Australian Information Security Management Conference

Australian Information Security Management Conference

 

Follow

Submissions from 2007

PDF

Medical Identity Theft – Not Feeling Like Yourself?, Darren Webb

PDF

Medical insecurity: when one size does not fit all, Patricia A. Williams

Submissions from 2006

PDF

The Reality of Risks from Consented use of USB Devices, Marwan Al-Zarouni

PDF

Network Forensics and Privacy Enhancing Technologies “living” together in harmony, Giannakis Antoniou and Stefanos Gritzalis

PDF

Uncontrollable Privacy - The right that every attacker desires, Giannakis Antoniou and Stefanos Gritzalis

PDF

The Lazarus Effect: Resurrecting Killed RFID Tags, Christopher Bolan

PDF

Managing Information Security Complexity, Murray Brand

PDF

The Information Security Ownership Question in ISO/IEC 27001 – an Implementation, Lizzie Coles-Kemp and Richard E. Overill

PDF

Outsourcing: the Security Risk Management Challenge, Carl Colwill

PDF

Cyber crime and biometric authentication – the problem of privacy versus protection of business assets, Michael G. Crowley

PDF

Does your wireless LAN have criminal intent?, Michael Crowley and Andrew Woodward

PDF

Information security management and virtual collaboration: A Western Australian perspective, Rosanna Fanciulli

PDF

The Implementation of E-mail content management in a large corporation, Michael Hansen and Craig Valli

PDF

Security Issues of IEEE 802.16 (WiMAX), Jamshed Hasan

PDF

Electronic surveillance in hospitals: A review, Sue Kennedy

PDF

Risks and responsibilities in establishing a wireless network for an educational institution, Leigh Knights, Matt Fonceca, Georgina Mack, and Andrew Woodward

PDF

QoS Issues of Using Probabilistic Non-Repudiation Protocol in Mobile Ad Hoc Network Environment, Yi-Chi Lin and Jill Slay

PDF

A Knowledge Framework for Information Security Modeling, Shuangyan Liu, Ching-hang Cheung, and Lam-for Kwok

PDF

Secure transmission of shared electronic health records: A review, Rachel J. Mahncke and Patricia A. Williams

PDF

An assessment of threats of the Physical and MAC Address Layers in WiMAX/802.16, Krishnun Sansurooah

PDF

Individuals’ Perceptions of Wireless Security in the Home Environment, Patryk Szewczyk

PDF

Social Engineering and its Impact via the Internet, Matthew J. Warren and Shona Leitch

PDF

Telemedicine and the Digital Door Doctor, Darren Webb and Patricia A. Williams

PDF

The Derivation of a Conceptual Model for IT Security Outsourcing, W D. Wilde, M J. Warren, and W Hutchinson

PDF

Making Research Real: Is Action Research a Suitable Methodology for Medical Information Security Investigations?, Patricia A. Williams

Submissions from 2005

PDF

Taxonomy of WRT54G(S) Hardware and Custom Firmware, Marwan Al-Zarouni

PDF

Seeking information superiority: Strategies for business in the commercial application of information operations, Martin Dart

PDF

An investigation into the paradox of organisational flexibility versus security: A research project, Rosanna Fanciulli

PDF

Identity synthesis: Creating an identity from scratch, Lennon Hopkins

PDF

Information security: A misnomer, William Hutchinson

PDF

Smart card authentication for mobile devices, Wayne Jansen, Serban Gavrila, and Clément Séveillac

PDF

Security governance: Its impact on security culture, K. Koh, A. B. Ruighaver, S. B. Maynard, and A. Ahmad

PDF

Non-repudiation in pure mobile ad hoc network, Yi-Chi Lin and Jill Slay

PDF

Understanding transition towards information security culture change, Leanne Ngo, Wanlei Zhou, and Matthew Warren

PDF

My problem or our problem? Exploring the use of information sharing as a component of a holistic approach to e-security in response to the growth of ‘malicious targeted attacks’, Aaron Olding and Paul Turner

PDF

Benchmarking e-business security: A model and framework, Graeme Pye and Matthew J. Warren

PDF

Architecture for self-estimation of security level in ad hoc network nodes, Reijo Savola

PDF

Risk management in CRM security management, Mahdi Seify

PDF

Detecting rogue access points that endanger the maginot line of wireless authentication, Zhiqi Tao and A. B. Ruighaver

PDF

Physician secure thyself, Patricia Williams

PDF

The underestimation of threats to patients data in clinical practice, Patricia Williams

PDF

Potential Bluetooth vulnerabilities in smartphones, Lih Wern Wong

PDF

Recommendations for wireless network security policy: An analysis and classification of current and emerging threats and solutions for different organisations, Andrew Woodward