CFP last date
20 January 2025
Reseach Article

The Role of Hiding Information in Information Systems on Organization Continuation and Strength

by Victor Setrag George Soultanian
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 119 - Number 2
Year of Publication: 2015
Authors: Victor Setrag George Soultanian
10.5120/21043-3661

Victor Setrag George Soultanian . The Role of Hiding Information in Information Systems on Organization Continuation and Strength. International Journal of Computer Applications. 119, 2 ( June 2015), 34-40. DOI=10.5120/21043-3661

@article{ 10.5120/21043-3661,
author = { Victor Setrag George Soultanian },
title = { The Role of Hiding Information in Information Systems on Organization Continuation and Strength },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 119 },
number = { 2 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 34-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume119/number2/21043-3661/ },
doi = { 10.5120/21043-3661 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:03:00.379110+05:30
%A Victor Setrag George Soultanian
%T The Role of Hiding Information in Information Systems on Organization Continuation and Strength
%J International Journal of Computer Applications
%@ 0975-8887
%V 119
%N 2
%P 34-40
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This study aimed to investigate how employees deal with each other in systems units to keep the information for themselves and its impact on the rest of other employees and on the whole organization as will. The study concluded that hiding information is deemed as key factor for organization solidity, strength and reputation. As all the organization.

References
  1. Laudon, Kenneth & Jane Laudon (2000) Management Information systems, Prentice International. New York.
  2. Al _ Hamami, A. and Al Any, S (2007) Information Security Technology and Protection system, Dar Wael, Amman.
  3. Qutaishat, M (2005) Database Management, Dar Wael, Amman.
  4. Hamami, A. H. and Hamami, M. A. (2008) Information Hiding: Ithra'a Publishing and Distribution, Amman.
  5. Shamsin, R (1998) Oracle 8 A Enhancing Data Base that ensure Information Management Confidentiality and Multiple Informatics Means, computer, Communication, Electronics Journal, Vo 15 Issue 10, pp 90-91.
  6. Al-Sheri, H (2012) Advanced Digital electronic system and Information confidentiality protection from spying . Arab Journal for safety and training Studies, Volume 28, Issue 56, pp 32-35.
  7. Ahmad, Awed and Hussein, A. (2005) Information Security and Coding Techniques, Al -Hamed For Publishing and distribution, Amman.
  8. Al _ Hamami, A. and Al Any, S (2007) Information Security Technology and Protection system, Dar Wael, Amman.
Index Terms

Computer Science
Information Sciences

Keywords

Environment Wastebasket Colleague Automatic Procedure Function Record Grant Authorization Monopoly Encryption Decryption Loop Programmer analyst Designer Application Efficiency Effectiveness