Sharman Lichtenstein

According to our database1, Sharman Lichtenstein authored at least 29 papers between 1996 and 2011.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Ethical issues for internet use policy: balancing employer and employee perspectives.
Int. J. Technol. Manag., 2011

Optimising e-mail communication: the impact of seminar- and computer-based training.
Int. J. Internet Enterp. Manag., 2011

Exploring Barriers In Expertise Seeking: Why Don'T They Ask An Expert?
Proceedings of the Pacific Asia Conference on Information Systems, 2011

2010
Supporting knowledge transfer in web-based managed IT support.
J. Syst. Inf. Technol., 2010

2009
Wikipedia model for collective intelligence: a review of information quality.
Int. J. Knowl. Learn., 2009

Successful Web-Based IT Support Services: Service Provider Perceptions of Stakeholder-Oriented Challenges.
Int. J. E Serv. Mob. Appl., 2009

2008
Socio-ethical issues for expertise location from electronic mail.
Int. J. Knowl. Learn., 2008

2007
Dynamic Knowledge Integration in Socio-Technical Networks: an Interpretive Study of Intranet Use for Knowledge Integration.
J. Inf. Knowl. Manag., 2007

Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework.
Proceedings of the New Approaches for Security, 2007

Fostering Information Security Culture in Small and Medium Size Enterprises: An Interpretive Study in Australia.
Proceedings of the Fifteenth European Conference on Information Systems, 2007

Enabling Successful Web-based Information Technology Support for Enterprise Customers: A Service Provider Perspective of Stakeholder-based Issues.
Proceedings of the 20th Bled eConference: eMergence: Merging and Emerging Technologies, 2007

2006
To Choose or Not to Choose: Exploring Australians' Views about Internet Banking.
Int. J. Technol. Hum. Interact., 2006

Toward a Receiver-Based Theory of Knowledge Sharing.
Int. J. Knowl. Manag., 2006

Collaborative knowledge creation in electronic mail.
Int. J. Knowl. Learn., 2006

Restructuring influences on organizational knowledge sharing: An interpretive case study.
Proceedings of the Fourteenth European Conference on Information Systems, 2006

2005
Issues in IT Service-Oriented Requirements Engineering.
Australas. J. Inf. Syst., 2005

Toward Successful Knowledge Transfer in Web-based Self-service for Information Technology Services.
Proceedings of the Pacific Asia Conference on Information Systems, 2005

Receiver Influences on Knowledge Sharing.
Proceedings of the 13th European Conference on Information Systems, 2005

2004
Knowledge Development and Creation in Email.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

2003
Email and Knowledge Management.
Proceedings of the Seventh Pacific Asia Conference on Information Systems, 2003

Understanding Problem Solving in Requirements Engineering: Debating Creativity with IS Practitioners.
Proceedings of the Seventh Pacific Asia Conference on Information Systems, 2003

Adding Value to Online Privacy for Consumers: Remedying Deficiences in Online Privacy Policies with an Holistic Approac.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

Sustainable knowledge management systems: integration personalisation and contextualisation.
Proceedings of the 11th European Conference on Information Systems, 2003

2002
The Potentialities of Focus Groups in e-Business Research: Theory Validation.
Proceedings of the Seeking Success in E-Business, 2002

2001
Effective Management and Policy in e-Business Security.
Proceedings of the 14th Bled eConference: e-Everything: e-Commerce, 2001

1998
Internet risks for companies.
Comput. Secur., 1998

1997
Internet acceptable usage policy for organizations.
Inf. Manag. Comput. Secur., 1997

Developing Internet Security Policy for Organizations.
Proceedings of the 30th Annual Hawaii International Conference on System Sciences (HICSS-30), 1997

1996
Factors in the selection of a risk assessment method.
Inf. Manag. Comput. Secur., 1996


  Loading...