked to see that it is performing efficiently as there are many ways in which a system can be damaged, both deliberately and accidentally. It is essential, therefore, that all computer systems are regularly audited.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Copyright information
© 1984 Trevor J. Bentley
About this chapter
Cite this chapter
Bentley, T.J. (1984). Security and Control. In: Making Computers Work. Palgrave Macmillan, London. https://doi.org/10.1007/978-1-349-17421-8_15
Download citation
DOI: https://doi.org/10.1007/978-1-349-17421-8_15
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-0-333-36374-4
Online ISBN: 978-1-349-17421-8
eBook Packages: Computer ScienceComputer Science (R0)