


default search action
Lech J. Janczewski
Person information
- affiliation: Dept. of Information Systems & Operations Management, University of Auckland, Auckland, New Zealand
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j7]Farzan Kolini, Lech J. Janczewski:
Exploring Incentives and Challenges for Cybersecurity Intelligence Sharing (CIS) across Organizations: A Systematic Review. Commun. Assoc. Inf. Syst. 50: 2 (2022) - [c34]Shohil Kishore, David Sundaram, Lech J. Janczewski, K. Dharini Amitha Peiris:
Vulnerable Groups Online: Understanding Engagement with Facebook, Instagram and Snapchat. AMCIS 2022 - 2021
- [c33]Gerard Ward
, Lech J. Janczewski:
Using Knowledge Synthesis to Identify Multi-dimensional Risk Factors in IoT Assets. ACeS 2021: 176-197 - 2020
- [c32]Saravanan Thangavelu, Lech J. Janczewski, Gabrielle Peko, David Sundaram:
Commercial Drones: Peeping Tom or Precision Operator? A Governance, Risk and Compliance Framework for a Secure Drone Eco-system. AMCIS 2020
2010 – 2019
- 2019
- [j6]Adnan Ahmad
, Brian Whitworth, Furkh Zeshan
, Lech J. Janczewski, Munwar Ali, Muhammad Hasanain Chaudary, Robert S. Friedman:
A relation-aware multiparty access control. J. Intell. Fuzzy Syst. 37(1): 227-239 (2019) - [c31]Khairulliza Ahmad Salleh
, Lech J. Janczewski:
Security Considerations in Big Data Solutions Adoption: Lessons from a Case Study on a Banking Institution. CENTERIS/ProjMAN/HCist 2019: 168-176 - 2018
- [c30]Khairulliza Ahmad Salleh, Lech J. Janczewski:
An Implementation of Sec-TOE Framework: Identifying Security Determinants of Big Data Solutions Adoption. PACIS 2018: 211 - [e2]Lech Jan Janczewski, Miroslaw Kutylowski:
ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings. IFIP Advances in Information and Communication Technology 529, Springer 2018, ISBN 978-3-319-99827-5 [contents] - 2017
- [j5]Koteswara Ivaturi, Cecil Chua
, Lech J. Janczewski
:
Impact of Information Seeking and Warning Frames on Online Deception: A Quasi-Experiment. J. Comput. Inf. Syst. 57(2): 139-147 (2017) - [c29]Lech J. Janczewski, Morris Ruoyu Miao:
Regulatory Environment of Cloud Computing in New Zealand. CONF-IRM 2017: 27 - [c28]Farzan Kolini, Lech J. Janczewski:
Clustering and Topic Modelling: A New Approach for Analysis of National Cyber security Strategies. PACIS 2017: 126 - 2016
- [c27]Khairulliza Ahmad Salleh
, Lech J. Janczewski
:
Technological, Organizational and Environmental Security and Privacy Issues of Big Data: A Literature Review. CENTERIS/ProjMAN/HCist 2016: 19-28 - [c26]Khairulliza Ahmad Salleh, Lech J. Janczewski:
Adoption of Big Data Solutions: A study on its security determinants using Sec-TOE Framework. CONF-IRM 2016: 66 - [c25]Andrea Herrera, Lech J. Janczewski
:
Cloud Supply Chain Resilience Model: Development and Validation. HICSS 2016: 3938-3947 - 2015
- [c24]Farzan Kolini, Lech J. Janczewski:
Cyber Defense Capability Model: A Foundation Taxonomy. CONF-IRM 2015: 32 - [c23]Ruilin Zhu, Lech J. Janczewski:
Typology of information systems security research: A methodological perspective. InfoSec 2015: 93-98 - [c22]Ruilin Zhu, Lech J. Janczewski:
A Proposed Framework for Examining Information Systems Security Research. ISD 2015 - [c21]Andrea Herrera, Lech J. Janczewski
:
Cloud supply chain resilience. ISSA 2015: 1-9 - [c20]Khairulliza Ahmad Salleh, Lech J. Janczewski, Fernando Beltrán:
SEC-TOE Framework: Exploring Security Determinants in Big Data Solutions Adoption. PACIS 2015: 203 - 2014
- [c19]Koteswara Ivaturi, Lech J. Janczewski, Cecil Chua:
Effect of Frame of Mind on Users' Deception Detection Attitudes and Behaviours. CONF-IRM 2014: 21 - 2013
- [c18]Andrea Herrera, Lech J. Janczewski:
Modelling Organizational Resilience in the Cloud. PACIS 2013: 275 - [e1]Lech J. Janczewski, Henry B. Wolfe, Sujeet Shenoi:
Security and Privacy Protection in Information Processing Systems - 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings. IFIP Advances in Information and Communication Technology 405, Springer 2013, ISBN 978-3-642-39217-7 [contents] - 2012
- [c17]Andrew M. Colarik, Lech J. Janczewski:
A Discussion on Life Systems Security and the Systems Approach. CONF-IRM 2012: 56 - [c16]Adnan Ahmad, Brian Whitworth, Lech J. Janczewski:
Dynamic Rights Reallocation In Social Networks. HAISA 2012: 185-194 - [c15]Koteswara Ivaturi, Lech J. Janczewski:
A Typology Of Social Engineering Attacks - An Information Science Perspective. PACIS 2012: 145 - [c14]Koteswara Ivaturi, Lech J. Janczewski:
Effects Of Information Seeking Modes On Users' Online Social Engineering Vulnerabilities. PACIS 2012: 188 - [c13]Adnan Ahmad
, Brian Whitworth, Lech J. Janczewski
:
More Choices, More Control: Extending Access Control by Meta-rights Reallocation. TrustCom 2012: 1113-1118 - 2011
- [c12]Rizwan Ahmad, Lech J. Janczewski:
Governance Life Cycle Framework for Managing Security in Public Cloud: From User Perspective. IEEE CLOUD 2011: 372-379 - [c11]Andrew M. Colarik, Lech J. Janczewski
:
Developing a grand strategy for Cyber War. IAS 2011: 52-57 - 2010
- [c10]Lech J. Janczewski, Lingyan (René) Fu:
Social Engineering-Based Attacks-Model and New Zealand Perspective. IMCSIT 2010: 847-853
2000 – 2009
- 2007
- [c9]Andrew M. Colarik, Jairo A. Gutiérrez, Lech J. Janczewski:
Securing Data Transfers: An Integrity Algorithm for Error Recovery Triangulation. PACIS 2007: 44 - 2006
- [c8]Lech J. Janczewski, Vladimir Petranovic:
Review of the PKI status in New Zealand. PACIS 2006: 69 - 2005
- [c7]Lech J. Janczewski, Victor Portougal:
Assignment of Security Clearances in an Organization. SEC 2005: 51-64 - 2004
- [c6]Andrew M. Colarik, Clark D. Thomborson, Lech J. Janczewski
:
Update/Patch Management Systems: A Protocol Taxonomy with Security Implications. International Information Security Workshops 2004: 67-80 - 2003
- [c5]Lech J. Janczewski, Andrew M. Colarik:
World Framework for Security Benchmark Changes. SEC 2003: 397-400 - 2002
- [j4]Lech J. Janczewski
, Frank Xinli Shi:
Development of Information Security Baselines for Healthcare Information Systems in New Zealand. Comput. Secur. 21(2): 172-192 (2002) - 2001
- [j3]Lech J. Janczewski:
Handling Distributed Denial-of-Service Attacks. Inf. Secur. Tech. Rep. 6(3): 37-44 (2001) - 2000
- [j2]Lech J. Janczewski
, Victor Portougal:
"Need-to-know" principle and fuzzy security clearances modelling. Inf. Manag. Comput. Secur. 8(5): 210-217 (2000) - [c4]Grace SauLan Loo, Bondic C. P. Tang, Lech J. Janczewski:
An Adaptable Human-Agent Collaboration Information System in Manufacturing (HACISM). DEXA Workshop 2000: 445-452 - [c3]Lech J. Janczewski:
Current information security protocols and an outlook for the future. IRMA Conference 2000: 578-581
1990 – 1999
- 1998
- [j1]Victor Portougal, Lech J. Janczewski
:
Industrial information-weight security models. Inf. Manag. Comput. Secur. 6(5): 205-211 (1998) - 1997
- [c2]Erland Jonsson, Lech J. Janczewski:
A taxonomy and overview of information security experiments. SEC 1997: 139-150 - 1992
- [c1]Lech J. Janczewski:
Data Security Model for Branch Offices of Big Organisations. SEC 1992: 153-164
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint