Helen Armstrong

According to our database1, Helen Armstrong authored at least 19 papers between 2002 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
A meta-network approach for analysing the information system access vulnerabilities in organizations.
Proceedings of the 2nd IEEE Network Science Workshop, 2013

Networks of nurses: A case study in informal networks of advice.
Proceedings of the 2nd IEEE Network Science Workshop, 2013

Virtual Penetration Testing: A Joint Education Exercise across Geographic Borders.
Proceedings of the Information Assurance and Security Education and Training, 2013

2012
Insider Threat Behavior Factors: A Comparison of Theory with Reported Incidents.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

Myopia: A Visualization Tool in Support of Close Reading.
Proceedings of the 7th Annual International Conference of the Alliance of Digital Humanities Organizations, 2012

2011
Two Approaches to Information Security Doctoral Research.
Proceedings of the Information Assurance and Security Education and Training, 2011

2010
Modeling Forensic Evidence Systems Using Design Science.
Proceedings of the Human Benefit through the Diffusion of Information Systems Design Science Research - IFIP WG 8.2/8.6 International Working Conference, Perth, Australia, March 30, 2010

Digital Forensics: Defining an Education Agenda.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

Security and Quality Issues in IT Projects.
Proceedings of the South African Information Security Multi-Conference, 2010

Organizational Risk using Network Analysis.
Proceedings of the South African Information Security Multi-Conference, 2010

A Course Applying Network Analysis to Organizational Risk in Information Security.
Proceedings of the South African Information Security Multi-Conference, 2010

2009
Bayesian covariance matrix estimation using a mixture of decomposable graphical models.
Stat. Comput., 2009

Reaching Today's Information Security Students.
Proceedings of the Information Assurance and Security Education and Training, 2009

Remote Laboratory Access for Students with Vision Impairment.
Proceedings of the Fifth International Conference on Networking and Services, 2009

2007
Remote and local delivery of cisco education for the vision-impaired.
Proceedings of the 12th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2007

Resubmit my Information Security Thesis? - You must be joking!
Proceedings of the Fifth World Conference on Information Security Education, 2007

The Role of Information Security Industry Training and Accreditation in Tertiary Education.
Proceedings of the Fifth World Conference on Information Security Education, 2007

2004
A Computing Education Vision for the Sight Impaired.
Proceedings of the Sixth Australasian Computing Education Conference (ACE 2004), 2004

2002
Internet Security Management: A Joint Postgraduate Curriculum Design.
J. Inf. Syst. Educ., 2002


  Loading...