Rodger Jamieson

According to our database1, Rodger Jamieson authored at least 33 papers between 1989 and 2012.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Addressing identity crime in crime management information systems: Definitions, classification, and empirics.
Comput. Law Secur. Rev., 2012

2010
Circuits of Power: A Study of Mandated Compliance to an Information Systems Security De Jure Standard in a Government Organization.
MIS Q., 2010

Identification of Legal Issues for Computer Forensics.
J. Digit. Forensic Pract., 2010

2009
Information Systems Security Compliance in E-Government.
Proceedings of the Pacific Asia Conference on Information Systems, 2009

Critical Infrastructure Infomation Security: Impacts of Identity and Related Crimes.
Proceedings of the Pacific Asia Conference on Information Systems, 2009

Information Security in an Identity Management Lifecycle: Mitigating Identity Crimes.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2008
Developing a Conceptual Framework for Identity Fraud Profiling.
Proceedings of the 16th European Conference on Information Systems, 2008

Moving Towards Information System Security Accreditation within Australian State Government Agencies.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

2007
Participants Involved In Identity Fraud.
Proceedings of the Pacific Asia Conference on Information Systems, 2007

An Identity Fraud Model Categorising Perpetrators, Channels, Methods of Attack, Victims and Organisational Impacts.
Proceedings of the Pacific Asia Conference on Information Systems, 2007

An Action Research Program to Improve Information Systems Security Compliance across Government Agencies.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Development of a Conceptual Framework for Managing Identity Fraud.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

2006
Determining Key Factors in E-Government Information System Security.
Inf. Syst. Manag., 2006

2005
An Investigation of Dispute Resolution Mechanisms on Power and Trust: A Domain Study of Online Trust in e-Auctions.
Proceedings of the Trust, 2005

Security Risks in Mobile Business.
Proceedings of the 2005 International Conference on Mobile Business (ICMB 2005), 2005

Key Factors in E-Government Information System Security.
Proceedings of the 18th Bled eConference: eIntegration in Action, 2005

2003
Investigating ID Fraud in Australia: A Research Program.
Proceedings of the Seventh Pacific Asia Conference on Information Systems, 2003

Integrating trust and risk perceptions in business-to-consumer electronic commerce with the technology acceptance model.
Proceedings of the 11th European Conference on Information Systems, 2003

TRiTAM: A Model for Integrating Trust and Risk Perceptions in Business-to-Consumer Electronic Commerce.
Proceedings of the 16th Bled eConference: eTransformation, 2003

2002
The Introduction and Assessment of Three Teaching Tools (WebCT, Mindtrail, EVE) into a Post Graduate Course.
J. Inf. Technol. Educ., 2002

A Popular Postgraduate Information Systems Security Course.
J. Inf. Syst. Educ., 2002

Multidisciplinary E-Forensics Methodology Development to Assist in the Investigation of e-Crime.
Proceedings of the Seeking Success in E-Business, 2002

Governance for E-business Knowledge Management Systems.
Proceedings of the Seeking Success in E-Business, 2002

Development of a Framework for Risks and Security in B2C eBusiness.
Proceedings of the Towards The Knowledge Society: eCommerce, 2002

2001
A Tool for Designing Multimedia Systems.
Proceedings of the World Multiconference on Systemics, Cybernetics and Informatics, 2001

Data Mining Prototype for Detecting E-Commerce Fraud.
Proceedings of the 9th European Conference on Information Systems, 2001

A Comparison of Online Electronic Commerce Assurance Service Providers in Australia.
Proceedings of the 14th Bled eConference: e-Everything: e-Commerce, 2001

1998
Organisational intelligence for human resource management: systems support for power distribution in organisations.
Proceedings of the Sixth European Conference on Information Systems, 1998

1996
An Investigation of Electronic Data Interchange Risks, Security and Controls.
Proceedings of the Fourth European Conference on Information Systems, 1996

1991
Strategies for teaching information systems.
J. Inf. Technol., 1991

1990
<i>Local</i> area network operations: a security, control and audit perspective.
J. Inf. Technol., 1990

1989
Impact of Knowledge Based Information Systems on Organisations.
J. Inf. Technol., 1989

Security and control issues in local area network design.
Comput. Secur., 1989


  Loading...