http://research.usc.edu.au/vital/access/manager/Index ${session.getAttribute("locale")} 5 Understanding victim-enabled identity theft http://research.usc.edu.au/vital/access/manager/Repository/usc:23426 Wed 21 Mar 2018 11:06:41 AEST ]]> Evaluating cryptocurrency laundering as a complex socio-technical system: A systematic literature review http://research.usc.edu.au/vital/access/manager/Repository/usc:28744 Wed 21 Aug 2019 15:56:23 AEST ]]> The first 72 hours are critical for hacking victims http://research.usc.edu.au/vital/access/manager/Repository/usc:18655 Wed 15 Nov 2017 11:26:00 AEST ]]> Exploring information security controls using information Fraud episodes: Case study evidence from a large telecommunications firm http://research.usc.edu.au/vital/access/manager/Repository/usc:13980 Wed 05 Jul 2017 14:56:27 AEST ]]> Exploring interpersonal relationships in security information sharing http://research.usc.edu.au/vital/access/manager/Repository/usc:13981 Wed 05 Jul 2017 14:55:54 AEST ]]> Understanding Victim-enabled Identity Theft: Perpetrator and Victim Perspectives http://research.usc.edu.au/vital/access/manager/Repository/usc:26775 Tue 21 Aug 2018 13:48:27 AEST ]]> Revisiting employee fraud: Gender, investigation outcomes and offender motivation http://research.usc.edu.au/vital/access/manager/Repository/usc:18296 Tue 12 Jan 2016 16:26:12 AEST ]]> Breaking bad systems with Human Factors and Ergonomics: Using Work Domain Analysis to identify strategies to disrupt trading in dark net marketplaces http://research.usc.edu.au/vital/access/manager/Repository/usc:30337 Tue 10 Mar 2020 13:29:25 AEST ]]> Designing and Evaluating Two Interventions to Improve Identity Theft Recovery Outcomes http://research.usc.edu.au/vital/access/manager/Repository/usc:23427 Tue 10 Apr 2018 14:34:39 AEST ]]> Using the Event Analysis of Systemic Teamwork (EAST) broken-links approach to understand vulnerabilities to disruption in a darknet market http://research.usc.edu.au/vital/access/manager/Repository/usc:28755 Thu 28 May 2020 09:39:16 AEST ]]> Understanding the effects of compromise and misuse of personal details on older people http://research.usc.edu.au/vital/access/manager/Repository/usc:28452 Thu 27 Jun 2019 10:59:26 AEST ]]> Identity fraud: empowering the individual http://research.usc.edu.au/vital/access/manager/Repository/usc:15379 Thu 27 Jun 2019 10:59:25 AEST ]]> Continuance in online participation following the compromise of older adults’ identity information: a literature review http://research.usc.edu.au/vital/access/manager/Repository/usc:25601 Thu 27 Jun 2019 10:59:23 AEST ]]> It's Dark in There: Using Systems Analysis to Investigate Trust and Engagement in Dark Web Forums http://research.usc.edu.au/vital/access/manager/Repository/usc:16670 Thu 27 Jun 2019 09:28:49 AEST ]]> Money back, not guaranteed: A systems analysis of dark web carder markets http://research.usc.edu.au/vital/access/manager/Repository/usc:16671 Thu 27 Jun 2019 09:28:47 AEST ]]> Taking the bait: A systems analysis of phishing attacks http://research.usc.edu.au/vital/access/manager/Repository/usc:17269 Thu 27 Jun 2019 09:26:03 AEST ]]> Celebrating adversity: Inter-organizational dependence and public sector performance reporting in the Australian Federal Police http://research.usc.edu.au/vital/access/manager/Repository/usc:13976 Thu 16 Nov 2017 15:52:28 AEST ]]> Detecting complex account fraud in the enterprise: The role of technical and non-technical controls http://research.usc.edu.au/vital/access/manager/Repository/usc:13978 Thu 16 Nov 2017 15:51:56 AEST ]]> Death by a thousand facts: Criticising the technocratic approach to information security awareness http://research.usc.edu.au/vital/access/manager/Repository/usc:18300 Thu 16 Nov 2017 14:41:47 AEST ]]> Logic program synthesis in a higher-order setting http://research.usc.edu.au/vital/access/manager/Repository/usc:18401 Thu 14 Jan 2016 14:38:10 AEST ]]> Proving correctness of compiler optimizations by temporal logic http://research.usc.edu.au/vital/access/manager/Repository/usc:18400 Thu 14 Jan 2016 14:31:11 AEST ]]> Developments in Public Sector Performance Measurement: A Project on Producing Return on Investment Metrics for Law Enforcement http://research.usc.edu.au/vital/access/manager/Repository/usc:13979 Thu 06 Jul 2017 10:31:54 AEST ]]> The identity theft response system http://research.usc.edu.au/vital/access/manager/Repository/usc:30866 Mon 30 Mar 2020 13:55:18 AEST ]]> The Dark Side Of The Net: Event Analysis Of Systemic Teamwork (East) Applied To Illicit Trading On A Darknet Market http://research.usc.edu.au/vital/access/manager/Repository/usc:27493 Mon 17 Feb 2020 15:03:37 AEST ]]> Cybercrime and you: When bad things happen to your good name http://research.usc.edu.au/vital/access/manager/Repository/usc:20425 Mon 15 Aug 2016 12:01:10 AEST ]]> The application of scam compliance models to investment fraud offending http://research.usc.edu.au/vital/access/manager/Repository/usc:31226 Mon 11 May 2020 10:44:24 AEST ]]> Loop transformations in the ahead-of-time optimization of Java bytecode http://research.usc.edu.au/vital/access/manager/Repository/usc:18305 Mon 11 Jan 2016 14:18:12 AEST ]]> Universal regular path queries http://research.usc.edu.au/vital/access/manager/Repository/usc:18303 Mon 11 Jan 2016 13:57:11 AEST ]]> Understanding and transforming organizational security culture http://research.usc.edu.au/vital/access/manager/Repository/usc:18301 Mon 11 Jan 2016 13:49:51 AEST ]]> A new institute for a new millennium http://research.usc.edu.au/vital/access/manager/Repository/usc:18299 Mon 11 Jan 2016 13:29:10 AEST ]]> Compilation techniques for high level parallel code http://research.usc.edu.au/vital/access/manager/Repository/usc:18298 Mon 11 Jan 2016 13:22:12 AEST ]]> The role of organizations in identity theft response: The organization-individual victim dynamic http://research.usc.edu.au/vital/access/manager/Repository/usc:18297 Mon 11 Jan 2016 12:33:11 AEST ]]> Guilty before proven innocent: The truth about identity theft customer-organization dynamic http://research.usc.edu.au/vital/access/manager/Repository/usc:16672 Mon 05 Feb 2018 13:21:18 AEST ]]> Beyond virtual and physical borders: Extending the conceptualization of the identity ecosystem http://research.usc.edu.au/vital/access/manager/Repository/usc:17096 Mon 05 Feb 2018 13:20:55 AEST ]]> Program transformations using temporal logic side conditions http://research.usc.edu.au/vital/access/manager/Repository/usc:18304 Fri 29 May 2020 16:11:48 AEST ]]> Beyond new public management: does performance measurement drive public value in networks? http://research.usc.edu.au/vital/access/manager/Repository/usc:13977 Fri 24 Apr 2015 11:18:38 AEST ]]> Identity fraud in Australia: implications for higher sector integrity http://research.usc.edu.au/vital/access/manager/Repository/usc:18946 Fri 18 Mar 2016 13:07:46 AEST ]]> New Challenges for Performing Management: Exploratory Evidence On Organisational Responses to Identity Fraud http://research.usc.edu.au/vital/access/manager/Repository/usc:18944 Fri 18 Mar 2016 12:46:47 AEST ]]> Organisations, Control Systems and Fraud http://research.usc.edu.au/vital/access/manager/Repository/usc:18943 Fri 18 Mar 2016 12:04:46 AEST ]]> Identity management in disaster response environments: a child exploitation mitigation perspective http://research.usc.edu.au/vital/access/manager/Repository/usc:26932 Fri 14 Sep 2018 08:46:24 AEST ]]> Compiler optimization correctness by temporal logic http://research.usc.edu.au/vital/access/manager/Repository/usc:18302 Fri 08 Apr 2016 08:35:01 AEST ]]> Social embeddedness and sharing security information: Bridging the cost benefit gap http://research.usc.edu.au/vital/access/manager/Repository/usc:13982 Fri 08 Apr 2016 08:10:17 AEST ]]>