Author of the publication

The use of deception in systems.

, and . ICSTM, volume 72 of CEUR Workshop Proceedings, CEUR-WS.org, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information Security: a Misnomer.. AISM, page 33-37. School of Computer and Information Science, Edith Cowan University, Western Australia, (2005)Information Warfare: Fact or Fiction?, and . SEC, volume 175 of IFIP Conference Proceedings, page 411-420. Kluwer, (2000)Truth, lies, reality and deception: an issue for e-commerce., and . Int. J. Serv. Technol. Manag., 3 (2): 208-221 (2002)Information Warfare and Deception.. Informing Sci. Int. J. an Emerg. Transdiscipl., (2006)Integrating Information Security and Intelligence Courses.. World Conference on Information Security Education, volume 253 of IFIP Conference Proceedings, page 75-83. Kluwer, (2003)Deception: A Tool and Curse for Security Management., and . SEC, volume 193 of IFIP Conference Proceedings, page 327-338. Kluwer, (2001)Information Warfare and Ethics., and . Australas. J. Inf. Syst., (2001)Attitudes of Australian information system managers against online attackers., and . Inf. Manag. Comput. Secur., 9 (3): 106-111 (2001)Information Security - An E-learning Problem., and . ICWL, volume 2783 of Lecture Notes in Computer Science, page 21-26. Springer, (2003)A Security Evaluation Criteria for Baseline Security Standards., , and . SEC, volume 214 of IFIP Conference Proceedings, page 79-90. Kluwer, (2002)