Work Study: Volume 39 Issue 4
Table of contents
IT Security and Integrity
Data security implies the avoidance of theft, loss or unauthorised disclosure of data. This may have financial implications either because the data lost can be converted into…
Evaluate your Work‐at‐Home Potential
Barbara Jizba, Brian H. KleinerExamines the possibilities and requirements of home‐based workarrangements. Considers personal work style, home environment and jobrequisites as deciding factors about the…
Building a Culture of Quality and Service: A Strategic Approach to Success through Customer Service
Andy ClarkConsiders the adoption of customer care by both public and privatesector organizations as a means of gaining a longer‐term competitiveedge. Examines ways of avoiding “charm‐school…
Contracting – In or Out
Eddie PittDescribes approaches to potential cost savings that can be gainedby contracting in or out through an external service agency. Examinesthe distinction between contracting in and…
Planning the Personal Use of Time
Alan LittlewoodDiscusses methods and procedure for achieving effective personaltime management. Highlights the identification of problems, theprioritization of objectives, and the breaking down…