Stephen JC Smith
Stephen JC Smith
Verified email at mq.edu.au
Title
Cited by
Cited by
Year
Circuits of Power: A Study of Mandated Compliance to an Information Systems Security" De Jure" Standard in a Government Organization
S Smith, D Winchester, D Bunker, R Jamieson
MIS quarterly, 463-486, 2010
1432010
Determining key factors in e-government information system security
S Smith, R Jamieson
Information systems management 23 (2), 23-32, 2006
1002006
Agile enterprise architecture: a case of a cloud technology-enabled government enterprise transformation
AQ Gill, S Smith, G Beydoun, V Sugumaran
402014
An activity theoretic analysis of the mediating role of information systems in tackling climate change adaptation
H Hasan, S Smith, P Finnegan
Information Systems Journal 27 (3), 271-308, 2017
342017
Disaster Management and Community Warning Systems: Inter-Organisational Collaboration and ICT Innovation.
D Bunker, S Smith
PACIS 2009 Proceedings, 36, 2009
252009
Kinetics of production of individual products from the isothermal pyrolysis of seven Australian oil shales
GC Wall, SJC Smith
Fuel 66 (3), 345-349, 1987
171987
An action research program to improve information systems security compliance across government agencies
S Smith, R Jamieson, D Winchester
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
152007
Building a Taxonomy for Cybercrimes.
L Land, S Smith, V Pang
PACIS, 109, 2013
122013
A study of government Cloud adoption: The Australian context
P Busch, S Smith, AQ Gill, P Harris, B Fakieh, Y Blount
Proceedings of the 25th Australasian Conference on Information Systems, ACIS …, 2014
112014
The Impact of Web 2.0 (Gov 2.0) and Social Media Technologies on engagement in Local Government.
A Gibby, S Smith, V Pang, C Van Toorn
PACIS, 120, 2014
92014
A tuned fuzzy logic relocation model in WSNs using particle swarm optimization
A Rafiei, Y Maali, M Abolhasan, D Franklin, F Safaei, S Smith
2013 IEEE 78th Vehicular Technology Conference (VTC Fall), 1-5, 2013
92013
Exploration rock geochemistry for gold, Parkes, New South Wales, Australia
GJS Govett, VJ Dobos, S Smith
Journal of Geochemical Exploration 21 (1-3), 175-191, 1984
91984
A study of the risks in an information system outsourcing partnership
S Ajitkumar, D Bunker, S Smith, D Winchester
IFIP Working Conference on Open IT-Based Innovation: Moving Towards …, 2008
82008
Developing a Conceptual Framework for Identity Fraud Profiling.
R Jamieson, D Winchester, G Stephens, S Smith
ECIS, 1418-1429, 2008
82008
Development of a conceptual framework for managing identity fraud
R Jamieson, D Winchester, S Smith
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
82007
What do we mean by e-procurement?-A private hospital perspective in Australia
M Chan, V Pang, D Bunker, S Smith
PACIS 2006 Proceedings, 72, 2006
82006
A case study for choosing proper relocation algorithms to recover large scale coverage hole (s) in wireless sensor networks
A Rafiei, M Abolhasan, D Franklin, S Smith
Workshop on Advances in Real-time Information Networks, 2013
62013
CRITICAL INFRASTRUCTURE INFOMATION SECURITY: IMPACTS OF IDENTITY AND RELATED CRIMES
R Jamieson, L Land, S Smith, G Stephens, D Winchester
PACIS 2009 Proceedings, 78, 2009
62009
The influence of industry culture on an inter-organisational information system adoption process
V Pang, D Bunker, S Smith
ACIS 2007 Proceedings, 69, 2007
62007
The Barriers to the Adoption of E-Commerce by Micro Businesses, Small Businesses and Medium Enterprises
C Van Toorn, D Bunker, K Yee, S Smith
Sixth International Conference on Knowledge, Culture, and Change in …, 2006
62006
The system can't perform the operation now. Try again later.
Articles 1–20