Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PKI - Advantages and Obstacles., and . AISM, page 104-114. School of Computer and Information Science, Edith Cowan University, Western Australia, (2004)Deception: A Tool and Curse for Security Management., and . SEC, volume 193 of IFIP Conference Proceedings, page 327-338. Kluwer, (2001)Security authentication for on-line Internet banking., and . Informatica (Slovenia), (2001)Review: Responsible use of technology to combat Cyberbullying among adolescents., , and . Australas. J. Inf. Syst., (2020)Information Warfare and Ethics., and . Australas. J. Inf. Syst., (2001)Fostering Information Security Culture in Small and Medium Size Enterprises: An Interpretive Study in Australia., , and . ECIS, page 1560-1571. University of St. Gallen, (2007)Social media as an information system: improving the technological agility., , and . Enterp. Inf. Syst., 11 (4): 512-533 (2017)Attitudes of Australian information system managers against online attackers., and . Inf. Manag. Comput. Secur., 9 (3): 106-111 (2001)Information Security - An E-learning Problem., and . ICWL, volume 2783 of Lecture Notes in Computer Science, page 21-26. Springer, (2003)Hacker Taggers: A new type of hackers., and . Inf. Syst. Frontiers, 12 (4): 425-431 (2010)