Submissions from 2010


Ignorant Experts: Computer and Network Security Support From Internet Service Providers, Patryk Szewczyk and Craig Valli


An Analysis of Information Security Awareness within Home and Work Environments, Shuhaili Talib, Nathan Clarke, and Steven Furnell


Application of a Data Mining Framework for the Identification of Agricultural Production Areas in WA , Yunous Vagh, Leisa Armstrong, and Dean Diepeveen

Developing VoIP Router honeypots, Craig Valli and Mohammed Al Lawati

Geotagging Where Cyberspace Comes to Your Place, Craig Valli and Peter Hannay

A Graphical User Interface for the Visually Impaired - an Evaluation, David Veal and Stanislaw Maj

An ill-defined problem : effective biomedical informatics curriculum?, Patricia Williams

Improving Medical Information Security using Contextualization Models, Patricia Williams

Medical Information Security: Is it all too hard? , Patricia Williams

Construction of Similarity Profile of Dynamic Web Documents for Similarity-aware Web Content Management, Jitian Xiao

Cross-cultural Learning Challenges and Teaching Strategies for First-year Asian Students in Australian Universities., Jitian Xiao, Jie Lu, Kum Chin, Jun Xu, and Juan Yao


Autonomous Bee Colony Optimization for Multi-objective Function, F Zeng, James Decraene, Malcolm Low, Philip Hingston, C Wentong, Z Suiping, and M Chandramohan

Submissions from 2009

An Intervention to Increase Positive Attitudes and Address Misconceptions About Australian Muslims: A Call for Education and Open Mindedness , Anne Aly

Media hegemony, activism and identity: Muslim women re-presenting Muslim women., Anne Aly

The historical roots of Al Qaeda's ideology: understanding Ayman al Zawahri's vision and developing an appropriate response., Anne Aly

The Terrorists' Audience: A Model of Internet Radicalisation, Anne Aly

An evaluation of Methodologies for eAgriculture in an Australian Context, Leisa J. Armstrong and Dean A. Diepeveen

An Information-Based Decision Support Framework for eAgriculture, Leisa J. Armstrong and Dean A. Diepeveen

Risk Culture Influences in Internet Safety and Security, S Atkinson, Steven Furnell, and A.D. Phippen

Securing the next generation: enhancing e-safety awareness among young people, Shirley Atkinson, Steven Furnell, and Andy Phippen

Consensual Security Risk Assessment: Overcoming Bias, Conflicting Interests and Parochialism, Benjamin Beard and David Brooks

Safeguarding Australia from Cyber-terrorism: A proposed cyber-terrorism SCADA Risk Framework for Industry Adoption, Christopher Beggs and Matthew Warren

A Spoofing Attack Against an EPC Class One RFID System, Christopher Bolan

Freegate: A Defence against the Pending Censorship of Australia?, Christopher Bolan and Peter Hannay

From desktop to mobile: Examining the security experience, Reinhardt A. Botha, Steven Furnell, and Nathan Clarke

Clipping Mercury's Wings: The Challenge of Email Archiving, Mark Brogan

RMAA Technology Survey 2008: From mainstream to bleeding edge- technology in the RIM workspace., Mark Brogan and David Roberts

Defeating biometric fingerprint systems: An applied testing methodology, David Brooks

Intruder Alarm Systems: Is the Security Industry Installing and Maintaining Alarm Systems in Compliance to Australian Standard AS2201?, David Brooks

Key concepts in security risk management: A psychometric concept map to approach to understanding, David Brooks

What is security: Definition through knowledge categorisation, David Brooks

The Alox5 gene is a novel therapeutic target in cancer stem cells of chronic myeloid leukemia, Yaoyu Chen, Dongguang Li, and Shaoguang Li

Cross-cultural learning and teaching in Australian universities, Kum Leng Chin, Jie Lu, Jun Xu, Jitian Xiao, and Juan Yao


Digital natives or digital refugees? Why we have failed Gen Y?, Barbara Combes

Generation Y: Are they really digital natives or more like digital refugees?, Barbara Combes

Security Decay: An Entropic Approach to Definition and Understanding, M COOLE and David Brooks

Intelligence Support to Law Enforcement: Untangling the Gordian Knot, Jeffrey Corkill

Professional Intelligence Judgement Artistry: Some early observations, Jeffrey Corkill

The function of security in reducing women's fear of crime in open public spaces: A case study of serial sex attacks at a western australian university, Christopher J. Cubbage and Clifton Smith

Applying Data Mining Techniques in the Selection of Plant Traits, Dean A. Diepeveen and Leisa J. Armstrong

Selecting Areas for Land Use Change in a Catchment, Neil Dunstan, Leisa J. Armstrong, and Dean A. A. Diepeveen


A Max-Min Multiobjective Technique to Optimize Model Based Test Suite, Usman Farooq and Chiou P. Lam


Evolving the Quality of a Model-Based Test Suite, Usman Farooq and Chiou P. Lam

Secure State Deletion: Testing the efficacy and integrity of secure deletion tools on Solid State Drives, Michael Freeman and Andrew Woodward

SmartPot - Creating a 1st Generation Smartphone Honeypot, Michael Freeman and Andrew Woodward

Mobile Security: A Pocket Guide, Steven Furnell

Scare Tactics - A viable weapon in the security war?, Steven Furnell, Maria Papadaki, and Kerry-Lynn Thomson

From culture to disobedience: Recognising the varying user acceptance of IT security, Steven Furnell and Kerry-Lynn Thomson

Recognising and addressing 'security fatigue', Steven Furnell and Kerry-Lynn Thomson

Wireless device identification for forensic purposes, Lukasz Andrzej Golygowski and Andrew Woodward

Fun & Games: an Introduction to Console Forensics, Peter Hannay

Satellite Navigation Forensics Techniques, Peter Hannay

An Assessment of Internationalised Domain Name Homograph Attack Mitigation Implementations, Peter Hannay and Christopher Bolan

Firewire Forensics in Modern Operating Systems, Peter Hannay and Andrew Woodward

Culture jamming: from activism to hactivism, Kay Hearn, Rachel Mahncke, and Patricia Williams

A Turing Test for Computer Game Bots, Philip Hingston


Iterated Prisoner's Dilemma for Species, Philip Hingston

Cyber Influence, William Hutchinson

Security as an element in environmental assessment and decision making, William Hutchinson and Matthew Warren

Assessing the Usability of Personal Internet Security Tools, T Ibrahim, Steven Furnell, M Papadaki, and Nathan Clarke

Evaluating Web-Based User Authentication using Graphical Techniques, MZ Jali, Steven Furnell, and PS Dowland

Use of a Secure Portable Application Device as a Component of Network Centric Operations, Peter James

Security Requirements Engineering-The Reluctant Oxymoron, Michael Johnstone

An Introduction to Digital Forensics, Andrew Jones

A summary of Thoughts, Issues and Problems, Andrew Jones

Conclusions and Final Thoughts, Andrew Jones

Developing a Career in Digital Forensic Management, Andrew Jones

Developing the Business Plan, Andrew Jones

Establishing and Managing a Digital Forensics Laboratory, Andrew Jones

High Technology Crimes: Case Summaries, Andrew Jones

Lessons not learned on data disposal, Andrew Jones

Networking, Liaison and Sources of Information, Andrew Jones

Responding to Crimes requiring Computer Forensic Investigation, Andrew Jones

The Computer Forensics Unit Strategic, Tactical, and Annual Plans, Andrew Jones

The Future of Digital Forensics in the Criminal Justice System, Andrew Jones

Types of Forensic Investigation, Andrew Jones

Why are we not getting better at Data Disposal?, Andrew Jones

Workload Management and the Outsourcing Option, Andrew Jones


The 2009 Analysis of Information Remaining on USB Storage Devices Offered for Sale on the Second Hand Market, Andrew Jones, Craig Valli, and G Dabibi


The 2008 analysis of information remaining on disks offered for sale on the second hand market, Andrew Jones, Craig Valli, Glenn Dardick, Iain Sutherland, and Gareth Davies

Application of latent moderated structuring (LMS) to rank the effects of intervening variables on teh IT and firm performance relationship, Abbas Keramati, Glenn Dardick, Navid Majir, and Behdad Banan

Bluetooth Hacking: A Case Study , Gary Kessler and Dennis Browning


Using Event-Intervals to Analyze Alarm Sequences in a Chemical Plant, Savo Kordic, Chiou Peng Lam, Jitian Xiao, and Huaizhong Li


Advances in Fetal Heart Rate Monitoring using Smart Phones, Chang Su Lee, Martin Masek, Chiou Peng Lam, and Keng Tiong Tan


Towards Higher Accuracy and Better Noise Tolerance for Fetal Heart Rate Monitoring using Doppler Ultrasound, Chang Su Lee, Martin Masek, Chiou Peng Lam, and Keng Tiong Tan

An Anomaly-based Intrusion Detection Architecture to Secure Wireless Network, SY Lim and Andrew Jones

Terror attacks: Understanding social risk views between Singaporean lay and security practitioners, Yam Hoo Loo and David Brooks

Cross-Cultural Teaching and Learning Methodology Analysis for Asian Students in Australian Universities, Jie Lu, Kum Leng Chin, Juan Yao, Jun Xu, and Jitian Xiao

Measuring information security governance within general medical practice, Rachel Mahncke, Donald McDermid, and Patricia Williams


Raising heart rate with dance pad based computer games, Martin Masek, Philip Hingston, Matthew Carrigy, Liam Collins, and Kazunori (Ken) Nosaka


Remote Home-Based Ante and Post Natal Care, Martin Masek, Chang Su Lee, Chiou Peng Lam, Keng Tiong Tan, and Angela Fyneman


Applying a Reusable Framework for Software Selection, Valerie Maxville, Jocelyn Armarego, and Chiou Peng Lam

Challenges in improving information security practice in Australian general practice, Donald Mcdermid, Rachel Mahncke, and Patricia Williams

Drug prevention programmes for young people: where have we been and where should we be going?, Richard Midford

Playing Safe: A prototype game for raising awareness of social engineering, Michael Newbould and Steven Furnell

PCI Compliance: Overcoming The Challenges, Benjamin Ngugi, Gina Vega, and Glenn Dardick

Security education in Singapore: A study of knowledge structures in electronic security technology, C Phinney and Clifton Smith


The 2009 Personal Firewall Robustness Evaluation, Ken Pydayya, Peter Hannay, and Patryk Szewczyk

An Assessment of People's Vulnerabilities in Relation to Personal and Sensitive Data, B.G. Sanders, P.S. Dowland, and Steven Furnell

A forensics overview and analysis of USB flash memory devices, Krishnun Sansurooah