Tanya Jane McGill

Orcid: 0000-0003-4272-1757

According to our database1, Tanya Jane McGill authored at least 72 papers between 1993 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Artificial intelligence - Based video traffic policing for next generation networks.
Simul. Model. Pract. Theory, 2022

Factors Influencing Consumer Adoption of Electronic Health Records.
J. Comput. Inf. Syst., 2022

H.264 and H.265 video traffic modeling using neural networks.
Comput. Commun., 2022

2021
Exploring potential gender differences in information security and privacy.
Inf. Comput. Secur., 2021

The Influence of User Culture on Website Usability.
Int. J. Hum. Comput. Stud., 2021

Maladaptive behaviour in response to email phishing threats: The roles of rewards and response costs.
Comput. Secur., 2021

Public Acceptance of Internet Censorship in Indonesia.
Proceedings of the Australasian Conference on Information Systems, 2021

Usability Perceptions of Culturally Adapted Web Pages.
Proceedings of the Australasian Conference on Information Systems, 2021

2020
I Want It Anyway: Consumer Perceptions of Smart Home Devices.
J. Comput. Inf. Syst., 2020

Cultural factors and the role of privacy concerns in acceptance of government surveillance.
J. Assoc. Inf. Sci. Technol., 2020

Modelling email traffic workloads with RNN and LSTM models.
Hum. centric Comput. Inf. Sci., 2020

Integrating Research into Information Technology Education.
Proceedings of the ACE 2020, 2020

2019
Problematic and extensive YouTube use: first hand reports.
Online Inf. Rev., 2019

How perceived security risk affects intention to use smart home devices: A reasoned action explanation.
Comput. Secur., 2019

Using the Decomposed Theory of Planned Behaviour to explain Healthcare Consumer Adoption of Electronic Health Records.
Proceedings of the Australasian Conference on Information Systems, 2019

2018
Compulsive YouTube usage: A comparison of use motivation and personality effects.
Comput. Hum. Behav., 2018

Short-term and Long-term Effects of Fear Appeals in Improving Compliance with Password Guidelines.
Commun. Assoc. Inf. Syst., 2018

Gender Differences in Information Security Perceptions and Behaviour.
Proceedings of the Australasian Conference on Information Systems, 2018

Privacy Concerns and Acceptance of Government Surveillance in Australia.
Proceedings of the Australasian Conference on Information Systems, 2018

2017
"Security begins at home": Determinants of home computer and mobile device security behavior.
Comput. Secur., 2017

Old risks, new challenges: exploring differences in security between home computer and mobile device use.
Behav. Inf. Technol., 2017

Experimental Evaluation of Less-Than-Best-Effort TCP Congestion Control Mechanisms.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

Experimental evaluation of less-than-best-effort TCP over 802.11 wireless networks.
Proceedings of the 23rd Asia-Pacific Conference on Communications, 2017

Mining the Mind - Applying Quantitative Techniques to Understand Mental Models of Security.
Proceedings of the Australasian Conference on Information Systems, 2017

2016
Large-Sample Comparison of TCP Congestion Control Mechanisms over Wireless Networks.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

Optimising Visual Layout for Training and Learning Technologies.
Proceedings of the Australasian Conference on Information Systems, 2016

2015
Affective Stack - A Model for Affective Computing Application Development.
J. Softw., 2015

Student Perceptions of Flipped Learning.
Proceedings of the 17th Australasian Computing Education Conference, 2015

2014
Australian Academic Leaders' Perceptions of the Teaching-Research-Industry-Learning Nexus in Information and Communications Technology Education.
Int. J. Inf. Commun. Technol. Educ., 2014

Critical success factors for the continuation of e-learning initiatives.
Internet High. Educ., 2014

Improving Compliance with Password Guidelines: How User Perceptions of Passwords and Security Threats Affect Compliance with Guidelines.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

2013
Learning Anywhere, Anytime: Student Motivators for M-learning.
J. Inf. Technol. Educ. Res., 2013

The functionality-based application confinement model.
Int. J. Inf. Sec., 2013

The state of the art of application restrictions and sandboxes: A survey of application-oriented access controls and their shortfalls.
Comput. Secur., 2013

An investigation of the impact of recertification requirements on recertification decisions.
Proceedings of the 2013 Computers and People Research Conference, SIGMIS-CPR '13, Cincinnati, OH, USA, May 30, 2013

Satisfaction of IT Academics with Transnational Education.
Proceedings of the Australasian Conference on Information Systems, 2013

Enabling and Encouraging Greater Diversity in ICT.
Proceedings of the Australasian Conference on Information Systems, 2013

2012
The Teaching-Research-Industry-Learning Nexus in Information and Communications Technology.
ACM Trans. Comput. Educ., 2012

Towards Usable Application-Oriented Access Controls: Qualitative Results from a Usability Study of SELinux, AppArmor and FBAC-LSM.
Int. J. Inf. Secur. Priv., 2012

Affective Tutoring Systems: Enhancing e-Learning with the Emotional Awareness of a Human Tutor.
Int. J. Inf. Commun. Technol. Educ., 2012

An open affective platform.
Proceedings of the 3rd IEEE International Conference on Networked Embedded Systems for Every Application, 2012

2011
Empowering End Users to Confine Their Own Applications: The Results of a Usability Study Comparing SELinux, AppArmor, and FBAC-LSM.
ACM Trans. Inf. Syst. Secur., 2011

A Policy Language for Abstraction and Automation in Application-Oriented Access Controls: The Functionality-Based Application Confinement Policy Language.
Proceedings of the POLICY 2011, 2011

Techniques for Automating Policy Specification for Application-oriented Access Controls.
Proceedings of the Sixth International Conference on Availability, 2011

2010
The role of involvement in learning management system success.
J. Comput. High. Educ., 2010

2009
Incremental submission of programming code using object-oriented classes.
ACM SIGCSE Bull., 2009

Understanding User Behavior towards Passwords through Acceptance and Use Modelling.
Int. J. Inf. Secur. Priv., 2009

A task-technology fit view of learning management system impact.
Comput. Educ., 2009

2008
How students and instructors using a virtual learning environment perceive the fit between technology and task.
J. Comput. Assist. Learn., 2008

An investigation of the role of trust in virtual project management success.
Int. J. Netw. Virtual Organisations, 2008

User developed application success: sources and effects of involvement.
Behav. Inf. Technol., 2008

2007
From Beliefs to Success: Utilizing an Expanded TAM to Predict Web Page Development Success.
Int. J. Technol. Hum. Interact., 2007

2006
End-User Perceptions of the Benefits and Risks of End-User Web Development.
J. Organ. End User Comput., 2006

Project Management in Student Information Technology Projects.
Int. J. Inf. Commun. Technol. Educ., 2006

2005
Information Technology Certification: A Student Perspective.
Int. J. Inf. Commun. Technol. Educ., 2005

Learning IT: Where Do Lecturers Fit?
Int. J. Inf. Commun. Technol. Educ., 2005

The role of spreadsheet knowledge in user-developed application success.
Decis. Support Syst., 2005

Staying Up-to-Date with Changes in IT.
Proceedings of the Encyclopedia of Information Science and Technology (5 Volumes), 2005

Data Communications and E-Learning.
Proceedings of the Encyclopedia of Information Science and Technology (5 Volumes), 2005

2004
The Effect of End User Development on End User Success.
J. Organ. End User Comput., 2004

Spreadsheet Knowlege: Measuring what User Developers Know.
J. Inf. Syst. Educ., 2004

2003
User Developed Applications and Information Systems Success: A Test of DeLone and McLean's Model.
Inf. Resour. Manag. J., 2003

2002
User-Developed Applications: Can End Users Assess Quality?
J. Organ. End User Comput., 2002

2000
Using Lotus Learning Space to enhance student learning of data communications.
Proceedings of the Challenges of Information Technology Management in the 21st Century, 2000

1998
How Good Are Students at Assessing the Quality of Their Applications?
Informing Sci. Int. J. an Emerg. Transdiscipl., 1998

Use of the Internet by Small to Medium Enterprises in Singapore.
Proceedings of WebNet 98, 1998

1997
Using a network simulation package to teach the client-server model.
Proceedings of the 2nd Annual Conference on Integrating Technology into Computer Science Education, 1997

1996
A supplementary package for distance education students studying introductory programming.
Proceedings of the 27th SIGCSE Technical Symposium on Computer Science Education, 1996

Integrating a networking simulation package into a data communications course to enhance student learning.
Proceedings of the ACM SIGCSE 1st Australasian Conference on Computer Science Education, 1996

1995
An investigation of the relationship between student algorithm quality and program quality.
ACM SIGCSE Bull., 1995

Identification of Technological Gatekeepers in the Information Technology Profession.
J. Am. Soc. Inf. Sci., 1995

1993
Computing Professionals and Information About Developments in Information Technology.
Aust. Comput. J., 1993


  Loading...