Author of the publication

Exploring Practitioner Perspectives of Sourcing Risks: Towards the Development of an Integrated Risk and Control Framework.

, , , and . CoRR, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A 'uses and gratifications' approach to understanding the role of wiki technology in enhancing teaching and learning outcomes., , and . ECIS, page 665-676. (2009)Exploring Practitioner Perspectives of Sourcing Risks: Towards the Development of an Integrated Risk and Control Framework., , , and . ACIS, page 149. (2015)Technoidentology: Towards An Explication Of Individual Relationships With IS/IT., , and . ECIS, page 81. (2013)Exploring Practitioner Perspectives of Sourcing Risks: Towards the Development of an Integrated Risk and Control Framework., , , and . CoRR, (2016)Typology and Hierarchy of Students' Motivations to Use Technology in Learning., , and . Australas. J. Inf. Syst., (2018)The Introduction and Assessment of Three Teaching Tools (WebCT, Mindtrail, EVE) into a Post Graduate Course., and . J. Inf. Technol. Educ., 1 (3): 233-252 (2002)Investigating ID Fraud in Australia: A Research Program., , , , , , , , and . PACIS, page 116. AISeL, (2003)Antecedents to Risk and Threat in HCI: Controlling for the unknown., , and . PACIS, page 127. (2016)The Implications of E-Commerce for Software Project Risk: A preliminary investigation., and . E-Business: Multidisciplinary Research and Practice, volume 252 of IFIP Conference Proceedings, page 327-343. Kluwer, (2002)A Popular Postgraduate Information Systems Security Course., and . J. Inf. Syst. Educ., 13 (3): 219-226 (2002)