Peter Dell
Curtin University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Peter Dell.
Journal of Information Technology | 2010
William Newk-Fon Hey Tow; Peter Dell; John Venable
The advent of social networking websites presents further opportunities for criminals to obtain information for use in identity theft, cyber-stalking, and worse activities. This paper presents research investigating why users of social networking websites willingly disclose personal information and what sorts of information they provide (or not). The study employed an ethnographic approach of participation in the online community and interviews of community members, combined with a quantitative survey. The findings show that users are often simply not aware of the issues or feel that the risk to them personally is very low. The paper develops a preliminary theoretical model to explain the information disclosure phenomenon. It further recommends that government agencies or social networking websites themselves conduct campaigns to inform the public of these issues and that social networking websites consider removing some facilities. The study was conducted in an Australian context and focussed on the popular Facebook website.
Info | 2010
Peter Dell
Purpose – IPv6 is the replacement for the internets incumbent protocol, IPv4. IPv6 adoption is required to allow the internet to continue to grow; however, there has been almost no uptake since its standardization in the late 1990s. This paper seeks to explain how this non‐adoption may be a consequence of current policies paradoxically intended to promote IPv6.Design/methodology/approach – Economic theories of exhaustible resources and permit markets are used to provide an explanation for the lack of adoption of IPv6.Findings – The current policy approach will not yield a significant adoption of IPv6 until after the IPv4 address space is exhausted and may also constrain internet growth after IPv4 exhaustion occurs.Practical implications – Current policies intended to promote IPv6 diffusion through the internet must be reconsidered. The economics of permit markets in particular can inform discussions about IPv4 address transfer markets.Originality/value – Economic analyses of IPv6 adoption are almost non‐...
Info | 2008
Peter Dell; Christopher Kwong; Ying Liu
Purpose – The purpose of this paper is to put forward a case for increased research into the likely economic impact in Australia of early or late diffusion of IPv6, and to argue that Government intervention may be necessary.Design/methodology/approach – The paper characterises the approach to IPv6 in Australia to date as generally laissez‐faire, and compares this with diffusion and promotion efforts in countries in which IPv6 has become more widely adopted.Findings – The paper finds that IPv6 diffusion is inevitable in the long term, but early diffusion is unlikely in the absence of government action. The likely economic impact on Australia of early versus late IPv6 diffusion is unknown, yet it is potentially of national interest.Originality/value – This study identifies the need for research into the economic impact of IPv6 diffusion in Australia and is relevant to individuals and organisations involved in telecommunications and policy and research funding.
symposium on applications and the internet | 2008
Peter Dell; Khwaja Shan-ul-Hasan Ghori
Bluetooth is a de facto standard feature in mobile devices such as smart phones, PDAs and similar devices. While this provides great convenience to the user, there are a number of security issues for which exploits are widely available. This fact, combined with the growing sophistication of devices, creates the potential for serious loss in the event of a security breach. This paper investigates the use of bluetooth profiles by the public and finds that some potentially high-risk profiles are not widely used. A subsequent investigation of a number of devices determined that no way of configuring individual profiles was available. The paper concludes with a recommendation that devices allow users to configure individual bluetooth profiles.
Information Technology & People | 2018
Melina Seedoyal Doargajudhur; Peter Dell
Bring your own device (BYOD) refers to employees utilizing their personal mobile devices to perform work tasks. Drawing on the job demands-resources (JD-R) model and the task-technology fit (TTF) model, the purpose of this paper is to develop a model that explains how BYOD affects employee well-being (through job satisfaction), job performance self-assessment, and organizational commitment through perceived job autonomy, perceived workload and TTF.,Survey data from 400 full-time employees in different industry sectors in Mauritius were used to test a model containing 13 hypotheses using confirmatory factor analysis and structural equation modeling.,The SEM results support the hypothesized model. Findings indicate that BYOD indirectly affects job satisfaction, job performance and organizational commitment via job demands (perceived workload), job resources (perceived job autonomy) and TTF. Further, job resources influences job demands while TTF predicted job performance. Finally, job satisfaction and job performance self-assessment appear to be significant determinants of organizational commitment.,The findings are congruent with the JD-R and TTF models, and confirm that BYOD has an impact on job satisfaction, job performance self-assessment and organizational commitment. This could inform organizations’ policies and practices relating to BYOD, leading to improved employee well-being, performance and higher commitment.,The expanded model developed in this study explains how employee well-being, performance and organizational commitment are affected by BYOD, and is one of the first studies to investigate these relationships.
Proceedings of the International Conference on Electronic Governance and Open Society | 2016
Eltahir Kabbar; Peter Dell
This paper proposes a new conceptual model that explains factors that influence the uptake of e-government services in a developing country context. The development of the conceptual model was guided by qualitative data collected from a range of e-government potential adopters using semi-structured interviews informed by prior e-government literature. The paper starts by describing the research methods used, followed by a description of the environment in which the interviews took place and the analytical method used. Then, a detailed description of the domain analysis technique used to analyze the qualitative data is provided. This is followed by presenting the findings of the study and highlighting the main domains that emerged from the data which led to the development of the conceptual Demand-based e-government Adoption Model (DeAM).
IT Enabled Services | 2013
Eltahir Kabbar; Peter Dell
Although initially conceived in the relatively narrow context of Business Process Outsourcing (BPO), particularly to offshore locations, IT-enabled Services (ITeS) has matured and increasingly emphasizes innovation of conventional services (Uesugi 2008). An example of this in practice is the growth of e-government, in which conventional government services are provided in online environments.
ACIS 2012 : Location, location, location : Proceedings of the 23rd Australasian Conference on Information Systems 2012 | 2012
William Newk-Fon Hey Tow; John Venable; Peter Dell
pacific asia conference on information systems | 2011
William Newk-Fon Hey Tow; John Venable; Peter Dell
Dell, P.T. <http://researchrepository.murdoch.edu.au/view/author/Dell, Peter.html> and Marinova, D. <http://researchrepository.murdoch.edu.au/view/author/Marinova, Dora.html> (2007) Are they acting their age? Online social interaction and identity in the elderly. In: MODSIM07 - Land, Water and Environmental Management: Integrated Systems for Sustainability, 10 December to 13 December 2007, Christchurch pp. 2700-2706. | 2007
Peter Dell; Dora Marinova