David Lacey

According to our database1, David Lacey authored at least 25 papers between 1995 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Exploiting organisational vulnerabilities as dark knowledge: conceptual development from organisational fraud cases.
J. Knowl. Manag., 2022

2019
Understanding the effects of compromise and misuse of personal details on older people.
Australas. J. Inf. Syst., 2019

2017
Designing and evaluating two interventions to improve identity theft recovery outcomes.
Proceedings of the 2017 IEEE International Symposium on Technology and Society, 2017

2016
Understanding victim-enabled identity theft.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

2015
It's Dark in There: Using Systems Analysis to Investigate Trust and Engagement in Dark Web Forums.
Proceedings of the Engineering Psychology and Cognitive Ergonomics, 2015

2012
Death by a Thousand Facts: Criticising the Technocratic Approach to Information Security Awareness.
Inf. Manag. Comput. Secur., 2012

2011
Detecting complex account fraud in the enterprise: The role of technical and non-technical controls.
Decis. Support Syst., 2011

Exploring Interpersonal Relationships in Security Information Sharing.
Proceedings of the International Conference on Information Systems, 2011

Exploring information security controls using information fraud episodes: case study evidence from a large telecommunications firm.
Proceedings of the 19th European Conference on Information Systems, 2011

2010
Understanding and transforming organizational security culture.
Inf. Manag. Comput. Secur., 2010

Compilation Techniques for High Level Parallel Code.
Int. J. Parallel Program., 2010

2009
Program transformations using temporal logic side conditions.
ACM Trans. Program. Lang. Syst., 2009

Understanding and Transforming Organisational Culture.
Proceedings of the 3rd International Conference on Human Aspects of Information Security and Assurance, 2009

2007
Verification Coverage: When is Enough, Enough?
Proceedings of the 44th Design Automation Conference, 2007

2006
A new institute for a new millennium.
Inf. Secur. Tech. Rep., 2006

Loop Transformations in the Ahead-of-Time Optimization of Java Bytecode.
Proceedings of the Compiler Construction, 15th International Conference, 2006

2005
Inventing the future - The vision of the Jericho Forum.
Inf. Secur. Tech. Rep., 2005

2004
Compiler Optimization Correctness by Temporal Logic.
High. Order Symb. Comput., 2004

Assertion-based design, Second Edition.
Kluwer, ISBN: 978-1-4020-8027-2, 2004

2003
Universal Regular Path Queries.
High. Order Symb. Comput., 2003

Investigating ID Fraud in Australia: A Research Program.
Proceedings of the Seventh Pacific Asia Conference on Information Systems, 2003

2002
Proving correctness of compiler optimizations by temporal logic.
Proceedings of the Conference Record of POPL 2002: The 29th SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2002

2001
Imperative Program Transformation by Rewriting.
Proceedings of the Compiler Construction, 10th International Conference, 2001

2000
Logic Program Synthesis in a Higher-Order Setting.
Proceedings of the Computational Logic, 2000

1995
Client/server - a handbook of modern computer system design.
BCS practitioner series, Prentice Hall, ISBN: 978-0-13-377201-2, 1995


  Loading...