Circuits of power: A study of mandated compliance to an information systems security" De Jure" standard in a government organization S Smith, D Winchester, D Bunker, R Jamieson MIS quarterly, 463-486, 2010 | 226 | 2010 |
Forward contracts in electricity markets: The Australian experience EJ Anderson, X Hu, D Winchester Energy Policy 35 (5), 3089-3103, 2007 | 131 | 2007 |
Addressing identity crime in crime management information systems: Definitions, classification, and empirics R Jamiesona, LPW Landa, D Winchestera, G Stephensa, A Steelb, ... Transnational Financial Crime, 399-414, 2017 | 26 | 2017 |
An action research program to improve information systems security compliance across government agencies S Smith, R Jamieson, D Winchester 2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007 | 18 | 2007 |
Descriptive data mining on fraudulent online dating profiles J Pan, D Winchester, L Land, P Watters | 14 | 2010 |
Defining identity crimes R Jamieson, L Land, R Sarre, A Steel, G Stephens, D Winchester ACIS 2008 Proceedings, 107, 2008 | 14 | 2008 |
An Identity Fraud Model Categorising Perpetrators, Channels, Methods of Attack, Victims and Organisational Impacts R Jamieson, G Stephens, D Winchester | 12 | 2007 |
Developing a Conceptual Framework for Identity Fraud Profiling. R Jamieson, D Winchester, G Stephens, S Smith ECIS, 1418-1429, 2008 | 11 | 2008 |
A study of the risks in an information system outsourcing partnership S Ajitkumar, D Bunker, S Smith, D Winchester Open IT-Based Innovation: Moving Towards Cooperative IT Transfer and …, 2008 | 10 | 2008 |
Development of a conceptual framework for managing identity fraud R Jamieson, D Winchester, S Smith 2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007 | 10 | 2007 |
Identity crime: the need for an appropriate government strategy R Jamieson, L Land, G Stephens, D Winchester Forum on Public Policy Online, 1-33, 2008 | 8 | 2008 |
The more we know, the less we agree: A test of the trading horizon heterogeneity theory L Dai, JT Parwada, DW Winchester, B Zhang Financial Review 57 (1), 45-67, 2022 | 7 | 2022 |
CRITICAL INFRASTRUCTURE INFOMATION SECURITY: IMPACTS OF IDENTITY AND RELATED CRIMES R Jamieson, L Land, S Smith, G Stephens, D Winchester | 6 | 2009 |
2007 R Jamieson, G Stephens, D Winchester The authors assign to ACIS and educational, 0 | 6 | |
Foreign investors’ trading disadvantages in US stock market: An analysis by country of origin J Parwada, T Walter, D Winchester Unpublished Working Paper, University of New South Wales, 2007 | 5 | 2007 |
Critical Learning from Fires: An Investigation of Complexity in IS-enabled Emergency Management A Edwards, S Smith, P Busch, D Winchester, F Tan, V Pang | 4 | 2020 |
IS for government climate change adaptation activities: an exploratory case study S Smith, DW Winchester, H Hasan, P Finnegan | 4 | 2011 |
IS mediation of emergency management:: adding prediction to the existing framework of activities? A Edwards, S Smith, P Busch, V Pang, D Winchester 23rd Pacific-Asia Conference on Information Systems, PACIS 2019, 2-14, 2019 | 3 | 2019 |
Collaboration as a strategic service in government online communities S Smith, D Winchester, S Clegg, V Pang Journal of Change Management 14 (2), 236-257, 2014 | 3 | 2014 |
Information systems security compliance in e-government S Smith, D Winchester, R Jamieson, HT Nguyen PACIS 2009-13th Pacific Asia Conference on Information Systems: IT Services …, 2009 | 3 | 2009 |