Skip to Main Content
Keywords: IT
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Information Management & Computer Security (2000) 8 (1): 42–44.
Published: 01 March 2000
... a simpler interface than a keyboard and mouse? Does speech recognition boost productivity? That depends on many factors including your line of work, writing habits, patience, office environment, etc. To get the most out of a particular speech recognition package, you’ll have to know its features and quirks...
Journal Articles
Information Management & Computer Security (1999) 7 (4): 178–185.
Published: 01 October 1999
... securities claims allege that a stock has dropped in value since a shareholder bought it; that the issuing company (and its officers and directors) knew specific information that indicated that the drop in price was possible; and that instead of disclosing this information, the company made misleading...
Journal Articles
Information Management & Computer Security (1997) 5 (1): 20–22.
Published: 01 March 1997
... the complete approach to information security management and may become a marketing tool for an organization, as ISO 9000 is today. Obtaining an ISO information security certificate may indeed be the “IT driver’s licence” of the future, which will enable an organization to link its IT systems with those...
Journal Articles
Information Management & Computer Security (1997) 5 (1): 3–6.
Published: 01 March 1997
...‐step model for effective infrastructure management. This article is not written by a sky‐is‐falling, headline‐grabbing, content‐challenged industry guru/voyeur. Nor is it written by a conceptual, deep‐thinking academic. Its primary author is an industry practitioner working in a highly competitive...
Journal Articles
Information Management & Computer Security (1995) 3 (4): 15–19.
Published: 01 October 1995
... in relation to its value as a source of information for corporations, individuals and educational establishments and its growing use as an interactive medium. The press has also given substantial coverage to information security risks associated with connecting to the Internet: logical attack...

or Create an Account

Close Modal
Close Modal