Information Management & Computer Security: Volume 1 Issue 4

Subjects:

Table of contents

Studying Potential Customers: The Applications of Marketing Information Systems in University Recruitment

Mark Gabbott, Ewan Sutherland

Looks at Management Information Systems and their application withregard to higher education and recruitment in universities. Discusseshow admissions can more accurately be…

Information Loss Rarely Recovered

Tom Newman

Highlights the target value of competitor information and in doingso highlights the need for organizations to understand the need toprotect their own information. Gives practical…

Corporate Security: An Australian Ostrich

H. James, R.A. Coldwell

A recent study of 50 Australian information systems developmentenvironments highlights a continuing lack of corporate security measuresby Australian business organizations…

Computer Security as a Liability Control Tool

David Hains

Focuses on the importance of the less spectacular threats relatedto information theft. Contains some thoughtprovoking questions which mayindicate a higher degree of risk in your…

Data Integrity and Security: Who′s in Charge Here Anyway?

Kenneth P. Weiss

Lost, stolen, destroyed, compromised, or exploited, computerinformation can cripple a company irrevocably, deplete shareholderassets, and leave the CIO and other executives…

Information, Communication and Innovation: Identifying Critical Innovation Factors (CIF)

Jon‐Arild Johannessen, Johan Olaisen

Surveys existing literature pertaining to the role of communicationand information in generating innovation in organizations, aiming toorganize innovation literature, coupled with…

Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid