Rodger Jamieson

Learn More
Executive Summary This paper discusses the use and assessment of three teaching tools (WebCT, Mindtrail, and EVE) in a postgraduate course. Firstly, the postgraduate course is introduced and the reader is provided with an overview of the course, Information Systems Auditing, an explanation of the manner in which the course was delivered, the cohort(More)
Organizations need to protect information assets against cyber crime, denial-of-service attacks, web hackers, data breaches, identity and credit card theft, and fraud. Criminals often try to achieve financial, political, or personal gain through these attacks, so the threats that their actions prompt are insidious motivators for organizations to adopt(More)
This paper develops and validates a theoretical extension of the Technology Acceptance Model (TAM). The extended model aims to predict and explain consumers' intentions to transact with an Internet-based business-to-consumer electronic commerce (B2C EC) system by integrating trust and risk perceptions with TAM. Trust is the foundation of commerce. Its(More)
The advent of electronic commerce (e-commerce) has marked a significant change in the way business now approach the implementation of their sales and marketing strategies. Electronic commerce growth has been accompanied by an increase in fraudulent practices. Researchers have proposed rules-based auditing systems for electronic commerce transactions, but(More)
This paper addresses many important questions. Firstly, what are the main identity fraud perpetrator categories? Secondly, what are the current Information Systems (IS) facilitated attack channels and methods used by identity fraud perpetrators? Thirdly, what are the effects sustained by targeted victim organisations? The major contribution of this paper is(More)