default search action
Joan Richardson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j12]Ana Hol, Joan Richardson, Margaret Hamilton, Jim McGovern:
Strengthening Undergraduate Information Systems Education in an Increasingly Complex Computing Disciplines Landscape. Commun. Assoc. Inf. Syst. 54: 5 (2024) - [j11]Margaret Hamilton, Ana Hol, Joan Richardson, James McGovern:
Computer Science Undergraduate Programs in Australia. Inroads 15(1): 18-26 (2024) - 2023
- [j10]Ana Hol, Joan Richardson, James McGovern, Margaret Hamilton:
A New Sustainable Model for Aligning Industry Requirements and University Programs. Inroads 14(1): 30-39 (2023) - 2021
- [j9]Tuan Anh Nguyen, Cong Hiep Pham, Martin Dick, Joan Richardson:
Trust Types and Mediating Effect of Consumer Trust in m-payment Adoption: An empirical Examination of Vietnamese Consumers. Australas. J. Inf. Syst. 25 (2021) - 2018
- [j8]Kwok Hung Lau, Tri Khai Lam, Booi Hon Kam, Mathews Nkhoma, Joan Richardson, Susan Thomas:
The role of textbook learning resources in e-learning: A taxonomic study. Comput. Educ. 118: 10-24 (2018) - 2017
- [j7]Cong Hiep Pham, Duy Dang Pham, Linda Brennan, Joan Richardson:
Information Security and People: A Conundrum for Compliance. Australas. J. Inf. Syst. 21 (2017) - 2016
- [j6]Cong Hiep Pham, Jamal El-Den, Joan Richardson:
Stress-based security compliance model - an exploratory study. Inf. Comput. Secur. 24(4): 326-347 (2016) - 2014
- [j5]Usman K. Durrani, Zijad Pita, Joan Richardson, John Lenarcic:
Towards Holistic Traceability Solution: From Systematic Literature Review to Proposed Traceability Model. Int. J. Strateg. Decis. Sci. 5(1): 24-38 (2014) - [j4]Usman Khan Durrani, Zijad Pita, Joan Richardson:
The Tetrad Influences: A Case Study of an Adaptable Software Configuration Management Process. Int. J. Strateg. Decis. Sci. 5(2): 30-42 (2014) - [j3]Usman K. Durrani, Zijad Pita, Joan Richardson:
Coexistence of agile and SCM practices: An exploratory study of Australian agile software development organizations. J. Syst. Inf. Technol. 16(1): 20-39 (2014) - 2013
- [j2]Usman K. Durrani, Joan Richardson, John Lenarcic:
Investigation on Australian Agile Software Development Organizations: An Exploratory Study of Adaptable SCM Process Implementation. J. Comput. 8(7): 1799-1803 (2013) - 2010
- [j1]Joan Richardson, Brian J. Corbitt:
Using Trigger That Instant Messaging to Improve Stakeholder Communications. J. Cases Inf. Technol. 12(4): 1-17 (2010)
Conference and Workshop Papers
- 2018
- [c17]Vince Bruno, Joan Richardson, Jim McGovern:
Names and Faces: a staff dashboard to support student learning engagement. ACIS 2018: 30 - [c16]Joan Richardson, Frada Burstein, Ana Hol, Robert J. Clarke, James McGovern:
Australian Undergraduate Information Systems Curricula: A Comparative Study. ISD (Selected Papers) 2018: 19-34 - [c15]Joan Richardson, Frada Burstein, Ana Hol, Rodney J. Clarke, Jim McGovern:
Australian Undergraduate Information Systems Curricula: a Comparative Study. ISD 2018 - 2016
- [c14]Hiep Cong Pham, Linda Brennan, Joan Richardson:
Stress-Based IS Security Compliance: Towards a Conceptual Model. ACIS 2016: 19 - 2015
- [c13]Cong Hiep Pham, Jamal El-Den, Joan Richardson:
Influence of Security Compliance Demands and Resources on Security Compliance-An Exploratory Study in Vietnam. PACIS 2015: 49 - 2014
- [c12]Usman K. Durrani, Zijad Pita, Joan Richardson, John Lenarcic:
An Empirical Study of Lean and Agile Influences in Software Configuration Management. PACIS 2014: 320 - 2013
- [c11]Usman K. Durrani, Joan Richardson, John Lenarcic, Zijad Pita:
Adaptable Management Systems Implementation for the Governance: A Case Study of Cloud Computing. Bled eConference 2013: 9 - 2012
- [c10]Joan Richardson, Margaret Hamilton, Kathleen Gray, Jenny Waycott, Celia Thompson:
In what ways does policy on academic integrity, copyright and privacy need to respond in order to accommodate assessment with Web 2.0 tools? ACIS 2012 - [c9]Asma Md Ali, Joan Richardson:
Web Interactive Multimedia Technology Implementation: A University Context. UKAIS 2012: 34 - 2011
- [c8]Joan Richardson, Amalia Di Iorio, Paul R. Cerotti, Claire Davison, Asma Md Ali:
Web Reflection: The Design and Implementation of a Reflective Journal Using PebblePad. ACIS 2011 - [c7]Asma Md Ali, Joan Richardson:
Web Interactive Multimedia Technology: State of the Art. ICSECS (3) 2011: 41-53 - 2010
- [c6]Mary Paulette Kelly, Joan Richardson, Brian J. Corbitt, John Lenarcic:
The Impact of Context on the Adoption of Health Informatics in Australia. Bled eConference 2010: 4 - 2009
- [c5]Joan Richardson, John Lenarcic:
SMS - Push First and Then Students Will Pull Administrative Information in Higher Education? ACIS 2009 - 2008
- [c4]John Lenarcic, Joan Richardson:
Polymorphic Innovation through Unintended Consequences. ACIS 2008 - 2007
- [c3]Joan Richardson, John Lenarcic:
Trigger iz gr8 4 Gen Y: Mobile Student Administration via a Text Messaging System. ACIS 2007 - [c2]Joan Richardson, John Lenarcic:
e-Inclusion Through Text Messaging: The Emergence of an Administrative Ecology Within an University Student Population Via The Use of a Mobile Academic Information Delivery System. Bled eConference 2007: 12 - 2003
- [c1]Joan Richardson:
Building an Effective Learning Management System. ICWL 2003: 27-36
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint