default search action
Sharman Lichtenstein
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2011
- [j14]Thomas W. Jackson, Sharman Lichtenstein:
Optimising e-mail communication: the impact of seminar- and computer-based training. Int. J. Internet Enterp. Manag. 7(2): 197-216 (2011) - [j13]Sharman Lichtenstein:
Ethical issues for internet use policy: balancing employer and employee perspectives. Int. J. Technol. Manag. 54(2/3): 288-303 (2011) - [c26]Remko Helms, Daan Diemer, Sharman Lichtenstein:
Exploring Barriers In Expertise Seeking: Why Don'T They Ask An Expert? PACIS 2011: 77 - 2010
- [j12]Vanessa A. Cooper, Sharman Lichtenstein:
Supporting knowledge transfer in web-based managed IT support. J. Syst. Inf. Technol. 12(2): 140-160 (2010) - [c25]Sneza Dojkovski, Sharman Lichtenstein, Matthew J. Warren:
Enabling Information Security Culture: Influences and Challenges for Australian SMEs. ACIS 2010
2000 – 2009
- 2009
- [j11]Vanessa A. Cooper, Sharman Lichtenstein, Ross Smith:
Successful Web-Based IT Support Services: Service Provider Perceptions of Stakeholder-Oriented Challenges. Int. J. E Serv. Mob. Appl. 1(1): 1-20 (2009) - [j10]Sharman Lichtenstein, Craig M. Parker:
Wikipedia model for collective intelligence: a review of information quality. Int. J. Knowl. Learn. 5(3/4): 254-272 (2009) - [c24]Sharman Lichtenstein:
The Decline of Experts in the Age of Web 2.0: Lay Blogger Perceptions of Experts. ACIS 2009 - 2008
- [j9]Sharman Lichtenstein, Sara Tedmori, Thomas W. Jackson:
Socio-ethical issues for expertise location from electronic mail. Int. J. Knowl. Learn. 4(1): 58-74 (2008) - [c23]Nicholas J. A. Tate, Sharman Lichtenstein, Matthew J. Warren:
IT Security Certifications: Stakeholder Evaluation and Selection. ACIS 2008 - 2007
- [j8]Sharman Lichtenstein, Craig M. Parker, Alexia Hunter:
Dynamic Knowledge Integration in Socio-Technical Networks: an Interpretive Study of Intranet Use for Knowledge Integration. J. Inf. Knowl. Manag. 6(2): 91-103 (2007) - [c22]Vanessa A. Cooper, Sharman Lichtenstein, Ross Smith:
Understanding Knowledge Transfer in Web-based B2B IT Support. ACIS 2007 - [c21]Nicholas J. A. Tate, Sharman Lichtenstein, Matthew J. Warren:
Supporting User Evaluation of IT Security Certification Schemes. ACIS 2007 - [c20]Vanessa A. Cooper, Sharman Lichtenstein, Ross Smith:
Enabling Successful Web-based Information Technology Support for Enterprise Customers: A Service Provider Perspective of Stakeholder-based Issues. Bled eConference 2007: 59 - [c19]Sneza Dojkovski, Sharman Lichtenstein, Matthew J. Warren:
Fostering Information Security Culture in Small and Medium Size Enterprises: An Interpretive Study in Australia. ECIS 2007: 1560-1571 - [c18]Nicholas Tate, Sharman Lichtenstein, Matthew J. Warren:
Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework. SEC 2007: 473-478 - 2006
- [j7]Sharman Lichtenstein, Craig M. Parker:
Collaborative knowledge creation in electronic mail. Int. J. Knowl. Learn. 2(3/4): 279-297 (2006) - [j6]Sharman Lichtenstein, Alexia Hunter:
Toward a Receiver-Based Theory of Knowledge Sharing. Int. J. Knowl. Manag. 2(1): 24-40 (2006) - [j5]Kirsty Williamson, Sharman Lichtenstein, Jen Sullivan, Don Schauder:
To Choose or Not to Choose: Exploring Australians' Views about Internet Banking. Int. J. Technol. Hum. Interact. 2(4): 17-36 (2006) - [c17]Vanessa A. Cooper, Sharman Lichtenstein, Ross Smith:
Enabling the Transfer of Information Technology Support Knowledge to Enterprise Customers Using Web-based Self-service Systems: Critical Success Factors from the Support Organisation Perspective. ACIS 2006 - [c16]Ziqi Liao, Sharman Lichtenstein:
Consumer Acceptance of Third Generation Mobile Value-added Services: A Survey of Hong Kong Consumer Perceptions. ACIS 2006 - [c15]Sharman Lichtenstein, Craig M. Parker, Alexia Hunter:
Toward an Integrative Role for Intranets: An Interpretive Case Study of Intranet-based Dynamic Knowledge Integration in Socio-technical Networks. ACIS 2006 - [c14]Sharman Lichtenstein, Michael Brain:
Restructuring influences on organizational knowledge sharing: An interpretive case study. ECIS 2006: 2133-2144 - 2005
- [j4]Sharman Lichtenstein, Lemai Nguyen, Alexia Hunter:
Issues in IT Service-Oriented Requirements Engineering. Australas. J. Inf. Syst. 13(1) (2005) - [c13]Vanessa A. Cooper, Sharman Lichtenstein, Ross Smith:
Emerging Issues in After-sales Enterprise Information Technology Support Using Web-based Self-service Systems. ACIS 2005 - [c12]Sharman Lichtenstein, Alexia Hunter:
Receiver Influences on Knowledge Sharing. ECIS 2005: 1187-1198 - [c11]Vanessa A. Cooper, Sharman Lichtenstein, Ross Smith:
Toward Successful Knowledge Transfer in Web-based Self-service for Information Technology Services. PACIS 2005: 41 - 2004
- [c10]Sharman Lichtenstein, Alexia Hunter, Jamie Mustard:
Utilisation of Intranets for Knowledge Sharing: a Socio-Technical Study. ACIS 2004 - [c9]Sharman Lichtenstein:
Knowledge Development and Creation in Email. HICSS 2004 - 2003
- [c8]Sharman Lichtenstein, Paula M. C. Swatman:
Sustainable knowledge management systems: integration personalisation and contextualisation. ECIS 2003: 1084-1092 - [c7]Sharman Lichtenstein, Paula M. C. Swatman, Kanchan Babu:
Adding Value to Online Privacy for Consumers: Remedying Deficiences in Online Privacy Policies with an Holistic Approac. HICSS 2003: 206 - [c6]Jacob L. Cybulski, Lemai Nguyen, Theerasak Thanasankit, Sharman Lichtenstein:
Understanding Problem Solving in Requirements Engineering: Debating Creativity with IS Practitioners. PACIS 2003: 32 - [c5]Sharman Lichtenstein, Paula M. C. Swatman:
Email and Knowledge Management. PACIS 2003: 55 - 2002
- [c4]Sharman Lichtenstein, Paula M. C. Swatman, Kanchan Babu:
Effective Online Privacy Policies. ACIS 2002 - [c3]Sharman Lichtenstein, Paula M. C. Swatman:
The Potentialities of Focus Groups in e-Business Research: Theory Validation. E-Business: Multidisciplinary Research and Practice 2002: 207-226 - 2001
- [c2]Sharman Lichtenstein, Paula M. C. Swatman:
Effective Management and Policy in e-Business Security. Bled eConference 2001: 19
1990 – 1999
- 1998
- [j3]Sharman Lichtenstein:
Internet risks for companies. Comput. Secur. 17(2): 143-150 (1998) - 1997
- [j2]Sharman Lichtenstein, Paula M. C. Swatman:
Internet acceptable usage policy for organizations. Inf. Manag. Comput. Secur. 5(5): 182-190 (1997) - [c1]Sharman Lichtenstein:
Developing Internet Security Policy for Organizations. HICSS (4) 1997: 350- - 1996
- [j1]Sharman Lichtenstein:
Factors in the selection of a risk assessment method. Inf. Manag. Comput. Secur. 4(4): 20-25 (1996)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-25 23:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint