default search action
Brian Cusack
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j3]Brian Cusack, Adekemi Adedokun:
Cloud Disruption Impacts Business IT Role Requirements. J. Comput. Inf. Syst. 62(5): 1061-1071 (2022) - [c31]Brian Cusack, Paula Raymond Lutui:
Smart Agriculture IoT Network Communications Security Improvement. ITNAC 2022: 164-169 - 2021
- [j2]Brian Cusack, Eghbal Ghazizadeh:
Formulating Knowledge-Based Cloud Identity Selection. J. Comput. Inf. Syst. 61(3): 207-218 (2021) - [c30]Raymond Lutui, Brian Cusack:
Data Acquisition from Cloud Network Storage. ITNAC 2021: 1-6 - 2020
- [c29]Eghbal Ghazizadeh, Hanif Deylami, Abid Shahzad, Brian Cusack:
Cloud Surfing: A General Comparison of Cloud Identity Guidelines. AMCIS 2020
2010 – 2019
- 2019
- [c28]Brian Cusack, Eghbal Ghazizadeh:
Defining cloud identity security and privacy issues: A Delphi method. AMCIS 2019 - [c27]Ar Kar Kyaw, Zhuang Tian, Brian Cusack:
Design and Evaluation for Digital Forensic Ready Wireless Medical Systems. HealthyIoT 2019: 118-141 - [c26]Ar Kar Kyaw, Brian Cusack, Raymond Lutui:
Digital Forensic Readiness In Wireless Medical Systems. ITNAC 2019: 1-6 - 2018
- [c25]Brian Cusack, Eghbal Ghazizadeh:
Satisfying Secure Load Balancing Expectations in the Cloud. AMCIS 2018 - [c24]Brian Cusack, Gerard Ward:
Points of Failure in the Ransomware Electronic Business Model. AMCIS 2018 - 2017
- [j1]Nor Aida Mahiddin, Nurul I. Sarkar, Brian Cusack:
An Internet Access Solution: MANET Routing and a Gateway Selection Approach for Disaster Scenarios. Rev. Socionetwork Strateg. 11(1): 47-64 (2017) - 2016
- [c23]Brian Cusack, Eghbal Ghazizadeh:
Analysing Trust Issues in Cloud Identity Environments. ACIS 2016: 50 - [c22]Brian Cusack, Raymond Lutui, Reza Khaleghparast:
Detecting Slow DDos Attacks on Mobile Devices. ACIS 2016: 69 - [c21]Ar Kar Kyaw, Pulin Agrawal, Brian Cusack:
Wi-Pi: a study of WLAN security in Auckland CBD. ACSW 2016: 42 - [c20]Brian Cusack, Eghbal Ghazizadeh:
Formulating Methodology to Build a Trust Framework for Cloud Identity Management. AMCIS 2016 - [c19]Brian Cusack, Zhuang Tian, Ar Kar Kyaw:
Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT. InterIoT/SaSeIoT 2016: 127-138 - [i1]Brian Cusack, Reza Khaleghparast:
Using Design Science to build a Watermark System for Righful Ownership Protection in the Cloud. CoRR abs/1606.02508 (2016) - 2015
- [c18]Brian Cusack, Reza Khaleghparast:
Using Design Science to Build a Watermark System for Cloud Rightful Ownership Protection. ACIS 2015: 148 - [c17]Saide Lo, Brian Cusack:
Project Governance: How Processes Can Be Managed With an Aim to Improve Project Performance. PACIS 2015: 73 - 2014
- [c16]Brian Cusack, Saide Lo:
Project Governance Requirements: a Case Study. ECIS 2014 - [c15]Allan Fowler, Brian Cusack, Alessandro Canossa:
Measuring Learning in Video Games: A Case Study. IE 2014: 3:1-3:7 - 2013
- [c14]Fuad Khan Baloch, Brian Cusack:
On where the Internet is. AMCIS 2013 - [c13]Brian Cusack, Fuad Khan Baloch:
Implications of Internet Governance Issues for the end Users. UKAIS 2013: 6 - 2012
- [c12]Fuad Khan Baloch, Brian Cusack:
A discussion on Internet Governance. CASoN 2012: 1-7 - 2011
- [c11]Fuad Khan Baloch, Brian Cusack:
Exploring the Potential of Dooyeweerd's Aspects and Critical Realism for Evaluating Robustness of Ontology in Information Systems. ACIS 2011 - [c10]Allan Fowler, Brian Cusack:
Kodu game lab: improving the motivation for learning programming concepts. FDG 2011: 238-240 - [c9]Fuad Khan Baloch, Alan T. Litchfield, Brian Cusack:
Arguments for the Adoption of a Heuristic Approach to IS Research. ICIS 2011
2000 – 2009
- 2009
- [c8]Fuad Khan Baloch, Brian Cusack:
Re-visualizing Cyberspace: Using Quasi Objects for Spatial Definitions. ACIS 2009 - [c7]Brian Cusack:
Assessing Business Value of IT and IS Risk: Security Issues. ACIS 2009 - 2007
- [c6]Mathew Nicho, Brian Cusack:
A Metrics Generation Model for Measuring the Control Objectives of Information Systems Audit. HICSS 2007: 235 - [c5]Brian Cusack:
Making Online Work, Work. PACIS 2007: 136 - 2004
- [c4]Brian Cusack:
Enterprise Security Semantics. ACIS 2004 - [c3]Brian Cusack:
Objectives Alignment: Reworking IS Security for eBusiness Enterprises. AMCIS 2004: 557 - 2003
- [c2]Sid Sirisukha, Brian Cusack:
Integrative Approaches To Securing eBusiness Networks. ACIS 2003 - 2002
- [c1]Christoph Dieterich, Brian Cusack, Haiyan Wang, Katja Rateitschak, Antje Krause, Martin Vingron:
Annotating regulatory DNA based on man-mouse genomic comparison. ECCB 2002: 84-90
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-22 21:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint