SPOTLIGHT ON ACCOUNTABILITY AND AUDITING Information Management: Spring 1999 A comprehensive inter-linked research database search was conducted using the key words "information management – public sector, government", "information systems – development, internal control, audit, fraud, quality assurance, security", "information security management", "public sector" and "user needs" and related abstractions covering the period 1975 to 1998 (focusing on the last four years). The results of the search were consequently analysed, sorted and assessed for applicability. Abrams, Marshall D. Moffett, Jonathan D. Higher level of computer security through active policies. Computers & Security. 14(2): 147-157. 1995. Aladwani, Adel M. Implications of some of the recent improvement philosophies for the management of the information systems organization. Industrial Management & Data Systems. 99(1): 33-39. 1999. Anonymous. Are we over complicating knowledge management? Management Accounting. London. 77(5): 8, 1. May 1999. Barron, Terence M. Chiang, Roger H. L. Storey, Veda C. A semiotics framework for information systems classification and development. Decision Support Systems. 25(1): 1-17. February 1999. Barton, J. Designing flexible logistics systems: a review of some Singaporean examples. Cunningham Logistics Information Management. 40-48. 9 February 1996. Ballantine, Joan A. Stray, Stephanie. Information systems and other capital investments: evaluation practices compared. Logistics Information Management. 12(1)(2): 78-93. 1999. Barnes, David. Security and the enterprise network. International Journal of Network Management. 5(4): 198-206. July - August 1995. Banerjee, Debasish. Jones, Thomas W. Cronan, Timothy P. The association of demographic variables and ethical behaviour of information system personnel. Industrial Management & Data Systems. 96(3): 3-10. 1996. Baines, Anna. Using information technology to facilitate organisational change. Work Study. 47(2): 49-52. 1998. Bhatti, S.N. McCarthy, K.M.T. Knight, G. Pavlou, G. Secure management information exchange. Journal of Network and Systems Management. 4(3): 251-277. September 1996. Binshan, Lin. Managing in an Information Highway Age: Critical Issues. Industrial Management & Data Systems. 94(8): 3-7. 1994. Brynard, Dirk J. Combating red tape in the public sector. International Journal of Public Sector Management. 8(4): 38-47. 1995. Burrows, James H. Information Technology standards in a changing world: the role of the users. Computer Standards & Interfaces. 20(4-5): 323-331. 15 February 1999. Cardinali, Richard. Reinforcing our moral vision: examining the relationship between unethical behaviour and computer crime. Work Study. 44(8): 11-17. 1995. Cardinali, Richard. Safeguarding databases basic concepts revisited. Information Management & Computer Security. 3(1): 30-37. 1995. Clarke, Roger. Human Identification in Information Systems Management Challenges and Public Policy Issues. Information Technology & People. 7(4): 6-37. 1994. Curry, Adrienne. Herbert, David. Continuous improvement in public services - a way forward. Managing Service Quality. 8(5): 339-349. 1998. Deakin, Mark. The development of computer-based information systems for local authority property management. Property Management. 16(2): 61-82. 1998. Dixon, John. Kouzmin, Alexander. Korac-Kakabadse, Nada. Managerialism - something old, something borrowed, little new Economic prescription versus effective organizational change in public agencies. International Journal of Public Sector Management. 11(2/3): 164-187. 1998. Dowlen, Ashley. Learning to manage risk in public services. Executive Development. 8(2): 19-24. 1995. Donnelly, Mike. Dalrymple, John F. Hollingsworth, Ivan P. The Use and Development of Information Systems and Technology in Scottish Local Government. International Journal of Public Sector Management. 7(3): 4-15. 1994. Erridge, Andrew. Fee, Ruth. McIlroy, John. Public sector quality: political project or legitimate goal? International Journal of Public Sector Management. 11(5): 341-353. 1998. Finne, Thomas. A Conceptual Framework for Information Security Management. Computers & Security. 17(4): 303-307. 1998. Fink, Dieter. A Security Framework for Information Systems Outsourcing. Information. Management & Computer Security. 2(4): 3-8. 1994. Geary, James M. Executive Liability for Computer Crime and How to Prevent It. Information Management & Computer Security. 2(2): 29-31. 1994. Godwin, J Udo. The status of information systems department: the effects of downsizing. Industrial Management & Data Systems. 98(1): 23-32. 1998. Graham, Peter. Are public sector organizations becoming customer centred? Marketing Intelligence & Planning. 13(1): 35-47. 1995. Grundy, Emma. Collier, Paul. Spaul, Barry. Auditing Personnel: A Human Resource Approach to Information Systems Control. Managerial Auditing Journal. 9(6): 10-16. 1994. Harris, Duncan. Sidwell, David. Distributed database security. Computers & Security. 13(7): 547- 557. 1994. Hallinger, Philip. Increasing the organization's IQ: public sector leadership in Southeast Asia. The Learning Organization. 5(4): 176-183. 1998. Harwood, Graham. Information Management Logistics. Information Management. 7(5): 30-35. 1994. Hackney, Raymond A. McBride, Neil K. The efficacy of information systems in the public sector Issues of context and culture. International Journal of Public Sector Management. 8(6): 17-29. 1995. Karake, Zeinab A. Managing information resources and environmental turbulence. Information Management & Computer Security. 5(3): 93-99. 1997. Kinne, Dan. Local Area Networks: A Realistic Audit Approach. Managerial Auditing Journal. 9(5): 8- 15. 1994. Kovacich, Gerald L. Establishing A Network Security Programme. Computers & Security. 15(6): 486- 498. 1996. Kovacich, Gerald. Establishing an Information Systems Security Organization (ISSO). Computers & Security. 17(7): 600-612. 1998. Kwok, Lam-for. Longley, Dennis. Code of Practice: A Standard for Information Security Management. Computers & Security. 16(3): 206. 1997. Kwok, Lam-for. Longley, Dennis. Information security management and modelling. Information Management & Computer Security. 7(1): 30-40. 1999. Leek, Colin. Information systems frameworks and strategy. Industrial Management & Data Systems. 97(3): 86-89. 1997. Lee, Matthew K.O. IT outsourcing contracts: practical issues for management. Industrial Management and Data Systems. 96(1): 15-20. 1996. List, William. Mellville, Rob. Integrity in information systems - executive summary. Computers & Security. 13(4): 295-301. 1994. Marcella, Rita. Carcary, Iona. Baxter, Graeme. The information needs of United Kingdom Members of the European Parliament (MEPs) Library. Management. 20(3): 168-178. 1999. McAdam, Rodney. Donaghy, John. Business process re-engineering in the public sector A study of staff perceptions and critical success factors. Business Process Management Journal. 5(1): 33-52. 1999. McHugh, Marie. Bennett, Hadyn. Introducing teamworking within a bureaucratic maze. Leadership & Organizational Development Journal. 20(2): 81-93. 1999. Myers, Michael D. Young, Leslie W. Hidden agendas, power and managerial assumptions in information systems development - An ethnographic study. Information Technology & People. 10(3): 224-240. 1997. Navaratnam, K.K. Harris, Bill. Quality process analysis: a technique for management in the public sector. International Journal of Public Sector Management. 8(1): 11-19. 1995. Norton, David P. Managing benefits from information technology. Information Management & Computer Security. 3(5): 29-35. 1995. O’Mahoney, Donal. Security considerations in a network management environment. IEEE Network. 8(3): 12-17. May - June 1994. Papps, Ivy. Evaluation of performance, monitoring costs and quality management. International Journal of Quality & Reliability Management. 12(3): 49-56. 1995. Pangalos, George. Tutorial on secure database systems. Information and Software Technology. 36(12): 717-724. December 1994. Remenyi, Dan. Sherwood-Smith, Michael. Maximise information systems value by continuous participative evaluation. Logistics Information Management. 12(1/2): 14-31. 1999. Serafeimidis, Vassilis. Smithson, Steve. Rethinking the approaches to information systems investment evaluation. Logistics Information Management. 12(1/2): 94-107. 1999. Shirey, Robert W. Security requirements for network management data. Computer Standards & Interfaces. 17(4): 321-331. 15 September 1995. Sloman, Morris. Policy driven management for distributed systems. Journal of Network and Systems Management. 2(4): 333-360. December 1994. Southern, Culture G. Murray, Allistair U. Quality Information Management - The Way to a Better Company. Information Management & Computer Security. 2(2): 32-35. 1994. Stevenson, Jerry. Knowledge management: Today's buzzword, tomorrow's solution. Infotech Update. Oak Ridge. 8(2): 9, 2. Mar/Apr 1999. Swash, G.D. The information audit. Journal of Managerial Psychology. 12(5): 312-318. 1997. Van Alstyne, Marshall. Brynjolfsson, Erik. Madnick, Stuart. Why not one big database? Principles for data ownership. Decision Support Systems. 15(4): 267-284. December 1995. Von Solms, Rossouw. Information Security Management: The Second Generation. Computers & Security. 15(4): 281-288. 1996. Wells, LaMont. Managing organizational knowledge in a revenue agency: The experience of Washington D.C. Government Finance Review. Chicago. 15(2): 21, 3. Apr 1999. Whyte, Grafton. Bytheway, Andy. Factors affecting information systems' success. International Journal of Service Industry Management. 7(1): 74-93. 1996. Zeffane, Rachid. Inter-organizational Alliance and Networking Dynamics, Processes and Technology. Leadership & Organizational Development Journal. 15(7): 28-32. 1994.
| HOME | CONTACT US | MISSION | COPYRIGHT | NPO Registration Number : 045-133-NPO| web design by DUMELANG MEDIA SERVICES |
RELATED PAGES About the Publication Spring 2001 Summer 2001 Summer 2000 Spring 1999 Autumn 1999 Summer 1999 Spring 1998 Winter 1998