scispace - formally typeset
Search or ask a question

Showing papers by "Northumbria University published in 1991"


Book
01 Jun 1991
TL;DR: An overview what is information technology and information technology organization and structure the systems approach people and organizations information management decisions, decisions decisions as a dynamic a question of balance virtual organization.
Abstract: An overview what is information technology and information technology organization and structure the systems approach people and organizations information management decisions, decisions decisions as a dynamic a question of balance virtual organization.

55 citations


Journal ArticleDOI
TL;DR: In this article, the second-order rate constants for the reaction of tetraacetylethylenediamine (TAED) with hydroperoxide and peracetate anions are analyzed.
Abstract: Hydrogen peroxide and water react with tetraacetylethylenediamine (TAED) to form consecutively triacetylethylenediamine and diacetylethylenediamine with the release of two molecules of peracetic acid or acetic acid. The effect of pH, specific buffers and temperature on the rates of hydrolysis and perhydrolysis are compared. Peracetic acid reacts with TAED very slowly. The ratio of the second-order rate constants for the reaction of TAED with hydroperoxide and peracetate anions is exceptionally large after taking into account the difference in pKa values of their conjugate acids. The relative reactivity of various nucleophiles with TAED is discussed in terms of its performance as a bleach activator.

44 citations


Journal ArticleDOI
TL;DR: In this paper, the authors report the results of a survey which was carried out to discover how public service organizations assign responsibility for the prevention and detection of computer fraud, and to investigate the role of the internal audit department in this area.
Abstract: This article reports the results of a survey which was carried out to discover how public service organizations assign responsibility for the prevention and detection of computer fraud, and to investigate the role of the internal audit department in this area. In addition, the opinions of internal auditors about the threats of computer fraud were obtained. The supply of trained computer audit staff was also investigated. The authors recommend implementation of a management strategy for the prevention and detection of computer fraud and suggest some areas where future research is needed.

15 citations


Book Chapter
01 Jan 1991

1 citations