Skip to Main Content
Keywords: Management strategy
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Information Management & Computer Security (2012) 20 (3): 152–169.
Published: 13 July 2012
... Group Publishing Limited 2012 Identity management Business strategy formulation Strategic management principles Identity management guidelines Security Management strategy Corporate strategy With the advent of information technology, users' roles in information systems have...
Journal Articles
Information Management & Computer Security (2012) 20 (2): 52–70.
Published: 01 June 2012
... might also be called normalized rules, because they are rules of thumb that are: Michael Workman can be contacted at: workmanfit@yahoo.com © Emerald Group Publishing Limited 2012 State security Decision making Decision support systems Management strategy Security and decision...
Journal Articles
Information Management & Computer Security (2010) 18 (3): 185–197.
Published: 20 July 2010
... a middle ground management strategy for software development to gain more effectiveness and efficiency in delivering projects on time and within budget. Design/methodology/approach The paper combines narrative with argument and analysis with a dynamic programming model. The model was applied...
Journal Articles
Journal Articles
Information Management & Computer Security (2004) 12 (4): 318–327.
Published: 01 September 2004
... to evaluate the impact of information technology on small and medium enterprises in the USA. The results provide useful insight into the use of information technology by both manufacturing and service SMEs. © Emerald Group Publishing Limited 2004 Communication technologies Management strategy...

or Create an Account

Close Modal
Close Modal