Saturday, August 1, 2009

Information Management & Computer Security.


Journal search
Information Management & Computer Security

Information Management & Computer Security




Full text online
Content: Table of Contents | Latest Issue RSS RSS
Information: Journal information | Editorial Team | Author Guidelines
Other: Journal News (inc. calls for papers) | Sample articles | Events | Sponsored Links | Recommend this journal

Emerald EarlyCite

This journal is pre-published through Emerald EarlyCite. Issues are made available before the official publication date - look for the EarlyCite symbolIcon: EarlyCite.on the journal's table of contents page. If no EarlyCite issues are available, this indicates recent official publication.


Information Page


Unique attributes

Information Management & Computer Security contributes to the advance of knowledge directly related to the theory and practice of the management and security of information and information systems. It publishes methodological developments, empirical studies and practical applications. Emphasis is placed on systematic studies that contribute to the general understanding of the power and usefulness of information and hence contribute to more effective management. A double-blind review process ensures the content's validity and relevance.

Topicality

Because computers are now regarded as such an everyday facet of business life, they tend to be regarded as useful furniture, rather than dynamic technological aids. For this reason, their full potential is often not efficiently exploited. This journal examines the two closely related fields of data management and its security, providing insights and describing methodologies that computer users can adapt to their own systems to improve input, storage, use and protection of valuable data.

Key benefits

Subscribers are kept abreast of new systems developments, theoretical and practical knowledge, and the design, creation, development, implementation and evaluation of information systems. Protecting data from unsolicited use, an increasingly important aspect of data management as companies commission research in areas such as new products, is also given thorough coverage. News on applications, including medical and legal issues, is included in this international and interdisciplinary journal, already regarded as a leader in its field.

Key journal audiences

  • Computer industry practitioners
  • Information systems managers and academics
  • Management consultants
  • Senior executives with responsibility for business performance

Coverage

  • Book reviews and news round-up
  • Conference/exhibition dates
  • Computer selection
  • Financial planning/control
  • HR-training, industrial relations and pay structures
  • Management of data systems
  • Marketing management
  • Production planning
  • Project management
  • Specific legislation
  • Technological innovations

Information Management & Computer Security is indexed and abstracted in:

  • Emerald Management Reviews
  • BUBL Information Service
  • Information Science Abstracts
  • INSPEC
  • LISA
  • Research trends in Computer & Data Security
  • Computer Literature Index
  • Fulltext Sources Online
  • zetoc (British Library)



Sample Articles

  • Managing electronic information: an ethics perspective
    Mayur S. Desai and Thomas J. von der Embse
    Volume: 16 Issue: 1; 2008
    View Abstract | HTML | PDF

  • Process-Variance Models in Information Security Awareness Research
    Angeliki Tsohou, Spyros Kokolakis and Maria Karyda and Evangelos Kiountouzis
    Volume: 16 Issue: 3; 2008
    View Abstract | HTML | PDF



No comments:

Post a Comment

Followers