Select Publications
Book Chapters
2017, 'Addressing identity crime in crime management information systems: Definitions, classification, and empirics', in Transnational Financial Crime, pp. 399 - 413, http://dx.doi.org/10.4324/9781315084572
,2007, 'Impact of a Value-Based Approach to Training Software Inspectors: Empirical Results of a Controlled Software Inspection Experiment', in Klein AD (ed.), Computer software engineering research, Nova Science Publications, New York, USA, pp. 143 - 159
,Journal articles
2024, 'Exploring active and passive interactions in social networking services: a psychological needs perspective', Information Technology and People, 37, pp. 1918 - 1949, http://dx.doi.org/10.1108/ITP-07-2022-0563
,2023, 'Managing historical conditions in information systems strategizing: An imprinting perspective', Journal of Strategic Information Systems, 32, http://dx.doi.org/10.1016/j.jsis.2023.101794
,2023, 'Exploring users' content creation and information dissemination behavior in social media: The moderating effect of social presence', Acta Psychologica, 233, http://dx.doi.org/10.1016/j.actpsy.2023.103846
,2022, 'Exploring Adoption and Satisfaction with Self-Service Health Technology in Older Age: Perspectives of Healthcare Professionals and Older People', Healthcare (Switzerland), 10, pp. 738, http://dx.doi.org/10.3390/healthcare10040738
,2020, 'Understanding the effects of physical experience and information integration on consumer use of online to offline commerce', International Journal of Information Management, 51, pp. 102046, http://dx.doi.org/10.1016/j.ijinfomgt.2019.102046
,2018, 'Love at first sight: The interplay between privacy dispositions and privacy calculus in online social connectivity management', Journal of the Association for Information Systems, 19, pp. 124 - 151, http://dx.doi.org/10.17705/1jais.00487
,2017, 'Delivering Disruption in an Emergent Access Economy: A Case Study of an E-Hailing Platform', Communications of the Association for Information Systems, 41, pp. 497 - 516, http://aisel.aisnet.org/cais/vol41/iss1/22/
,2016, 'The Effects of General Privacy Concerns and Transactional Privacy Concerns on Facebook APPS Usage', Information & Management, 53, pp. 868 - 877, http://dx.doi.org/10.1016/j.im.2016.02.003
,2015, 'The Delphi Method Research Strategy in Studies of Information Systems', Communications of the Association for Information Systems, 37, pp. 31 - 63, http://aisel.aisnet.org/cais/vol37/iss1/2/
,2012, 'Addressing Identity Crime in Crime Management Information Systems: Definitions, Classification, and Empirics', Computer Law and Security Review, 28, pp. 381 - 395, http://www.sciencedirect.com/science/article/pii/S0267364912000659
,2011, 'Studying Infant Mortality Rate: A Data Mining Approach', Health and Technology, 1, pp. 25 - 34, http://dx.doi.org/10.1007/s12553-011-0005-0
,2011, 'Teaching IS Ethics: Applying A Research Technique For Classroom Use', Journal of Information Systems Education, 22, pp. 239 - 249, http://search.proquest.com/docview/911808992?accountid=12763
,2008, 'Identity Crime: The Need for an Appropriate Government Strategy', Forum on Public Policy: a journal of the Oxford Round Table, 2008, pp. 1 - 33
,2006, 'Effects of Reducing Reviewer Preparation and Meeting Durations on Software Review Performance: Two Laboratory Experiments', International Transactions on Systems Science and Applications, 1, pp. 151 - 157
,2006, 'Knowledge Management for Small-Medium Sized Software Development Teams: A Case Study', International Journal of Diversity in Organizations, Communities and Nations, 5, pp. 91 - 98, http://ijd.cgpublisher.com/product/pub.29/prod.207
,2002, 'Retaining Organizational Knowledge: A Case Study of an Australian Construction Company', Journal of Information and Knowledge Management, 1, pp. 119 - 130
,2002, 'Software Group Reviews and the Impact of Procedural Roles on Defect Detection Performance', Empirical Software Engineering: An International Journal, 7, pp. 77 - 79
,2000, 'The effectiveness of software development technical reviews: A behaviorally motivated program of research', IEEE Transactions on Software Engineering, 26, pp. 1 - 14
,2000, 'The use of procedural roles in code inspections: an experimental study', Empirical Software Engineering: An International Journal, 5, pp. 11 - 34, http://dx.doi.org/10.1023/A:1009893716489
,1999, 'Validating the defect detection performance advantage of group designs for software reviews: Report of a replicated experiment', Computer Standards & Interfaces, 21, pp. 174 - 175, http://dx.doi.org/10.1016/s0920-5489(99)92209-2
,Conference Papers
2020, 'Digital imprinting: The role of history in digital strategising at a predigital organisation', in Proceedings of the 24th Pacific Asia Conference on Information Systems: Information Systems (IS) for the Future, PACIS 2020, Dubai, UAE, presented at 24th Pacific Asia Conference on Information Systems: Information Systems (IS) for the Future, PACIS 2020, Dubai, UAE, 20 June 2020 - 24 June 2020, https://aisel.aisnet.org/pacis2020/67/
,2019, 'Start-up tasks for software development projects from customer and vendor perspectives', in Proceedings of the 25th Americas Conference on Information Systems (AMCIS 2019), Association for Information Systems (AIS), Cancún, México, presented at The 25th Americas Conference on Information Systems (AMCIS 2019), Cancún, México, 15 August 2019 - 17 August 2019, http://dx.doi.org/10.26190/unsworks/27690
,2017, 'Safeguarding Against Romance Scams - Using Protection Motivation Theory', in Proceedings of the 25th European Conference on Information Systems (ECIS 2017), Association for Information Systems, Guimarães, Portugal, pp. 2429 - 2444, presented at The 25th European Conference on Information Systems (ECIS 2017), Guimarães, Portugal, 05 June 2017 - 10 June 2017, http://aisel.aisnet.org/ecis2017_rp/154
,2016, 'Attributes, Processes, and Tendencies applied to Government Information Technology Outsourcing', in Proceedings of the 27th Australasian Conference on Information Systems (ACIS 2016), Wollongong, presented at The 27th Australasian Conference on Information Systems (ACIS 2016), Wollongong, 05 December 2016 - 07 December 2016, http://business.uow.edu.au/content/groups/public/@web/@bus/documents/doc/uow223966.pdf
,2015, 'Collaborative Consumption On Mobile Applications: A Study Of Multi-sided Digital Platform GoCatch', in Proceedings of the 14th International Conference on Mobile Business (ICMB 2015), Association for Information Systems, Fort Worth, USA, presented at The 14th International Conference on Mobile Business (ICMB 2015), Fort Worth, USA, 12 December 2015 - 12 December 2015, http://aisel.aisnet.org/icmb2015/11
,2015, 'Reviewing the Past for a Better Future: Reevaluating the IT Project Retrospective', in eProceedings of the 10th International Research Workshop on IT Project Management (SIGITProjMgmt 2015), Association for Information Systems, Fort Worth, Texas, USA, pp. 110 - 119, presented at The 10th International Research Workshop on IT Project Management (SIGITProjMgmt 2015), Fort Worth, Texas, USA, 12 December 2015 - 12 December 2015, http://aisel.aisnet.org/irwitpm2015/3
,2015, 'The effects of general privacy concerns and transactional privacy concerns on Facebook apps usage', in Proceedings of the 19th Pacific Asia Conference on Information Systems (PACIS 2015), Singapore, presented at The 19th Pacific Asia Conference on Information Systems (PACIS 2015), Singapore, 05 July 2015 - 09 July 2015, http://aisel.aisnet.org/pacis2015/221
,2015, 'The Affordance of Gamification in Enabling a Digital Disruptor: A Case Study of the goCatch Taxi Booking App', in Proceedings of the 48th Annual Hawaii International Conference on System Sciences (HICSS 2015), IEEE Computer Society, Kauai, Hawaii, pp. 1197 - 1206, presented at The 48th Annual Hawaii International Conference on System Sciences (HICSS 2015), Kauai, Hawaii, 05 January 2015 - 08 January 2015, http://dx.doi.org/10.1109/HICSS.2015.145
,2014, 'The Construction of Identity Offences Taxonomy: An Australian Context', in Proceedings of the 25th Australasian Conference on Information Systems (ACIS 2014), Auckland, New Zealand, presented at The 25th Australasian Conference on Information Systems (ACIS 2014), Auckland, New Zealand, 08 December 2014 - 10 December 2014, http://hdl.handle.net/10292/8085
,2014, 'Developing a conceptual model for project knowledge management', in Proceedings of the 20th Americas Conference on Information Systems (AMCIS 2014), Association for Information Systems, Savannah, Georgia, USA, presented at The 20th Americas Conference on Information Systems (AMCIS 2014), Savannah, Georgia, USA, 07 August 2014 - 09 August 2014
,2014, 'Persuasion in Prosocial Domains: Explaining the Persuasive Affordances of Volunteering Websites', in Proceedings of the 22nd European Conference on Information Systems (ECIS 2014), Tel Aviv, Israel, presented at The 22nd European Conference on Information Systems (ECIS 2014), Tel Aviv, Israel, 09 June 2014 - 11 June 2014, http://aisel.aisnet.org/ecis2014/proceedings/track01/14/
,2013, 'Starting-up IT-enabled Disruptive Innovation: A Stage Model', in Proceedings of the 24th Australasian Conference on Information Systems (ACIS 2013), Melbourne, Australia, presented at The 24th Australasian Conference on Information Systems (ACIS 2013), Melbourne, Australia, 04 December 2013 - 06 December 2013, https://ros.unsw.edu.au/userprofile.html?uid=18379
,2013, 'Building a Taxonomy for Cybercrimes', in Proceedings of the 17th Pacific Asia Conference on Information Systems (PACIS 2013), Association for Information Systems, Jeju Island, South Korea, presented at The 17th Pacific Asia Conference on Information Systems (PACIS 2013), Jeju Island, South Korea, 18 June 2013 - 22 June 2013, http://aisel.aisnet.org/
,2013, 'Patterned Interactions In Complex Systems: The Role Of Information Technology For Re-Shaping Organizational Structures', in Proceedings of the 21st European Conference on Information Systems (ECIS 2013), Utrecht, Netherlands, presented at The 21st European Conference on Information Systems (ECIS 2013), Utrecht, Netherlands, 06 June 2013 - 08 June 2013, https://ros.unsw.edu.au/userprofile.html?uid=18989
,2012, 'Understanding unintended consequences for EMR: A literature review', in Studies in Health Technology and Informatics, pp. 192 - 198, http://dx.doi.org/10.3233/978-1-61499-078-9-192
,2011, 'A CYBERCIEGE Gaming Simulation Experience in IS Security Teaching', in Proceedings of the 2011 International SIGED: IAIM Conference, Association for Information Systems, USA, pp. 1 - 11, presented at AIS SIG-ED IAIM 2011 Conference, Shanghai, China, 03 December 2011 - 04 December 2011
,2010, 'Cyberbullying and the Educator's Responsibility', in Proceedings of the 2010 International SIGED: IAIM Conference, International Academy for Information Management, USA, pp. 1 - 7, presented at AIS SIGED: IAIM International Conference on Informatics Education and Research, Saint Louis, Missouri, USA, 10 December 2010 - 12 December 2010, http://www.sig-ed.org/IAIM%202009/SIGED2009/SIGED2009.zip
,2010, 'Complementary organizational mechanisms - A case study on information technology business value', in 18th European Conference on Information Systems, ECIS 2010
,2010, 'What Happens Before a Project Starts?—Project Start-up from the Supplier Perspective', in Information Systems Development - Business Systems and Services: Modelling and Development, Springer, New York, Dordrecht, Heidelberg, London, pp. 647 - 657, presented at 19th International Conference on Information Systems Development (ISD 2010), Prague, Czech Republic, 25 August 2010 - 27 August 2010, http://dx.doi.org/10.1007/978-1-4419-9790-6_52
,2010, 'Design for Enterprise 2.0: Articulating the Online Social Capital Hypothesis', in Bridging the Socio-Technical Gap in Decision Support Systems: Challenges for the Next Decade, IOS Press, Amsterdam, Berlin, Tokyo, Washington, DC, pp. 163 - 171, presented at The 15th IFIP WG 8.3 International Conference on Decision Support Systems on Bridging the Socio-technical Gap in DSS - Challenges for the Next Decade, Lisbon, Portugal, 07 July 2010 - 10 July 2010, http://dx.doi.org/10.3233/978-1-60750-577-8-163
,2010, 'Descriptive Data Mining on Fraudulent Online Dating Profiles', in Proceedings of 18th European Conference on Information Systems, Scholar One, South Africa, pp. 1 - 11, presented at 18th European Conference on Information Systems (ECIS 2010), Pretoria, South Africa, 07 June 2010 - 09 June 2010
,2010, 'Nature and Extent of Identity Crime through Wireless Technology Abuse and its Impact on Individual and Organisational Levels', in Proceedings of the International Conference on Information Resources Management (CONF-IRM 2010), The Association for Information Systems (AIS), USA, pp. 1 - 11, presented at International Conference on Information Resources Management 2010, Jamaica, 16 May 2010 - 18 May 2010, http://aisel.aisnet.org/confirm2010/26/
,2010, 'Online Lecturing: Students' want it, but what about the lecturers?', in Proceedings of the International Conference on Information Resources Management (CONF-IRM 2010), The Association for Information Systems (AIS), USA, pp. 1 - 15, presented at International Conference on Information Resources Management 2010, Jamaica, 16 May 2010 - 18 May 2010, http://aisel.aisnet.org/confirm2010/25/
,2010, 'Online Lecturing: Suitable for All Courses?', in Proceedings of the Southern Association for Information Systems Conference 2010, The Association for Information Systems (AIS), USA, pp. 20 - 26, presented at Southern Association for Information Systems Conference 2010, Atlanta, GA, USA, 26 March 2010 - 27 March 2010, http://sais.aisnet.org/2010/2010-SAIS%20Proceedings/Shum-Land-and-Dick.pdf
,2009, 'Exploring Lecturers' Acceptance of Online Media for Teaching', in Proceedings of the 2009 International SIGED: IAIM Conference, The Internaitonal Academy for Information Management, paper 114, www.sig-ed.org, presented at AIS SIGED: IAIM 2009, Phoenix, Arizona, USA, 12 December 2009 - 14 December 2009
,2009, 'Consumer choice model of mobile banking', in 12th Australian Conference on Knowledge Management and Intelligent Decision Support, ACKMIDS 09 and 20th Australasian Conference on Information Systems, ACIS 2009, pp. 25 - 35
,2009, 'A Conceptual Framework for Investigating Suppliers¿ Participation in Business-to-Government (B2G) Electronic Auction Markets in the Thai Context', in Proceedings of the Fifteenth Americas Conference on Information Systems (AMCIS 2009), Association for Information Systems (AIS), USA, presented at Fifteenth Americas Conference on Information Systems (AMCIS 2009)- The Golden Gate to the Future of IS, San Francisco, California, 06 August 2009 - 09 August 2009
,2009, 'Evaluation Criteria for Frameworks in eHealth Domain', in Proceedings of the Fifteenth Americas Conference on Information Systems (AMCIS 2009), Association for Information Systems (AIS), USA, presented at Fifteenth Americas Conference on Information Systems (AMCIS 2009)- The Golden Gate to the Future of IS, San Francisco, California, 06 August 2009 - 09 August 2009
,