460499. Cybersecurity and privacy not elsewhere classified
Title | 460499. Cybersecurity and privacy not elsewhere classified |
---|---|
Parent | 4604. Cybersecurity and privacy |
Latest research outputs
Sort by Date Title
A flexible payment scheme and its user-role assignment
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2002. "A flexible payment scheme and its user-role assignment." Chan, A., Chan, S., Leong, H. and Ng, V. (ed.) 2nd International Workshop on Cooperative Internet Computing. Hong Kong, China 18 - 19 Aug 2002 Hong Kong.Paper
Extended RBAC with role attributes
Yong, Jianming, Bertino, Elisa, Toleman, Mark and Roberts, Dave. 2006. "Extended RBAC with role attributes." Tan, Bernard (ed.) 10th Pacific Asia Conference on Information Systems (PACIS 2006). Kuala Lumpur, Malaysia 06 - 09 Jul 2006 Sheffield, UK.Paper
A discussion on security risks in mobile commerce
Gururajan, Raj. 2006. "A discussion on security risks in mobile commerce." E-Business Review. 7 (2), pp. 9-39.Article
The relationship between system administration and end user license agreements
Wallis, Corey. 2004. "The relationship between system administration and end user license agreements." Sage-au'04 12 Annual Conference. Brisbane, Australia 16 - 20 Aug 2004Paper
Attitudes towards information privacy
Cockcroft, Sophie and Clutterbuck, Peter. 2001. "Attitudes towards information privacy." 12th Australasian Conference on Information Systems (ACIS 2001). Coffs Harbour, Australia 04 - 07 Dec 2001 Australia.Paper
A preliminary study to determine the role of organizational knowledge in computer security
Gururajan, Raj and Thompson, Alan. 2004. "A preliminary study to determine the role of organizational knowledge in computer security." Elliott, Steve, Williams, Mary-Anne, Williams, Sue and Pollard, Carol (ed.) 15th Australasian Conference on Information Systems (ACIS 2004). Hobart, Australia 01 - 03 Dec 2004 Hobart, Australia.Paper