460499. Cybersecurity and privacy not elsewhere classified


Title460499. Cybersecurity and privacy not elsewhere classified
Parent4604. Cybersecurity and privacy

Latest research outputs

Sort by Date Title
A flexible payment scheme and its user-role assignment
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2002. "A flexible payment scheme and its user-role assignment." Chan, A., Chan, S., Leong, H. and Ng, V. (ed.) 2nd International Workshop on Cooperative Internet Computing. Hong Kong, China 18 - 19 Aug 2002 Hong Kong.

Paper

Extended RBAC with role attributes
Yong, Jianming, Bertino, Elisa, Toleman, Mark and Roberts, Dave. 2006. "Extended RBAC with role attributes." Tan, Bernard (ed.) 10th Pacific Asia Conference on Information Systems (PACIS 2006). Kuala Lumpur, Malaysia 06 - 09 Jul 2006 Sheffield, UK.

Paper

A discussion on security risks in mobile commerce
Gururajan, Raj. 2006. "A discussion on security risks in mobile commerce." E-Business Review. 7 (2), pp. 9-39.

Article

The relationship between system administration and end user license agreements
Wallis, Corey. 2004. "The relationship between system administration and end user license agreements." Sage-au'04 12 Annual Conference. Brisbane, Australia 16 - 20 Aug 2004

Paper

Attitudes towards information privacy
Cockcroft, Sophie and Clutterbuck, Peter. 2001. "Attitudes towards information privacy." 12th Australasian Conference on Information Systems (ACIS 2001). Coffs Harbour, Australia 04 - 07 Dec 2001 Australia.

Paper

A preliminary study to determine the role of organizational knowledge in computer security
Gururajan, Raj and Thompson, Alan. 2004. "A preliminary study to determine the role of organizational knowledge in computer security." Elliott, Steve, Williams, Mary-Anne, Williams, Sue and Pollard, Carol (ed.) 15th Australasian Conference on Information Systems (ACIS 2004). Hobart, Australia 01 - 03 Dec 2004 Hobart, Australia.

Paper