Greg Stephens

Affiliations:
  • University of New South Wales, Sydney, NSW, Australia


According to our database1, Greg Stephens authored at least 16 papers between 2003 and 2012.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Artificial immune systems for the detection of credit card fraud: an architecture, prototype and preliminary results.
Inf. Syst. J., 2012

Addressing identity crime in crime management information systems: Definitions, classification, and empirics.
Comput. Law Secur. Rev., 2012

2009
Critical Infrastructure Infomation Security: Impacts of Identity and Related Crimes.
Proceedings of the Pacific Asia Conference on Information Systems, 2009

Multi-Dimensionality of Overall Consumer Satisfaction - Socio-Technical Perspective.
Proceedings of the 15th Americas Conference on Information Systems, 2009

Information Security in an Identity Management Lifecycle: Mitigating Identity Crimes.
Proceedings of the 15th Americas Conference on Information Systems, 2009

An Investigation of the Impact of Corporate Culture on Employee Information Systems Security Behaviour.
Proceedings of the Australasian Conference on Information Systems, 2009

2008
Investigating the Applicability of Structural Analysis Techniques in Distributed Systems.
Proceedings of the Information Systems Development, 2008

Towards a Methodology for Profiling Cyber Criminals.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

Developing a Conceptual Framework for Identity Fraud Profiling.
Proceedings of the 16th European Conference on Information Systems, 2008

Defining Identity Crimes.
Proceedings of the Australasian Conference on Information Systems, 2008

2007
Participants Involved In Identity Fraud.
Proceedings of the Pacific Asia Conference on Information Systems, 2007

An Identity Fraud Model Categorising Perpetrators, Channels, Methods of Attack, Victims and Organisational Impacts.
Proceedings of the Pacific Asia Conference on Information Systems, 2007

Identity Fraud: The Player Landscape in Australia.
Proceedings of the Australasian Conference on Information Systems, 2007

2004
Knowledge Discovery through Visualising Using Virtual Reality.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Biometrics Acceptance - Perceptions of Use of Biometrics.
Proceedings of the Australasian Conference on Information Systems, 2004

2003
Biometric Authentication Adoption Issues.
Proceedings of the Australasian Conference on Information Systems, 2003


  Loading...