Information Management & Computer Security: Volume 5 Issue 4

Subjects:

Table of contents

Top‐down driven architecture design

Richard L. Nolan

Argues that senior management must be involved in the IT architecture process in a directly participatory manner. Describes the process of executive architecture design, complete…

1361

KPMG survey: the IT outsourcing decision

Margaret Hurley, Folker Schaumann

Presents the results of KPMG’s survey on the current IT outsourcing practices in Australia, to which 300 organizations responded. Demonstrates a high rate of usage of outsourced…

3174

Managing for demonstrably effective IT projects

Jeff Gooch

Describes the main phases and corresponding characteristics of large IT projects. Summarizes the ways in which IT delivers value to the business. Introduces frameworks for…

1044

Hypertext information security model for organizations

Lam‐for Kwok

States that traditional information security models address only the micro view of how to maintain a secure environment by controlling the flows of information within protection…

1070

Business critical messaging

Everard Tarascio

States that growth‐oriented retailers such as WalMart deploy messaging infrastructures that actually run the business. Enterprise Solutions Ltd works with leading retailers to…

776
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid