当前位置: X-MOL首页全球导师 海外导师 › Cook, David

研究领域

Counter Terrorism Anti Terrorism Money Laundering Information Security CPTED Radicalisation and Governance in Indonesia

近期论文

查看导师新发文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

Cook, D., (2011), E-governance of the Forest: Management by Multivalence. Common Property Resource Management: A Focus on Forestry, 177 - 203, New Delhi, India. Cook, D., Waugh, B., Abdipanah, M., Hashemi, O., Abdul Rahman, S., (2014), Twitter Deception and Influence: Issues of Identity, Slacktivism, and Puppetry. Journal of Information Warfare, 13(1), 58 - 71, Mindsystems 243 Bridge Road, Richmond VIC 3121 AU. Cook, D., Smith, T., (2011), The Battle for Money Transfers: The allure of PayPal and Western Union over Familial remittance networks. The Journal of Information Warfare, 10(1), 18 - 35, Edith Cowan University, Western Australia. Cook, D., Apoorv Kumar, ., Satiah, C., (2015), Loyalty cards and the problem of CAPTCHA: 2nd Tier security and usability issues for senior citizens. The Proceedings of 13th Australian Information Security Management Conference, 101 - 111, Perth, WA. Cook, D., (2015), Birds of a feather deceive together: The chicanery of multiplied metadata. Journal of Information Warfare, 85-96, Richmond, Victoria. Cook, D., (2014), Identity Multipliers and the Mistaken Twittering of Birds of a Feather. Proceedings of the 13th European Conference on Cyber Warfare and Security, 42 - 48, Reading, UK. Waugh, B., Abdipanah, M., Hashemi, O., Abdul Rahman, S., Cook, D., (2013), The influence and deception of Twitter: the authenticity of the narrative and slacktivism in the Australian electoral process. The Proceedings of the 14th Australian Information Warfare Conference, 28 - 38, Edith Cowan University, Joondalup. Blanquart, G., Cook, D., (2013), Twitter Influence and Cumulative Perceptions of Extremist Support: A Case Study of Geert Wilders. The Proceedings of the 4th Australian Counter Terrorism Conference, 1 - 11, Perth, Western Australia. Smith, T., Cook, D., (2012), Regulations for Retail Remittances: Compliance Entropy in Store-Front Transfers. e-Proceedings of the 5th International Conference on Financial Criminology (ICFC) 2013, 10-23, Universiti Teknologi Mara, Shah Alam Malaysia. Letch, J., McGlinn, E., Bell, J., Downing, E., Cook, D., (2011), An Exploration of 1st and 2nd Generation CPTED for End of Year School Leavers at Rottnest Island. Proceedings of The 4th Australian Security and Intelligence Conference, 38 - 48, Perth, Western Australia . Cook, D., Smith, T., (2011), Finance, Fear and Family: Issues of Trust and the Common Ground with Terrorist Funding. Proceedings of The 2nd Australian Counter Terrorism Conference, 1 - 11, Perth, Western Australia. Cook, D., Szewczyk, P., Sansurooah, K., (2011), Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users. Proceedings of the 2nd International Cyber Resilience Conference, 20 - 28, Perth, Western Australia. Cook, D., Szewczyk, P., Sansurooah, K., (2011), Seniors Language Paradigms: 21st Century Jargon and the Impact on Computer Security and Financial Transactions for Senior Citizens. Proceedings of the 9th Australian Information Security Management Conference, 63-68, Perth, Western Australia .

推荐链接
down
wechat
bug