Two Approaches to Information Security Doctoral Research
Researchers embarking upon doctoral research in information security face numerous challenges at the commencement of their studies. Students often face confusion as they consider where to start and how to progress. The objectives of the research need to be clearly defined before commencing the proje...
| Main Author: | Armstrong, Helen |
|---|---|
| Other Authors: | Lynn Futcher |
| Format: | Conference Paper |
| Published: |
IFIP TC11.8
2011
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/12497 |
Similar Items
Implications for design-focused professional doctorates of Australian research into professional doctorates
by: Love, Terence
Published: (2003)
by: Love, Terence
Published: (2003)
Research designs and methodological use in Malaysian doctoral research
by: Cameron, Roslyn
Published: (2010)
by: Cameron, Roslyn
Published: (2010)
A soft approach to management of information security.
by: Armstrong, Helen
Published: (1999)
by: Armstrong, Helen
Published: (1999)
Coming to terms with research practice: Riding the emotional rollercoaster of doctoral research studies
by: Morrison Saunders, A., et al.
Published: (2010)
by: Morrison Saunders, A., et al.
Published: (2010)
Mixed method research designs: a case study of their adoption in a doctor of business administration program
by: Miller, P., et al.
Published: (2011)
by: Miller, P., et al.
Published: (2011)
Future directions for behavioral information security research
by: Crossler, R., et al.
Published: (2013)
by: Crossler, R., et al.
Published: (2013)
Uncovering Assumptions in Information Security
by: Armstrong, Helen, et al.
Published: (2005)
by: Armstrong, Helen, et al.
Published: (2005)
A multimodal investigation of Discourse Markers in doctoral supervision sessions: Two case studies
by: Bakeer, Samira
Published: (2020)
by: Bakeer, Samira
Published: (2020)
Reaching today's information security students
by: Armstrong, Helen, et al.
Published: (2009)
by: Armstrong, Helen, et al.
Published: (2009)
Australian dispensing doctors’ prescribing: quantitative and qualitative analysis
by: Lim, Chee, et al.
Published: (2011)
by: Lim, Chee, et al.
Published: (2011)
A Course Applying Network Analysis to Organizational Risk in Information Security
by: Armstrong, Helen, et al.
Published: (2010)
by: Armstrong, Helen, et al.
Published: (2010)
Resubmit my Information Security Thesis? - You must be joking!
by: Armstrong, Helen, et al.
Published: (2007)
by: Armstrong, Helen, et al.
Published: (2007)
Can Hospital-Based Doctors Change Their Working Hours? Evidence from Australia
by: Norman, Richard, et al.
Published: (2014)
by: Norman, Richard, et al.
Published: (2014)
An approach to visualising information security knowledge
by: Armstrong, Colin
Published: (2011)
by: Armstrong, Colin
Published: (2011)
Improving communication between postgraduate researchers and the university library: a case study at De Montfort University Library and Learning Services
by: Petch, Melanie, et al.
Published: (2016)
by: Petch, Melanie, et al.
Published: (2016)
Methodological matters for Singaporean research
by: Cameron, Roslyn
Published: (2010)
by: Cameron, Roslyn
Published: (2010)
The doctoral journey from passion to PhD
by: Bennett, Dawn
Published: (2010)
by: Bennett, Dawn
Published: (2010)
Sticky Advice for Research Students
by: McGann, Sarah, et al.
Published: (2013)
by: McGann, Sarah, et al.
Published: (2013)
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013)
by: Hui, K., et al.
Published: (2013)
Transplanting Tissa: "New Voices" in Trans-Tasman Social Work Research
by: Watts, Lynelle, et al.
Published: (2024)
by: Watts, Lynelle, et al.
Published: (2024)
Security and quality issues in IT projects
by: El Desouki, Hassan, et al.
Published: (2010)
by: El Desouki, Hassan, et al.
Published: (2010)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Changes in medical student and doctor attitudes toward older adults after an intervention: a systematic review
by: Samra, Rajvinder, et al.
Published: (2013)
by: Samra, Rajvinder, et al.
Published: (2013)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
Two level security approaches for secure XML database centric web services against xpath injections
by: Asmawi, Aziah
Published: (2016)
by: Asmawi, Aziah
Published: (2016)
Prescribing practices of Australian dispensing doctors
by: Lim, Chee Kiat (David)
Published: (2010)
by: Lim, Chee Kiat (David)
Published: (2010)
Grunt language versus accent: the perceived communication barriers between international medical graduates and patients in Central Wheatbelt catchments
by: Sommer, J., et al.
Published: (2011)
by: Sommer, J., et al.
Published: (2011)
CNSS Mapping for IA lab exercises
by: Dodge, R., et al.
Published: (2009)
by: Dodge, R., et al.
Published: (2009)
The multi-tiered medical education system and its influence on the health care market - a China’s flexner report
by: Hsieh, Chee-Ruey, et al.
Published: (2019)
by: Hsieh, Chee-Ruey, et al.
Published: (2019)
Mechanisms of change in applied educational psychology
by: Gulliford, Anthea M.
Published: (2022)
by: Gulliford, Anthea M.
Published: (2022)
The multi-tiered medical education system and its influence on the health care market—China’s Flexner Report
by: Hsieh, Chee-Ruey, et al.
Published: (2019)
by: Hsieh, Chee-Ruey, et al.
Published: (2019)
A conceptual framework for information security and privacy
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Peer to peer support: the disappearing work in the doctoral student experience
by: Devenish, Rosemerry, et al.
Published: (2009)
by: Devenish, Rosemerry, et al.
Published: (2009)
The influence of usable security on security culture
by: Fallatah, Wesam
Published: (2025)
by: Fallatah, Wesam
Published: (2025)
Covid-19 changes to maternity care: Experiences of Australian doctors
by: Szabo, R.A., et al.
Published: (2021)
by: Szabo, R.A., et al.
Published: (2021)
An investigation into methods and concepts of qualitative research in information system research.
by: A. Jabar, Marzanah, et al.
Published: (2009)
by: A. Jabar, Marzanah, et al.
Published: (2009)
A conceptual framework for information privacy and security in collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Incident-centered information security: Managing a strategic balance between prevention and response
by: Baskerville, Richard, et al.
Published: (2014)
by: Baskerville, Richard, et al.
Published: (2014)
A taxonomy for information privacy in virtual collaborations
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Virtual Penetration Testing: A Joint Education Exercise across Geographic Borders
by: Armstrong, Helen, et al.
Published: (2013)
by: Armstrong, Helen, et al.
Published: (2013)
Similar Items
-
Implications for design-focused professional doctorates of Australian research into professional doctorates
by: Love, Terence
Published: (2003) -
Research designs and methodological use in Malaysian doctoral research
by: Cameron, Roslyn
Published: (2010) -
A soft approach to management of information security.
by: Armstrong, Helen
Published: (1999) -
Coming to terms with research practice: Riding the emotional rollercoaster of doctoral research studies
by: Morrison Saunders, A., et al.
Published: (2010) -
Mixed method research designs: a case study of their adoption in a doctor of business administration program
by: Miller, P., et al.
Published: (2011)