Table of contents
Inadequate security encourages the thief
Alan MillsReviews the findings of the Audit Commission′s fifth triennialreport on computer fraud and abuse, published in October 1994. Thisshows that, while computer fraud and abuse is a…
Quality information systems and quality management: a reference model and associated measures for empirical research
C. ForzaDevelops the theory on the role of information systems withinquality management. Proposes a reference model for the study of qualityinformation systems within quality management…
A module‐based conceptual framework for largescale expert systems
Rajeev Kaula, Leslie C. LanderIncreasing utilization of expert systems in organizations hasnecessitated development of large‐scale expert systems that deal withcomplex problem domains requiring handling of…
Re‐engineering information technology: an enabler for the new business strategy
Herman P. HoplinAddresses the need for re‐engineering information systems (IS) in arapidly changing environment, and the urgency of doing this to meetcurrent and future needs of organizations…
ISSN:
0263-5577e-ISSN:
1758-5783ISSN-L:
0263-5577Renamed from:
Industrial ManagementOnline date, start – end:
1980Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditors:
- Dr Alain Yee Loong Chong
- Prof Hing Kai Chan