Author of the publication

Aged Care Informatics: Exploring the Role of Information, Knowledge and Aged Care Management.

, , , , , and . Int. J. Enterp. Inf. Syst., 10 (2): 1-20 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Genome Mining Using Machine Learning Techniques., , and . ICOST, volume 9102 of Lecture Notes in Computer Science, page 379-384. Springer, (2015)A Model for Automated Affect Recognition on Smartphone-Cloud Architecture., , , and . ICOST, volume 9677 of Lecture Notes in Computer Science, page 407-414. Springer, (2016)Older People's Needs and Opportunities for Assistive Technologies., , and . ICOST, volume 12157 of Lecture Notes in Computer Science, page 404-414. Springer, (2020)Measuring E-Learning System Success (Research In Progress)., , and . PACIS, page 15. Queensland University of Technology, (2011)Changing ICT for Client/Patient Management and Clinical Information in Residential and Community Aged Care Services in Regional Australia: Structured Interviews with Service Managers., and . ICOST, volume 6159 of Lecture Notes in Computer Science, page 113-120. Springer, (2010)Spatiotemporal Hybrid Random Forest Model for Tea Yield Prediction Using Satellite-Derived Variables., , , , , , and . Remote. Sens., 14 (3): 805 (2022)An investigation of the challenges and issues influencing the adoption of cloud computing in Australian regional municipal governments., , and . J. Inf. Secur. Appl., (2016)Collaborative cloud computing adoption in Australian regional municipal government: An exploratory study., , , , and . CSCWD, page 540-548. IEEE, (2015)The perceived public value of social media in Queensland local Councils., , , and . ACIS, page 8. (2017)The potential of e-procurement technology for reducing corruption., , and . Int. J. Inf. Technol. Manag., 11 (4): 273-287 (2012)