Research Services Division

Deakin Research

2005 School of Information and Business Analytics Research Output

Note: The 2012, 2013, 2014 publications have not been audited.

Jump to: Publications | Grants and Consultancies | HDR completions

Publications

Corbitt, Brian, Peszynski, Konrad and Boon, Olaf (2005) Managing complexity and insitutionalization : power and politics in ERP implementation in an Australian university, in von Hellens, Liisa; Nielsen, Sue and Beekhuyzen, Jenine (eds), Qualitative case studies on implementation of enterprise wide systems, pp. 160-175, Idea Group, Hershey, Pa. [B1]
DRO entry for this publication

Cybulski, Jacob and Sarkar, Pradip (2005) Requirements engineering for web-based information systems, in Wohlin, Claes and Aurum, Aybu╠łke (eds), Engineering and managing software requirements, pp. 327-349, Springer-Verlag, Berlin, Germany [B1]
DRO entry for this publication

Fraunholz, Bardo, Unnithan, Chandana and Jung, Jurgen* (2005) Tracking and tracing applications of 3G for SMEs, in Pagani, Margherita (eds), Mobile and wireless systems beyond 3G: managing new business opportunities, pp. 130-154, IRM Press, Hershey, Pa. [B1]
DRO entry for this publication

Lichtenstein, Sharman, Parker, Craig and Cybulski, Margaret (2005) Email and knowledge creation: supporting inquiring systems and enhancing wisdom, in Coutney, James; Haynes, John and Paradice, David (eds), Inquiring organizations: moving from knowledge management to wisdom, pp. 89-108, Idea Group Publishing, Hershey, Pa. [B1]
DRO entry for this publication

Lichtenstein, Sharman (2005) Development of organizational internet security policy: a holistic approach, in Chen, William W.S. (eds), Statistical methods in computer security, pp. 1-21, Marcel Dekker, New York, N.Y. [B1]
DRO entry for this publication

Versace, V., Ierodiaconou, Daniel, Salzman, Scott, Stagnitti, Frank, Leblanc, M., Boland, A.*, Laurenson, Laurie, March, T. and Thwaites, L. (2005) Multivariate modelling of landuse on in-stream salinity over multiple spatial scales, in De Conceicao Cunha, M. and Brebbia, C. A. (eds), Water resources management III, pp. 299-309, WIT Press, Southampton, England [B1]
DRO entry for this publication

Warren, Matthew and Leitch, Shona (2005) The ethics of hacking and computer abuse: Australian case studies, in Weckert, John (eds), Electronic monitoring in the workplace: controversies and solutions, pp. 35-48, Idea Group Publishing, Hershey, Pa [B1]
DRO entry for this publication

Ding, Melissa Soo and Unnithan, Chandana (2005) Mobile payments (M-payments) - an exploratory study of emerging Issues and future trends, in Deans, P. Candace (eds), E-commerce and M-commerce technologies, pp. 57-79, IRM, Hershey, Pa. [B2]
DRO entry for this publication

Castleman, Tanya, Coulthard, Darryl and Reed, Rosslyn* (2005) Complexities in the career-family perspectives of young professionals, Labour & industry, vol. 16, no. 2, pp. 61-80, RMIT, Melbourne, Vic. [C1]
ERA journal ID: 18456 – Scopus EID: Not tagged
DRO entry for this publication

Chamberlain, Jeff and Castleman, Tanya (2005) Moving personal tax online: the Australian Taxation Office's E-Tax initiative, International journal of cases on electronic commerce, vol. 1, no. 3, pp. 54-70, Idea Group Publishing, Hershey, Pa. [C1]
ERA journal ID: 31254 – Scopus EID: Not tagged
DRO entry for this publication

Fisher, Julie* and Craig, Annemieke (2005) Developing business community portals for SMEs-Issues of design, development and sustainability, Electronic markets, vol. 15, no. 2, pp. 76-78, Routledge, St.Gallen, Switzerland [C1]
ERA journal ID: 17846 – Scopus EID: Not tagged
DRO entry for this publication

Hoffmann, Oliver*, Cropley, David*, Cropley, Arthur*, Nguyen, Lemai and Swatman, Paul* (2005) Creativity, requirements and perspectives, Australasian journal of information systems, vol. 13, no. 1, pp. 159-175, University of Wollongong, Wollongong, N.S.W. [C1]
ERA journal ID: 19280 – Scopus EID: Not tagged
DRO entry for this publication

Ierodiaconou, Daniel, Laurenson, Laurie, Leblanc, Marc, Stagnitti, Frank, Duff, Gordon*, Salzman, Scott and Versace, Vincent (2005) The consequences of land use change on nutrient exports: a regional scale assessment in south-west Victoria, Australia, Journal of environmental management, vol. 74, no. 4, pp. 305-316, Academic Press, London, England [C1]
ERA journal ID: 5850 – Scopus EID: 2-s2.0-14544291457
Citation counts: Scopus - 40, Thomson - 30
DRO entry for this publication

Ladson, Alicia and Fraunholz, Bardo (2005) Facilitating online privacy on eCommerce websites: an Australian experience, Journal of information, communication and ethics in society, vol. 3, no. 2, pp. 59-68, Troubador Publishing Ltd, Leicester, England [C1]
ERA journal ID: 32126 – Scopus EID: Not tagged
DRO entry for this publication

Redman, J., Warren, Matthew and Hutchinson, Willam* (2005) System survivability: a critical security problem, Information management & computer security, vol. 13, no. 3, pp. 182-188, Emerald Group Publishing Ltd, Bingley, England [C1]
ERA journal ID: 17903 – Scopus EID: 2-s2.0-24144496839
Citation counts: Scopus - 1
DRO entry for this publication

Kazakevitch, Gennadi*, Torlina, Luba and Hendricks, Sharon* (2005) Why don't you give me a call?, Monash business review, vol. 1, no. 2, pp. 48-49, Monash University ePress, Carlton, Vic. [C1.1]
ERA journal ID: 31141 – Scopus EID: Not tagged
DRO entry for this publication

Pierce, J., Warren, Matthew and Corray, X.* (2005) In pursuit of a standard penetration testing methodology, Journal of information warfare, vol. 4, no. 3, pp. 26-39, Edith Cowan University, Perth, W.A. [C1.1]
ERA journal ID: 18015 – Scopus EID: Not tagged
DRO entry for this publication

Craig, Annemieke (2005) Girls not choosing computing: causes and effects, Redress: journal of the association women educators, vol. 14, no. 3, pp. 2-7, Association of Women Educators Inc, Brisbane, Qld. [C2]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Keller, Susan, Smith, Ross, Howard, Steve* and Carroll, Jennie* (2005) Altered images : the relations between design representations and design practice, Australasian journal of information systems, vol. 12, no. 2, pp. 164-177, University of Canberra, Canberra, A.C.T [C2]
ERA journal ID: 19280 – Scopus EID: Not tagged
DRO entry for this publication

Lichtenstein, Sharman, Nguyen, Lemai and Hunter, A. (2005) Issues in IT service-oriented requirements engineering, Australasian journal of information systems, vol. 13, no. 1, pp. 176-191, University of Wollongong, Wollongong, N.S.W. [C2]
ERA journal ID: 19280 – Scopus EID: Not tagged
DRO entry for this publication

Parker, Craig (2005) Interactive web-based ecommerce learning modules, Journal of electronic commerce in organizations, vol. 3, no. 1, pp. i-iv, IGI Publishing, Hershey, Pa. [C2]
ERA journal ID: 31243 – Scopus EID: Not tagged
DRO entry for this publication

Price, Jenny and Cybulski, Jacob (2005) Consensus making in requirements negotiation : the communication perspective, Australian journal of information systems, vol. 13, no. 1, pp. 209-224, University of Canberra, Canberra, A.C.T [C2]
ERA journal ID: 19280 – Scopus EID: Not tagged
DRO entry for this publication

Kuruppuarachchi, Palitha*, Mandal, Purnendu* and Smith, Ross (2005) Recipe for success: an integrated approach, Australian project manager, vol. 25, no. 2, pp. 15-17, Banksia Media Group Pty Limited, Wahroonga, N.S.W. [C3]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Mackay, David, Smith, Ross and Holt, Dale (2005) Workplace learning growing leadership on the job, Information Age, vol. April/May, pp. 55-56, IDG Communications, Sydney, N.S.W. [C3]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Pye, Graeme, Pierce, Justin D., Warren, Matthew and Mackay, David (2005) Supply chain security: the need for continuous assessment, Supply chain practice, vol. 7, no. 1, pp. 56-68, Cranfield School of Management, Bedford, England [C3]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Fraunholz, Bardo, Jung, Jurgen* and Unnithan, Chandana (2005) Mobile location based services, in Pagani, Margherita (eds), Encyclopedia of multimedia technology and networking, pp. 629-637, Idea Group Reference, Hershey, Pa. [D2]
DRO entry for this publication

Peszynski, Konrad J. (2005) Trust in B2C e-commerce for the New Zealand Maori, in Khosrow-Pour, Mehdi (eds), Encyclopedia of information science and technology, pp. 2882-2886, Idea Group Reference, Hershey, Pa. [D2]
DRO entry for this publication

Blount, Yvette*, Castleman, Tanya and Coulthard, Darryl (2005) eCommerce in service industries : extending the socio-technical paradigm, in Campbell, Bruce; Underwood, Jim and Bunker, Deborah (eds), Proceedings of the 16th Australasian Conference on Information Systems (ACIS 2005), November 30 - December 2, 2005, Sydney, AustraliaAustralasian Conference on Information Systems, pp. 1-12, Association for Information Systems, Sydney, N.S.W. [E1]
DRO entry for this publication

Boon, O., Corbitt, B. and Coulthard, Darryl (2005) A customer relationship management case study : critical success factors in action, in Unknown (ed.), I.T. and Value Creation : PACIS 2005. the Ninth Pacific-Asia Conference on Information Systems Bangkok, Thailand, 7 - 10 July 2005, PACIS, Bangkok, Thailand [E1]
DRO entry for this publication

Busuttil, T. and Warren, Matthew (2005) An approach for critical information infrastructure protection, in Hutchinson, Bill (eds), 4th European Conference on Information Warfare and Security: University of Glamorgan, [Pontypridd], UK, 11 - 12 July 2005 ; [ECIW 2005], Academic Conferences Ltd, Reading, England [E1]
DRO entry for this publication

Chan, C. and Warren, Matthew (2005) RFID and ethics, in Warren, Matthew (eds), Conference proceedings of AiCE 2005 Geelong, September 26th, 2005, fourth Australian Institute of Computer Ethics Conference, Deakin University, c2005., Deakin University, School of Information Systems [E1]
DRO entry for this publication

Cooper, Vanessa, Lichtenstein, Sharman and Smith, Ross (2005) Toward successful knowledge transfer in web-based self-service for information technology services, in Unknown (ed.), PACIS 2005 : IT & value creation : Proceedings of the Ninth Pacific Asia Conference on Information Systems, pp. 506-520, PACIS, Bangkok, Thailand [E1]
DRO entry for this publication

Cooper, Vanessa, Lichtenstein, Sharman and Smith, Ross (2005) Emerging issues in after-sales enterprise information technology support using web-based Self-service systems, in Unknown (ed.), Proceedings of the 16th Australasian Conference on Information Systems (ACIS 2005), Australasian Chapter of the Association for Information Systems, Sydney, N.S.W. [E1]
DRO entry for this publication

Craig, Annemieke, Fisher, J.* and Dawson, L. (2005) Evaluating intervention programs for women in IT, in Beekhuyzen J.; von Hellens L.; Guest, K. and Morley, M. (eds), 2005 QualIT : challenges for qualitative research, Griffith University, Institute for Integrated and Intelligent Systems, Brisbane, Qld. [E1]
DRO entry for this publication

Crofts, Merete and Leitch, Shona (2005) Global software development: the ethical challenge of requirements elicitation, in Warren, Matthew (eds), Conference proceedings of AiCE 2005 Geelong, September 26th, 2005, fourth Australian Institute of Computer Ethics Conference, Deakin University, School of Information Systems, Geelong, Vic. [E1]
DRO entry for this publication

Cybulski, Jacob and Lukaitis, Stasys* (2005) The impact of communications and understanding on the success of business/IT alignment, in Campbell, Bruce; Underwood, Jim and Bunker, Deborah (eds), Proceedings of the 16th Australasian Conference on Information Systems (ACIS 2005), November 30 - December 2, 2005, Sydney, Australia, Australasian Chapter of the Association for Information Systems, Sydney, N.S.W. [E1]
DRO entry for this publication

Dallman, Shaun*, Nguyen, Lemai, Lamp, John and Cybulski, Jacob (2005) Contextual factors which influence creativity in requirements engineering, in Unknown (ed.), Information systems in a rapidly changing economy: ECIS 2005, 13th European Conference on Information Systems, pp. 1-12, University of Regensburg, Germany [E1]
DRO entry for this publication

Djojosaputro, L., Nguyen, Lemai and Peszynski, Konrad (2005) Cultural dimensions in online learning, in Unknown (ed.), Proceedings of the 16th Australasian Conference on Information Systems, Australasian Chapter of the Association for Information Systems, Sydney, N.S.W. [E1]
DRO entry for this publication

Dojkovski, Sneza, Warren, Matthew and Lichtenstein, Sharman (2005) Information security culture in small and medium sized enterprises: a socio-cultural framework, in Pye, Graeme and Warren, Matthew (eds), Protecting the Australian homeland : conference proceedings of [the] 6th Australian Information Warfare & Security Conference, Deakin University, School of Information Systems, Geelong, Vic. [E1]
DRO entry for this publication

Fisher, Julie*, Bentley, John*, Turner, Rodney* and Craig, Annemieke (2005) SME myths: if we put up a website customers will come to us-why usability is important, in Vogel, Douglas R. (eds), eIntegration in action : 18th Bled eConference, Bled, Slovenia, June 6 - 8, 2005 ; conference proceedings, University of Maribor, Bled, Slovenia [E1]
DRO entry for this publication

Fraunholz, Bardo and Unnithan, Chandana (2005) Mobile healthcare information systems : thru' the ant lens, in Khosrow-Pour, Mehdi (eds), Managing Modern Organizations With Information Technology, Proceedings of the 2005 Information Resources Management Association International Conference, pp. 371-374, Hershey, Pa., Idea Group Publishing [E1]
DRO entry for this publication

Fraunholz, Bardo and Unnithan, Chandana (2005) Enabling mobile infrastructures on the road to 3G, in Dhillon, G. and Jaiswal, M. (eds), Conference on Information Science Technology and Management 2005 Proceedings, The Information Institute, Washington, DC [E1]
DRO entry for this publication

Kazakevitch, Gennadi*, Torlina, Luba and Hendricks, Sharon* (2005) Consumer loyalty versus propensity to switch between providers in mature IT markets (the case of mobile phone market), in Unknown (ed.), Proceedings of the Ninth Pacific Asia Conference on Information Systems, pp. 838-851, University of Hong Kong, Hong Kong [E1]
DRO entry for this publication

Koeglreiter, G., Smith, R. and Torlina, Luba (2005) Identification of an emerging communicy of practice in a knowledge workplace, in Burstein, Frada and Linger, Henry (eds), Australian Conference on Knowledge Management and Intelligent Decision Support 2006, Melbourne Australia, pp. 187-208, Monash University, Melbourne, Vic. [E1]
DRO entry for this publication

Lee, Chia Yao (2005) Strategies for B2B electronic markets : delivering business value to buyers and sellers, in Zhao, Xiande and Liu, Baoding (eds), ICEB 2005 : Proceedings of the Fifth International Conference on Electronic Business : Enhancing logistics & supply chain competence through e-Business, pp. 187-192, ICEB, Hong Kong [E1]
DRO entry for this publication

Lichtenstein, Sharman and Hunter, Alexia (2005) Receiver influences on knowledge sharing, in Unknown (ed.), ECIS 2005 : Proceedings of the XIIIth European Conference on Information Systems, ECIS, Regensburg, Germany [E1]
DRO entry for this publication

Lichtenstein, Sharman, Nguyen, Lemai and Hunter, Alexia (2005) Emerging issues in IT service management, in Soliman, Khalid S. (eds), Internet and information technology in modern organizations : challenges & answers, proceedings of the 5th international business information management conference, pp. 878-885, International Business Information Management Association, United States of America [E1]
DRO entry for this publication

Lichtenstein, Sharman and Hunter, Alexia (2005) Considering the receiver in knowledge sharing: when the receiver seems ready the sharer appears, in Burstein, Frada and Linger, Henry (eds), ACKMIDS 2004 : Organisational challenges for knowledge management Proceedings of the Australian Conference on Knowledge Management and Intelligent Decision Support, pp. 48-70, Australian Scholarly Publishing, Kew, Vic. [E1]
DRO entry for this publication

Lichtenstein, Sharman and Williamson, Kirsty* (2005) Security, privacy and trust in internet banking adoption: evolving Australian banking consumer attitudes, in Pye, Graeme and Warren, Matthew (eds), Protecting the Australian homeland : conference proceedings of [the] 6th Australian Information Warfare & Security Conference, Deakin University, School of Information Systems, Geelong, Vic. [E1]
DRO entry for this publication

Lukaitis, Stasys and Cybulski, Jacob (2005) The role of stakeholder understanding in aligning IT with business objectives, in Cox, Karl; Dubois, Eric; Pigneur, Yves; Bleistein, Steven J.; Verner, June; Davis, Alan M. and Wieringa, Roel (eds), Proceedings of REBNITA 2005 1st International Workshop on Requirements Engineering for Business Need and IT Alignment, pp. 93-105, University of New South Wales Press, Sydney, NSW [E1]
DRO entry for this publication

Mackay, David, Smith, Ross, Challis, Di and Holt, Dale (2005) Beyond assumptions: seeking industry perspectives to enhance experiential education in university-industry partnerships, in Roy, Denis (eds), 14th World Conference on Cooperative Education, Northern University, Boston, MA [E1]
DRO entry for this publication

Mason, Cecily, Castleman, Tanya and Parker, Craig (2005) Can knowledge management save regional development?, in Lowe, Julian (eds), Proceedings of the CRIC Cluster Conference : Beyond clusters: Current Practices & Future Strategies Conference Proceedings, pp. 1-15, University of Ballarat, Centre for Regional Innovation and Competitiveness, Ballarat, Vic. [E1]
DRO entry for this publication

Moloney, Belinda (2005) Investigation of the value chain for creative products : a phenomenological study of the perceptions of music intermediaries, in Campbell, Bruce; Underwood, Jim and Bunker, Deborah (eds), ACIS 2005 : Social IT : Thinking About the People Proceedings, Australasian Chapter of the Association for Information Systems, Sydney, N.S.W. [E1]
DRO entry for this publication

Mustard, Jamie (2005) A family of maps suitable for use in chaotic encryption, in Pye, Graeme and Warren, Matthew (eds), Protecting the Australian homeland : conference proceedings of [the] 6th Australian Information Warfare & Security Conference, Geelong, November 24-25th, 2005, Deakin University, Geelong, Vic. [E1]
DRO entry for this publication

Ngo, Leanne, Zhou, Wanlei and Warren, Matthew (2005) Understanding transition towards information security culture change, in Valli, C. and Woodward, A. (eds), Proceeding of the 3rd Australian Computer, Network & Information Forensics Conference, pp. 67-73, Edith Cowan University, School of Computer and Information Science, Perth, W.A. [E1]
DRO entry for this publication

Nguyen, Lemai, Armarego, Jocelyn* and Swatman, Paul* (2005) Understanding requirements engineering process: a challenge for practice and education, in Soliman, Khalid S. (eds), Internet and information technology in modern organizations: challenges & answers: proceedings of the 5th International Business Information Management Conference, pp. 886-894, International Business Information Management Association, Cairo, Egypt [E1]
DRO entry for this publication

Peszynski, Konrad J., Corbitt, Brian J. and Coulthard, Darryl (2005) There are always two sides to a story: the use of social dramas as a mode of data analysis in information systems, in Campbell, Bruce; Underwood, Jim and Bunker, Deborah (eds), ACIS 2005 proceedings: social IT: thinking about the people, Australasian Chapter of the Association for Information Systems, Sydney, N.S.W. [E1]
DRO entry for this publication

Peszynski, K., Corbitt, B.* and Coulthard, Darryl (2005) The politics of systems implementation: a critical approach, in Beekhuyzen, J.; von Hellens, L.; Guest, K. and Morley, M. (eds), Proceedings of the qualitative research in IT & IT in qualitative research, Griffith University, Institute for Integrated and Intelligent Systems, Brisbane, Qld. [E1]
DRO entry for this publication

Pierce, J., Mackay, David, Warren, Matthew and Wells, Jason (2005) A review of Australian internet banking client-side authentication models, in Pye, Graeme and Warren, Matthew (eds), Protecting the Australian homeland : conference proceedings of [the] 6th Australian Information Warfare & Security Conference, Geelong, November 24-25th, 2005, Deakin University, Geelong, Vic. [E1]
DRO entry for this publication

Pierce, J., Mackay, David, Warren, Matthew and Wells, Jason (2005) An observational survey of Australian internet banking authentication and client-side security: does it merit the fees?, in Sellitto, Carmine and Wenn, Andrew (eds), E-links : community, business and university : proceedings of the 6th International We-B (Working for E-Business) Conference, 23rd to 25th November, 2005, Melbourne, Victoria University, Melbourne, Vic. [E1]
DRO entry for this publication

Pierce, Justin D., Jones, Ashley G.* and Warren, Matthew (2005) A taxonomy of penetration testing ethics, in Warren, Matthew (eds), Conference proceedings of AiCE 2005 Geelong, September 26th, 2005, fourth Australian Institute of Computer Ethics Conference, Deakin University, School of Information Systems, Geelong, Vic. [E1]
DRO entry for this publication

Price, Jenny and Cybulski, Jacob (2005) Stakeholder bargaining behaviour : the social backbone of communication, negotiation and consensus as used for information system requirements elicitation, in Cox, K.; Cybulski, Jacob; Nguyen, Lemai; Lamp, John and Smith, R. (eds), Tenth Australian Workshop on Requirements Engineering : proceedings, Deakin University, Geelong, Vic. [E1]
DRO entry for this publication

Pye, Graeme and Warren, Matthew (2005) Ethics or ICT governance: striking an ethical balance, in Warren, Matthew (eds), Conference proceedings of AiCE 2005 Geelong, September 26th, 2005, fourth Australian Institute of Computer Ethics Conference, Deakin University, Geelong, Vic. [E1]
DRO entry for this publication

Pye, Graeme and Warren, Matthew (2005) Benchmarking e-business security : a model and framework, in Valli, Craig and Woodward, Andrew (eds), Proceeding of the 3rd Australian Computer, Network & Information Forensics Conference, pp. 1-8, Edith Cowan University, School of Computer and Information Science, Perth, W.A. [E1]
DRO entry for this publication

Pye, Graeme and Warren, Matthew (2005) Modelling critical infrastructure dependency relationships, in Pye, Graeme and Warren, Matthew (eds), Protecting the Australian homeland : conference proceedings of [the] 6th Australian Information Warfare & Security Conference, Geelong, November 24-25th, 2005., Deakin University, School of Information Systems, Geelong, Vic. [E1]
DRO entry for this publication

Pye, Graeme and Warren, Matthew (2005) Australian commercial-critical infrastructure management protection, in Hutchinson, Bill (eds), Proceedings of the 4th European Conference on Information Warfare and Security, pp. 249-259, Academic Conferences Limited, Reading, England [E1]
DRO entry for this publication

Scollary, A.*, Craig, A. and Rickard, K.* (2005) On-line mentoring-supporting women in ICT and academe for career development and recognition, in Archibald; Emms; Grundy; Payne and Turner (eds), WIC2005 : The Gender Politics of ICT, pp. 408-421, Women Into Computing, London, England [E1]
DRO entry for this publication

Teo, Evelyn, Fraunholz, Bardo and Unnithan, Chandana (2005) Inhibitors and facilitators for mobile payment adoption in Australia: a preliminary study, in Brookes, Wayne; Lawrence, Elaine; Steele, Robert and Chang, Elizabeth (eds), International Conference on Mobile Business, ICMB 2005, pp. 663-666, IEEE, Los Alamitos, Calif. [E1]
DRO entry for this publication

van der Klooster, Marie and Coldwell, Jo (2005) Real time, perceived time and time online : a review of student experiences of time over thirty years of distance and online education, in Burge, Andrew (eds), 3rd Annual Hawaii International Conference on Education Conference Proceedings, pp. 1-14, Hawaii International Conference on Education, Honolulu, T.H. [E1]
DRO entry for this publication

Warren, Matthew, Wilde, D., Dojkovski, S. and Hutchinson, W.* (2005) A conceptual model security for IT security outsourcing, in Pye, Graeme and Warren, Matthew (eds), Protecting the Australian homeland : conference proceedings of [the] 6th Australian Information Warfare & Security Conference, Geelong, Deakin University, School of Information Systems, Geelong, Vic. [E1]
DRO entry for this publication

Warren, Matthew and Hutchinson, William* (2005) A systems approach to security, in Richardon, Kurt; Gregory, Wendy and Midgley, Gerald (eds), Systems Thinking and Complexity Science: Insights for Action Proceedings of the 11th Annual ANZSYS / Managing the Complex V conference, pp. 302-305, ISCE, Mansfield, Mass. [E1]
DRO entry for this publication

Wilkin, Carla*, Fraunholz, Bardo and Unnithan, Chandana (2005) Project quality management in virtual environments : a primer, in Khosrow-Pour, Mehdi (eds), Managing modern organizations with information technology: 2005 Information Resources Management Association International Conference, pp. 753-755, Idea Group Publishing, Hershey, Pa. [E1]
DRO entry for this publication

Dojkovski, Sneza, Warren, Matthew and Hutchinson, W.* (2005) Issues of Australian IT security outsourcing, in Warren, Matthew (eds), Conference proceedings of AiCE 2005 Geelong, September 26th, 2005, fourth Australian Institute of Computer Ethics Conference, Deakin University, School of Information Systems, Geelong, Vic. [E2]
DRO entry for this publication

Geller, Christopher, Mustard, Jamie and Shahwan, Ranya (2005) Standard voting power indices work : an experimental investigation of pure voting power, in Ashworth, John (eds), EPCS 2005 : Papers of the Annual Meeting of the European Public Choice Society 2005, pp. 1-30, University of Durham, London, England [E2]
DRO entry for this publication

van der Klooster, Marie (2005) Learning online, clock time and network time? How students use and perceive time when studying online., Hawaii International Conference on Education Conference Proceedings, p. 4923, Hawaii International Conferences Organisation, Hawaii, T.H. [E3]
DRO entry for this publication

Pye, Graeme and Warren, Matthew (2005) Protecting the Australian homeland : conference proceedings of [the] 6th Australian Information Warfare & Security Conference, Geelong, November 24-25th, 2005, in Pye, Graeme and Warren, Matthew (eds), Deakin University, Geelong, Vic. [E4]
DRO entry for this publication

Linden, Tanya* and Cybulski, Jacob (2005) Colour and image issues in web development, EuroPLoP 2005 : Tenth European Conference on Pattern Languages of Programs, pp. 1-10 [L1]
DRO entry for this publication

Carr, Rodney and Salzman, Scott (2005) Using Excel to generate empirical sampling distributions, ISI-55 : 2005 Session of the International Statistical Institute, pp. 1-4, International Statistical Institute, Sydney, N.S.W. [L2]
DRO entry for this publication

Dojkovski, Sneza (2005) Toward an information security culture for Australian small and medium size enterprises, in Campbell, Bruce; Underwood, Jim and Bunker, Deborah (eds), ACIS 2005 : Social IT : thinking about the people : Proceedings, pp. 18-24, Australasian Chapter of the Association for Information Systems, Sydney, N.S.W. [L2]
DRO entry for this publication

Grants and Consultancies

Grants with funding during 2005

Research Income - National Competitive Grants

Mackay, D and Garner, B. Compliance Assistant for Electronic Commerce, Australian Research Council Small Grant [T]

  • 1997: $5,200

Warren, M and Hutchinson, W*. A model for IT Security Outsourcing of Critical Services, Australian Research Council, Project - Discovery - Projects [T]

  • 2005: $41,796
  • 2004: $40,936

Craig, A, Fisher, J*, Lang, C*, Forgasz, H, Forgasz, H*, Ellul, R* and Harlos, B*. Digital Divas: Designing approaches to enthuse girls' interest in ICT studies and ICT careers, ARC Collaborative - Linkage - Projects (Round 1) [T]

  • 2011: $6,000
  • 2010: $8,000
  • 2009: $6,000

Cybulski, J, Mather, D, Keller, S, Saundage, D and Dharmasena, L. Enhancing collaborative learning in information systems business analytics using data visualisation and manipulation techniques, OLT Seed Projects - Office for Learning and Teaching [T]

  • 2013: $-35,161
  • 2012: $165,000

Research Income - Other Public Sector Funding

Mackay, D. Smart Geelong Education Network [U]

  • 1998: $1,630

Coulthard, D. PURIST Data Analysis [U]

  • 2000: $6,000

Hewett, W. Call Centre Capability Analysis [U]

  • 2000: $90,000

Castleman, T, Cavill, M and Mackay, D. Use of eCommerce for Export (EC4X) [U]

  • 2002: $54,496

Warren, M. PhD Scholarship - Warren Brooks [U]

  • 2005: $8,120
  • 2004: $13,863
  • 2003: $13,500

Cybulski, J, Segrave, S, Holt, D and Munro, J. ALTC Project - CG8-771 - Building academic staff capacity for using eSimulations in professional education for experience transfer [U]

  • 2009: $83,764
  • 2008: $45,407

Allinson, G*, Salzman, S, Mc Namara, E*, Li, H* and Taniguchi, M*. Understanding the connections between ground and surface water on the Werribee plains [U]

  • 2010: $8,163
  • 2009: $15,918

Chan, C, Keller, S, Cameron-Smith, D and Crowe, T. Exploring options for the development of a comprehensive food database to support the Australian government's Industry Partnership Initiative [U]

  • 2010: $98,800

Gunawan, G*, Parker, C and Mason, C. Encouraging Small and Medium Enterprise ICT-Based Collaboration in Industry Clusters [U]

  • 2011: $1,500

Versace, V, Miller, A*, Matthews, T and Bowie, k. Support for Research on Genetic Variability in Donax Deltoides [U]

  • 2011: $10,000

Research Income - Industry and Other Funding

Craig, A. CS4HS: Broadening Participation in ICT [V]

  • 2013: $2,100

Research Income - Industry and Other Funding - Australian

Warren, M. Seeding Project - Corporate critical infrastructure protection - visualization [V.1]

  • 2007: $5,000

Chan, C, Keller, S, Braithwaite, R and Fraunholz, B. Investigating the role of extended information on consumer's behaviour in the food industry [V.1]

  • 2010: $5,000
  • 2009: $2,000

Coldwell, J and Craig, A. Go Girl Go for IT programme in Victoria-to ascertain its short term and longer term impact [V.1]

  • 2009: $4,500

Higher Degree by Research Completions

2005 - Doctor of Philosophy

Saranond Inthanond. Supervisor: Matthew Warren
Thesis entitled: The Meaning of Information: A Study of Western Construction of Asian-ness in Film.

Konrad Peszynski. Supervisor: Matthew Warren
Thesis entitled: Power and Politics in a System Implementation.

Legend:
* Not a member of Deakin University at time of output.

DRO to publications collection last synchronised: Wednesday 17th September 2014 10:04pm

Deakin University acknowledges the traditional land owners of present campus sites.

8th November 2010