Work Study: Volume 39 Issue 4

Subject:

Table of contents

IT Security and Integrity

Data security implies the avoidance of theft, loss or unauthorised disclosure of data. This may have financial implications either because the data lost can be converted into…

Evaluate your Work‐at‐Home Potential

Barbara Jizba, Brian H. Kleiner

Examines the possibilities and requirements of home‐based workarrangements. Considers personal work style, home environment and jobrequisites as deciding factors about the…

Building a Culture of Quality and Service: A Strategic Approach to Success through Customer Service

Andy Clark

Considers the adoption of customer care by both public and privatesector organizations as a means of gaining a longer‐term competitiveedge. Examines ways of avoiding “charm‐school…

Contracting – In or Out

Eddie Pitt

Describes approaches to potential cost savings that can be gainedby contracting in or out through an external service agency. Examinesthe distinction between contracting in and…

Planning the Personal Use of Time

Alan Littlewood

Discusses methods and procedure for achieving effective personaltime management. Highlights the identification of problems, theprioritization of objectives, and the breaking down…

ISSN:

0043-8022

Online date, start – end:

1952 – 2003

Copyright Holder:

Emerald Publishing Limited