Dale Kleeman

According to our database1, Dale Kleeman authored at least 7 papers between 1997 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Information Security Perceptions of Users, Levels of Engagement and Developer Resistance.
Proceedings of the Australasian Conference on Information Systems, 2018

2016
Boundary Spanning Theory: a Case Study of the Professionalisation of ICT Graduates in the Australian Public Service.
Proceedings of the Australasian Conference on Information Systems, 2016

2013
A theoretical model for participation by stakeholders concerned with information security issues in systems development processes.
Proceedings of the Australasian Conference on Information Systems, 2013

2011
Impact of restrictive composition policy on user password choices.
Behav. Inf. Technol., 2011

2010
Password Entropy and Password Quality.
Proceedings of the Fourth International Conference on Network and System Security, 2010

2007
The Good and Not So Good of Enforcing Password Composition Rules.
Inf. Secur. J. A Glob. Perspect., 2007

1997
Developing new group work practices: An evaluation of the design and use of groupware-based work systems for a graduate student course in Information System.
Proceedings of the Third Pacific Asia Conference on Information Systems, 1997


  Loading...