Information Management & Computer Security: Volume 3 Issue 3

Subjects:

Table of contents

Managing end‐user computing

Catherine Ko, Margaret Hurley

This is an extract from a 1994 report prepared by Nolan, Norton& Co., a subsidiary of KPMG Information Solutions. Presents theresults of an end‐user computing research group…

1205

Policies, procedures and standards: an approach for implementation

Barry Moule, Lina Giavara

Describes, through practical recent experiences, an approach toimplementing policies, standards and procedures in a large commercialenterprise. Presents an outline of a guide for…

2376

Business continuity planning and service level agreements

Russell Smith

Business continuity planning is like any other service that isprovided and, as such, justifies a service level agreement. Promotes theidea of a master service agreement as an…

2098

Establishing an effective continuity strategy

Kevin J. Fitzgerald

Proposes that for a business continuity strategy to be adjudgedeffective, it must be matched to the business′ true tolerance, beenterprise‐wide, get the basics right, develop a…

1329

The interpersonal computer interregnum

Thornton A. May

Argues that the personal computer is dead as a workplacephenomenon. Suggests that the financial pay‐off associated with usingpersonal computers to increase knowledge and worker…

2865
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid