default search action
Stephen Smith 0001
Person information
- affiliation: Macquarie University, Department of Computing, Sydney, Australia
- affiliation (former): University of New South Wales, Sydney, Australia
Other persons with the same name
- Stephen Smith — disambiguation page
- Stephen Smith 0002 — Los Alamos National Laboratory, Los Alamos, NM, USA
- Stephen Smith 0003 — Central Queensland University, School of Mathematics and Decision Sciences, Rockhampton, Australia
Other persons with a similar name
- Brian Stephen Smith
- Stephen A. Smith
- Stephen E. Smith
- Stephen F. Smith — Carnegie Mellon University, Robotics Institute, Pittsburgh, PA, USA
- Stephen J. Smith
- Stephen P. Smith
- Stephen L. Smith 0001 — University of Waterloo, Canada (and 1 more)
- Stephen M. Smith 0001 (aka: Steve M. Smith 0001) — University of Oxford, UK
- Stephen L. Smith 0002 (aka: Stephen Leslie Smith) — University of York, UK
- Stephen C. Warren-Smith
- show all similar names
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c57]Andrew Edwards, Stephen Smith, Peter Busch:
Predictive Tools for House Fire Instance Preparation. AMCIS 2024 - 2023
- [c56]Connor Stead, Stephen Smith, Peter Busch, Savanid Vatanasakdakul:
Abstract Sentence Classification Acceptance. ACIS 2023 - 2022
- [c55]Hijab Alavi, Stephen Smith, Peter Busch:
IT Education vs. Employability Mismatch. ACIS 2022: 8 - [c54]Andrew Edwards, Stephen Smith, Peter Busch, Donald Winchester:
Predictive Technologies for Strategic House Fire Management. ACIS 2022: 10 - [c53]Hassan Hessari, Peter Busch, Stephen Smith:
Supportive leadership and co-worker support for nomophobia reduction: Considering affective commitment and HRM practices. ACIS 2022: 18 - [c52]Yuk Tung Tonnie Lam, Peter Busch, Stephen Smith:
Australia's Embrace of a Cashless Society: A Quantitative Analysis. ACIS 2022: 24 - [c51]Yvonne Bachiller, Peter Busch, Stephen Smith:
Innovation through process automation: Factors for success. ACIS 2022: 33 - [c50]Haibin Wu, Deborah Bunker, Stephen Smith:
Digital Innovation: A Comparison of Government CovidApps in Australia and China. ACIS 2022: 64 - 2021
- [c49]Hijab Alavi, Stephen Smith, Peter Busch, Matthew Mansour:
Australian Undergraduate IT Curricula: Employer Perspectives. ACIS 2021: 35 - [c48]Connor Stead, Stephen Smith, Peter Busch, Savanid Vatanasakdakul:
Intention to Use Abstract Sentence Classification Technology. ACIS 2021: 83 - [c47]Hijab Alavi, Stephen Smith, Peter Busch, Donald Winchester:
Empiricism through Activity Theory: Australian Undergraduate ICT Education. ICIS 2021 - [c46]Saad Sajid Hashmi, Nazar Waheed, Gioacchino Tangari, Muhammad Ikram, Stephen Smith:
Longitudinal Compliance Analysis of Android Applications with Privacy Policies. MobiQuitous 2021: 280-305 - [i3]Saad Sajid Hashmi, Nazar Waheed, Gioacchino Tangari, Muhammad Ikram, Stephen Smith:
Longitudinal Compliance Analysis of AndroidApplications with Privacy Policies. CoRR abs/2106.10035 (2021) - 2020
- [c45]Connor Stead, Stephen Smith, Peter Busch, Savanid Vatanasakdakul:
Thirty Years of ACIS Proceedings: An Archival Analysis. ACIS 2020: 19 - [c44]Yuk Tung Tonnie Lam, Peter Busch, Stephen Smith:
Australia's Embrace of a Cashless Society. ACIS 2020: 70 - [c43]Connor Stead, Stephen Smith, Peter Busch, Savanid Vatanasakdakul, Vincent Pang:
An Activity Theory Investigation of Academic Abstract Sentence Classification. PACIS 2020: 37 - [c42]Andrew Edwards, Stephen Smith, Peter Busch, Donald Winchester, Felix T. C. Tan, Vincent Pang:
Critical Learning from Fires: An Investigation of Complexity in IS-enabled Emergency Management. PACIS 2020: 99 - [c41]Connor Stead, Stephen Smith, Peter Busch, Savanid Vatanasakdakul:
Towards an Academic Abstract Sentence Classification System. RCIS 2020: 562-568
2010 – 2019
- 2019
- [c40]Haibin Wu, Deborah Bunker, Stephen Smith:
Information Systems for Disaster Management: The Impact of National Context. ACIS 2019: 47 - [c39]Connor Stead, Stephen Smith, Peter Busch, Savanid Vatanasakdakul:
Emerald 110k: A Multidisciplinary Dataset for Abstract Sentence Classification. ALTA 2019: 120-125 - [c38]Saad Sajid Hashmi, Muhammad Ikram, Stephen Smith:
On optimization of ad-blocking lists for mobile devices. MobiQuitous 2019: 220-227 - [c37]Andrew Edwards, Stephen Smith, Peter Busch, Vincent Pang, Donald Winchester:
IS Mediation of Emergency Management: Adding Prediction to the existing Framework of Activities? PACIS 2019: 52 - 2018
- [c36]Hasan J. Alyamani, Annika Hinze, Stephen Smith, Manolya Kavakli:
Preference Feedback for Driving in an Unfamiliar Traffic Regulation. ASSRI 2018: 35-49 - [i2]Ahmed D. Alharthi, Peter Busch, Stephen Smith:
A prototypical Skin Cancer Information System. CoRR abs/1808.04980 (2018) - 2017
- [j4]Helen Hasan, Stephen Smith, Patrick Finnegan:
An activity theoretic analysis of the mediating role of information systems in tackling climate change adaptation. Inf. Syst. J. 27(3): 271-308 (2017) - [c35]Andrew Edwards, Stephen Smith, Vincent Pang:
Towards development of a predictive model for structure fire - a review of the literature. AMCIS 2017 - [c34]Ali Rafiei, Mehran Abolhasan, Daniel Robert Franklin, Farzad Safaei, Stephen Smith, Wei Ni:
Cooperative recovery of coverage holes in WSNs via disjoint spanning trees. ICSPCS 2017: 1-10 - [c33]Ali Rafiei, Mehran Abolhasan, Daniel Robert Franklin, Farzad Safaei, Stephen Smith, Wei Ni:
Effect of the number of participating nodes on recovery of WSN coverage holes. ITNAC 2017: 1-8 - [c32]Serene Lin-Stephens, Stephen Smith, Debbie Richards, Vincent Pang, John Uesi, James Athanasou:
Students and Employers Don't See Eye to Eye: The Case of Information Systems, Information Technology and Engineering. PACIS 2017: 120 - [c31]Andrew Edwards, Stephen Smith, Vincent Pang:
A Data Driven Approach to Reducing the Risk and Impact of Structure Fires. PACIS 2017: 145 - 2016
- [c30]Stephen Smith, Vincent Pang, Kurt Liu, Manolya Kavakli-Thorne, Andrew Edwards, Mehmet A. Orgun, Richard Host:
Adoption of Data-Driven Decision Making in Fire Emergency Management. ECIS 2016: Research Paper 116 - [c29]Serene Lin-Stephens, Stephen Smith, Marianne Peso, Vincent Pang:
The Career Information Literacy Learning Framework: a Case Study of Information Systems, Information Technology and Engineering Capstone Units of an Australian University. PACIS 2016: 52 - [i1]Sarah Van Der Meer, Stephen Smith, Vincent Pang:
The Use of ICT to preserve Australian Indigenous Culture and Language - a Preliminary Proposal using the Activity Theory Framework. CoRR abs/1606.01436 (2016) - 2015
- [c28]Sarah Van Der Meer, Stephen Smith, Vincent Pang:
The Use of ICT to preserve Australian Indigenous Culture and Language - a Preliminarily Proposal Using the Activity Theory Framework. ACIS 2015: 129 - [c27]Sandhya Krishnan, Barath Kumar Balu, Stephen Smith, Vincent Pang:
The Development of Theoretical Framework for In-App Purchasing for the Gaming Industry. PACIS 2015: 30 - 2014
- [c26]Shaun Ngoh, Savanid Vatanasakdakul, Stephen Smith:
Smart Statements - An Analysis of Organizational Green Statements. AMCIS 2014 - [c25]Aaron Gibby, Stephen Smith, Vincent Pang, Christine Van Toorn:
The Impact of Web 2.0 (Gov 2.0) and Social Media Technologies on engagement in Local Government. PACIS 2014: 120 - [c24]Asif Gill, Stephen Smith, Ghassan Beydoun, Vijayan Sugumaran:
Agile Enterprise Architecture: a Case of a Cloud Technology-Enabled Government Enterprise Transformation. PACIS 2014: 121 - [c23]Shaun Ngoh, Savanid Vatanasakdakul, Stephen Smith:
Sustainable Symmetry: a Comparison of Institutional Green Statements. PACIS 2014: 322 - 2013
- [c22]Ahmed D. Alharthi, Peter Busch, Stephen Smith:
A prototypical Skin Cancer Information System. ACIS 2013: 91 - [c21]Ali Rafiei, Yashar Maali, Mehran Abolhasan, Daniel Robert Franklin, Stephen Smith:
An iteratively tuned fuzzy logic movement model in WSN using particle swarm optimization. ICSPCS 2013: 1-7 - [c20]Stephen Smith, Asif Qumer Gill, Helen Hasan, Shahla Ghobadi:
An Enterprise Architecture Driven Approach to Virtualisation. PACIS 2013: 50 - [c19]Lesley Land, Stephen Smith, Vincent Pang:
Building a Taxonomy for Cybercrimes. PACIS 2013: 109 - [c18]Ali Rafiei, Yashar Maali, Mehran Abolhasan, Daniel Robert Franklin, Farzad Safaei, Stephen Smith:
A Tuned Fuzzy Logic Relocation Model in WSNs Using Particle Swarm Optimization. VTC Fall 2013: 1-5 - 2012
- [j3]Manning Li, Deborah Richards, Stephen Smith, Yang Xu:
An Online Advisory System to Empower Victims of Domestic Violence. Commun. Assoc. Inf. Syst. 30: 3 (2012) - [c17]Helen Hasan, Stephen Smith:
Increasing Demands On Information Systems And Infrastructures For Complex Decision-Making. PACIS 2012: 82 - 2011
- [c16]Stephen Smith, Donald Winchester, Helen Hasan, Patrick Finnegan:
IS for Government Climate Change Adaptation Activities: An Exploratory Case Study. ACIS 2011 - [c15]Shahla Ghobadi, Stephen Smith:
The Employment Of Online Communities Of Practice For Manifesting Feminist Behaviors Among Eastern Women. PACIS 2011: 66 - 2010
- [j2]Stephen Smith, Donald Winchester, Deborah Bunker, Rodger Jamieson:
Circuits of Power: A Study of Mandated Compliance to an Information Systems Security De Jure Standard in a Government Organization. MIS Q. 34(3): 463-486 (2010)
2000 – 2009
- 2009
- [c14]Rodger Jamieson, Lesley Pek Wee Land, Stephen Smith, Greg Stephens, Donald Winchester:
Information Security in an Identity Management Lifecycle: Mitigating Identity Crimes. AMCIS 2009: 686 - [c13]Deborah Bunker, Stephen Smith:
Disaster Management and Community Warning Systems: Inter-Organisational Collaboration and ICT Innovation. PACIS 2009: 36 - [c12]Stephen Smith, Rodger Jamieson, Hung Nguyen, Donald Winchester:
Information Systems Security Compliance in E-Government. PACIS 2009: 77 - [c11]Rodger Jamieson, Lesley Land, Stephen Smith, Greg Stephens, Donald Winchester:
Critical Infrastructure Infomation Security: Impacts of Identity and Related Crimes. PACIS 2009: 78 - 2008
- [c10]Stephen Smith, Rodger Jamieson, Deborah Bunker, Donald Winchester:
Moving Towards Information System Security Accreditation within Australian State Government Agencies. AMCIS 2008: 46 - [c9]Rodger Jamieson, Donald Winchester, Greg Stephens, Stephen Smith:
Developing a Conceptual Framework for Identity Fraud Profiling. ECIS 2008: 1418-1429 - [c8]Shabareesh Ajitkumar, Deborah Bunker, Stephen Smith, Donald Winchester:
A Study of the Risks in an Information System Outsourcing Partnership. Open IT-Based Innovation 2008: 403-422 - 2007
- [c7]Vincent Pang, Deborah Bunker, Stephen Smith:
The Influence of Industry Culture on an Inter-Organisational Information System Adoption Process. ACIS 2007 - [c6]Stephen Smith, Rodger Jamieson, Donald Winchester:
An Action Research Program to Improve Information Systems Security Compliance across Government Agencies. HICSS 2007: 99 - [c5]Rodger Jamieson, Donald Winchester, Stephen Smith:
Development of a Conceptual Framework for Managing Identity Fraud. HICSS 2007: 157 - 2006
- [j1]Stephen Smith, Rodger Jamieson:
Determining Key Factors in E-Government Information System Security. Inf. Syst. Manag. 23(2): 23-32 (2006) - [c4]Stephen Smith, Deborah Bunker, Vincent Pang:
Does Agency Size Affect IS Security Compliance for e-Government? PACIS 2006: 47 - [c3]Margaret Chan, Vincent Pang, Deborah Bunker, Stephen Smith:
What Do We Mean by E-Procurement? - A Private Hospital Perspective in Australia. PACIS 2006: 72 - 2005
- [c2]Rodger Jamieson, Stephen Smith:
Key Factors in E-Government Information System Security. Bled eConference 2005: 32 - 2003
- [c1]Stephen Smith, Rodger Jamieson:
Key Drivers and Inhibitors for Information System Security within E-Government. ACIS 2003
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-01 00:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint