TY - GEN
T1 - Seguridad de la Información en procesos de organización para una asociación de profesionales con la metodología del marco de trabajo COSO
AU - More Valencia, Rubén A.
AU - Sandoval Morales, Corina
AU - Infante Saavedra, Carmen L.
AU - Correa Calle, Teófilo R.
AU - Jaramillo Atoche, Javier E.
N1 - Publisher Copyright:
© 2023 IMCIC.All Rights Reserved.
PY - 2023
Y1 - 2023
N2 - The effects of information security involve an audit of procedures aimed at generating valid and sufficient judgments for a study that addresses risk assessment related to information, business processes, and the control mechanisms that are theorized and applied, such as those in the COSO framework (Framework Committee of Sponsoring Organizations of the Treadway Commission). This includes the objectives of designing controls according to the proposed implementation within organizations, such as a professional association. It also involves establishing lines of application for assessing the utility of computerized and communication means. The evaluation method is descriptive and systematically examines operations related to financial and accounting data and information. The result obtained is the reasonableness of the information states for processes related to functional operability, equipment control, and programs and applications. While there is a basis for professional judgment, it is sufficient to make recommendations and propose feedback for information security and the use of information technology.
AB - The effects of information security involve an audit of procedures aimed at generating valid and sufficient judgments for a study that addresses risk assessment related to information, business processes, and the control mechanisms that are theorized and applied, such as those in the COSO framework (Framework Committee of Sponsoring Organizations of the Treadway Commission). This includes the objectives of designing controls according to the proposed implementation within organizations, such as a professional association. It also involves establishing lines of application for assessing the utility of computerized and communication means. The evaluation method is descriptive and systematically examines operations related to financial and accounting data and information. The result obtained is the reasonableness of the information states for processes related to functional operability, equipment control, and programs and applications. While there is a basis for professional judgment, it is sufficient to make recommendations and propose feedback for information security and the use of information technology.
UR - http://www.scopus.com/inward/record.url?scp=85171292625&partnerID=8YFLogxK
U2 - 10.54808/CICIC2023.01.159
DO - 10.54808/CICIC2023.01.159
M3 - Contribución a la conferencia
AN - SCOPUS:85171292625
T3 - CICIC 2023 - Decima Tercera Conferencia Iberoamericana de Complejidad, Informatica y Cibernetica en el contexto de the 14th International Multi-Conference on Complexity, Informatics, and Cybernetics, IMCIC 2023 - Memorias
SP - 159
EP - 164
BT - CICIC 2023 - Decima Tercera Conferencia Iberoamericana de Complejidad, Informatica y Cibernetica en el contexto de the 14th International Multi-Conference on Complexity, Informatics, and Cybernetics, IMCIC 2023 - Memorias
A2 - Callaos, Nagib C.
A2 - Horne, Jeremy
A2 - Ruiz-Ledesma, Elena Fabiola
A2 - Sanchez, Belkis
A2 - Tremante, Andres
PB - International Institute of Informatics and Systemics, IIIS
T2 - Decima Tercera Conferencia Iberoamericana de Complejidad, Informatica y Cibernetica, CICIC 2023 en el contexto de the 14th International Multi-Conference on Complexity, Informatics, and Cybernetics, IMCIC 2023 - 13th Ibero-American Conference on Complexity, Informatics and Cybernetics, CICIC 2023 in the context of the 14th International Multi-Conference on Complexity, Informatics, and Cybernetics, IMCIC 2023
Y2 - 28 March 2023 through 31 March 2023
ER -