Lech J. Janczewski

Orcid: 0000-0003-3319-924X

Affiliations:
  • Dept. of Information Systems & Operations Management, University of Auckland, Auckland, New Zealand


According to our database1, Lech J. Janczewski authored at least 41 papers between 1992 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Exploring Incentives and Challenges for Cybersecurity Intelligence Sharing (CIS) across Organizations: A Systematic Review.
Commun. Assoc. Inf. Syst., 2022

Vulnerable Groups Online: Understanding Engagement with Facebook, Instagram and Snapchat.
Proceedings of the 28th Americas Conference on Information Systems, 2022

2021
Using Knowledge Synthesis to Identify Multi-dimensional Risk Factors in IoT Assets.
Proceedings of the Advances in Cyber Security - Third International Conference, 2021

2020
Commercial Drones: Peeping Tom or Precision Operator? A Governance, Risk and Compliance Framework for a Secure Drone Eco-system.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2019
A relation-aware multiparty access control.
J. Intell. Fuzzy Syst., 2019

Security Considerations in Big Data Solutions Adoption: Lessons from a Case Study on a Banking Institution.
Proceedings of the CENTERIS 2019 - International Conference on ENTERprise Information Systems / ProjMAN 2019 - International Conference on Project MANagement / HCist 2019, 2019

2018
An Implementation of Sec-TOE Framework: Identifying Security Determinants of Big Data Solutions Adoption.
Proceedings of the 22nd Pacific Asia Conference on Information Systems, 2018

2017
Impact of Information Seeking and Warning Frames on Online Deception: A Quasi-Experiment.
J. Comput. Inf. Syst., 2017

Clustering and Topic Modelling: A New Approach for Analysis of National Cyber security Strategies.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017

Regulatory Environment of Cloud Computing in New Zealand.
Proceedings of the 2017 International Conference on Information Resources Management, 2017

2016
Cloud Supply Chain Resilience Model: Development and Validation.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

Adoption of Big Data Solutions: A study on its security determinants using Sec-TOE Framework.
Proceedings of the CONF-IRM 2016, 2016

Technological, Organizational and Environmental Security and Privacy Issues of Big Data: A Literature Review.
Proceedings of the International Conference on ENTERprise Information Systems/International Conference on Project MANagement/International Conference on Health and Social Care Information Systems and Technologies, 2016

2015
SEC-TOE Framework: Exploring Security Determinants in Big Data Solutions Adoption.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015

Cloud supply chain resilience.
Proceedings of the 2015 Information Security for South Africa, 2015

A Proposed Framework for Examining Information Systems Security Research.
Proceedings of the Information Systems Development: Transforming Healthcare through Information Systems, 2015

Typology of information systems security research: A methodological perspective.
Proceedings of the 2015 Second International Conference on Information Security and Cyber Forensics, 2015

Cyber Defense Capability Model: A Foundation Taxonomy.
Proceedings of the CONF-IRM 2015, 2015

2014
Effect of Frame of Mind on Users' Deception Detection Attitudes and Behaviours.
Proceedings of the CONF-IRM 2014, The International Conference on Information Resources Management: Big Data, 2014

2013
Modelling Organizational Resilience in the Cloud.
Proceedings of the 17th Pacific Asia Conference on Information Systems, 2013

2012
More Choices, More Control: Extending Access Control by Meta-rights Reallocation.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Effects Of Information Seeking Modes On Users' Online Social Engineering Vulnerabilities.
Proceedings of the 16th Pacific Asia Conference on Information Systems, 2012

A Typology Of Social Engineering Attacks - An Information Science Perspective.
Proceedings of the 16th Pacific Asia Conference on Information Systems, 2012

Dynamic Rights Reallocation In Social Networks.
Proceedings of the 6th International Symposium on Human Aspects of Information Security and Assurance, 2012

A Discussion on Life Systems Security and the Systems Approach.
Proceedings of the CONF-IRM 2012, 2012

2011
Developing a grand strategy for Cyber War.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

Governance Life Cycle Framework for Managing Security in Public Cloud: From User Perspective.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
Social Engineering-Based Attacks-Model and New Zealand Perspective.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2010

2007
Securing Data Transfers: An Integrity Algorithm for Error Recovery Triangulation.
Proceedings of the Pacific Asia Conference on Information Systems, 2007

2006
Review of the PKI status in New Zealand.
Proceedings of the Pacific Asia Conference on Information Systems, 2006

2005
Assignment of Security Clearances in an Organization.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

2004
Update/Patch Management Systems: A Protocol Taxonomy with Security Implications.
Proceedings of the Information Security Management, Education and Privacy, 2004

2003
World Framework for Security Benchmark Changes.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

2002
Development of Information Security Baselines for Healthcare Information Systems in New Zealand.
Comput. Secur., 2002

2001
Handling Distributed Denial-of-Service Attacks.
Inf. Secur. Tech. Rep., 2001

2000
"Need-to-know" principle and fuzzy security clearances modelling.
Inf. Manag. Comput. Secur., 2000

Current information security protocols and an outlook for the future.
Proceedings of the Challenges of Information Technology Management in the 21st Century, 2000

An Adaptable Human-Agent Collaboration Information System in Manufacturing (HACISM).
Proceedings of the 11th International Workshop on Database and Expert Systems Applications (DEXA'00), 2000

1998
Industrial information-weight security models.
Inf. Manag. Comput. Secur., 1998

1997
A taxonomy and overview of information security experiments.
Proceedings of the Information Security in Research and Business, 1997

1992
Data Security Model for Branch Offices of Big Organisations.
Proceedings of the IT Security: The Need for International Cooperation, 1992


  Loading...