Tanya Jane McGill
Orcid: 0000-0003-4272-1757
According to our database1,
Tanya Jane McGill
authored at least 78 papers
between 1993 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
"No point worrying" - The role of threat devaluation in information security behavior.
Comput. Secur., 2024
2022
Simul. Model. Pract. Theory, 2022
J. Comput. Inf. Syst., 2022
2021
Inf. Comput. Secur., 2021
Maladaptive behaviour in response to email phishing threats: The roles of rewards and response costs.
Comput. Secur., 2021
Proceedings of the Australasian Conference on Information Systems, 2021
Proceedings of the Australasian Conference on Information Systems, 2021
2020
J. Comput. Inf. Syst., 2020
Cultural factors and the role of privacy concerns in acceptance of government surveillance.
J. Assoc. Inf. Sci. Technol., 2020
Hum. centric Comput. Inf. Sci., 2020
Proceedings of the ACE 2020, 2020
2019
How perceived security risk affects intention to use smart home devices: A reasoned action explanation.
Comput. Secur., 2019
Using the Decomposed Theory of Planned Behaviour to explain Healthcare Consumer Adoption of Electronic Health Records.
Proceedings of the Australasian Conference on Information Systems, 2019
2018
Comput. Hum. Behav., 2018
Short-term and Long-term Effects of Fear Appeals in Improving Compliance with Password Guidelines.
Commun. Assoc. Inf. Syst., 2018
Proceedings of the Australasian Conference on Information Systems, 2018
Proceedings of the Australasian Conference on Information Systems, 2018
2017
"Security begins at home": Determinants of home computer and mobile device security behavior.
Comput. Secur., 2017
Old risks, new challenges: exploring differences in security between home computer and mobile device use.
Behav. Inf. Technol., 2017
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
Proceedings of the 23rd Asia-Pacific Conference on Communications, 2017
Mining the Mind - Applying Quantitative Techniques to Understand Mental Models of Security.
Proceedings of the Australasian Conference on Information Systems, 2017
2016
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016
Proceedings of the Australasian Conference on Information Systems, 2016
2015
J. Softw., 2015
Proceedings of the 17th Australasian Computing Education Conference, 2015
2014
Australian Academic Leaders' Perceptions of the Teaching-Research-Industry-Learning Nexus in Information and Communications Technology Education.
Int. J. Inf. Commun. Technol. Educ., 2014
Internet High. Educ., 2014
Improving Compliance with Password Guidelines: How User Perceptions of Passwords and Security Threats Affect Compliance with Guidelines.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014
2013
J. Inf. Technol. Educ. Res., 2013
The state of the art of application restrictions and sandboxes: A survey of application-oriented access controls and their shortfalls.
Comput. Secur., 2013
An investigation of the impact of recertification requirements on recertification decisions.
Proceedings of the 2013 Computers and People Research Conference, SIGMIS-CPR '13, Cincinnati, OH, USA, May 30, 2013
Proceedings of the Australasian Conference on Information Systems, 2013
Proceedings of the Australasian Conference on Information Systems, 2013
2012
The Teaching-Research-Industry-Learning Nexus in Information and Communications Technology.
ACM Trans. Comput. Educ., 2012
Towards Usable Application-Oriented Access Controls: Qualitative Results from a Usability Study of SELinux, AppArmor and FBAC-LSM.
Int. J. Inf. Secur. Priv., 2012
Affective Tutoring Systems: Enhancing e-Learning with the Emotional Awareness of a Human Tutor.
Int. J. Inf. Commun. Technol. Educ., 2012
Proceedings of the 3rd IEEE International Conference on Networked Embedded Systems for Every Application, 2012
2011
Empowering End Users to Confine Their Own Applications: The Results of a Usability Study Comparing SELinux, AppArmor, and FBAC-LSM.
ACM Trans. Inf. Syst. Secur., 2011
A Policy Language for Abstraction and Automation in Application-Oriented Access Controls: The Functionality-Based Application Confinement Policy Language.
Proceedings of the POLICY 2011, 2011
Proceedings of the Australasian Conference on Information Systems, 2011
Techniques for Automating Policy Specification for Application-oriented Access Controls.
Proceedings of the Sixth International Conference on Availability, 2011
2010
J. Comput. High. Educ., 2010
2009
ACM SIGCSE Bull., 2009
Int. J. Inf. Secur. Priv., 2009
2008
How students and instructors using a virtual learning environment perceive the fit between technology and task.
J. Comput. Assist. Learn., 2008
Int. J. Netw. Virtual Organisations, 2008
Behav. Inf. Technol., 2008
The Relationship between LMS Use and Teacher Performance: The Role of Task-Technology Fit.
Proceedings of the Australasian Conference on Information Systems, 2008
2007
From Beliefs to Success: Utilizing an Expanded TAM to Predict Web Page Development Success.
Int. J. Technol. Hum. Interact., 2007
2006
J. Organ. End User Comput., 2006
Int. J. Inf. Commun. Technol. Educ., 2006
Proceedings of the Australasian Conference on Information Systems, 2006
2005
Int. J. Inf. Commun. Technol. Educ., 2005
Decis. Support Syst., 2005
Proceedings of the Encyclopedia of Information Science and Technology (5 Volumes), 2005
Proceedings of the Encyclopedia of Information Science and Technology (5 Volumes), 2005
2004
J. Organ. End User Comput., 2004
Proceedings of the Australasian Conference on Information Systems, 2004
2003
User Developed Applications and Information Systems Success: A Test of DeLone and McLean's Model.
Inf. Resour. Manag. J., 2003
2002
J. Organ. End User Comput., 2002
2001
The Application Development Process: What Role does it Play in the Success of an Application for the User Developer?
Proceedings of the Australasian Conference on Information Systems, 2001
2000
Using Lotus Learning Space to enhance student learning of data communications.
Proceedings of the Challenges of Information Technology Management in the 21st Century, 2000
1998
Informing Sci. Int. J. an Emerg. Transdiscipl., 1998
Use of the Internet by Small to Medium Enterprises in Singapore.
Proceedings of WebNet 98, 1998
1997
Proceedings of the 2nd Annual Conference on Integrating Technology into Computer Science Education, 1997
1996
A supplementary package for distance education students studying introductory programming.
Proceedings of the 27th SIGCSE Technical Symposium on Computer Science Education, 1996
Integrating a networking simulation package into a data communications course to enhance student learning.
Proceedings of the ACM SIGCSE 1st Australasian Conference on Computer Science Education, 1996
1995
An investigation of the relationship between student algorithm quality and program quality.
ACM SIGCSE Bull., 1995
Identification of Technological Gatekeepers in the Information Technology Profession.
J. Am. Soc. Inf. Sci., 1995
1993
Computing Professionals and Information About Developments in Information Technology.
Aust. Comput. J., 1993