If you made any changes in Pure these will be visible here soon.

Research Output 2005 2018

  • 6 Conference contribution
  • 3 Article
Filter
Conference contribution
2018

Information Security Perceptions of Users, Levels of Engagement and Developer Resistance

KLEEMAN, D., Dec 2018, 29th Australasian Conference on Information Systems. Sydney: Australasian Conference on Information Systems Executive Committee, p. 1-10 10 p. 137

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
Security of data
Managers
Industry
2016
205 Downloads (Pure)

Boundary Spanning Theory: a Case Study of the Professionalisation of ICT Graduates in the Australian Public Service

MACKRELL, D., MCDONALD, C., Buick, F. & KLEEMAN, D., 2016, Proceedings of the 27th Australasian Conference on Information Systems (ACIS 2016). Australia : University of Wollongong, p. 1-8 8 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
File
professionalization
public service
graduate
university
working life
2013
1 Citation (Scopus)

A theoretical model for participation by stakeholders concerned with information security issues in systems development processes

KLEEMAN, D., 2013, ACIS 2013: Information systems: Transforming the Future: Proceedings of the 24th Australasian Conference on Information Systems . Deng, H. & Standing, C. (eds.). Melbourne: RMIT Univerity, Vol. 1. p. 1-12 12 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
Security of data
Information systems
2010
32 Citations (Scopus)
5 Downloads (Pure)

Password Entropy and Password Quality

Ma, W., Campbell, J., Tran, D. & Kleeman, D., 2010, Fourth International Conference on Network and System Security (NSS 2010). USA: IEEE, Institute of Electrical and Electronics Engineers, p. 583-587 5 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
File
Entropy
Glossaries
2006
6 Citations (Scopus)
3 Downloads (Pure)

Password Composition Policy: Does Enforcement Lead to Better Password Choices?

Campbell, J., Kleeman, D. & Ma, W., 2006, Proceedings of the 17th Australasian Conference on Information Systems. Spencer, S. & Jenkins, A. (eds.). South Australia: Association for Information Systems, p. 1-8 8 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution

Open Access
File
Chemical analysis
Glossaries
Access control
Authentication
Information systems
2005

Reflections on the teaching of SSM

Kleeman, D., 2005, 16th Australasian Conference on Information Systems (ACIS 2005) "Socialising IT: Thinking About the People". Campbell, B., Underwood, J. & Bunker, D. (eds.). Sydney: Association for Information Systems, p. 1-8 8 p.

Research output: A Conference proceeding or a Chapter in BookConference contribution