Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 36

Full-Text Articles in Entire DC Network

Exploring The Key Enabling Role Of Digital Technology For Enhancing Supply Chain Performance Through Supply Chain Collaboration, Inventory Management And Supply Chain Resilience, Michelle J. Sadha, Zeplin J. H. Tarigan, Hotlan Siagian, Ferry Jie Jun 2024

Exploring The Key Enabling Role Of Digital Technology For Enhancing Supply Chain Performance Through Supply Chain Collaboration, Inventory Management And Supply Chain Resilience, Michelle J. Sadha, Zeplin J. H. Tarigan, Hotlan Siagian, Ferry Jie

Research outputs 2022 to 2026

The company always tries to improve competitiveness by improving company performance. Using upgraded digital technology makes it easier for internal and external companies to determine business strategies quickly and precisely. This study surveyed expedition companies in East Java, as many as 104 companies with the criteria of having a transportation fleet. Data collection using questionnaires and dissemination in collaboration with the Association of Express Delivery Service Companies, Post and Logistics Indonesia (ASPERINDO). Research respondents consist of employees or unit leaders who are competent in the substance of the survey. Data analysis uses the partial least square (PLS) method. The results …


Unleashing The Power Of Internet Of Things And Blockchain: A Comprehensive Analysis And Future Directions, Abderahman Rejeb, Karim Rejeb, Andrea Appolloni, Sandeep Jagtap, Mohammad Iranmanesh, Salem Alghamdi, Yaser Alhasawi, Yasanur Kayikci Jan 2024

Unleashing The Power Of Internet Of Things And Blockchain: A Comprehensive Analysis And Future Directions, Abderahman Rejeb, Karim Rejeb, Andrea Appolloni, Sandeep Jagtap, Mohammad Iranmanesh, Salem Alghamdi, Yaser Alhasawi, Yasanur Kayikci

Research outputs 2022 to 2026

As the fusion of the Internet of Things (IoT) and blockchain technology advances, it is increasingly shaping diverse fields. The potential of this convergence to fortify security, enhance privacy, and streamline operations has ignited considerable academic interest, resulting in an impressive body of literature. However, there is a noticeable scarcity of studies employing Latent Dirichlet Allocation (LDA) to dissect and categorize this field. This review paper endeavours to bridge this gap by meticulously analysing a dataset of 4455 journal articles drawn solely from the Scopus database, cantered around IoT and blockchain applications. Utilizing LDA, we have extracted 14 distinct topics …


Opportunities And Challenges Posed By Disruptive And Converging Information Technologies For Australia's Future Defence Capabilities: A Horizon Scan, Pi-Shen Seet, Anton Klarin, Janice Jones, Mike Johnstone, Helen Cripps, Jalleh Sharafizad, Violetta Wilk, David Suter, Tony Marceddo Jan 2024

Opportunities And Challenges Posed By Disruptive And Converging Information Technologies For Australia's Future Defence Capabilities: A Horizon Scan, Pi-Shen Seet, Anton Klarin, Janice Jones, Mike Johnstone, Helen Cripps, Jalleh Sharafizad, Violetta Wilk, David Suter, Tony Marceddo

Research outputs 2022 to 2026

Introduction: The research project's objective was to conduct a comprehensive horizon scan of Network Centric Warfare (NCW) technologies—specifically, Cyber, IoT/IoBT, AI, and Autonomous Systems. Recognised as pivotal force multipliers, these technologies are critical to reshaping the mission, design, structure, and operations of the Australian Defence Force (ADF), aligning with the Department of Defence (Defence)’s offset strategies and ensuring technological advantage, especially in the Indo-Pacific's competitive landscape.

Research process: Employing a two-pronged research approach, the study first leveraged scientometric analysis, utilising informetric mapping software (VOSviewer) to evaluate emerging trends and their implications on defence capabilities. This approach facilitated a broader understanding …


Professionalism In Artificial Intelligence: The Link Between Technology And Ethics, Anton Klarin, Hossein Ali Abadi, Rifat Sharmelly Jan 2024

Professionalism In Artificial Intelligence: The Link Between Technology And Ethics, Anton Klarin, Hossein Ali Abadi, Rifat Sharmelly

Research outputs 2022 to 2026

Ethical conduct of artificial intelligence (AI) is undoubtedly becoming an ever more pressing issue considering the inevitable integration of these technologies into our lives. The literature so far discussed the responsibility domains of AI; this study asks the question of how to instil ethicality into AI technologies. Through a three-step review of the AI ethics literature, we find that (i) the literature is weak in identifying solutions in ensuring ethical conduct of AI, (ii) the role of professional conduct is underexplored, and (iii) based on the values extracted from studies about AI ethical breaches, we thus propose a conceptual framework …


Expanding Australia's Defence Capabilities For Technological Asymmetric Advantage In Information, Cyber And Space In The Context Of Accelerating Regional Military Modernisation: A Systemic Design Approach, Pi-Shen Seet, Anton Klarin, Janice Jones, Michael N. Johnstone, Violetta Wilk, Stephanie Meek, Summer O'Brien Jan 2024

Expanding Australia's Defence Capabilities For Technological Asymmetric Advantage In Information, Cyber And Space In The Context Of Accelerating Regional Military Modernisation: A Systemic Design Approach, Pi-Shen Seet, Anton Klarin, Janice Jones, Michael N. Johnstone, Violetta Wilk, Stephanie Meek, Summer O'Brien

Research outputs 2022 to 2026

Introduction. The aim of the project was to conduct a systemic design study to evaluate Australia'sopportunities and barriers for achieving a technological advantage in light of regional military technological advancement. It focussed on the three domains of (1) cybersecurity technology, (2) information technology, and (3) space technology.

Research process. Employing a systemic design approach, the study first leveraged scientometric analysis, utilising informetric mapping software (VOSviewer) to evaluate emerging trends and their implications on defence capabilities. This approach facilitated a broader understanding of the interdisciplinary nature of defence technologies, identifying key areas for further exploration. The subsequent survey study, engaging 828 …


Artificial Intelligence Innovation And Stock Price Crash Risk, Junru Zhang, Chen Cui, Chen Zheng, Grantley Taylor Jan 2024

Artificial Intelligence Innovation And Stock Price Crash Risk, Junru Zhang, Chen Cui, Chen Zheng, Grantley Taylor

Research outputs 2022 to 2026

This study examines the association between artificial intelligence innovation (AII) and stock price crash risk (SPCR). AII serves as a governance mechanism that can bolster strength in internal controls, leading to increased financial transparency and thereby reducing the likelihood of future SPCR. The results hold after accounting for possible endogeneity issues Further, we find that monitoring through corporate governance mechanisms, level of following by equity analysts, and the reduced information asymmetry constitute important channels that mediate the association between AII and SPCR. Additionally, the relationship between AII and SPCR varies across corporate life cycle stages and workplace culture.


The New Model For Medicine Distribution By Combining Of Supply Chain And Expert System Using Rule Based Reasoning Method, Mufadhol Mufadhol, Mustafid Mustafid, Ferry Jie, Yuni Noor Hidayah Mar 2023

The New Model For Medicine Distribution By Combining Of Supply Chain And Expert System Using Rule Based Reasoning Method, Mufadhol Mufadhol, Mustafid Mustafid, Ferry Jie, Yuni Noor Hidayah

Research outputs 2022 to 2026

The medicine distribution supply chain is important, especially during the coronavirus disease 2019 (COVID-19) pandemic, because delays in medicine distribution can increase the risk for patients. So far, the distribution of medicines has been carried out exclusively and even some medicines are distributed on a limited basis because they require strict supervision from the Medicine Supervisory Agency in each department. However, the distribution of this medicine has a weakness if at one public health center there is a shortage of certain types of medicines, it cannot ask directly to other public health center, thus allowing the availability of medicines not …


Supply Chain Insights From Social Media Users’ Responses To Panic Buying During Covid-19: The Herd Mentality, Violetta Wilk, Saiyidi Mat Roni, Ferry Jie Jan 2023

Supply Chain Insights From Social Media Users’ Responses To Panic Buying During Covid-19: The Herd Mentality, Violetta Wilk, Saiyidi Mat Roni, Ferry Jie

Research outputs 2022 to 2026

Purpose:

This study applied the herd mentality theory to explore local and global social media users’ responses to panic buying across the USA, UK and Australia during the COVID-19 crisis to understand the implications on operations and supply chains.

Design/methodology/approach:

A total of 208,806 social media user-generated content (UGC) pieces were collected from Twitter in three countries – the USA, UK and Australia. The analysis of this big qualitative data was performed using machine learning–based software – Leximancer.

Findings:

Positive and negative sentiment towards panic buying during the COVID-19 crisis was observed in the UGC. No significant differences in social …


Comparing Western Australia And South Australia Public High School’S Cyberbullying Policies – Is There A Need For A Legislative Change, Vanessa Tay Jan 2023

Comparing Western Australia And South Australia Public High School’S Cyberbullying Policies – Is There A Need For A Legislative Change, Vanessa Tay

Theses: Doctorates and Masters

The internet provides some of the most effective means of communication. Cyberbullying occurs when the internet is used to bully another person. Along with the positive aspects of the internet, cyberbullying is certainly one of the most negative aspects, especially with regard to school students. Victims of cyberbullying may be able to obtain legal sanctions, however, this usually occurs after the harm is done. In Australia, some states such as South Australia have recognised the need for preventive strategies by requiring schools to have an anti-bullying plan in place. Other countries, like Ontario, Canada have implemented similar preventative strategies in …


Blockchain Technology As An Enabler For Sustainable Business Ecosystems: A Comprehensive Roadmap For Socioenvironmental And Economic Sustainability, Morteza Ghobakhloo, Mohammad Iranmanesh, Muhammad S. Mubarik, Muhammad F. Mubarak, Azlan Amran, Ahmad A. A. Khanfar Jan 2023

Blockchain Technology As An Enabler For Sustainable Business Ecosystems: A Comprehensive Roadmap For Socioenvironmental And Economic Sustainability, Morteza Ghobakhloo, Mohammad Iranmanesh, Muhammad S. Mubarik, Muhammad F. Mubarak, Azlan Amran, Ahmad A. A. Khanfar

Research outputs 2022 to 2026

Blockchain technology is a core technology expected to play a highly instrumental role in competing with socioenvironmental challenges. The literature hypothesizes various blockchain functions for building a sustainable business ecosystem. This study unifies these diverse perspectives into an interpretive strategy roadmap that provides a holistic overview of how blockchain should be leveraged to deliver sustainability functions optimally. The study first identified the sustainability functions of blockchain through a content-centric literature review. The study applied interpretive structural modeling (ISM) and drew on experts' opinions to model how and in which order blockchain delivers these sustainability functions. The study further drew on …


Blockchain And Sustainability Disclosure: A Scenario-Based Application For Supply Chains, Laura Corazza, Junru Zhang, Dilhani Kapu Arachchilage, Simone Domenico Scagnelli Jan 2023

Blockchain And Sustainability Disclosure: A Scenario-Based Application For Supply Chains, Laura Corazza, Junru Zhang, Dilhani Kapu Arachchilage, Simone Domenico Scagnelli

Research outputs 2022 to 2026

This paper presents the implications of blockchain technologies on sustainability reporting and disclosure, and specifically proposes blockchain use-cases as a possible solution for problems experienced in the field of supply chain carbon information. This study addresses how the reliability of supply chains’ carbon-related information can become more transparent and reliable through a decentralized approach based on blockchain thinking (BT), issues that have been identified as a gap in the literature and in the practice. Scenario analysis and design science research (DSR) are used as a methodological driver to conceptualize over the nature of practical solutions using unified modeling language (UML) …


Behind The Definition Of Industry 5.0: A Systematic Review Of Technologies, Principles, Components, And Values, Morteza Ghobakhloo, Mohammad Iranmanesh, Ming-Lang Tseng, Andrius Grybauskas, Alessandro Stefanini, Azlan Amran Jan 2023

Behind The Definition Of Industry 5.0: A Systematic Review Of Technologies, Principles, Components, And Values, Morteza Ghobakhloo, Mohammad Iranmanesh, Ming-Lang Tseng, Andrius Grybauskas, Alessandro Stefanini, Azlan Amran

Research outputs 2022 to 2026

This study addresses the emerging concept of Industry 5.0, which aims to tackle societal concerns associated with the ongoing digital industrial transformation. However, there is still a lack of consensus on the definition and scope of Industry 5.0, as well as limited understanding of its technological components, design principles, and intended values. To bridge these knowledge gaps, the study conducts a content-centric review of relevant literature and synthesizes evidence to develop an architectural design for Industry 5.0. The findings reveal that Industry 5.0 represents the future of industrial transformation, offering potential solutions to socio-economic and environmental issues that were inadequately …


Nethnography, Complementing Netnography: A Defensible Praxis For The Online Researcher, Martin Maccarthy Sep 2022

Nethnography, Complementing Netnography: A Defensible Praxis For The Online Researcher, Martin Maccarthy

Research outputs 2022 to 2026

This article issues a challenge for interpretive tourism researchers to consider the trove of online data currently disavowed by aficionados of Netnography. Non-dyadic social media data is used by researchers but has been devalued as lacking legitimacy. However, by combining ‘lifeless’ non-dyadic social media with lesser-engaged ethnographic methods a lived proxy can be achieved. Nethnography is a two-part qualitative praxis of spending enough time with the phenomenon to discern meanings with confidence, which is then used to interpret non-dyadic textual discourse. Lesser-engaged ethnographic methods include participants as observers, observers as participants and complete observers. A fourth legitimizer of online interpretation …


Information Warfare: Methods To Counter Disinformation, Andrew Dowse, Sascha Dov Bachmann Sep 2022

Information Warfare: Methods To Counter Disinformation, Andrew Dowse, Sascha Dov Bachmann

Research outputs 2022 to 2026

The information age has transformed society by allowing people to interact digitally, yet it enables motivated actors to use mass influence to further their political objectives. The struggle against disinformation requires an appreciation of how a disinformation effect can be achieved in order to counter it. We consider the nature of disinformation and its use in the hybrid warfare domain, before examining the problem through frames of planning approach, truth theory, systems thinking, and military strategy. These approaches are informative in developing counter-strategies and we specifically identify the concept of kill chains as a useful framework to assist in the …


Travel Ban Effects On Sars-Cov-2 Transmission Lineages In The Uae As Inferred By Genomic Epidemiology, Andreas Henschel, Samuel F. Feng, Rifat A. Hamoudi, Gihan Daw Elbait, Ernesto Damiani, Fathimathuz Waasia, Guan K. Tay, Bassam H. Mahboub, Maimunah Hemayet Uddin, Juan Acuna, Eman Alefishat, Rabih Halwani, Herbert F. Jelinek, Farah Mustafa, Nawal Alkaabi, Habiba S. Alsafar Mar 2022

Travel Ban Effects On Sars-Cov-2 Transmission Lineages In The Uae As Inferred By Genomic Epidemiology, Andreas Henschel, Samuel F. Feng, Rifat A. Hamoudi, Gihan Daw Elbait, Ernesto Damiani, Fathimathuz Waasia, Guan K. Tay, Bassam H. Mahboub, Maimunah Hemayet Uddin, Juan Acuna, Eman Alefishat, Rabih Halwani, Herbert F. Jelinek, Farah Mustafa, Nawal Alkaabi, Habiba S. Alsafar

Research outputs 2022 to 2026

Global and local whole genome sequencing of SARS-CoV-2 enables the tracing of domestic and international transmissions. We sequenced Viral RNA from 37 sampled Covid-19 patients with RT-PCR-confirmed infections across the UAE and developed time-resolved phylogenies with 69 local and 3,894 global genome sequences. Furthermore, we investigated specific clades associated with the UAE cohort and, their global diversity, introduction events and inferred domestic and international virus transmissions between January and June 2020. The study comprehensively characterized the genomic aspects of the virus and its spread within the UAE and identified that the prevalence shift of the D614G mutation was due to …


Digitalization In Food Supply Chains: A Bibliometric Review And Key-Route Main Path Analysis, Abderahman Rejeb, Karim Rejeb, Alireza Abdollahi, Suhaiza Zailani, Mohammad Iranmanesh, Morteza Ghobakhloo Jan 2022

Digitalization In Food Supply Chains: A Bibliometric Review And Key-Route Main Path Analysis, Abderahman Rejeb, Karim Rejeb, Alireza Abdollahi, Suhaiza Zailani, Mohammad Iranmanesh, Morteza Ghobakhloo

Research outputs 2022 to 2026

Technological advances such as blockchain, artificial intelligence, big data, social media, and geographic information systems represent a building block of the digital transformation that supports the resilience of the food supply chain (FSC) and increases its efficiency. This paper reviews the literature surrounding digitalization in FSCs. A bibliometric and key-route main path analysis was carried out to objectively and analytically uncover the knowledge development in digitalization within the context of sustainable FSCs. The research began with the selection of 2140 articles published over nearly five decades. Then, the articles were examined according to several bibliometric metrics such as year of …


Editorial: Covid-19, Corporate Governance, Sustainability, And The Post-Neoliberal World, Marie Dela Rama, Julie Crews Jan 2021

Editorial: Covid-19, Corporate Governance, Sustainability, And The Post-Neoliberal World, Marie Dela Rama, Julie Crews

Research outputs 2014 to 2021

Welcome to this special issue of Corporate Governance and Sustainability Review focusing on the impact of thecoronavirus (COVID-19) on societies and economies worldwide. The five papers in this special issue reflect the initial impact of the COVID-19 pandemic,in its first year,on corporate governance and sustainability. What is common throughout these papers is how the pandemic has created disequilibria for many organisations. The question continues to be posed as to the new forms of organising and managing as the world reorientates or pivots in a pandemic and post-pandemic world.


Corporate Security Career Progression: A Comparative Study Of Four Australian Organisations, Codee Roy Ludbey, David J. Brooks, Michael Coole Jul 2020

Corporate Security Career Progression: A Comparative Study Of Four Australian Organisations, Codee Roy Ludbey, David J. Brooks, Michael Coole

Research outputs 2014 to 2021

The study investigated the Corporate Security stratum of work within large Australian organisations, seeking to extract professional seating, roles, associated task complexity, career opportunity and progression ceilings as articulated through the socio-organisational literature. Two phases were applied: Phase One used online surveys distributed to participants (N = 53) across four Australian organisations, Phase Two employed semi-structured interviews and focus groups (N = 14). Findings reinforced the established literature articulation of corporate security’s roles; however, they contested the current articulation of corporate security’s executive level seating within large organisations. Instead, the study identified a Corporate Security seating with a restricted sphere …


Identifying The Critical Factors Of Sustainable Manufacturing Using The Fuzzy Dematel Method, Luwei Jiang, Tenghao Zhang, Yanfei Feng Jan 2020

Identifying The Critical Factors Of Sustainable Manufacturing Using The Fuzzy Dematel Method, Luwei Jiang, Tenghao Zhang, Yanfei Feng

Research outputs 2014 to 2021

© 2020 Luwei Jiang et al., published by Sciendo 2020. The burgeoning trend of globalization gives rise to the formation of the manufacturing ecosystem. This study aims to identify the critical factors of sustainable manufacturing for countries and regions across the globe finding their unique ecological niches. From the perspective of the ecological niche, we develop an evaluation system of the manufacturing niche. By using the fuzzy Decision-Making Trial and Evaluation Laboratory (DEMATEL) method, the critical factors, and its causal relationships of the manufacturing niche can be quantified and visualized. The results indicate that: (1) the evaluation system of the …


Improving Forensic Software Tool Performance In Detecting Fraud For Financial Statements, Brian Cusack, Tau’Aho Ahokov Jan 2016

Improving Forensic Software Tool Performance In Detecting Fraud For Financial Statements, Brian Cusack, Tau’Aho Ahokov

Australian Digital Forensics Conference

The use of computer forensics is important for forensic accounting practice because most accounting information is in digital forms today. The access to evidence is increasingly more complex and in far greater volumes than in previous decades. The effective and efficient means of detecting fraud are required for the public to maintain their confidence in the reliability of accounting audit and the reputation of accounting firms. The software tools used by forensic accounting can be called into question. Many appear inadequate when faced with the complexity of fraud and there needs to be the development of automated and specialist problem-solving …


Timing Attack Detection On Bacnet Via A Machine Learning Approach, Michael N. Johnstone, Matthew Peacock, J I. Den Hartog Jan 2015

Timing Attack Detection On Bacnet Via A Machine Learning Approach, Michael N. Johnstone, Matthew Peacock, J I. Den Hartog

Australian Information Security Management Conference

Building Automation Systems (BAS), alternatively known as Building Management Systems (BMS), which centralise the management of building services, are often connected to corporate networks and are routinely accessed remotely for operational management and emergency purposes. The protocols used in BAS, in particular BACnet, were not designed with security as a primary requirement, thus the majority of systems operate with sub-standard or non-existent security implementations. As intrusion is thus likely easy to achieve, intrusion detection systems should be put in place to ensure they can be detected and mitigated. Existing intrusion detection systems typically deal only with known threats (signature-based approaches) …


Secure Portable Execution And Storage Environments: A Capability To Improve Security For Remote Working, Peter James Jan 2015

Secure Portable Execution And Storage Environments: A Capability To Improve Security For Remote Working, Peter James

Theses: Doctorates and Masters

Remote working is a practice that provides economic benefits to both the employing organisation and the individual. However, evidence suggests that organisations implementing remote working have limited appreciation of the security risks, particularly those impacting upon the confidentiality and integrity of information and also on the integrity and availability of the remote worker’s computing environment. Other research suggests that an organisation that does appreciate these risks may veto remote working, resulting in a loss of economic benefits. With the implementation of high speed broadband, remote working is forecast to grow and therefore it is appropriate that improved approaches to managing …


Sustaining Online Communities In The Charitable Health Sector: How To Keep A Good Thing Going, Leesa N. Costello, Julie S. Dare, Lelia R. Green Jan 2013

Sustaining Online Communities In The Charitable Health Sector: How To Keep A Good Thing Going, Leesa N. Costello, Julie S. Dare, Lelia R. Green

Research outputs 2013

What happens when an online community part-funded by a competitive grant process in partnership with a relevant charitable organisation reaches its use-by date? What reasons might an organisation have for continuing (or not) to support the community and its future development? How is ‘ownership’ transferred from the research institution to the not-forprofit organisation, along with any possible risks? These are all good questions: not least because it seems that most communities in this position are not ‘adopted’ by their not-forprofit sponsors, but languish on the sidelines waiting for a benefactor to pick up the potential costs and risks. This paper …


When Is A Bystander Not A Bystander? A Typology Of The Roles Of Bystanders In Workplace Bullying, Megan Paull, Maryam Omari, Peter Standen Jan 2012

When Is A Bystander Not A Bystander? A Typology Of The Roles Of Bystanders In Workplace Bullying, Megan Paull, Maryam Omari, Peter Standen

Research outputs 2012

The role of the bystander is one which has received only a small portion of the research attention that has been paid to workplace bullying. This paper will argue that bystanders are not just incidental but are an integral part of the context of bullying. Drawing on qualitative data from two separate studies, a typology is presented which outlines thirteen potential roles bystanders can take. This typology can be employed as an awareness-raising tool to encourage individuals to examine their own behaviour in a range of situations, and to acknowledge that their actions, either deliberate or inadvertent, can contribute to …


Security Awareness By Online Banking Users In Western Australian Of Phishing Attacks, Nattakant Utakrit Jan 2012

Security Awareness By Online Banking Users In Western Australian Of Phishing Attacks, Nattakant Utakrit

Theses: Doctorates and Masters

Phishing involves sending e-mails pretending to be from the legitimate financial institutions to recipients and asking for personal information such as username and password. It also redirects network traffic to malicious sites, deny network traffic to web services, and modify protection mechanisms in the targeted computer systems. Consequences of successful attacks can include identity and financial losses, and unauthorised information disclosure.

The purpose of this study was to investigate the experiences of Western Australian bank users in using online banking. The study considered the relationship between the background of the Western Australian bank users and their experience in using online …


The Malarkey Of Money Transfers: Overlooking E-Bay Whilst The Hawaladars Are Hunted, David M. Cook, Timothy Smith Nov 2010

The Malarkey Of Money Transfers: Overlooking E-Bay Whilst The Hawaladars Are Hunted, David M. Cook, Timothy Smith

Australian Counter Terrorism Conference

Informal Money Transfer systems represent one of several persistent loopholes in the fight against the War on Terror. Terrorist groups and criminal networks continue to use the Hawala system, as well as other informal transfer systems, to escape the regulatory and administrative control of formal international banking transactions. In an age where global financial regulation is underpinned by international agreement through Basel and others, the ongoing use of IVTs in Australia is cause for increasing concern. Yet Hawala is only half of the informal equation. E-bay and its associated bedfellows outstrip Hawala transfers through the same commercial imperative that drives …


What Does Security Culture Look Like For Small Organizations?, Patricia A. Williams Dec 2009

What Does Security Culture Look Like For Small Organizations?, Patricia A. Williams

Australian Information Security Management Conference

The human component is a significant factor in information security, with a large numbers of breaches occurring due to unintentional user error. Technical solutions can only protect information so far and thus the human aspect of security has become a major focus for discussion. Therefore, it is important for organisations to create a security conscious culture. However, currently there is no established representation of security culture from which to assess how it can be manoeuvred to improve the overall information security of an organization. This is of particular importance for small organizations who lack the resources in information security and …


Transformation Theory And E-Commerce Adoption, Mark P. Brogan Jan 2006

Transformation Theory And E-Commerce Adoption, Mark P. Brogan

Theses: Doctorates and Masters

This thesis investigates business transformation on the Internet; particularly the nature and significance of Cyber transformation theory and the Marketspace Model as a framework for E-commerce adoption. E-commerce can raise a firm's productivity, transform customer relationships and open up new markets. The extent to which nations become adopters of E-commerce is set to become a source of comparative national competitive advantage (or disadvantage) in the twenty first century.


Non-Business Use Of The World Wide Web : A Study Of Selected Western Australian Organisations, Craig Valli Jan 2003

Non-Business Use Of The World Wide Web : A Study Of Selected Western Australian Organisations, Craig Valli

Theses: Doctorates and Masters

Employees undertake a wide range of activities when they use the World Wide Web in the work place. Some of these activities may leave the modem Internet connected organisation vulnerable to undue or unknown risk, potential productivity losses and expense us a result of misuse or abuse or the Internet provision. Much of the existing literature on this subject points to a purported epidemic of misuse in the workplace. If this practice is so prevalent and widespread, what can modem Internet connected organisations do to identify the abuse and reduce the risks and losses that these abuses represent? To what …


Determinants Of Internet Banking Adoption In Thailand, Bussakorn Jaruwachirathanakul Jan 2003

Determinants Of Internet Banking Adoption In Thailand, Bussakorn Jaruwachirathanakul

Theses: Doctorates and Masters

Increasingly competition in the financial services sector is forcing service providers to develop and utilise alternative delivery channels (Daniel, 1999). Within the sector, banking has always been a highly service intensive activity that relies heavily on technology to acquire, process, and deliver services and information to consumers (Tan & Teo, 2000). The emergence of the Internet has provided a way for banks to improve the efficiency of their service delivery and to gain a competitive advantage by reducing the number of brick-and-mortar branches. The study investigated the adoption of lnternet banking services in Thailand and is based on the premise …