What constitutes information integrity?
Author(s) -
Stephen Flowerday,
Rossouw von Solms
Publication year - 2007
Publication title -
south african journal of information management
Language(s) - English
Resource type - Journals
eISSN - 2078-1865
pISSN - 1560-683X
DOI - 10.4102/sajim.v9i4.201
Subject(s) - computer security , information security , computer science , data integrity , audit , pillar , information security management , information assurance , risk analysis (engineering) , information security standards , business , security information and event management , engineering , cloud computing security , security service , cloud computing , accounting , network security policy , operating system , structural engineering
This research focused on what constitutes information integrity as this is a problem facing companies today. Moreover, information integrity is a pillar of information security and is required in order to have a sound security management programme. However, it is acknowledged that 100% information integrity is not currently achievable due to various limitations and therefore the auditing concept of reasonable assurance is adopted. This is in line with the concept that 100% information security is not achievable and the notion that adequate security is the goal, using appropriate countermeasures. The main contribution of this article is to illustrate the importance of and provide a macro view of what constitutes information integrity. The findings are in harmony with Samuel Johnson's words (1751): 'Integrity without knowledge is weak and useless, and knowledge without integrity is dangerous and dreadful.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom