Clive Vermeulen and Rossouw Von Solms
Because of changes that have taken place in the way that IT is used in organisations, as well as the purposes for which it is used, traditional forms of computer security are no…
Abstract
Because of changes that have taken place in the way that IT is used in organisations, as well as the purposes for which it is used, traditional forms of computer security are no longer adequate. Today, information is more important than the IT systems which house it and effective information security management is required to adequately protect this information. The implementation of information security management is, however, a complex process and a methodology for its implementation provided in the form of an interactive software tool, featuring automation of certain steps, would prove valuable to modern organisations.
Details
Keywords
I suppose that most noticeable of all the changes in our profession since I came into it has been the multiplicity of the methods by which one can become a librarian. A. E…
Abstract
I suppose that most noticeable of all the changes in our profession since I came into it has been the multiplicity of the methods by which one can become a librarian. A. E. Standley says in a recent article in the L.A.R., in 1970: “The term librarian includes the Library Association chartered librarian, the graduate with a degree in librarianship, the scholar librarian, the information and intelligence officer, the translator, the abstracter, the non‐library‐qualified subject expert”.