Work Study: Volume 39 Issue 4

Table of contents

IT Security and Integrity

Data security implies the avoidance of theft, loss or unauthorised disclosure of data. This may have financial implications either because the data lost can be converted into…

128

Evaluate your Work‐at‐Home Potential

Barbara Jizba, Brian H. Kleiner

Examines the possibilities and requirements of home‐based workarrangements. Considers personal work style, home environment and jobrequisites as deciding factors about the…

416

Building a Culture of Quality and Service: A Strategic Approach to Success through Customer Service

Andy Clark

Considers the adoption of customer care by both public and privatesector organizations as a means of gaining a longer‐term competitiveedge. Examines ways of avoiding “charm‐school…

265

Contracting – In or Out

Eddie Pitt

Describes approaches to potential cost savings that can be gainedby contracting in or out through an external service agency. Examinesthe distinction between contracting in and…

137

Planning the Personal Use of Time

Alan Littlewood

Discusses methods and procedure for achieving effective personaltime management. Highlights the identification of problems, theprioritization of objectives, and the breaking down…

343

ISSN:

0043-8022

Online date, start – end:

1952 – 2003

Copyright Holder:

Emerald Publishing Limited