460999. Information systems not elsewhere classified


Title460999. Information systems not elsewhere classified
Parent4609. Information systems

Latest research outputs

Sort by Date Title
Reality mining in eHealth
Wlodarczak, Peter, Soar, Jeffrey and Ally, Mustafa. 2015. "Reality mining in eHealth." Yin, Xiaoxia, Ho, Kendall, Zeng, Daniel, Aickelin, Uwe, Zhou, Rui and Wang, Hua (ed.) 4th International Health Information Science Conference (HIS 2015). Melbourne, Australia 28 - 30 May 2015 Switzerland. https://doi.org/10.1007/978-3-319-19156-0_1

Paper

An investigation of the challenges and issues influencing the adoption of cloud computing in Australian regional municipal governments
Ali, Omar, Soar, Jeffrey and Yong, Jianming. 2016. "An investigation of the challenges and issues influencing the adoption of cloud computing in Australian regional municipal governments." Journal of Information Security and Applications. 27-28, pp. 19-34. https://doi.org/10.1016/j.jisa.2015.11.006

Article

A workshop on the use of an interactive multimedia environment for learning the basics of network diagram construction in project management
Nooriafshar, Mehryar. 2015. "A workshop on the use of an interactive multimedia environment for learning the basics of network diagram construction in project management." 13th International Conference of the Mathematics Education for the Future Project: Mathematics Education in a Connected World. Catania, Italy 16 - 21 Sep 2015 Muenster, Germany.

Paper

Consistent! Transparent! D.I.Y. ITSM process assessment approach
Shrestha, Anup and Kennedy, Graham. 2014. "Consistent! Transparent! D.I.Y. ITSM process assessment approach." iTSMF Australia Annual Conference (LEADit 2014): IT Service Management in a Connected World. Melbourne, Australia 13 - 15 Aug 2014 Melbourne, Australia.

Presentation

Reducing corruption through e-procurement
Neupane, Arjun, Soar, Jeffrey, Vaidya, Krishor and Yong, Jianming. 2014. "Reducing corruption through e-procurement." 2013 Annual Statistical Report on United Nations Procurement - Supplement.

Article

HTML5: new opportunities, old threats
Martin, Neil and Farley, Helen. 2012. "HTML5: new opportunities, old threats." Sankey, Michael (ed.) Exploring New Dimensions: HTML5 in Higher Education (2012). Toowoomba, Australia 19 - 20 Nov 2012 Toowoomba, Australia.

Presentation

University staff adoption of iPads: an empirical study using an extended Technology Acceptance Model
Lane, Michael and Stagg, Adrian. 2014. "University staff adoption of iPads: an empirical study using an extended Technology Acceptance Model." Australasian Journal of Information Systems. 18 (3), pp. 53-74.

Article

An overview of system architectures for remote laboratories
Maiti, Ananda, Maxwell, Andrew D. and Kist, Alexander A.. 2013. "An overview of system architectures for remote laboratories." Lee, Mark J. W. (ed.) 2nd IEEE International Conference on Teaching, Assessment and Learning for Engineering (TALE 2013). Kuta, Indonesia 26 - 29 Aug 2013 Piscataway, NJ. United States. https://doi.org/10.1109/TALE.2013.6654520

Paper

Information communication technology tools for software review and verification
Wong, Yuk Kuen. 2009. "Information communication technology tools for software review and verification." Cartelli , Antonio and Palma, Marco (ed.) Encyclopedia of information communication technology. IGI Global. pp. 429-435

Edited book (chapter)

ITSM process assessments using ISO/IEC 15504 for CSI
Shrestha, Anup, Collins, Paul and Cater-Steel, Aileen. 2013. "ITSM process assessments using ISO/IEC 15504 for CSI." Informed Intelligence: ITSMF Australia Bulletin.

Article

Anti-corruption capabilities of public e-procurement technologies: principal-agent theory
Neupane, Arjun, Soar, Jeffrey and Vaidya, Kishor. 2014. "Anti-corruption capabilities of public e-procurement technologies: principal-agent theory." Bwalya, Kelvin Joseph (ed.) Technology development and platform enhancements for successful global e-government design. Hershey, PA. United States. IGI Global. pp. 185-203

Edited book (chapter)

Aging issues and policies in Australia
Soar, Jeffrey. 2013. "Aging issues and policies in Australia." Li, Yushi (ed.) Global aging issues and policies: understanding the importance of comprehending and studying the aging process. Springfield, IL. United States. Charles C. Thomas Publisher Ltd. pp. 295-311

Edited book (chapter)

Social ITSM - challenges and benefits
Shrestha, Anup. 2012. "Social ITSM - challenges and benefits." At Your Service. 2 (3), pp. 3-7.

Article

Does the android permission system provide adequate information privacy protection for end-users of mobile apps?
Lane, Michael. 2012. "Does the android permission system provide adequate information privacy protection for end-users of mobile apps?" Williams, Trish, Johnstone, Mike and Valli, Craig (ed.) 10th Australian Information Security Management Conference (SECAU 2012). Perth, Western Australia 03 - 05 Dec 2012 Perth Western Australia.

Paper

A performance measurement framework for IT service management
Gacenga, Francis Njoroge. 2013. A performance measurement framework for IT service management. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

Role of public e-procurement technology to reduce corruption in government procurement
Neupane, Arjun, Soar, Jeffrey, Vaidya, Kishor and Yong, Jianming. 2012. "Role of public e-procurement technology to reduce corruption in government procurement." 5th International Public Procurement Conference (IPPC5). Seattle, United States 17 - 19 Aug 2012 United States.

Paper

The fit of mobile work support functionalities with pharmaceutical sales-force worker tasks
Lembach, Markus and Lane, Michael Steven. 2011. "The fit of mobile work support functionalities with pharmaceutical sales-force worker tasks." Siriluck, Rotchanakitumnuai / RS and Kaewkitipong, Laddawan / KL (ed.) 11th International Conference on Electronic Business: Borderless e-Business for the Next Decade (ICEB 2011). Bangkok, Thailand 28 Nov - 02 Dec 2011 Bangkok Thailand.

Paper

Enhanced M-learning with cloud computing: the Bangladesh case
Hossain Masud, Md. Anwar, Huang, Xiaodi and Yong, Jianming. 2011. "Enhanced M-learning with cloud computing: the Bangladesh case." Shen, Weiming, Barthès, Jean-Paul, Luo, Junzhou, Kropf, Peter, Pouly, Michel, Yong, Jianming, Xue, Yunjiao and Ramos, Milton (ed.) CSCWD 2011: 15th International Conference on Computer Supported Cooperative Work in Design. Lausanne, Switzerland 08 - 10 Jun 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/CSCWD.2011.5960200

Paper

Ageing, chronic disease, technology and smart homes: an Australian perspective
Soar, Jeffrey. 2011. "Ageing, chronic disease, technology and smart homes: an Australian perspective." Clinical technologies: concepts, methodologies, tools and applications. Hershey, PA. United States. IGI Global. pp. 1539-1553

Edited book (chapter)

DeDu: building a deduplication storage system over cloud computing
Sun, Zhe, Shen, Jun and Yong, Jianming. 2011. "DeDu: building a deduplication storage system over cloud computing." Shen, Weiming, Barthes, Jean-Paul, Luo, Junzhou and Kropf, Peter (ed.) CSCWD 2011: 15th International Conference on Computer Supported Cooperative Work in Design. Lausanne, Switzerland 08 - 10 Jun 2011 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2011.5960097

Paper

Constructing robust digital identity infrastructure for future networked society
Yong, Jianming, Tiwari, Sanjib, Huang, Xiaodi and Jin, Qun. 2011. "Constructing robust digital identity infrastructure for future networked society." Shen, Weiming, Barthès, Jean-Paul, Luo, Junzhou and Kropf, Peter (ed.) CSCWD 2011: 15th International Conference on Computer Supported Cooperative Work in Design. Lausanne, Switzerland 08 - 10 Jun 2011 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2011.5960129

Paper

Critical competencies required for the role of the modern CIO
Lane, Michael S. and Koronios, Andy. 2007. "Critical competencies required for the role of the modern CIO." Toleman, Mark, Cater-Steel, Aileen and Roberts, Dave (ed.) 18th Australasian Conference on Information Systems (ACIS 2007). Toowoomba, Australia 05 - 07 Dec 2007 Toowoomba, Australia.

Paper

Insights into intelligent parking technology adoption
Bilodeau, Victor, Cater-Steel, Aileen and Soar, Jeffrey. 2011. "Insights into intelligent parking technology adoption." Su, Ying and Al-Hakim, Latif (ed.) COINFO 2011: 6th International Conference on Cooperation and Promotion of Information Resources in Science and Technology: Coordinative Innovation and Open Sharing. Hangzhou, China 12 - 14 Nov 2011 Irvine, CA, United States.

Paper

Security and privacy preservation for mobile e-learning via digital identity attributes
Yong, Jianming. 2011. "Security and privacy preservation for mobile e-learning via digital identity attributes." Journal of Universal Computer Science. 17 (2), pp. 296-310. https://doi.org/10.3217/jucs-017-02-0296

Article

A commit scheduler for XML databases
Dekeyser, Stijn and Hidders, Jan. 2003. "A commit scheduler for XML databases." Xiaofang, Zhou, Zhang, Yanchun and Orlowska, Maria E. (ed.) 5th Asia-Pacific Web Conference (APWeb 2003): Web Technologies and Applications. Xian, China 23 - 25 Apr 2003 China. Springer. https://doi.org/10.1007/3-540-36901-5_8

Paper

Authorization approaches for advanced permission-role assignments
Wang, Hua, Yong, Jianming, Li, Jiuyong and Peng, Min. 2008. "Authorization approaches for advanced permission-role assignments." Shen, Weiming, Zheng, Qinghua, Luo, Junzhou, Yong, Jianming, Duan, Zhenhua and Tian, Feng (ed.) CSCWD 2008: 12th International Conference on Computer Supported Cooperative Work in Design . Xi'an, China 16 - 18 Apr 2008 United States. https://doi.org/10.1109/CSCWD.2008.4536994

Paper

CSCWD technologies, applications and challenges
Yong, Jianming, Shen, Weiming and Pino, José A.. 2009. "CSCWD technologies, applications and challenges." Journal of Universal Computer Science. 15 (9), pp. 1744-1745. https://doi.org/10.3217/jucs-015-09

Editorial

The impact of push/pull factors in information technology-facilitated knowledge transfer
Gururajan, Vijaya and Fink, Dieter. 2003. "The impact of push/pull factors in information technology-facilitated knowledge transfer." Brown, Alan (ed.) 17th Australian and New Zealand Academy of Management Conference (ANZAM 2003). Fremantle, Australia 02 - 05 Dec 2003 Australia.

Paper

ABDM: an extended flexible delegation model in RBAC
Li, Min and Wang, Hua. 2008. "ABDM: an extended flexible delegation model in RBAC." Wu, Qiang and He, Xiangjian (ed.) 8th IEEE International Conference on Computer and Information Technology. Sydney, Australia 08 - 11 Jul 2008 United States. https://doi.org/10.1109/CIT.2008.4594707

Paper

Interpretative insights into interpersonal trust and effectiveness of virtual communities of open source software (OSS) developers
Lane, Michael S., van der Vyver, Glen, Basnet, Prajwal and Howard, Srecko. 2004. "Interpretative insights into interpersonal trust and effectiveness of virtual communities of open source software (OSS) developers." 15th Australasian Conference on Information Systems (ACIS 2004). Hobart, Australia 01 - 03 Dec 2004 Hobart, Tasmania.

Paper

Trust in virtual communities involved in free/open source projects: an empirical study
Lane, Michael S., van der Vyver, Glen and Basnet, Prajwal. 2004. "Trust in virtual communities involved in free/open source projects: an empirical study." 15th Australasian Conference on Information Systems (ACIS 2004). Hobart, Australia 01 - 03 Dec 2004 Hobart, Tasmania.

Paper

Development of an IS Relevance Index
Young, Raymond, Darroch, Fiona and Toleman, Mark. 2006. "Development of an IS Relevance Index." Spencer, S. and Jenkins, A. (ed.) 17th Australasian Conference on Information Systems (ACIS 2006). Adelaide, Australia 06 - 08 Dec 2006 Australia.

Paper

Instance-independent view serializability for semistructured databases
Dekeyser, Stijn, Hidders, Jan, Paredaens, Jan and Vercammen, Roel. 2005. "Instance-independent view serializability for semistructured databases." The Computing Research Repository (CoRR).

Article

Usage and preference of traditional and alternative payment methods by online consumers in the Australian marketplace
Ally, Mustafa. 2010. Usage and preference of traditional and alternative payment methods by online consumers in the Australian marketplace. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

Integration of VSAT with WiMAX technology for E-health in Chinese rural areas
Su, Ying and Soar, Jeffrey. 2010. "Integration of VSAT with WiMAX technology for E-health in Chinese rural areas." Luo, Qi and Chao-Lin, Kuo (ed.) 3CA 2010: International Symposium on Computer, Communication, Control and Automation. Tainan, Taiwan 05 - 07 May 2010 Piscataway, NJ. United States. https://doi.org/10.1109/3CA.2010.5533764

Paper

Computer mediated teaching: a case-study in discrete mathematics
Toleman, Mark. 1995. "Computer mediated teaching: a case-study in discrete mathematics." Balbo, S. (ed.) 3rd Computer Human Interaction Special Interest Group of the Ergonomics Society of Australia, CHISIG (Queensland) Symposium (QCHI'95). Gold Coast, Australia 21 Aug 1995 Australia.

Paper

Traditional and alternative internet payment systems: the merchant perspective
Ally, Mustafa, Toleman, Mark and Cater-Steel, Aileen. 2010. "Traditional and alternative internet payment systems: the merchant perspective." 5th International Conference on Qualitative Research in IT & IT in Qualitative Research: The Traditions and Innovations of Qualitative Approaches in ICT Research (QualIT 2010). Brisbane, Australia 29 - 30 Nov 2010 Australia.

Paper

Modelling flow for surgery management process
Al-Hakim, Latif. 2009. "Modelling flow for surgery management process." China Science and Technology Resources Review. 41 (1), pp. 17-24. https://doi.org/10.3772/j.issn.1674-1544.2009.01.003

Article

Digital identity enrolment and assurance support for VeryIDX
Yong, Jianming and Bertino, Elisa. 2010. "Digital identity enrolment and assurance support for VeryIDX." Shen, Weiming, Gu, Ning, Lu, Tun, Barthes, Jean-Paul and Luo, Junzhou (ed.) CSCWD 2010: 14th International Conference on Computer Supported Cooperative Work in Design . Shanghai, China 14 - 16 Apr 2010 https://doi.org/10.1109/CSCWD.2010.5471880

Paper

Specify and enforce the policies of quantified risk adaptive access control
Chen, Chen, Han, Weili and Yong, Jianming. 2010. "Specify and enforce the policies of quantified risk adaptive access control." Shen, Weiming, Gu, Ning, Lu, Tun, Barthes, Jean-Paul and Luo, Junzhou (ed.) CSCWD 2010: 14th International Conference on Computer Supported Cooperative Work in Design . Shanghai, China 14 - 16 Apr 2010 United States.

Paper