2007 |
13 | EE | Rodger Jamieson,
Donald Winchester,
Stephen Smith:
Development of a Conceptual Framework for Managing Identity Fraud.
HICSS 2007: 157 |
12 | EE | Stephen Smith,
Rodger Jamieson,
Donald Winchester:
An Action Research Program to Improve Information Systems Security Compliance across Government Agencies.
HICSS 2007: 99 |
2006 |
11 | EE | Stephen Smith,
Rodger Jamieson:
Determining Key Factors in E-Government Information System Security.
IS Management 23(2): 23-32 (2006) |
2005 |
10 | EE | David Phu,
Rodger Jamieson:
Security Risks in Mobile Business.
ICMB 2005: 121-127 |
9 | EE | Glenn Bewsell,
Rodger Jamieson,
Adrian Gardiner,
Deborah Bunker:
An Investigation of Dispute Resolution Mechanisms on Power and Trust: A Domain Study of Online Trust in e-Auctions.
TrustBus 2005: 288-298 |
8 | EE | Angela Brungs,
Rodger Jamieson:
Identification of Legal Issues for Computer Forensics.
IS Management 22(2): 57-66 (2005) |
2003 |
7 | EE | Hung Kit Lui,
Rodger Jamieson:
Integrating trust and risk perceptions in business-to-consumer electronic commerce with the technology acceptance model.
ECIS 2003 |
2002 |
6 | | Amy Tennyenhuis,
Rodger Jamieson:
Multidisciplinary E-Forensics Methodology Development to Assist in the Investigation of e-Crime.
E-Business: Multidisciplinary Research and Practice 2002: 187-205 |
5 | | Rodger Jamieson:
Governance for E-business Knowledge Management Systems.
E-Business: Multidisciplinary Research and Practice 2002: 437-459 |
4 | | Allan Baird,
Rodger Jamieson,
Narciso Cerpa:
Development of a Framework for Risks and Security in B2C eBusiness.
I3E 2002: 399-413 |
2001 |
3 | EE | Monkol Lek,
Benjamnin Anandarajah,
Narciso Cerpa,
Rodger Jamieson:
Data Mining Prototype for Detecting E-Commerce Fraud.
ECIS 2001 |
2 | | Benjamin Pak,
Sunny Tsang,
Narciso Cerpa,
Rodger Jamieson:
A Tool for Designing Multimedia Systems.
ISAS-SCI (1) 2001: 502-507 |
1989 |
1 | EE | Rodger Jamieson,
Graham Low:
Security and control issues in local area network design.
Computers & Security 8(4): 283-290 (1989) |