Rodger Jamieson

Learn More
Organizations need to protect information assets against cyber crime, denial-of-service attacks, web hackers, data breaches, identity and credit card theft, and fraud. Criminals often try to achieve financial, political, or personal gain through these attacks, so the threats that their actions prompt are insidious motivators for organizations to adopt(More)
This paper develops and validates a theoretical extension of the Technology Acceptance Model (TAM). The extended model aims to predict and explain consumers' intentions to transact with an Internet-based business-to-consumer electronic commerce (B2C EC) system by integrating trust and risk perceptions with TAM. Trust is the foundation of commerce. Its(More)
The advent of electronic commerce (e-commerce) has marked a significant change in the way business now approach the implementation of their sales and marketing strategies. Electronic commerce growth has been accompanied by an increase in fraudulent practices. Researchers have proposed rules-based auditing systems for electronic commerce transactions, but(More)
This paper addresses three main areas and develops a conceptual framework for identity fraud profiling. First, we identify the main contemporary profiling methods that are crime and/or business based. Second, accepting the current information systems (IS) facilitated attack channels and methods used by identity crime perpetrators (Jamieson & Stephens &(More)