Projects per year
Fingerprint
Dive into the research topics where Dale Kleeman is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
- 1 Similar Profiles
Projects
- 2 Finished
-
Conversations in Digital Literacy; the use of patterns in work integrated learning (WIL)
Mcdonald, C. & Kleeman, D.
15/02/10 → 30/06/10
Project: Other
-
Predicting the impact of software projects through an analysis of software project types and thier stakeholders.
Mcdonald, C. & Kleeman, D.
2/04/02 → 2/10/03
Project: Other
-
Information Security Perceptions of Users, Levels of Engagement and Developer Resistance
KLEEMAN, D., Dec 2018, 29th Australasian Conference on Information Systems. Sydney: Australasian Conference on Information Systems Executive Committee, p. 1-10 10 p. 137Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
Open Access -
Boundary Spanning Theory: a Case Study of the Professionalisation of ICT Graduates in the Australian Public Service
MACKRELL, D., MCDONALD, C., Buick, F. & KLEEMAN, D., 2016, Proceedings of the 27th Australasian Conference on Information Systems (ACIS 2016). Australia : University of Wollongong, p. 1-8 8 p. (Proceedings of the 27th Australasian Conference on Information Systems, ACIS 2016).Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
Open AccessFile328 Downloads (Pure) -
A theoretical model for participation by stakeholders concerned with information security issues in systems development processes
KLEEMAN, D., 2013, ACIS 2013: Information systems: Transforming the Future: Proceedings of the 24th Australasian Conference on Information Systems . Deng, H. & Standing, C. (eds.). Melbourne: RMIT Univerity, Vol. 1. p. 1-12 12 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
Open Access1 Citation (Scopus) -
Impact of restrictive composition policy on user password choices
Campbell, J., Ma, W. & Kleeman, D., 2011, In: Behaviour and Information Technology. 30, 3, p. 379-388 10 p.Research output: Contribution to journal › Article › peer-review
31 Citations (Scopus) -
Password Entropy and Password Quality
Ma, W., Campbell, J., Tran, D. & Kleeman, D., 2010, Fourth International Conference on Network and System Security (NSS 2010). USA: IEEE, Institute of Electrical and Electronics Engineers, p. 583-587 5 p.Research output: A Conference proceeding or a Chapter in Book › Conference contribution › peer-review
Open AccessFile56 Citations (Scopus)56 Downloads (Pure)