Author of the publication

User Behaviours Associated with Password Security and Management.

, and . Australas. J. Inf. Syst., (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fight club: culture, conflict and everyday life amongst an online 'community'., , and . Int. J. Web Based Communities, 2 (4): 474-489 (2006)Gear Train Theory: An Approach to the Assignment Problem Providing Tractable Solutions with Measured Optimality., and . PDPTA, page 986-995. CSREA Press, (1997)Integration Challenges in The Gene Expression Data Management, , , , , and . Bioinformatics -- Managing Scientific Data, page 277-302. Morgan Kaufmann Publishers, (2003)Demonstrative Reference, the Relational View of Experience, and the Proximality Principle. chapter III, (2010)Dynamic Changes in Organizational Motivations to Crowdsourcing for GLAMs., and . ICIS, Association for Information Systems, (2013)Smarter Software Engineering: Knowledge factors contributing to improved Individual Performance., , and . SEKE, page 309-314. Knowledge Systems Institute Graduate School, (2010)(Re)Negotiating Homeless Identity through Technology-Mediated Social Interaction., , and . ICIS, Association for Information Systems, (2015)Knowledge pricing structures on MOOC platform - A use case analysis on edX., , , and . PACIS, page 181. (2018)Quantitative Analysis of Desirability in User Experience., , and . CoRR, (2016)Telework and the Nature of Work: an Assessment of Different Aspects of Work and the Role of Technology., , and . ECIS, (2014)