The Role of Hiding Information in Information Systems on Organization Continuation and Strength

Print
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 119 - Number 2
Year of Publication: 2015
Authors:
Victor Setrag George Soultanian
10.5120/21043-3661

Victor Setrag George Soultanian. Article: The Role of Hiding Information in Information Systems on Organization Continuation and Strength. International Journal of Computer Applications 119(2):34-40, June 2015. Full text available. BibTeX

@article{key:article,
	author = {Victor Setrag George Soultanian},
	title = {Article: The Role of Hiding Information in Information Systems on Organization Continuation and Strength},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {119},
	number = {2},
	pages = {34-40},
	month = {June},
	note = {Full text available}
}

Abstract

This study aimed to investigate how employees deal with each other in systems units to keep the information for themselves and its impact on the rest of other employees and on the whole organization as will. The study concluded that hiding information is deemed as key factor for organization solidity, strength and reputation. As all the organization.

References

  • Laudon, Kenneth & Jane Laudon (2000) Management Information systems, Prentice International. New York.
  • Al _ Hamami, A. and Al Any, S (2007) Information Security Technology and Protection system, Dar Wael, Amman.
  • Qutaishat, M (2005) Database Management, Dar Wael, Amman.
  • Hamami, A. H. and Hamami, M. A. (2008) Information Hiding: Ithra'a Publishing and Distribution, Amman.
  • Shamsin, R (1998) Oracle 8 A Enhancing Data Base that ensure Information Management Confidentiality and Multiple Informatics Means, computer, Communication, Electronics Journal, Vo 15 Issue 10, pp 90-91.
  • Al-Sheri, H (2012) Advanced Digital electronic system and Information confidentiality protection from spying . Arab Journal for safety and training Studies, Volume 28, Issue 56, pp 32-35.
  • Ahmad, Awed and Hussein, A. (2005) Information Security and Coding Techniques, Al -Hamed For Publishing and distribution, Amman.
  • Al _ Hamami, A. and Al Any, S (2007) Information Security Technology and Protection system, Dar Wael, Amman.