Information Management & Computer Security: Volume 2 Issue 4

Subjects:

Table of contents

A Security Framework for Information Systems Outsourcing

Dieter Fink

The business benefits that can be achieved have dominated theconsiderations as to whether or not to outsource information systems(IS). Very little attention appears to have been…

3825

Establishing Security in a Multi‐platform, Multi‐vendor Enterprise‐wide IT Environment

Kevin J. Fitzgerald

Establishing information security in a downsized multi‐platform,multi‐vendor, enterprise‐wide information technology environment isemerging as the greatest challenge yet to…

496

Organisational Transformation and Alignment: Misalignment as an Impediment to Progress in Organisational Development

K. Hugh Macdonald

The business environment is turbulent, with the degree and frequency ofchange seemingly increasing but action to anticipate and prepare forturbulence being less evident. Outlines…

2518

Censorship on the Information Highway

Geoffrey Ebbs, Howard Rheingold

Provides summaries of the arguments of two contributors to TheAustralian debating the case for and against censorship on the Internetnetwork.

890

Software Auditing Means Better Business

Philip Berner

If a company′s software is seized because it has not been legitimatelyacquired, that company′s business records including business planning,financial records and new business…

695

Security and Network Management: Changes in the Way We Work

Karen A. Forcht, Yuan‐Wen Aven Tsai

Outsourcing Local Area Network (LAN) administration is rapidly gainingground but, since many LANs are connected, virtually all users have atleast limited access to information…

1652
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid