Donald Winchester

According to our database1, Donald Winchester authored at least 21 papers between 2007 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Predictive Technologies for Strategic House Fire Management.
Proceedings of the Australasian Conference on Information Systems, 2022

2021
Empiricism through Activity Theory: Australian Undergraduate ICT Education.
Proceedings of the 42nd International Conference on Information Systems, 2021

2020
Critical Learning from Fires: An Investigation of Complexity in IS-enabled Emergency Management.
Proceedings of the 24th Pacific Asia Conference on Information Systems, 2020

2019
IS Mediation of Emergency Management: Adding Prediction to the existing Framework of Activities?
Proceedings of the 23rd Pacific Asia Conference on Information Systems, 2019

2012
Addressing identity crime in crime management information systems: Definitions, classification, and empirics.
Comput. Law Secur. Rev., 2012

2011
IS for Government Climate Change Adaptation Activities: An Exploratory Case Study.
Proceedings of the Australasian Conference on Information Systems, 2011

2010
Circuits of Power: A Study of Mandated Compliance to an Information Systems Security De Jure Standard in a Government Organization.
MIS Q., 2010

The Impact of IT Investment Announcements about Y2K Compliance on the Firm's Market Value.
Proceedings of the International Conference on Information Systems, 2010

Descriptive Data Mining on Fraudulent Online Dating Profiles.
Proceedings of the 18th European Conference on Information Systems, 2010

2009
Information Systems Security Compliance in E-Government.
Proceedings of the Pacific Asia Conference on Information Systems, 2009

Critical Infrastructure Infomation Security: Impacts of Identity and Related Crimes.
Proceedings of the Pacific Asia Conference on Information Systems, 2009

Information Security in an Identity Management Lifecycle: Mitigating Identity Crimes.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2008
A Study of the Risks in an Information System Outsourcing Partnership.
Proceedings of the Open IT-Based Innovation: Moving Towards Cooperative IT Transfer and Knowledge Diffusion, 2008

Developing a Conceptual Framework for Identity Fraud Profiling.
Proceedings of the 16th European Conference on Information Systems, 2008

Moving Towards Information System Security Accreditation within Australian State Government Agencies.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

Defining Identity Crimes.
Proceedings of the Australasian Conference on Information Systems, 2008

2007
Participants Involved In Identity Fraud.
Proceedings of the Pacific Asia Conference on Information Systems, 2007

An Identity Fraud Model Categorising Perpetrators, Channels, Methods of Attack, Victims and Organisational Impacts.
Proceedings of the Pacific Asia Conference on Information Systems, 2007

An Action Research Program to Improve Information Systems Security Compliance across Government Agencies.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Development of a Conceptual Framework for Managing Identity Fraud.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Identity Fraud: The Player Landscape in Australia.
Proceedings of the Australasian Conference on Information Systems, 2007


  Loading...