Citation Impact

Citing Papers

What's in a service? Towards accurate description of non-functional service properties
2002
Coping With Systems Risk: Security Planning Models for Management Decision Making1
1998 Standout
Fear Appeals and Information Security Behaviors: An Empirical Study1
2010 Standout
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness1
2010 Standout
Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations1
2010 Standout
Life in the fast lane? Towards a sociology of technology and time
2008 Standout
The isospin forbidden 1− → 0+ transition in 40Ca
1975
A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents
2007 Standout
The economic cost of publicly announced information security breaches: empirical evidence from the stock market*
2003 Standout
Recoil-distance lifetime measurements of levels in 36Ar and 36Cl
1976 StandoutNobel
The impact of enterprise risk management on competitive advantage by moderating role of information technology
2018 Standout
Mass of lowestT=2state ofC12
1978 StandoutNobel
A glossary of archival and records terminology
2006 Standout
The importance of trust in electronic commerce
1998
A survey on internet of vehicles: Applications, security issues & solutions
2019 Standout
Generalizing Generalizability in Information Systems Research
2003 Standout
Analysis of E1 and E2 radiative α-capture and giant multipole resonances
1975
Spatialities of Globalisation
2002 Standout
The α-width of the lowest T = 2 state in 28Si
1979 StandoutNobel
What's in a Service?
2002
The economics of information security investment
2002 Standout
A conceptual framework for information security management
1998
Protection motivation and deterrence: a framework for security policy compliance in organisations
2009 Standout
Isoscalar electric quadrupole strength inO16
1974
Fore-Aft Anisotropy in the Radiative Capture of 14-MeV Neutrons
1975
A comprehensive overview of cyber-physical systems: from perspective of feedback system
2016
Radiative width of the first T = 2 state in 8Be
1976
A conceptual foundation for organizational information security awareness
2000
QoS-aware middleware for Web services composition
2004 Standout
A survey on security control and attack detection for industrial cyber-physical systems
2017 Standout
The radiative capture reactions 40Ca(α, γ)44Ti and 48Ca(α, γ)52Ti in the region of the giant dipole resonance
1974
Current directions in IS security research: towards socio‐organizational perspectives
2001
Alpha capture to the giant dipole resonances of 42Ca, 44Ca and 52Cr
1976
Energy levels of A = 21−44 nuclei (V)
1973
Smartmentality: The Smart City as Disciplinary Strategy
2013 Standout
Computational Intelligence Based QoS-Aware Web Service Composition: A Systematic Literature Review
2015 Standout
Decays of the lowestT=2states inA=4Nnuclei fromBe8toTi44
1979 StandoutNobel
Energy levels of A = 21–44 nuclei (VII)
1990
Beyond Deterrence: An Expanded View of Employee Computer Abuse1
2013 Standout
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
2009 Standout
Isospin-forbidden particle decays in light nuclei
1978 StandoutNobel
Terrestrial in situ cosmogenic nuclides: theory and application
2001 Standout
A business approach to effective information technology risk analysis and management
1996
A Security and Privacy Review of VANETs
2015
Application of the Direct-Semidirect Model to the Interpretation ofE1andE2Strength inC14(ppol, γ0)N15
1976 StandoutNobel
Total width of the lowest T = 2 state in 24Mg
1978
Note on the cross section of the 25Mg(τ, γ)28Si reaction
1971
On the Move: Technology, Mobility, and the Mediation of Social Time and Space
2002 Standout
Insider Threat Prediction Tool: Evaluating the probability of IT misuse
2001
Photodisintegration of 28Si to excited residual states
1977
Intercalibration of standards, absolute ages and uncertainties in 40Ar/39Ar dating
1998 Standout
New Urban Eras and Old Technological Fears: Reconfiguring the Goodwill of Electronic Things
1996
Energy levels of A = 21–44 nuclei (VI)
1978 Standout
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
2008 Standout
Use of the 14C(18O,12Be)20Ne reaction to measure the mass of 12Be
1974 StandoutNobel
A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy
2018 Standout

Works of William Caelli being referenced

Electronic Funds Transfer Systems.
1988
Information Security in electronic Commerce.
1997
An Efficient Public Key Management System: An Application In Vehicular Ad Hoc Networks
2011
IT security : the need for international cooperation : proceedings of the IFIP TC11 Eighth International Conference on Information Security, IFIP/Sec '92, Singapore, 27-29 May 1992
1992
PKI, elliptic curve cryptography, and digital signatures
1999
Non-repudiation in the digital environment
2000
Information Security
1992
Search for the lowest T = 2 state of 8Be: Experimental
1969
Systematic Search for the LowestT=2State ofC12Using Deuteron- andHe3-Induced Reactions
1970
Information Security Handbook
1991
A framework for information security evaluation
1994
The 36Ar(α, γ0)40Ca reaction at excitation energies in the region of the giant dipole resonance
1973
A study of the reaction 11B(3He, γ0)14N in the energy range E3He = 0.9–2.6 MeV
1970
Information Security for Managers
1989
Rankless by CCL
2026