Follow
Alana Maurushat
Alana Maurushat
Professor of Cybersecurity and Behaviour
Verified email at westernsydney.edu.au
Title
Cited by
Cited by
Year
Opening up government data for Big Data analysis and public benefit
K Hardy, A Maurushat
Computer law & security review 33 (1), 30-37, 2017
1552017
Technical protection measures: tilting at copyright's windmill
IR Kerr, A Maurushat, CS Tacit
Ottawa L. Rev. 34, 7, 2002
95*2002
The role of user behaviour in improving cyber security management
AA Moustafa, A Bello, A Maurushat
Frontiers in Psychology 12, 561011, 2021
922021
Factors affecting reputational damage to organisations due to cyberattacks
S Perera, X Jin, A Maurushat, DGJ Opoku
Informatics 9 (1), 28, 2022
422022
Fragmented Copyright, Fragmented Management: Proposals to Defrag Copyright Management
D Gervais, A Maurushat
Canadian Journal of Law and Technology 2 (1), 2003
392003
Disclosure of security vulnerabilities: Legal and ethical issues
A Maurushat
Springer, 2013
332013
Incorporating psychology into cyber security education: a pedagogical approach
J Taylor-Jackson, J McAlaney, JL Foster, A Bello, A Maurushat, J Dale
Financial Cryptography and Data Security: FC 2020 International Workshops …, 2020
312020
Ethical hacking
A Maurushat
University of Ottawa Press/Les Presses de l’Université d’Ottawa, 2019
312019
Technical and behavioural training and awareness solutions for mitigating ransomware attacks
A Bello, A Maurushat
Applied Informatics and Cybernetics in Intelligent Systems: Proceedings of …, 2020
272020
Addressing identity crime in crime management information systems: Definitions, classification, and empirics
R Jamiesona, LPW Landa, D Winchestera, G Stephensa, A Steelb, ...
Transnational Financial Crime, 399-414, 2017
262017
Australia’s accession to the cybercrime convention: is the convention still relevant in combating cybercrime in the era of botnets and obfuscation crime tools?
A Maurushat
TheUNIVERSITY OF NEW SOUTH WALES LAW JOURNAL 33 (2), 431-473, 2010
202010
" Good" worms and human rights
J Aycock, A Maurushat
Acm Sigcas Computers and Society 38 (1), 28-39, 2008
202008
The Impact of Social Networks and Mobile Technologies on the Revolutions in the Arab World—A Study of Egypt and Tunisia
A Maurushat, M Chawki, H Al-Alosi, Y Shazly
Laws 3 (4), 674-692, 2014
182014
Exploring the limits of computer code as a protected form of expression: a suggested approach to encryption, computer viruses, and technological protection measures
A Colangelo, A Maurushat
McGill LJ 51, 47, 2005
182005
Using'big'metadata for criminal intelligence: understanding limitations and appropriate safeguards
A Maurushat, L Bennett-Moses, D Vaile
Proceedings of the 15th International Conference on Artificial Intelligence …, 2015
162015
Security risks and user perception towards adopting wearable internet of medical things
S Thapa, A Bello, A Maurushat, F Farid
International Journal of Environmental Research and Public Health 20 (8), 5519, 2023
142023
Future threats
J Aycock, A Maurushat
UNSW Law Research Paper, 2009
132009
Investigation of cryptocurrency enabled and dependent crimes
A Maurushat, D Halpin
Financial Technology and the Law: Combating Financial Crime, 235-267, 2022
122022
The legal obligation to provide timely security patching and automatic updates
A Maurushat, K Nguyen
International cybersecurity law review 3 (2), 437-465, 2022
112022
Working from home users at risk of COVID-19 ransomware attacks
AA Duong, A Bello, A Maurushat
Cybersecurity and cognitive science, 51-87, 2022
112022
The system can't perform the operation now. Try again later.
Articles 1–20