Brian Cusack

Orcid: 0000-0003-2489-4881

According to our database1, Brian Cusack authored at least 30 papers between 2002 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Cloud Disruption Impacts Business IT Role Requirements.
J. Comput. Inf. Syst., September, 2022

Smart Agriculture IoT Network Communications Security Improvement.
Proceedings of the 32nd International Telecommunication Networks and Applications Conference, 2022

2021
Formulating Knowledge-Based Cloud Identity Selection.
J. Comput. Inf. Syst., 2021

Data Acquisition from Cloud Network Storage.
Proceedings of the 31st International Telecommunication Networks and Applications Conference, 2021

2020
Cloud Surfing: A General Comparison of Cloud Identity Guidelines.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2019
Digital Forensic Readiness In Wireless Medical Systems.
Proceedings of the 29th International Telecommunication Networks and Applications Conference, 2019

Design and Evaluation for Digital Forensic Ready Wireless Medical Systems.
Proceedings of the IoT Technologies for HealthCare - 6th EAI International Conference, 2019

Defining cloud identity security and privacy issues: A Delphi method.
Proceedings of the 25th Americas Conference on Information Systems, 2019

2018
Points of Failure in the Ransomware Electronic Business Model.
Proceedings of the 24th Americas Conference on Information Systems, 2018

Satisfying Secure Load Balancing Expectations in the Cloud.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
An Internet Access Solution: MANET Routing and a Gateway Selection Approach for Disaster Scenarios.
Rev. Socionetwork Strateg., 2017

2016
Using Design Science to build a Watermark System for Righful Ownership Protection in the Cloud.
CoRR, 2016

Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT.
Proceedings of the Interoperability, Safety and Security in IoT, 2016

Formulating Methodology to Build a Trust Framework for Cloud Identity Management.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

Wi-Pi: a study of WLAN security in Auckland CBD.
Proceedings of the Australasian Computer Science Week Multiconference, 2016

Detecting Slow DDos Attacks on Mobile Devices.
Proceedings of the Australasian Conference on Information Systems, 2016

Analysing Trust Issues in Cloud Identity Environments.
Proceedings of the Australasian Conference on Information Systems, 2016

2015
Project Governance: How Processes Can Be Managed With an Aim to Improve Project Performance.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015

Using Design Science to Build a Watermark System for Cloud Rightful Ownership Protection.
Proceedings of the Australasian Conference on Information Systems, 2015

2014
Measuring Learning in Video Games: A Case Study.
Proceedings of the 2014 Conference on Interactive Entertainment, 2014

Project Governance Requirements: a Case Study.
Proceedings of the 22st European Conference on Information Systems, 2014

2013
Implications of Internet Governance Issues for the end Users.
Proceedings of the UKAIS 2013, 2013

On where the Internet is.
Proceedings of the 19th Americas Conference on Information Systems, 2013

2012
A discussion on Internet Governance.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

2011
Arguments for the Adoption of a Heuristic Approach to IS Research.
Proceedings of the International Conference on Information Systems, 2011

Kodu game lab: improving the motivation for learning programming concepts.
Proceedings of the Foundations of Digital Games, 2011

2007
Making Online Work, Work.
Proceedings of the Pacific Asia Conference on Information Systems, 2007

A Metrics Generation Model for Measuring the Control Objectives of Information Systems Audit.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

2004
Objectives Alignment: Reworking IS Security for eBusiness Enterprises.
Proceedings of the 10th Americas Conference on Information Systems, 2004

2002
Annotating regulatory DNA based on man-mouse genomic comparison.
Proceedings of the European Conference on Computational Biology (ECCB 2002), 2002


  Loading...