Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Moving Towards Information System Security Accreditation within Australian State Government Agencies., , , and . AMCIS, page 46. Association for Information Systems, (2008)Key Factors in E-Government Information System Security., and . Bled eConference, page 32. (2005)Multidisciplinary E-Forensics Methodology Development to Assist in the Investigation of e-Crime., and . E-Business: Multidisciplinary Research and Practice, volume 252 of IFIP Conference Proceedings, page 187-205. Kluwer, (2002)A Comparison of Online Electronic Commerce Assurance Service Providers in Australia, , and . Proceedings of the Fourteen Bled Electronic Commerce Conference, (2001)The Introduction and Assessment of Three Teaching Tools (WebCT, Mindtrail, EVE) into a Post Graduate Course., and . J. Inf. Technol. Educ., 1 (3): 233-252 (2002)An Approach to Implementing Maturity Models in IT Security., and . ACIS, (2003)The Impact of Legal and Social Issues on the Acceptance of Biometrics., and . ACIS, (2003)TRiTAM: A Model for Integrating Trust and Risk Perceptions in Business-to-Consumer Electronic Commerce., and . Bled eConference, page 60. (2003)An Investigation of Electronic Data Interchange Risks, Security and Controls., and . ECIS, page 899-916. (1996)A Security, Trust and Assurance Research Framework for Electronic Commerce, and . IFIP TC8 Working Conference on E-Commerce/E-Business, (2001)