Security and Privacy Factors Influencing the Adoption of Cloud Computing in Australian SMEs. | 0 | 0.34 | 2021 |
An Investigative Model of Adult Cyberbullying - A Court Case Analysis. | 0 | 0.34 | 2021 |
The Impact Of Self-Efficacy On Accountants' Behavioral Intention To Adopt And Use Accounting Information Systems | 0 | 0.34 | 2020 |
Data Retention: An Assessment Of A Proposed National Scheme | 0 | 0.34 | 2019 |
Preface to Research on Applied Ethics (Cybersecurity) | 1 | 0.34 | 2019 |
Factors that influence adoption of cloud computing: an empirical study of Australian SMEs | 0 | 0.34 | 2018 |
Editorial: Research on Applied Ethics Involving Emerging ICT Technologies | 0 | 0.34 | 2017 |
Social media as an information system: improving the technological agility. | 2 | 0.38 | 2017 |
A Hybrid Location Privacy Protection Scheme in Big Data Environment. | 1 | 0.35 | 2017 |
Ethics And Ict: Why All The Fuss? | 1 | 0.37 | 2016 |
Understanding the use of social media by organisations for crisis communication. | 4 | 0.40 | 2016 |
Security and Privacy Concerns for Australian SMEs Cloud Adoption: Empirical Study of Metropolitan vs Regional SMEs | 0 | 0.34 | 2016 |
The Syrian Electronic Army - A Hacktivist Group | 0 | 0.34 | 2016 |
An Empirical Study of Factors Influencing Accounting Information Systems Adoption | 0 | 0.34 | 2015 |
Applying classification controls to Internet content in Australia | 0 | 0.34 | 2015 |
The Influence Of Organisation Culture On E-Commerce Adoption | 4 | 0.42 | 2014 |
A Study Into How Australian Banks Use Social Media. | 9 | 0.56 | 2011 |
Protection Of Australia In The Cyber Age | 1 | 0.54 | 2011 |
Ethics: The Past, Present And Future Of Socio-Technical Systems Design | 0 | 0.34 | 2010 |
Fostering Information Security Culture in Small and Medium Size Enterprises: An Interpretive Study in Australia. | 12 | 0.51 | 2007 |
Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework | 0 | 0.34 | 2007 |
A Model And Framework For Online Security Benchmarking | 0 | 0.34 | 2007 |
E-business security benchmarking: a model and framework. | 0 | 0.34 | 2007 |
Striking A Balance Between Ethics And Ict Governance | 1 | 0.48 | 2006 |
Penetration Testing Professional Ethics: A Conceptual Model And Taxonomy | 4 | 0.58 | 2006 |
Australian Commercial - Critical Infrastructure Management Protection | 0 | 0.34 | 2005 |
An Approach for Critical Information Infrastructure Protection | 0 | 0.34 | 2005 |
Benchmarking E-business Security: A Model and Framework | 0 | 0.34 | 2005 |
Ciip-Ram - A Security Risk Analysis Methodology For Critical Information Infrastructure Protection | 1 | 0.40 | 2004 |
Graphical Authentication: An Architectural Design Specification | 0 | 0.34 | 2004 |
PKI - Advantages and Obstacles | 1 | 0.37 | 2004 |
Health Information Security Evaluation: Continued Development of an Object-Oriented Method | 0 | 0.34 | 2004 |
Graphical Authentication: Justifications and Objectives | 0 | 0.34 | 2004 |
A security risk management approach for e-commerce | 2 | 0.41 | 2003 |
ISO 17799 and Australian Healthcare Organisations | 0 | 0.34 | 2003 |
Australian Hackers and Ethics | 1 | 0.63 | 2003 |
Information Security - An E-learning Problem | 3 | 0.47 | 2003 |
Security Management: An Information Systems Setting | 2 | 0.49 | 2002 |
Deception: a tool and curse for security management | 0 | 0.34 | 2001 |
Attitudes of Australian information system managers against online attackers | 0 | 0.34 | 2001 |
A Security Method for Healthcare Organisations | 1 | 0.42 | 2001 |
Security authentication for on-line Internet banking | 0 | 0.34 | 2001 |
Information Warfare and Ethics | 0 | 0.34 | 2001 |
Information Warfare: Fact or Fiction? | 1 | 0.63 | 2000 |
The use of deception in systems | 1 | 0.43 | 2000 |
ICSTM2000, International Conference on Systems Thinking in Management, Geelong, Australia, November 8-10, 2000 | 104 | 29.37 | 2000 |
The Future of Australian & New Zealand Security Standard AS/NZS 4444? | 1 | 0.63 | 1999 |
Computer Hacking And Cyber Terrorism: The Real Threats In The New Millennium? | 12 | 1.99 | 1999 |
Computer Abuse: Vandalizing The Information Society | 4 | 0.67 | 1997 |