Information Management & Computer Security: Volume 4 Issue 3

Subjects:

Table of contents

National (UK) Computer Security Survey 1996

Brian Kearvell‐White

Presents the UK survey of 15,000 finance directors in the UK and Ireland with annual turnovers of £10 million or more. States that the objective was to gain information about…

3535

A policy for sending secret information over communications networks

Charles Cresson Wood

Proposes that one of the fundamental design principles of information security is that information should be consistently protected, and that this principle should apply in all…

460

An introduction to seismology

Gary Gibson

Investigates the effects of earthquakes in the Victoria region of Australia. Looks at how they can be predicted by the use of seismology, and how this information can be used to…

472

“Testing the plan is more important than the plan itself”

Colin Maslen

States that for business recovery planning to be successful, more than just a business recovery plan should be produced. Proposes that testing and training are just as important…

3720

Relating information and value disciplines

Ross Lowrey

Shows, giving examples, how information technology is changing business practices. Investigates the benefits of information systems which are brought about by structural changes…

2134

The Thornton May Files

Thornton A. May

Provides commentary and insight on a range of management issues in the information technology world. Hypothesizes on the future of paper in an electronic world; and takes a…

176

Telecommunications deregulation: an Australian perspective

John McCormick

Describes the high‐level events that have brought the telecommunications industry to its current state, enumerates the likely outcomes of pending deregulation and prescribes the…

1762
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid