Learn More
This paper presents a theoretical extension of the Technology Acceptance Model (TAM). The extended model aims to predict and explain consumers' intentions to transact with an Internet-based business-to-consumer electronic commerce (B2C EC) system by integrating trust and risk perceptions with TAM. The proposed model (TRiTAM) was validated using data(More)
Executive Summary This paper discusses the use and assessment of three teaching tools (WebCT, Mindtrail, and EVE) in a postgraduate course. Firstly, the postgraduate course is introduced and the reader is provided with an overview of the course, Information Systems Auditing, an explanation of the manner in which the course was delivered, the cohort(More)
This paper addresses three main areas and develops a conceptual framework for identity fraud profiling. First, we identify the main contemporary profiling methods that are crime and/or business based. Second, accepting the current information systems (IS) facilitated attack channels and methods used by identity crime perpetrators (Jamieson & Stephens &(More)
Organizations need to protect information assets against cyber crime, denial-of-service attacks, web hackers, data breaches, identity and credit card theft, and fraud. Criminals often try to achieve financial, political, or personal gain through these attacks, so the threats that their actions prompt are insidious motivators for organizations to adopt(More)
CONTEXT Community-based first aid training is the collaborative development of locally relevant emergency response training. The Sachigo Lake Wilderness Emergency Response Education Initiative was developed, delivered, and evaluated through two intensive 5-day first aid courses. Sachigo Lake First Nation is a remote Aboriginal community of 450 people in(More)