Australian Information Security Management Conference
Submissions from 2007
Medical Identity Theft – Not Feeling Like Yourself?, Darren Webb
Medical insecurity: when one size does not fit all, Patricia A. Williams
Submissions from 2006
The Reality of Risks from Consented use of USB Devices, Marwan Al-Zarouni
Network Forensics and Privacy Enhancing Technologies “living” together in harmony, Giannakis Antoniou and Stefanos Gritzalis
Uncontrollable Privacy - The right that every attacker desires, Giannakis Antoniou and Stefanos Gritzalis
The Lazarus Effect: Resurrecting Killed RFID Tags, Christopher Bolan
Managing Information Security Complexity, Murray Brand
The Information Security Ownership Question in ISO/IEC 27001 – an Implementation, Lizzie Coles-Kemp and Richard E. Overill
Outsourcing: the Security Risk Management Challenge, Carl Colwill
Cyber crime and biometric authentication – the problem of privacy versus protection of business assets, Michael G. Crowley
Does your wireless LAN have criminal intent?, Michael Crowley and Andrew Woodward
Information security management and virtual collaboration: A Western Australian perspective, Rosanna Fanciulli
The Implementation of E-mail content management in a large corporation, Michael Hansen and Craig Valli
Security Issues of IEEE 802.16 (WiMAX), Jamshed Hasan
Electronic surveillance in hospitals: A review, Sue Kennedy
Risks and responsibilities in establishing a wireless network for an educational institution, Leigh Knights, Matt Fonceca, Georgina Mack, and Andrew Woodward
QoS Issues of Using Probabilistic Non-Repudiation Protocol in Mobile Ad Hoc Network Environment, Yi-Chi Lin and Jill Slay
A Knowledge Framework for Information Security Modeling, Shuangyan Liu, Ching-hang Cheung, and Lam-for Kwok
Secure transmission of shared electronic health records: A review, Rachel J. Mahncke and Patricia A. Williams
An assessment of threats of the Physical and MAC Address Layers in WiMAX/802.16, Krishnun Sansurooah
Individuals’ Perceptions of Wireless Security in the Home Environment, Patryk Szewczyk
Social Engineering and its Impact via the Internet, Matthew J. Warren and Shona Leitch
Telemedicine and the Digital Door Doctor, Darren Webb and Patricia A. Williams
The Derivation of a Conceptual Model for IT Security Outsourcing, W D. Wilde, M J. Warren, and W Hutchinson
Making Research Real: Is Action Research a Suitable Methodology for Medical Information Security Investigations?, Patricia A. Williams
Submissions from 2005
Taxonomy of WRT54G(S) Hardware and Custom Firmware, Marwan Al-Zarouni
Seeking information superiority: Strategies for business in the commercial application of information operations, Martin Dart
An investigation into the paradox of organisational flexibility versus security: A research project, Rosanna Fanciulli
Identity synthesis: Creating an identity from scratch, Lennon Hopkins
Information security: A misnomer, William Hutchinson
Smart card authentication for mobile devices, Wayne Jansen, Serban Gavrila, and Clément Séveillac
Security governance: Its impact on security culture, K. Koh, A. B. Ruighaver, S. B. Maynard, and A. Ahmad
Non-repudiation in pure mobile ad hoc network, Yi-Chi Lin and Jill Slay
Understanding transition towards information security culture change, Leanne Ngo, Wanlei Zhou, and Matthew Warren
My problem or our problem? Exploring the use of information sharing as a component of a holistic approach to e-security in response to the growth of ‘malicious targeted attacks’, Aaron Olding and Paul Turner
Benchmarking e-business security: A model and framework, Graeme Pye and Matthew J. Warren
Architecture for self-estimation of security level in ad hoc network nodes, Reijo Savola
Risk management in CRM security management, Mahdi Seify
Detecting rogue access points that endanger the maginot line of wireless authentication, Zhiqi Tao and A. B. Ruighaver
Physician secure thyself, Patricia Williams
The underestimation of threats to patients data in clinical practice, Patricia Williams
Potential Bluetooth vulnerabilities in smartphones, Lih Wern Wong