Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Patricia A. H. Williams |
Physician secure thyself. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 3rd Australian Information Security Management Conference, Perth, Western Australia, 30th September 2005, pp. 111-116, 2005, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0611-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Patricia A. H. Williams |
The underestimation of threats to patient data in clinical practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 3rd Australian Information Security Management Conference, Perth, Western Australia, 30th September 2005, pp. 117-122, 2005, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0611-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Craig Valli, Andrew Woodward (eds.) |
Proceedings of the 3rd Australian Information Security Management Conference, Perth, Western Australia, 30th September 2005 ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0611-1 The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Leanne Ngo, Wanlei Zhou 0001, Matthew J. Warren |
Understanding Transition towards Information Security Culture Change. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 3rd Australian Information Security Management Conference, Perth, Western Australia, 30th September 2005, pp. 67-73, 2005, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0611-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Reijo Savola |
Architecture for Self-Estimation of Security Level in Ad Hoc Network Nodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 3rd Australian Information Security Management Conference, Perth, Western Australia, 30th September 2005, pp. 88-94, 2005, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0611-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Lih Wern Wong |
Potential Bluetooth Vulnerabilities in Smartphones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 3rd Australian Information Security Management Conference, Perth, Western Australia, 30th September 2005, pp. 123-132, 2005, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0611-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Wayne A. Jansen, Serban I. Gavrila, Clément Séveillac |
Smart Card Authentication for Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 3rd Australian Information Security Management Conference, Perth, Western Australia, 30th September 2005, pp. 38-46, 2005, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0611-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Andrew Woodward |
Recommendations for wireless network security policy: an analysis and classification of current and emerging threats and solutions for different organisations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 3rd Australian Information Security Management Conference, Perth, Western Australia, 30th September 2005, pp. 133-140, 2005, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0611-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Martin Dart |
Seeking information superiority: strategies for business in the commercial application of information operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 3rd Australian Information Security Management Conference, Perth, Western Australia, 30th September 2005, pp. 11-19, 2005, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0611-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Zhiqi Tao, Anthonie B. Ruighaver |
Detecting Rogue Access Points that endanger the Maginot Line of Wireless Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 3rd Australian Information Security Management Conference, Perth, Western Australia, 30th September 2005, pp. 103-110, 2005, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0611-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Mahdi Seify |
Risk Management in CRM Security Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 3rd Australian Information Security Management Conference, Perth, Western Australia, 30th September 2005, pp. 95-102, 2005, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0611-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Rosanna Fanciulli |
An investigation into the paradox of organisational flexibility versus security: A research project overview. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 3rd Australian Information Security Management Conference, Perth, Western Australia, 30th September 2005, pp. 20-26, 2005, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0611-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Lennon Hopkins |
Identity Synthesis: Creating An Identity From Scratch. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 3rd Australian Information Security Management Conference, Perth, Western Australia, 30th September 2005, pp. 27-32, 2005, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0611-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Marwan Al-Zarouni |
Taxonomy of WRT54G(S) Hardware and Custom Firmware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 3rd Australian Information Security Management Conference, Perth, Western Australia, 30th September 2005, pp. 1-10, 2005, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0611-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Aaron Olding, Paul Turner |
My Problem or Our Problem? - Exploring the use of information sharing as a component of a holistic approach to e-security in response to the growth of 'Malicious Targeted Attacks'. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 3rd Australian Information Security Management Conference, Perth, Western Australia, 30th September 2005, pp. 74-79, 2005, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0611-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Yi-Chi Lin, Jill Slay |
Non-Repudiation in Pure Mobile Ad Hoc Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 3rd Australian Information Security Management Conference, Perth, Western Australia, 30th September 2005, pp. 59-66, 2005, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0611-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Graeme Pye, Matthew J. Warren |
Benchmarking E-business Security: A Model and Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 3rd Australian Information Security Management Conference, Perth, Western Australia, 30th September 2005, pp. 80-87, 2005, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0611-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | William Hutchinson |
Information Security: a Misnomer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 3rd Australian Information Security Management Conference, Perth, Western Australia, 30th September 2005, pp. 33-37, 2005, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0611-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | K. Koh, Anthonie B. Ruighaver, Sean B. Maynard, Atif Ahmad |
Security Governance: Its Impact on Security Culture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 3rd Australian Information Security Management Conference, Perth, Western Australia, 30th September 2005, pp. 47-58, 2005, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0611-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | |
Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004 ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0572-7 The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
1 | Jill Slay, Gerald Quirchmayr |
A Formal Model for the Relationship between Culture and Trust within is Security Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004, pp. 159-166, 2004, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0572-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
1 | Emiko Terado, Patricia A. H. Williams |
Securing PDAs in the Healthcare Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004, pp. 4-10, 2004, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0572-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
1 | C. C. Terence Tan |
Developing a framework for understanding Security Governance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004, pp. 37-48, 2004, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0572-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
1 | Christopher Bolan |
Need to Know: Security or Liability? ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004, pp. 125-128, 2004, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0572-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
1 | Malcolm R. Pattinson |
Risk Homeostasis as a Factor of Information Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004, pp. 64-72, 2004, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0572-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
1 | Omar Zakaria |
Understanding Challenges of Information Security Culture: A Methodological Issue. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004, pp. 83-93, 2004, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0572-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
1 | Justin D. Pierce, Matthew J. Warren, David R. Mackay, Jason G. Wells |
Graphical Authentication: Justifications and Objectives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004, pp. 49-63, 2004, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0572-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
1 | Sabbir Ahmed, Leisa Armstrong |
Securing Web Services with XML aware Digital Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004, pp. 129-134, 2004, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0572-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
1 | Girish Bhagwan Gokhale, David A. Banks |
Organisational Information Security: A Viable System Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004, pp. 178-184, 2004, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0572-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
1 | Peter Wolski |
SOHO Wireless Intrusion Detection Systems - Cure or Placebo. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004, pp. 151-158, 2004, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0572-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
1 | Gim Hiong Soh, Timo Vuori |
New Form of Identity (ID) Theft Crime: Acquiring Personal Information from Your Online Newsletter Providers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004, pp. 27-36, 2004, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0572-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
1 | Warren Brooks, Matthew J. Warren |
Health Information Security Evaluation: Continued Development of an Object-Oriented Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004, pp. 135-150, 2004, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0572-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
1 | Mathew Hannan, Basil Tucker |
Risk Management and Organisational Culture: The Implications of Computer Network Attacks and Malware Incidents on Organizational Risk Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004, pp. 167-177, 2004, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0572-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
1 | Michael Wynne, Peter James |
Securing Data at Rest. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004, pp. 94-103, 2004, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0572-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
1 | A. Jancic, Matthew J. Warren |
PKI - Advantages and Obstacles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004, pp. 104-114, 2004, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0572-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
1 | Paul Ashley |
Enforcement of a P3P Privacy Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004, pp. 11-26, 2004, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0572-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
1 | Christopher Bolan, Daniel Mende |
Computer Security Research: Approaches and Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004, pp. 115-124, 2004, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0572-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
1 | G. Murphy |
An Examination of the Security of Routing Protocol Updates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004, pp. 56-63, 2004, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0572-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
1 | Vassilis Dimopoulos, Steven Furnell, Murray E. Jennex, Ioannis Kritharas |
Approaches to IT Security in Small and Medium Enterprises. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004, pp. 73-82, 2004, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0572-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|