dblp.uni-trier.dewww.uni-trier.de

Rodger Jamieson

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
13EERodger Jamieson, Donald Winchester, Stephen Smith: Development of a Conceptual Framework for Managing Identity Fraud. HICSS 2007: 157
12EEStephen Smith, Rodger Jamieson, Donald Winchester: An Action Research Program to Improve Information Systems Security Compliance across Government Agencies. HICSS 2007: 99
2006
11EEStephen Smith, Rodger Jamieson: Determining Key Factors in E-Government Information System Security. IS Management 23(2): 23-32 (2006)
2005
10EEDavid Phu, Rodger Jamieson: Security Risks in Mobile Business. ICMB 2005: 121-127
9EEGlenn Bewsell, Rodger Jamieson, Adrian Gardiner, Deborah Bunker: An Investigation of Dispute Resolution Mechanisms on Power and Trust: A Domain Study of Online Trust in e-Auctions. TrustBus 2005: 288-298
8EEAngela Brungs, Rodger Jamieson: Identification of Legal Issues for Computer Forensics. IS Management 22(2): 57-66 (2005)
2003
7EEHung Kit Lui, Rodger Jamieson: Integrating trust and risk perceptions in business-to-consumer electronic commerce with the technology acceptance model. ECIS 2003
2002
6 Amy Tennyenhuis, Rodger Jamieson: Multidisciplinary E-Forensics Methodology Development to Assist in the Investigation of e-Crime. E-Business: Multidisciplinary Research and Practice 2002: 187-205
5 Rodger Jamieson: Governance for E-business Knowledge Management Systems. E-Business: Multidisciplinary Research and Practice 2002: 437-459
4 Allan Baird, Rodger Jamieson, Narciso Cerpa: Development of a Framework for Risks and Security in B2C eBusiness. I3E 2002: 399-413
2001
3EEMonkol Lek, Benjamnin Anandarajah, Narciso Cerpa, Rodger Jamieson: Data Mining Prototype for Detecting E-Commerce Fraud. ECIS 2001
2 Benjamin Pak, Sunny Tsang, Narciso Cerpa, Rodger Jamieson: A Tool for Designing Multimedia Systems. ISAS-SCI (1) 2001: 502-507
1989
1EERodger Jamieson, Graham Low: Security and control issues in local area network design. Computers & Security 8(4): 283-290 (1989)

Coauthor Index

1Benjamnin Anandarajah [3]
2Allan Baird [4]
3Glenn Bewsell [9]
4Angela Brungs [8]
5Deborah Bunker [9]
6Narciso Cerpa [2] [3] [4]
7Adrian Gardiner [9]
8Monkol Lek [3]
9Graham C. Low (Graham Cedric Low, Graham Low) [1]
10Hung Kit Lui [7]
11Benjamin Pak [2]
12David Phu [10]
13Stephen Smith [11] [12] [13]
14Amy Tennyenhuis [6]
15Sunny Tsang [2]
16Donald Winchester [12] [13]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)