Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Security (4)
- Information security (3)
- [RSTDPub] (3)
- Business (2)
- Electronic banking (2)
-
- [ECUPub] (2)
- Artificial Neural Networks (1)
- Behaviour (1)
- Building Automation (1)
- Communities of practice (1)
- Controls (1)
- Cryptosystems (1)
- Culture (1)
- Cybercrime (1)
- Data processing (1)
- E-wallets (1)
- Electronic commerce (1)
- Financial Ratio Analysis (1)
- Forensic Software Tools (1)
- Forensic accounting (1)
- Fraud (1)
- Governance (1)
- Heating Ventilation and Air Conditioning (1)
- Information security culture (1)
- Information security management (1)
- Information security policy (1)
- Information warfare (1)
- Intrusion Detection (1)
- Knowledge management (1)
- Mobile devices (1)
Articles 1 - 10 of 10
Full-Text Articles in Business
Determinants Of Intention To Use E-Wallet: Personal Innovativeness And Propensity To Trust As Moderators, Madugoda Gunaratnege Senali, Mohammad Iranmanesh, Fatin Nadzirah Ismail, Noor Fareen Abdul Rahim, Mana Khoshkam, Maryam Mirzaei
Determinants Of Intention To Use E-Wallet: Personal Innovativeness And Propensity To Trust As Moderators, Madugoda Gunaratnege Senali, Mohammad Iranmanesh, Fatin Nadzirah Ismail, Noor Fareen Abdul Rahim, Mana Khoshkam, Maryam Mirzaei
Research outputs 2022 to 2026
This study aims to investigate the determinants of intention to use e-wallets. Drawing on the technology acceptance model (TAM), the conceptual framework was developed. The study extends the TAM in the context of e-wallets, by testing the influences of product-related factors namely perceived compatibility, perceived risk, and perceived emotions and investigating the moderating impacts of personal innovativeness and propensity to trust. To conduct an empirical study, the data were collected from Malaysian individuals with no experience with e-wallets using an online survey. Data from 374 participants were obtained and analyzed using the partial least squares technique. The results showed that …
Improving Forensic Software Tool Performance In Detecting Fraud For Financial Statements, Brian Cusack, Tau’Aho Ahokov
Improving Forensic Software Tool Performance In Detecting Fraud For Financial Statements, Brian Cusack, Tau’Aho Ahokov
Australian Digital Forensics Conference
The use of computer forensics is important for forensic accounting practice because most accounting information is in digital forms today. The access to evidence is increasingly more complex and in far greater volumes than in previous decades. The effective and efficient means of detecting fraud are required for the public to maintain their confidence in the reliability of accounting audit and the reputation of accounting firms. The software tools used by forensic accounting can be called into question. Many appear inadequate when faced with the complexity of fraud and there needs to be the development of automated and specialist problem-solving …
Evaluating Policy Layer Security Controls For Value Realisation In Secure Systems, Brian Cusack, Maher Al-Khazrajy
Evaluating Policy Layer Security Controls For Value Realisation In Secure Systems, Brian Cusack, Maher Al-Khazrajy
Australian Information Security Management Conference
A strategic question for any business is: What value do control frameworks give? The question concerns the costs associated with implementing and maintaining control frameworks compared with the benefits gained. Each control framework contains many controls that may or may not benefit a situation and this research is aimed at testing different selections and combinations of controls to forecast probable impacts on business outcomes. The scope of the research is limited to a representative set of security controls and the lesser question: What are the criteria for selecting the most effective and efficient security control configurations for best business value? …
Timing Attack Detection On Bacnet Via A Machine Learning Approach, Michael N. Johnstone, Matthew Peacock, J I. Den Hartog
Timing Attack Detection On Bacnet Via A Machine Learning Approach, Michael N. Johnstone, Matthew Peacock, J I. Den Hartog
Australian Information Security Management Conference
Building Automation Systems (BAS), alternatively known as Building Management Systems (BMS), which centralise the management of building services, are often connected to corporate networks and are routinely accessed remotely for operational management and emergency purposes. The protocols used in BAS, in particular BACnet, were not designed with security as a primary requirement, thus the majority of systems operate with sub-standard or non-existent security implementations. As intrusion is thus likely easy to achieve, intrusion detection systems should be put in place to ensure they can be detected and mitigated. Existing intrusion detection systems typically deal only with known threats (signature-based approaches) …
Corporate Security: Using Knowledge Construction To Define A Practising Body Of Knowledge, David Brooks
Corporate Security: Using Knowledge Construction To Define A Practising Body Of Knowledge, David Brooks
Research outputs 2012
Security is a multidimensional concept, with many meanings, practising domains, and heterogeneous occupations. Therefore, it is difficult to define security as a singular concept, although understanding may be achieved by its applied context in presenting a domicile body of knowledge. There have been studies that have presented a number of corporate security bodies of knowledge; however, there is still restricted consensus. From these past body of knowledge studies, and supported by multidimensional scaling knowledge mapping, a body of knowledge framework is put forward, integrating core and allied knowledge categories. The core knowledge categories include practise areas such as risk management, …
Improving An Organisations Existing Information Technology Policy To Increase Security, Shane Talbot, Andrew Woodward
Improving An Organisations Existing Information Technology Policy To Increase Security, Shane Talbot, Andrew Woodward
Australian Information Security Management Conference
A security policy which includes the appropriate phases of implementation, enforcement, auditing and review is vital to protecting an organisations information security. This paper examined the information security policy of a government organisation in response to a number of perceived shortcomings. The specific issues identified relating to the organisations security policy as a result of this investigation were as follows: a culture of ignoring policies, minimal awareness of policies, minimal policy enforcement, policy updating and review ad hoc at best, policy framework, lengthy policy development and approval process, no compliance program, no formal non-compliance reporting and an apparent inconsistent enforcement …
What Does Security Culture Look Like For Small Organizations?, Patricia A. Williams
What Does Security Culture Look Like For Small Organizations?, Patricia A. Williams
Australian Information Security Management Conference
The human component is a significant factor in information security, with a large numbers of breaches occurring due to unintentional user error. Technical solutions can only protect information so far and thus the human aspect of security has become a major focus for discussion. Therefore, it is important for organisations to create a security conscious culture. However, currently there is no established representation of security culture from which to assess how it can be manoeuvred to improve the overall information security of an organization. This is of particular importance for small organizations who lack the resources in information security and …
Exploring The Relationship Between Organizational Culture And Information Security Culture, Joo S. Lim, Shanton Chang, Sean Maynard, Atif Ahmad
Exploring The Relationship Between Organizational Culture And Information Security Culture, Joo S. Lim, Shanton Chang, Sean Maynard, Atif Ahmad
Australian Information Security Management Conference
Managing Information Security is becoming more challenging in today’s business because people are both a cause of information security incidents as well as a key part of the protection from them. As the impact of organizational culture (OC) on employees is significant, many researchers have called for the creation of information security culture (ISC) in organizations to influence the actions and behaviour of employees towards better organizational information security. Although researchers have called for the creation of ISC to be embedded in organizations, nonetheless, literature suggests that little past research examining the relationship between the nature of OC and ISC. …
Protecting The Infrastructure: 3rd Australian Information Warfare & Security Conference 2002, William Hutchinson (Ed.)
Protecting The Infrastructure: 3rd Australian Information Warfare & Security Conference 2002, William Hutchinson (Ed.)
Research outputs pre 2011
The conference is hosted by the We-B Centre (working with a-business) in the School of Management Information System, the School of Computer & Information Sciences at Edith Cowan University. This year's conference is being held at the Sheraton Perth Hotel in Adelaide Terrace, Perth. Papers for this conference have been written by a wide range of academics and industry specialists. We have attracted participation from both national and international authors and organisations.
The papers cover many topics, all within the field of information warfare and its applications, now and into the future.
The papers have been grouped into six streams: …
Working For Excellence In The E-Conomy: 2nd International We-B Conference, Sue Stoney (Ed.)
Working For Excellence In The E-Conomy: 2nd International We-B Conference, Sue Stoney (Ed.)
Research outputs pre 2011
Welcome to Perth, Western Australia, and to the 2nd International We-B Conference 2001 "working for excellence in the e-conomy" hosted by the We-B Centre, School of Management Information Systems at Edith Cowan University.
This is an international conference for academics and industry specialists in e-business, e-government and related fields. The conference has drawn participants from national and international organisations.
All submitted papers were subjected to an anonymous peer review process managed by the Conference Committee.