Limit search to available items
Add Marked to Bag Add All On Page Add Marked to My Lists
Authors (Last name first) (1-19 of 19)
Deakin University. School of Information Systems
1
Book
2009

Community of practice and the wider organisation : a multi-faceted KM framework


Koeglreiter, Gerlinde

[Place of publication not identified] : [publisher not identified], 2009

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  658.4038 Koe/Cop  AVAILABLE
2
Book
2006

The effectiveness of graphical authentication : an exploratory study


Pierce, Justin D

[Place of publication not identified] : [publisher not identified], 2006

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  005.8 Pie/Eog  AVAILABLE
3
Book
2007

Establishing information security culture in Australian small and medium enterprises


Dojkovski, Sneza

[Place of publication not identified] : [publisher not identified], 2007

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  658.4720994 Doj/Eis  AVAILABLE
4
Book
2004

Exploring the influences on requirements engineering during global software development


Hanisch, Josephine Shepherd

[Place of publication not identified] : [publisher not identified], 2004

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  005.1068 Han/Eti  AVAILABLE
5
Book
2008

Exploring the sociotechnical systems perspectives in global software development


Crofts, Merete

[Place of publication not identified] : [publisher not identified], 2008

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  005.1068 Cro/Ets  AVAILABLE
6
Book
2005

Factors influencing acceptance, use, continued use of electronic services system


Sandhu, Kamaljeet

[Place of publication not identified] : [publisher not identified], 2005

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  004.019 San/Fiu  AVAILABLE
7
Book
2009

Formalising a method for modelling critical infrastructure systems


Pye, Graeme

[Place of publication not identified] : [publisher not identified], 2009

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  363.6015118 Pye/Fam  AVAILABLE
8
Book
2009

A framework for assessing certification schemes for IT security professionals


Tate, Nicholas J. A

[Place of publication not identified] : [publisher not identified], 2009

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  005.8 Tat/Ffa  AVAILABLE
9
Book
2010

A hermeneutic phenomenological investigation of business and IT alignment


Lukaitis, Stasys

[Place of publication not identified] : [publisher not identified], 2010

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  658.05 Luk/Hpi  AVAILABLE
10
Book
2004

An investigation of the interaction between risk types in the outsourcing of the information technology function


Tho, Lye Ian

[Place of publication not identified] : [publisher not identified], 2004

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  658.40380684 Tho/Iot  AVAILABLE
12
Book
2006

Knowledge transfer in enterprise IT support provision using web-based self-service


Cooper, Vanessa A

[Place of publication not identified] : [publisher not identified], 2006

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  658.812 Coo/Kti  AVAILABLE
13
Book
2005

The meaning of information : a study of Western constructions of Asian-ness in film


Inthanond, Saranond

[Place of publication not identified] : [publisher not identified], 2005

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  303.4833 Int/Moi  AVAILABLE
14
Book
2003

New educational service products : tertiary EC/EB education - the Asia-Pacific region


Chan, Elsie Siu King

[Place of publication not identified] : [publisher not identified], 2003

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  658.05460711 Cha/Nes  AVAILABLE
15
Book
2003

Phenomenological inquiry into the experience of web project managers


Sarkar, Pradipta K

[Place of publication not identified] : [publisher not identified], 2003

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  006.76 Sar/Pii  AVAILABLE
16
Book
2007

Phenomenological investigation of e-value chains from Australian music stakeholders perceptions


Moloney, Belinda J

[Place of publication not identified] : [publisher not identified], 2007

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  780.2854678 Mol/Pio  AVAILABLE
 WATERFT ART&ARCH  780.2854678 Mol/Pio  LIB USE ONLY
17
Book
2005

Power and politics in a system implementation


Peszynski, Konrad Janusz

[Place of publication not identified] : [publisher not identified], 2005

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  658.403811 Pes/Pap  AVAILABLE
18
Book
2005

Protecting the Australian homeland : conference proceedings of [the] 6th Australian Information Warfare & Security Conference, Geelong, November 24-25th, 2005.


Australian Information Warfare & Security Conference (6th : 2005 : Geelong, Vic,)

Geelong, Vic. : Deakin University, School of Information Systems, 2005

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  363.35 Aiw/Asc 2005  AVAILABLE
19
 
Location Call no. Vol. Availability
 MELB  005.8 Aat/Iis 2010  AVAILABLE
Add Marked to Bag Add All On Page
Locate in results