Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Business (3)
- [ECUPub] (3)
- [RSTDPub] (3)
- Electronic commerce (2)
- Security (2)
-
- Attack (1)
- Australia (1)
- Case study (1)
- Cybercrime (1)
- Data security (1)
- Detection (1)
- Egovernment (1)
- Electronic banking (1)
- Firewall (1)
- Hackers (1)
- Indigenous (1)
- Industry (1)
- Information management (1)
- Innovation (1)
- Intelligence (1)
- Intrusion (1)
- Intrusion detection (1)
- Knowledge management (1)
- Management (1)
- Protocols (1)
- Systems (1)
- Virtual organisation (1)
Articles 1 - 6 of 6
Full-Text Articles in Business
A Virtual Organisation Model For E-Government, Greg Robins, Janice Burn
A Virtual Organisation Model For E-Government, Greg Robins, Janice Burn
Research outputs pre 2011
This paper looks at the implementation of a new customer value alliance model in e-govemment. Firstly we review the issues of e-govemment and the drive towards customer centric organisations in the context of multiple government agencies. A model of e-Government is introduced and examined within the context of a virtual organisation model which can be applied along the customer value chain across multiple service agencies. A case study is used to demonstrate how this concept of a virtual organisation as a customer value-alliance model can effect a successful transition to e-Govemment from a traditional Government model. Finally, we examine how …
Survival In The E-Conomy: 2nd Australian Information Warfare & Security Conference 2001, William Hutchinson (Ed.)
Survival In The E-Conomy: 2nd Australian Information Warfare & Security Conference 2001, William Hutchinson (Ed.)
Research outputs pre 2011
This is an international conference for academics and industry specialists in information warfare, security, and other related fields. The conference has drawn participants from national and international organisations.
Working For Excellence In The E-Conomy: 2nd International We-B Conference, Sue Stoney (Ed.)
Working For Excellence In The E-Conomy: 2nd International We-B Conference, Sue Stoney (Ed.)
Research outputs pre 2011
Welcome to Perth, Western Australia, and to the 2nd International We-B Conference 2001 "working for excellence in the e-conomy" hosted by the We-B Centre, School of Management Information Systems at Edith Cowan University.
This is an international conference for academics and industry specialists in e-business, e-government and related fields. The conference has drawn participants from national and international organisations.
All submitted papers were subjected to an anonymous peer review process managed by the Conference Committee.
Systems In Management 7th Annual Anzsys Conference 2001: The Relevance Of Systems Thinking In The Contemporary World, William Hutchinson (Ed.)
Systems In Management 7th Annual Anzsys Conference 2001: The Relevance Of Systems Thinking In The Contemporary World, William Hutchinson (Ed.)
Research outputs pre 2011
Welcome to Perth, Western Australia, and to the Systems in Management 7th Annual ANZSYS Conference 2001 "the relevance of systems thinking in the contemporary world" hosted by the We-B Centre, School of Management Information Systems at Edith Cowan University. The conference provides an opportunity for sharing and networking among academics and industry specialists in systems and related fields. The conference has drawn participants from national and international organizations. All submitted papers were subjected to an anonymous peer review process managed by the Conference Committee. Stringent review criteria resulted in an unprecedented number of papers declined this year. Based on these …
Nidh - Network Intrusion Detection Hierarchy: A Model For Gathering Attack Intelligence, Craig Valli
Nidh - Network Intrusion Detection Hierarchy: A Model For Gathering Attack Intelligence, Craig Valli
Research outputs pre 2011
Internet proxy systems such as Squid exchange intelligence relevant to their function as caching proxy servers via a distributed and trusted hierarchy of machines. The required intelligence is broadcast based along the network based upon established trust relationships throughout the connected network via specific port and protocols of exchange. An intrusion detection system that incorporates this functionality for gathering attack intelligence could be a formidable foe even for the wiliest attacker. This paper will outline a possible model for the deployment of a network/distributed network intrusion detection system utilising technologies and techniques already in existence to provide the supporting infrastructure.
Why A Journal Of Research For Consumers?, Simone Pettigrew
Why A Journal Of Research For Consumers?, Simone Pettigrew
Research outputs pre 2011
This article outlines the rationale behind the introduction of the Journal of Research for Consumers. The potential benefits to be gained from educating consumers are discussed, and arguments are made for the contribution of consumer researchers to the consumer education process. In particular, the deficiencies of the current dependence on research that produces managerial outcomes are discussed in terms of the limitations they place on understanding the relevance of consumption in consumers' lives. The structure of the Journal of Consumer Research is described in terms of the access provided to both academic and consumer audiences.