Search results

1 – 2 of 2
Article
Publication date: 1 August 2002

Clive Vermeulen and Rossouw Von Solms

Because of changes that have taken place in the way that IT is used in organisations, as well as the purposes for which it is used, traditional forms of computer security are no…

3434

Abstract

Because of changes that have taken place in the way that IT is used in organisations, as well as the purposes for which it is used, traditional forms of computer security are no longer adequate. Today, information is more important than the IT systems which house it and effective information security management is required to adequately protect this information. The implementation of information security management is, however, a complex process and a methodology for its implementation provided in the form of an interactive software tool, featuring automation of certain steps, would prove valuable to modern organisations.

Details

Information Management & Computer Security, vol. 10 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 August 1970

I suppose that most noticeable of all the changes in our profession since I came into it has been the multiplicity of the methods by which one can become a librarian. A. E…

Abstract

I suppose that most noticeable of all the changes in our profession since I came into it has been the multiplicity of the methods by which one can become a librarian. A. E. Standley says in a recent article in the L.A.R., in 1970: “The term librarian includes the Library Association chartered librarian, the graduate with a degree in librarianship, the scholar librarian, the information and intelligence officer, the translator, the abstracter, the non‐library‐qualified subject expert”.

Details

New Library World, vol. 72 no. 2
Type: Research Article
ISSN: 0307-4803

1 – 2 of 2