ABSTRACT

This chapter examines end-user computing control within the context of an architecture based on quality. The goals of worker empowerment, increased functionality and utility, and the ability of end-users to control their environment must be guarded. To address the complexity of end-user computing, an architectural approach is required; it helps to ensure that an organization's control strategy and technical strategy are mutually supportive. The components of an information protection architecture include management, confidentiality and integrity controls, and continuity controls. The other elements of effective management standards, procedures, and guidelines define in terms of technology and business processes precisely how controls are to be implemented. Confidentiality and integrity controls are intended to operate on physical, logical, and procedural levels. With the spread of distributed computing and local networks, physical controls still maintain a certain significance.