Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Business

Critical Study Of The Managerial Selection Practices In Malaysian Business Organisations, Zeti Sheikh Othman Jan 2001

Critical Study Of The Managerial Selection Practices In Malaysian Business Organisations, Zeti Sheikh Othman

Theses : Honours

An exploratory study was made on the managerial selection practices of Malaysian business organizations. The data for the study was provided by 62 business organizations comprising 22 Malaysian-owned small and medium enterprises, 26 large locally-owned corporation and 14 Malaysian-based multinational companies. Comparisons of the selection practices were made between the two categories of Malaysian local companies; between the Malaysian local companies and the multinationals, and between selection practices of the Malaysian organizations combined with the practices in the developed countries as revealed by management literature. Analysis of the results reveal that generally there were little differences between the selection practices …


Privacy On The Internet : Investigation Into Corporate Privacy Policy Of Australian Large Private Sector Organisations On The Internet, Keiko Sato Jan 2001

Privacy On The Internet : Investigation Into Corporate Privacy Policy Of Australian Large Private Sector Organisations On The Internet, Keiko Sato

Theses: Doctorates and Masters

The popularity of the Internet has been dramatically increased over recent years. The rapid growth of this technology and its international use has made it almost impossible to regulate the internet. As a result, the Internet has certainly provided freedoms to people and it has led to some abusing systems. Privacy is one of the major issues in the development of Electronic Commerce using the Internet. As an enormous amount of personal information is transmitted to several hosts connecting to the Internet, the information can be accessed by both authorised and unauthorised people. Although it is certain that there are …