Conference Publication |
Mirowski, LT, A method for whole of system analysis of RFID security, Proceedings of the 27th Australasian Conference on Information Systems, 5-7 December 2016, Wollongong, Australia, pp. 1-11. (2016) [Refereed Conference Paper] |  |
Johnson, DG and Malhotra, V and Vamplew, PW and Patro, S, Refining search queries from examples using Boolean expressions and Latent Semantic Analysis, Proceedings of the 2nd International Conference on Artificial Intelligence in Science and Technology (AISAT 2004), 21-25 November 2004, Hobart, Tasmania, pp. 120-125. ISBN 1 86295 209 4 (2004) [Refereed Conference Paper] | |
Diggles, A and Pollard, C, Iner-organisational trust in B2B E Commerce in Australia, Conference Proceedings, July 2003, Adelaide, pp. 196-209. ISBN 0868039942 (2003) [Refereed Conference Paper] | |
Murray, EV and Pollard, C, Trust in Online Auctions: an exploratory study of the link between reputation and exchange relationships of eBay traders, Proceedings of the Thirteenth Australasian Conference on Information Systems, 4-6 December 2002, Melbourne, pp. 1081-1092. ISBN 1 86272 615 9 (2002) [Refereed Conference Paper] | |
Nixon, Paddy and Wade, V and Terzis, S and O'Connell, M and Dobson, S, The Virtues Architecture: A Software Infrastructure for Business-to-Business E-Commerce, Proceedings of the Second International Conference on Enterprise Information Systems (ICEIS 2000), 4-7 July 2000, Stafford, UK, pp. 461-466. ISBN 9789729805011 (2000) [Refereed Conference Paper] |  |
Pedersen, SG and Ellis, L, The Internet As A Conduit For Marketing To Consumers, Fifth Americas Conference on Information Systems (AMCIS 1999), 13-15 August 1999, Milwaukee, Wisconsin, pp. 322-323. (1999) [Refereed Conference Paper] | |