Australian Information Security Management Conference

Australian Information Security Management Conference

 

Follow

Submissions from 2008

PDF

Risk Mitigation Strategies for the Prepaid Card Issuer in Australia, M A. Khairuddin, P Zhang, and A Rao

PDF

Organisational security requirements: An agile approach to Ubiquitous Information Security, A B. Ruighaver

PDF

Identifying DOS Attacks Using Data Pattern Analysis, Mohammed Salem and Helen Armstrong

PDF

Network security isn't all fun and games: An analysis of information transmitted while playing Team Fortress 2, Brett Turner and Andrew Woodward

PDF

Securing a wireless network with EAP-TLS: perception and realities of its implementation, Brett Turner and Andrew Woodward

PDF

Enhanced Security for Preventing Man-in-the-Middle Attacks in Authentication, Data Entry and Transaction Verification, Jason Wells, Damien Hutchinson, and Justin Pierce

PDF

Can intrusion detection implementation be adapted to end-user capabilities?, Patricia A. Williams and Renji J. Mathew

PDF

Trust me. I am a Doctor. Your records are safe, Patricia A. Williams and Craig Valli

PDF

Assessing and Mitigating VIP Vulnerabilities in the Corporate Environment, Hoi Z. Wong

Submissions from 2007

PDF

Taxonomy of iPhone Activation and SIM Unlocking Methods, Marwan Al-Zarouni and Haitham Al-Hajri

PDF

The need for a security/privacy model for the health sector in Ghana, James Tetteh Ami-Narh and Patricia A. Williams

PDF

Teaching PHP with security in mind, Greg Baatard

PDF

A Single Channel Attack on 915MHz Radio Frequency Identification Systems, Christopher Bolan

PDF

A Comprehensive Firewall Testing Methodology, Murray Brand

PDF

Evolution of a Database Security course: using non-enterprise teaching tools, Justin Brown

PDF

Improving Information Security Management in Nonprofit Organisations with Action, Mark Carey-Smith, Karen Nelson, and Lauren May

PDF

The Importance of Human Factors when Assessing Outsourcing Security Risks, Carl Colwill and Andy Jones

PDF

Increasing security in the physical layer of wireless communication, Luke Golygowski

PDF

Information Security Surveys: A Review of the Methodologies, the Critics and a, Alexis Guillot and Sue Kennedy

PDF

Network Security – Is IP Telephony Helping The Cause?, Paul Hansen and Andrew Woodward

PDF

The Need for an Investigation into Possible Security Threats Associated with SQL Based, Lee Heinke

PDF

How safe is Azeroth, or, are MMORPGs a security risk?, An Hilven and Andrew Woodward

PDF

Securing VoIP: A Framework to Mitigate or Manage Risks, Peter James and Andrew Woodward

PDF

Device- versus Network-Centric Authentication Paradigms for Mobile Devices:, S. Karatzouni, N. L. Clarke, and S. M. Furnell

PDF

Analysis of PKI as a means of securing ODF documents, Gautham Kasinath and Leisa Armstrong

PDF

Importance of Verification and Validation of Data Sources in Attaining Information Superiority, Gautham Kasinath and Leisa Armstrong

PDF

Security Issues within Virtual Worlds such as Second Life, Chia Yao Lee and Matthew Warren

PDF

An investigation into the usability of graphical authentication using AuthentiGraph, Paul Minne, Jason Wells, Damien Hutchinson, and Justin Pierce

PDF

Network Security Devices and Protocols Using State Model Diagrams, C. Nuangjamnong, D. Veal, and S. P. Maj

PDF

A Conceptual model for Security Outsourcing, K. Samarasinghe, M. Warren, and G. Pye

PDF

Intrusion Detection System (IDS) Techniques and Responses for Mobile Wireless Networks, Krishnun Sansurooah

PDF

The Phantasm of ATM Withdrawal, Nattakant Utakrit

PDF

The Impact of Security Surveys within Australia and New Zealand, Matthew J. Warren and Shona Leitch

PDF

Medical Identity Theft – Not Feeling Like Yourself?, Darren Webb

PDF

Medical insecurity: when one size does not fit all, Patricia A. Williams

Submissions from 2006

PDF

The Reality of Risks from Consented use of USB Devices, Marwan Al-Zarouni

PDF

Network Forensics and Privacy Enhancing Technologies “living” together in harmony, Giannakis Antoniou and Stefanos Gritzalis

PDF

Uncontrollable Privacy - The right that every attacker desires, Giannakis Antoniou and Stefanos Gritzalis

PDF

The Lazarus Effect: Resurrecting Killed RFID Tags, Christopher Bolan

PDF

Managing Information Security Complexity, Murray Brand

PDF

The Information Security Ownership Question in ISO/IEC 27001 – an Implementation, Lizzie Coles-Kemp and Richard E. Overill

PDF

Outsourcing: the Security Risk Management Challenge, Carl Colwill

PDF

Cyber crime and biometric authentication – the problem of privacy versus protection of business assets, Michael G. Crowley

PDF

Does your wireless LAN have criminal intent?, Michael Crowley and Andrew Woodward

PDF

Information security management and virtual collaboration: A Western Australian perspective, Rosanna Fanciulli

PDF

The Implementation of E-mail content management in a large corporation, Michael Hansen and Craig Valli

PDF

Security Issues of IEEE 802.16 (WiMAX), Jamshed Hasan

PDF

Electronic surveillance in hospitals: A review, Sue Kennedy

PDF

Risks and responsibilities in establishing a wireless network for an educational institution, Leigh Knights, Matt Fonceca, Georgina Mack, and Andrew Woodward

PDF

QoS Issues of Using Probabilistic Non-Repudiation Protocol in Mobile Ad Hoc Network Environment, Yi-Chi Lin and Jill Slay

PDF

A Knowledge Framework for Information Security Modeling, Shuangyan Liu, Ching-hang Cheung, and Lam-for Kwok

PDF

Secure transmission of shared electronic health records: A review, Rachel J. Mahncke and Patricia A. Williams

PDF

An assessment of threats of the Physical and MAC Address Layers in WiMAX/802.16, Krishnun Sansurooah

PDF

Individuals’ Perceptions of Wireless Security in the Home Environment, Patryk Szewczyk

PDF

Social Engineering and its Impact via the Internet, Matthew J. Warren and Shona Leitch

PDF

Telemedicine and the Digital Door Doctor, Darren Webb and Patricia A. Williams

PDF

The Derivation of a Conceptual Model for IT Security Outsourcing, W D. Wilde, M J. Warren, and W Hutchinson

PDF

Making Research Real: Is Action Research a Suitable Methodology for Medical Information Security Investigations?, Patricia A. Williams