February 2012
Journal of Digital Information Management;Feb2012, Vol. 10 Issue 1, preceding p1
Academic Journal
No abstract available.


Related Articles

  • The answer to a good night's sleep. Rickard, Colin // Data Strategy;Nov2007, Vol. 3 Issue 8, p13 

    The author discusses ways to ensure data quality and security. He emphasizes the significance of planning, cooperation and strategic business relations to data quality and security management. He cites the definition given by Baseline Consulting for data governance. He adds that the interest of...

  • Journal Self-Citation XI: Regulation of "Journal Self-Referencing" -- The Substantive Role of the AIS Code of Research Conduct. Clarke, Roger; Davison, Robert; Beath, Cynthia M. // Communications of the Association for Information Systems;2009, Vol. 25, p91 

    The practice of a publisher requiring authors to include citations to previous articles in the publisher's journals is widely acknowledged to be inappropriate. This paper presents the reasons why that is so. It considers possible means whereby the practice could be subjected to control, and...

  • The potential of metadata for linked open data and its value for users and publishers. Zuiderwijk, Anneke; Jeffery, Keith; Janssen, Marijn // eJournal of eDemocracy & Open Government;2012, Vol. 4 Issue 2, p222 

    Public and private organizations increasingly release their data to gain benefits such as transparency and economic growth. The use of these open data can be supported and stimulated by providing considerable metadata (data about the data), including discovery, contextual and detailed metadata....

  • Up, up and away... Schlöndorff, Detlef // Kidney International;Jan2013, Vol. 83 Issue 1, p3 

    The author discusses the steady increase of the impact factor of the journal due to the continuity of its editorial policy to publish articles devoted to important topics and advances in all areas of nephrology and its scientific basis. He mentions the plans of the team in providing a high...

  • Information Availability as Driver of Information Security Investments: A Systematic Review Approach. Dang, Duy; Nkhoma, Mathews // Proceedings of the European Conference on Information Management;2013, p71 

    Despite that information security issues have started to gain managers' attention since computers were first put in use, information security management has not yet reached its maturity and is still requiring input from both the academia and industry. Indeed, today's businesses have still not...

  • LANDLORDS: DON'T LET THE BEDBUGS BITE.  // Personal Real Estate Investor;Jul/Aug2013, p128 

    The article reports on the $800,000 award received by a tenant who sued his landlord for unknowingly rented the bed-bug-invested apartment in Maryland.

  • Investigating the Relationship of Users' Behavior and Internal Security Threat towards the Implementation of Total Health Information System (THIS) in Malaysian Medical Institutions. Humaidi, Norshima; Said, Noor Azzah; Daud, Norzaidi Mohd // Journal of Applied Sciences Research;Sep2011, Vol. 7 Issue 9, p291 

    This paper have been carried out with the purpose to develop research model that can be used to investigate the relationship of users' behavior and internal security threat towards the implementation of Total Health Information System (THIS). In doing so, several study related with health...

  • from the editor. Nott, Mary Jo // DM Review;Sep2006, Vol. 16 Issue 9, p4 

    This section introduces a series of articles published in the September 2006 issue of "DM Review.'

  • Related Articles.  // AIIM E-DOC;Jan/Feb2008 Guide to ECM Purchasing, Vol. 22, p5 

    The article lists several articles that were published in previous issue in initial Buyer's Guide including "Making the Case for Enterprise Content Management," "Successful Change Management," and "The Right Price."


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics