Information Management & Computer Security: Volume 4 Issue 5

Subjects:

Table of contents

Internet and Intranet: the faces of the wired economy

Thornton A. May

Draws on extensive research and experience to provide commentary and insight on a range of management issues in the information technology world. Presents a picture of the…

673

Internet marketing practices

Joseph Heinen

This project explores some of the ways that companies are ‐ or will be ‐ using the Internet to improve the marketing of their commercial businesses. It focuses upon practical…

7898

The value brokers: how to measure client/server payback

Brian McWilliams

Discusses the measurement of client server payback. suggests that companies should not be using return on investment because financial yardsticks cannot measure directly the…

337

Executive information systems in financial institutions: an introduction

Narender Ramarapu

Discusses the use and impact of executive information systems(EISs) for financial institutions. Describes the functions of EISs and suggests the essential elements of a good one…

1626

Removal of all unauthorized access paths in production software

Charles Cresson Wood

Presents a policy considered necessary to prevent breaches of security when software is moved from development to production. Contends that although information is a valuable…

339

Practical management of programme risk: the case of the National Strategy for Police Information Systems for England and Wales

Steve Frosdick

Presents a case study of managing risk in an IS/IT programme. Introduces the National Strategy for Police Information Systems for England and Wales. Outlines a framework for…

1752
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid