Information Management & Computer Security: Volume 5 Issue 2

Subjects:

Table of contents

Compassion in World Farming: an imaging and text retrieval case

Catherine Harrington

Discusses the issues associated with a surge in information demand in a relatively small organization. Introduces the idea of imaging and text retrieval to handle information…

282

Managing the desktop: research findings

Margaret A. Hurley

Draws on research carried out by the Nolan Norton Institute in Australia. Presents findings of applied research into PC and desktop management issues. Presents data on costs and…

402

Health informatics blueprint: business needs

Ernest Higgs

Introduces the broad issues associated with managing information in a variety of health care environments, particularly from the clinician and patient points of view. Enumerates…

1059

EDI security: a model of EDI risks and associated controls

Pauline Ratnasingham

Defines the rationale for developing a model of EDl risks and associated controls. Highlights how and which EDI controls will alleviate and/or eliminate the specified EDI risks…

1880

A project planning process for business continuity

Kon Karakasidis

Discusses the formulation of a business recovery plan. As a starting point, presents the business recovery timeline model. Gives a framework of components to be considered in a…

2907

A secure password storage policy

Charles Cresson Wood

Discusses the necessity of computer access control mechanisms, particularly passwords, to protect information. Suggests that many organizations allow practices which compromise…

1418
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid