Journal articles on the topic 'Intranets (Computer networks) Australia'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Intranets (Computer networks) Australia.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Regli, W. "Intranets." IEEE Internet Computing 1, no. 5 (September 1997): 6–7. http://dx.doi.org/10.1109/mic.1997.623962.
Full textLichtenstein, Sharman, Craig M. Parker, and Alexia Hunter. "Dynamic Knowledge Integration in Socio-Technical Networks: An Interpretive Study of Intranet Use for Knowledge Integration." Journal of Information & Knowledge Management 06, no. 02 (June 2007): 91–103. http://dx.doi.org/10.1142/s021964920700172x.
Full textChellappa, Ramnath K., and Alok Gupta. "Managing computing resources in active intranets." International Journal of Network Management 12, no. 2 (2002): 117–28. http://dx.doi.org/10.1002/nem.427.
Full textMcCracken, D. "Review: Intranets: The Surf Within." Computer Bulletin 40, no. 1 (January 1, 1998): 31. http://dx.doi.org/10.1093/combul/40.1.31-a.
Full textAshley, P., M. Vandenwauver, and F. Siebenlist. "Applying authorization to intranets: architectures, issues and APIs." Computer Communications 23, no. 17 (November 2000): 1613–20. http://dx.doi.org/10.1016/s0140-3664(00)00247-4.
Full textPhaltankar, Kaustubh. "Practical Guide for Implementing Secure Intranets and Extranets." EDPACS 27, no. 12 (June 2000): 1–2. http://dx.doi.org/10.1201/1079/43258.27.12.20000601/30345.5.
Full textElmorshidy, Ahmed. "Determinates of Live Support Chat in Organizational Intranets." Journal of Electronic Commerce in Organizations 17, no. 3 (July 2019): 16–34. http://dx.doi.org/10.4018/jeco.2019070102.
Full textWilson, Tom. "Mastering intranets: The windows 95/NT edition." International Journal of Information Management 17, no. 6 (December 1997): 469–70. http://dx.doi.org/10.1016/s0268-4012(97)84382-4.
Full textLamb, Roberta, and Elizabeth Davidson. "Understanding intranets in the context of end-user computing." ACM SIGMIS Database: the DATABASE for Advances in Information Systems 36, no. 1 (February 7, 2005): 64–85. http://dx.doi.org/10.1145/1047070.1047076.
Full textSinickas, Angela D. "The Role of Intranets and Other E-Channels in Employee Communication Preferences." Journal of Website Promotion 1, no. 1 (April 18, 2005): 31–51. http://dx.doi.org/10.1300/j238v01n01_04.
Full textVukatana, Kreshnik, Elira Hoxha, and Kozeta Sevrani. "Knowledge Transfer through Computer-based Systems in Manufacturing Networks: A Study on Albanian Plants." Academic Journal of Interdisciplinary Studies 11, no. 1 (January 3, 2022): 180. http://dx.doi.org/10.36941/ajis-2022-0016.
Full textZhou, Xujuan, Raj Gururajan, Yuefeng Li, Revathi Venkataraman, Xiaohui Tao, Ghazal Bargshady, Prabal D. Barua, and Srinivas Kondalsamy-Chennakesavan. "A survey on text classification and its applications." Web Intelligence 18, no. 3 (September 30, 2020): 205–16. http://dx.doi.org/10.3233/web-200442.
Full textMahmood, Shahid, Moneeb Gohar, Jin-Ghoo Choi, Seok-Joo Koh, Hani Alquhayz, and Murad Khan. "Digital Certificate Verification Scheme for Smart Grid using Fog Computing (FONICA)." Sustainability 13, no. 5 (February 26, 2021): 2549. http://dx.doi.org/10.3390/su13052549.
Full textSeneviratne, Aruna, and Terry Percival. "National ICT Australia (NICTA)." ACM SIGCOMM Computer Communication Review 35, no. 3 (July 2005): 61–64. http://dx.doi.org/10.1145/1070873.1070880.
Full textWang, Rongxia, Zhifang Liu, Shufeng Yang, and Jianxing Wang. "Implementation of Driving Safety Early Warning System Based on Trajectory Prediction on the Internet of Vehicles Environment." Security and Communication Networks 2022 (May 19, 2022): 1–6. http://dx.doi.org/10.1155/2022/2922507.
Full textSlay, J., and B. Turnbull. "Computer Security Education and Research in Australia." IEEE Security & Privacy Magazine 4, no. 5 (September 2006): 60–63. http://dx.doi.org/10.1109/msp.2006.115.
Full textGoodall, Alex. "Railway route planning in Australia." Data Processing 28, no. 3 (April 1986): 136–38. http://dx.doi.org/10.1016/0011-684x(86)90004-3.
Full textPreece, A. "Al in Australia and New Zealand." IEEE Intelligent Systems 19, no. 4 (July 2004): 96. http://dx.doi.org/10.1109/mis.2004.21.
Full textBRAUN, PATRICE. "REGIONAL TOURISM NETWORKS: THE NEXUS BETWEEN ICT DIFFUSION AND CHANGE IN AUSTRALIA." Information Technology & Tourism 6, no. 4 (January 1, 2003): 231–43. http://dx.doi.org/10.3727/1098305032781139.
Full textEt. al., Tarun Dhar Diwan,. "AN INVESTIGATION AND ANALYSIS OF CYBER SECURITY INFORMATION SYSTEMS: LATEST TRENDS AND FUTURE SUGGESTION." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 2 (March 25, 2021): 477–92. http://dx.doi.org/10.17762/itii.v9i2.372.
Full textJajszczyk, A. "Distinguished lecturer tour in Australia." IEEE Communications Magazine 43, no. 1 (January 2005): 2. http://dx.doi.org/10.1109/mcom.2005.1381869.
Full textMcAuley, Elise, Chandana Unnithan, and Sofie Karamzalis. "Implementing Scanned Medical Record Systems in Australia." International Journal of E-Adoption 4, no. 4 (October 2012): 29–54. http://dx.doi.org/10.4018/jea.2012100103.
Full textSinnott, Richard O., Christopher Bayliss, Andrew Bromage, Gerson Galang, Guido Grazioli, Philip Greenwood, Angus Macaulay, et al. "The Australia urban research gateway." Concurrency and Computation: Practice and Experience 27, no. 2 (April 23, 2014): 358–75. http://dx.doi.org/10.1002/cpe.3282.
Full textRein, Tony. "Case studies II — Australia." Computer Law & Security Review 6, no. 6 (March 1991): 33–36. http://dx.doi.org/10.1016/0267-3649(91)90180-4.
Full textKankanamge, Nayomi, Tan Yigitcanlar, and Ashantha Goonetilleke. "Gamifying Community Education for Enhanced Disaster Resilience: An Effectiveness Testing Study from Australia." Future Internet 14, no. 6 (June 9, 2022): 179. http://dx.doi.org/10.3390/fi14060179.
Full textCase, Gary N., Mladen A. Vouk, and John M. Mackenzie. "Real-Time Full Motion Stereo Microscopy Over Internet." Microscopy and Microanalysis 5, S2 (August 1999): 368–69. http://dx.doi.org/10.1017/s1431927600015166.
Full textManwaring, Kayleen. "Network neutrality: Issues for Australia." Computer Law & Security Review 26, no. 6 (November 2010): 630–39. http://dx.doi.org/10.1016/j.clsr.2010.09.004.
Full textHughes, Gordon, Sophie Dawson, and Tim Brookes. "Considering New Privacy Laws in Australia." IEEE Security & Privacy Magazine 6, no. 3 (May 2008): 57–59. http://dx.doi.org/10.1109/msp.2008.60.
Full textGarnett, Stephen T., and Jennifer Haydon. "Mapping Research Capacity in North-Western Tropical Australia." Journal of Information & Knowledge Management 04, no. 03 (September 2005): 141–56. http://dx.doi.org/10.1142/s0219649205001122.
Full textLiu, Yue. "Privacy regulations on biometrics in Australia." Computer Law & Security Review 26, no. 4 (July 2010): 355–67. http://dx.doi.org/10.1016/j.clsr.2010.05.002.
Full textOh, Sangjo, Song Yang, Sherah Kurnia, Heejin Lee, Marisa Maio Mackay, and Kieran O'Doherty. "The characteristics of mobile data service users in Australia." International Journal of Mobile Communications 6, no. 2 (2008): 217. http://dx.doi.org/10.1504/ijmc.2008.016578.
Full textBox, Kiernan, and Greg Aronson. "Protest Songs From Indonesia And Australia: A Musicological Comparison." Journal of Urban Society's Arts 9, no. 1 (December 19, 2022): 48–59. http://dx.doi.org/10.24821/jousa.v9i1.7146.
Full textHILLEY, S. "CTOSE branches out to US and Australia." Information Security Technical Report 9, no. 4 (December 2004): 7. http://dx.doi.org/10.1016/s1363-4127(04)00044-5.
Full textMathews-Hunt, Kate. "CookieConsumer: Tracking online behavioural advertising in Australia." Computer Law & Security Review 32, no. 1 (February 2016): 55–90. http://dx.doi.org/10.1016/j.clsr.2015.12.006.
Full textRolfe, John, Shirley Gregor, and Don Menzies. "Reasons why farmers in Australia adopt the Internet." Electronic Commerce Research and Applications 2, no. 1 (March 2003): 27–41. http://dx.doi.org/10.1016/s1567-4223(03)00004-8.
Full textCathro, Warwick S. "The development of national bibliographic and document access services in Australia." New Review of Information Networking 2, no. 1 (January 1996): 111–19. http://dx.doi.org/10.1080/13614579609516872.
Full textNourmohammadi, Fatemeh, Mohammadhadi Mansourianfar, Sajjad Shafiei, Ziyuan Gu, and Meead Saberi. "An Open GMNS Dataset of a Dynamic Multi-Modal Transportation Network Model of Melbourne, Australia." Data 6, no. 2 (February 19, 2021): 21. http://dx.doi.org/10.3390/data6020021.
Full textMoorhead, Simon. "Marconi Wireless Telegraphy Trialled in Australia." Journal of Telecommunications and the Digital Economy 10, no. 4 (December 28, 2022): 103–11. http://dx.doi.org/10.18080/jtde.v10n4.652.
Full textSun, Ling, and Dali Gao. "Security Attitude Prediction Model of Secret-Related Computer Information System Based on Distributed Parallel Computing Programming." Mathematical Problems in Engineering 2022 (March 25, 2022): 1–13. http://dx.doi.org/10.1155/2022/3141568.
Full textDavey, Bill, and Arthur Tatnall. "Two Computer Systems in Victorian Schools and the Actors and Networks Involved in their Implementation and Use." International Journal of Actor-Network Theory and Technological Innovation 5, no. 3 (July 2013): 37–46. http://dx.doi.org/10.4018/jantti.2013070104.
Full textWaite, Catherine. "Making place with mobile media: Young people’s blurred place-making in regional Australia." Mobile Media & Communication 8, no. 1 (May 31, 2019): 124–41. http://dx.doi.org/10.1177/2050157919843963.
Full textZyngier, Suzanne. "The Role of Technology in Knowledge Management Strategies in Australia: Recent Trends." Journal of Information & Knowledge Management 02, no. 02 (June 2003): 165–78. http://dx.doi.org/10.1142/s0219649203000061.
Full textHooper, Christopher, Ben Martini, and Kim-Kwang Raymond Choo. "Cloud computing and its implications for cybercrime investigations in Australia." Computer Law & Security Review 29, no. 2 (April 2013): 152–63. http://dx.doi.org/10.1016/j.clsr.2013.01.006.
Full textCampbell, J., R. Coutts, A. Martin, and R. Reid. "Observations and Conclusions from a Three Year Digital Radio Field Experiment in Australia." IEEE Journal on Selected Areas in Communications 5, no. 3 (April 1987): 416–26. http://dx.doi.org/10.1109/jsac.1987.1146550.
Full textAbduljabbar, Rusul L., Hussein Dia, and Pei-Wei Tsai. "Unidirectional and Bidirectional LSTM Models for Short-Term Traffic Prediction." Journal of Advanced Transportation 2021 (March 26, 2021): 1–16. http://dx.doi.org/10.1155/2021/5589075.
Full textMackie, Tom. "Proving liability for highly and fully automated vehicle accidents in Australia." Computer Law & Security Review 34, no. 6 (December 2018): 1314–32. http://dx.doi.org/10.1016/j.clsr.2018.09.002.
Full textGharib, Padid Akbarzadeh. "The Determination of User Satisfaction with Personal Internet Banking Services in the Context of Australia." Journal of Electronic Commerce in Organizations 14, no. 3 (July 2016): 57–79. http://dx.doi.org/10.4018/jeco.2016070104.
Full textZhou, Albert Z. "Managing Knowledge Strategically: A Comparison of Managers' Perceptions between the Private and Public Sector in Australia." Journal of Information & Knowledge Management 03, no. 03 (September 2004): 213–22. http://dx.doi.org/10.1142/s0219649204000833.
Full textMartinovic, Marietta. "GPS-EM Sanctions for Serious Sex Offenders: The Application and Outcomes in the United States and Australia." Journal of Technology in Human Services 34, no. 1 (January 2, 2016): 82–101. http://dx.doi.org/10.1080/15228835.2016.1140111.
Full textNaylor, David, and Andrew Jaworski. "Linking your way to liability? – Cooper v. Universal Music Australia Ltd [2006]." Computer Law & Security Review 23, no. 3 (January 2007): 285–89. http://dx.doi.org/10.1016/j.clsr.2007.03.007.
Full text