{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:53:14Z","timestamp":1754157194783,"version":"3.41.2"},"reference-count":14,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2004,2,1]],"date-time":"2004-02-01T00:00:00Z","timestamp":1075593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004,2,1]]},"abstract":"<jats:p>Primary data based on a sample of 274 executives was analyzed to assess the impact of computer disasters on information management. Company type\u2010wise impact of computer disasters on information management practices was examined by applying one\u2010way ANOVA. It was found that information management practices in all types of companies were adversely affected by the occurrence of computer disasters. Virus and hardware faults were the disasters that  ocurred the most. It was further found that disasters incidence level was more in both types of Indian companies than multinational companies (MNCs). So, adverse impact of computer disasters on information management practices was found comparatively greater in Indian companies than MNCs. Specifically, Indian companies were more adversely affected in collecting, organizing, processing, and maintaining of information.<\/jats:p>","DOI":"10.1108\/02635570410522107","type":"journal-article","created":{"date-parts":[[2004,3,30]],"date-time":"2004-03-30T18:14:37Z","timestamp":1080670477000},"page":"136-143","source":"Crossref","is-referenced-by-count":7,"title":["Impact of computer disasters on information management: a study"],"prefix":"10.1108","volume":"104","author":[{"given":"Subhash C.","family":"Kundu","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2022021820322399400_B1","unstructured":"Balasubramanian, T.A. (2001), \u201cWar against viral terrorism\u201d, Computers Today, Vol. 17 No. 236, November, pp. 60\u20104."},{"key":"key2022021820322399400_B2","doi-asserted-by":"crossref","unstructured":"Caelli, W., Longley, D. and Shain, M. (1991), Information Security Handbook, Macmillan, London.","DOI":"10.1007\/978-1-349-12209-7_7"},{"key":"key2022021820322399400_B3","doi-asserted-by":"crossref","unstructured":"Crede, A. (1997), \u201cSocial, cultural, economic and legal barriers to the development of technology\u2010based information systems\u201d, Industrial Management & Data Systems, Vol. 97 No. 1, pp. 58\u201062.","DOI":"10.1108\/02635579710161368"},{"key":"key2022021820322399400_B4","doi-asserted-by":"crossref","unstructured":"Davies, H. and Walters, M. (1998), \u201cDo all crises have to become disasters? Risk and risk mitigation\u201d, Disaster Prevention and Management: An International Journal, Vol. 7 No. 5, pp. 396\u2010400.","DOI":"10.1108\/02637479810202883"},{"key":"key2022021820322399400_B5","doi-asserted-by":"crossref","unstructured":"De Souza Dias, D. (1998), \u201cManagers\u2019 motivation for using information technology\u201d, Industrial Management & Data Systems, Vol. 98 No. 7, pp. 338\u201042.","DOI":"10.1108\/02635579810230153"},{"key":"key2022021820322399400_B6","doi-asserted-by":"crossref","unstructured":"Forcht, K. A. and Pierson, J. (1994), \u201cNew technologies and future trends in computer security\u201d, Industrial Management & Data Systems, Vol. 94 No. 8, pp. 30\u20106.","DOI":"10.1108\/02635579410069337"},{"key":"key2022021820322399400_B7","unstructured":"Godbole, N. (2001), \u201cManage the IT\u2010related risks in your business\u201d, Information Technology, Vol. 10 No. 9, 9 July, pp. 84\u20108."},{"key":"key2022021820322399400_B8","doi-asserted-by":"crossref","unstructured":"Gupta, U.G. and Collins, W. (1997), \u201cThe impact of information systems on the efficiency of banks:  an empirical investigation\u201d, Industrial Management & Data Systems, Vol. 97 No. 1, pp. 10\u201016.","DOI":"10.1108\/02635579710161296"},{"key":"key2022021820322399400_B9","doi-asserted-by":"crossref","unstructured":"Hedelin, L. and Allwood, C.M. (2002), \u201cIT and strategic decision making\u201d, Industrial Management & Data Systems, Vol. 102 No. 3, pp. 125\u201039.","DOI":"10.1108\/02635570210421318"},{"key":"key2022021820322399400_B10","unstructured":"Johnson, J. (2000), \u201cVITC\u2019s 2002 security survey results and analysis\u201d, JLJ Consulting Services, available at: www.viscc.org\/survey2000.html"},{"key":"key2022021820322399400_B11","unstructured":"Laudon, K.C. and Laudon, J.P. (2001), Management Information Systems: Organization and Technology, Prentice\u2010Hall of India Pvt Ltd, New Delhi."},{"key":"key2022021820322399400_B12","unstructured":"Marchand, D.A., Kettinger, W.J. and Rollins, J.D. (2000), \u201cInformation orientation: people, technology and the bottom line\u201d, Sloan Management Review, Summer, pp. 69\u201080."},{"key":"key2022021820322399400_B13","unstructured":"Parnell, J.A., Crandall, W. and Menefee, M.L. (1997), \u201cManagement perceptions of organizational crises: a cross\u2010cultural study of Egyptian managers\u201d, Academy of Strategic and Organizational Leadership Journal, Vol. 1, pp. 8\u201019, available at: www.alliedacademies.org\/strategic\/asolj1\u20101.pdf"},{"key":"key2022021820322399400_B14","doi-asserted-by":"crossref","unstructured":"Williams, L.T. (1997), \u201cPlanning and managing the information system \u2013 a manager\u2019s guide\u201d, Industrial Management & Data Systems, Vol. 97 No. 5, pp. 187\u201091.","DOI":"10.1108\/02635579710169577"}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/02635570410522107","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635570410522107\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635570410522107\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:37:19Z","timestamp":1753400239000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/imds\/article\/104\/2\/136-143\/184527"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,2,1]]},"references-count":14,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2004,2,1]]}},"alternative-id":["10.1108\/02635570410522107"],"URL":"https:\/\/doi.org\/10.1108\/02635570410522107","relation":{},"ISSN":["0263-5577"],"issn-type":[{"type":"print","value":"0263-5577"}],"subject":[],"published":{"date-parts":[[2004,2,1]]}}}