Table of contents
Compassion in World Farming: an imaging and text retrieval case
Catherine HarringtonDiscusses the issues associated with a surge in information demand in a relatively small organization. Introduces the idea of imaging and text retrieval to handle information…
Managing the desktop: research findings
Margaret A. HurleyDraws on research carried out by the Nolan Norton Institute in Australia. Presents findings of applied research into PC and desktop management issues. Presents data on costs and…
Health informatics blueprint: business needs
Ernest HiggsIntroduces the broad issues associated with managing information in a variety of health care environments, particularly from the clinician and patient points of view. Enumerates…
EDI security: a model of EDI risks and associated controls
Pauline RatnasinghamDefines the rationale for developing a model of EDl risks and associated controls. Highlights how and which EDI controls will alleviate and/or eliminate the specified EDI risks…
A project planning process for business continuity
Kon KarakasidisDiscusses the formulation of a business recovery plan. As a starting point, presents the business recovery timeline model. Gives a framework of components to be considered in a…
A secure password storage policy
Charles Cresson WoodDiscusses the necessity of computer access control mechanisms, particularly passwords, to protect information. Suggests that many organizations allow practices which compromise…