Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-11 of 11
Keywords: Information resources management
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
The hindrance of cloud computing acceptance within the financial sectors in Germany
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2022) 30 (2): 206–224.
Published: 24 August 2021
... 18 04 2021 01 08 2021 © Emerald Publishing Limited 2021 Emerald Publishing Limited Licensed re-use rights only Cloud computing Information resources management Information security Information management Data transmission Finance Cloud migration IaaS Data security TAM...
Journal Articles
The Second Annual Global Information Security Survey
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1999) 7 (3): 112–120.
Published: 01 August 1999
... Surveys Information resources management Computer security Data security The second annual Ernst & Young Global Information Security Survey canvassed the opinions of more than 4,254 companies in 29 countries. In Australia, 114 businesses were involved in the research project, drawn from...
Journal Articles
Information security management (3): the Code of Practice for Information Security Management (BS 7799)
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1998) 6 (5): 224–225.
Published: 01 December 1998
... British standards Computer security Information control Information resources management International standards the introduction, giving background information; and the security categories and controls. The Code of Practice is based on ten categories that should be present in most...
Journal Articles
Information security management (2): guidelines to the management of information technology security (GMITS)
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1998) 6 (5): 221–223.
Published: 01 December 1998
.... © MCB UP Limited 1998 Computer security Information control Information resources management International standards In the previous article, trusted evaluation criteria for secure computer products and systems were discussed. The conclusion reached was that trusted products...
Journal Articles
Achieving IT success
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1998) 6 (5): 199–204.
Published: 01 December 1998
... of corporate commitment and investment and a high‐speed development, test, implementation and roll out capability in IT. © MCB UP Limited 1998 Information resources management Information technology strategy Measurement Strategic management Success Systems management Sure, living...
Journal Articles
Strategic ignorance: the new competitive high ground
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1998) 6 (3): 127–128.
Published: 01 August 1998
... analysts posit that knowledge management is the natural next step in the evolution of information management. Knowledge management may be the next step ‐ is not the final step. The final step will be ignorance management. © MCB UP Limited 1998 Information resources management Information...
Journal Articles
Facilitating corporate knowledge: building the data warehouse
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1997) 5 (5): 170–174.
Published: 01 December 1997
... the implications of these practices on the business and of business practices on the success of data warehousing initiatives. © MCB UP Limited 1997 Data retrieval Data storage Information resources management On just about any measure, it is clear that the economy of the first world is based...
Journal Articles
Internet and Intranet: the faces of the wired economy
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1996) 4 (5): 3–6.
Published: 01 December 1996
..., influence and manipulate. Essentially it is an experience I can create”. The nuts and bolts of what makes a good web site are: utility; compelling content; interactivity; dialogue. Electronic data interchange Information resources management Information technology strategy...
Journal Articles
The value brokers: how to measure client/server payback
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1996) 4 (5): 15–17.
Published: 01 December 1996
... millions in savings on a $200,000 investment, according to Kelvie. © Authors 1996 Client‐server computing Information resources management Return on investment Kansas City Power and Light is a rare bird: an electric utility without a mainframe. But the $868 million (1994 revenues...
Journal Articles
The Thornton May Files
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1996) 4 (3): 36–38.
Published: 01 August 1996
...‐ROM Electronic data interchange Inequality Information resources management Knowledge workers Paper Reducing the handling costs associated with paper‐based information has become a high priority as corporate America seeks to streamline operations. Each year, 324 billion business documents...
Journal Articles
A consensus ranking for information system requirements
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1996) 4 (1): 10–18.
Published: 01 March 1996
... no weighting methodology. Thus, the SCPR method can help the system development team make efficient decisions when allocating resources for a new information system. © MCB UP Limited 1996 Information resources management Linear programming Steering committees Systems development Systems...
