Submissions from 2013
Manipulation of hard drive firmware to conceal entire partitions, Huw Read, Konstantino Xynos, Iain Sutherland, Gareth Davies, Tom Houiellebecq, Frode Roarson, and Andrew Blyth
Usability and security support offered through ADSL router user manuals, Patryk S. Szewczyk
Sellers continue to give away confidential information on second hand memory cards sold in Australia, Patryk S. Szewczyk, Nikki Robins, and Krishnun Sansurooah
Patterns and patter - An investigation into SSH activity using Kippo Honeypots, Craig Valli, Priya N. Rabadia, and Andrew J. Woodward
The influence and deception of Twitter: the authenticity of the narrative and slacktivism in the Australian electoral process, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, Shaquille Abdul Rahman, and David M. Cook
A conceptual framework for secure use of mobile health, Patricia A. Williams and Anthony Maeder
Submissions from 2012
Forensics Data Acquisition Methods for Mobile Phones, Khawla Abdulla Alghafli, Andrew Jones, and Thomas Anthony Martin
A revised UTAUT model to investigate E -health acceptance of health professionals in Africa, James Ami -Narh and Patricia Williams
Smart-Frame: a Flexible, Scalable, and Secure Information Management Framework for Smart Grids, Joonsang Baek, Quang Vu, Andrew Jones, Sameera Al Mulla, and Chan Yeob Yeun
Layered analysis of security ceremonies, Gianpaolo Bella and Elizabeth Coles-Kemp
Australia: recent developments in space situational awareness, Brett Biddington
Australia's Place in Space: Historical Constraints and Future Opportunities, Brett Biddington
Securing Space: Will Code of Conduct Discussions Help? A Perspective from Australia, Brett Biddington
The Regulation of Space and Cyberspace: One coin, Two sides, Brett Biddington
Mobile Device Management for Personally Controlled Electronic Health Records: Effective Selection of Evaluation Criteria, Murray Brand and Patricia Williams
Exposing potential privacy issues with IPV6 address construction, Clinton Carpene and Andrew Woodward
The international effort: building the bridge for Translational Medicine: Report of the 1st International Conference of Translational Medicine (ICTM), Xiaoming Chen, Roland Andersson, William CS Cho, David Christiani, Richard Coico, Jeffery Drazen, Markus Ege, Thomas Fehniger, Hongwei Gao, Kunlin Jin, Michael N. Liebman, Elena Lopez, Giuseppe Marraro, Gyorgy Marko-Varga, Francesco M. Marincola, Laurentiu M. Popescu, Claudio Spada, Aamir Shahzad, Ena Wang, Wei Wang, Xiangdong Wang, Yong-Xiao Wang, Jinglin Xia, and Jia Qu
A novel security architecture for a space-data DTN, Nathan Clarke, Vasilis Katos, Sofia-Anna Menesidou, Bogdan Ghita, and Steven Furnell
Security Specialists are from Mars; Healthcare Practitioners are from Venus: The Case for a Community-of-Practice Approach to Security Architectures for Healthcare, Elizabeth Coles-Kemp and Patricia Williams
Defence in depth, protection in depth and security in depth: A comparative analysis towards a common usage language, Michael Coole, Jeffrey Corkill, and Andrew Woodward
Understanding the vulnerabilities in Wi-Fi and the impact on its use in CCTV systems, Michael Coole, Andrew Woodward, and Craig Valli
Building patient trust in electronic health records, Helen Cripps and Craig Standing
Accountable-eHealth Systems: the Next Step Forward for Privacy, Randike Gajanayake, Tony Iannella, Bill Lane, and Tony Sahama
Legal Issues Related to Accountable-eHealth Systems in Australia, Randike Gajanayake, Bill Lane, Tony Iannella, and Tony Sahama
Assessing the accessibility of E-learning, Morten Goodwin, Iain Sutherland, Frode Roarson, and Tom Drange
Commitment and the 1% Motorcycle Club: threats to the brotherhood, Kira Harris
Cloud security: A case study in telemedicine, Michael Johnstone
On the Effectiveness of Intrusions into ZigBee-based Wireless Sensor Networks, Michael Johnstone and Jeremy Jarvis
Towards Effective Algorithms for Intelligent Defense Systems, Michael Johnstone and Andrew Woodward
The 2012 Analysis of Information Remaining on Computer Hard Disks Offered for Sale on the Second Hand Market in the UAE, Andrew Jones, Thomas Martin, and Mohammed Alzaabi
A Holistic Approach to eHealth Security in Australia: Developing a National eHealth Sercurity and Access Framework (NESAF), Yvette Lejins and John Leitch
Developing Governance Capability to Improve Information Security Resilience in Healthcare, Rachel Mahncke and Patricia Williams
Multimodal behavioural biometric authentication for mobile devices, Hataichanok Saevanee, Nathan Clarke, and Steven Furnell
An Overview of Cloud Computing Challenges and Its Security Concerns, Krishnun Sansurooah
Towards an organizational culture framework for information security practices, Joo Soon Lim, Shanton Chang, Atif Ahmad, and Sean Maynard
Protective Emblems in Cyber Warfare, Iain Sutherland, Konstantinos Xynos, Andrew Jones, and Andrew Blyth
An Australian Perspective on the Challenges for Computer and Network Security for Novice End-Users, Patryk Szewczyk
A Survey of Computer and Network Security Support from Computer Retailers to Consumers in Australia, Patryk Szewczyk
The 2012 Investigation into Remnant Data on Second Hand Memory Cards Sold in Australia, Patryk Szewczyk and Krishnun Sansurooah
Managing the Mapuche: Security and Identity collisions in Chile, Robyn Torok
SSH -- Somewhat Secure Host, Craig Valli
Eavesdropping on the Smart Grid, Craig Valli, Andrew Woodward, Clinton Carpene, Peter Hannay, Murray Brand, Reino Karvinen, and Christopher Holme
High temperature dry sliding friction and wear behavior of aluminum matrix composites (Al3Zr+α-Al2O3)/Al, Heguo Zhu, Cuicui Jar, Jinzhu Song, Jun Zhao, Jianliang Li, and Zonghan Xie
Submissions from 2009
Media hegemony, activism and identity: Muslim women re-presenting Muslim women, Anne Aly
The terrorists' audience: A model of internet radicalisation, Anne Aly
An Intervention to Increase Positive Attitudes and Address Misconceptions About Australian Muslims: A Call for Education and Open Mindedness, Anne Aly, Anne Pedersen, Lisa Hartley, and Craig McGarty
Risk culture influences in internet safety and security, S Atkinson, S M. Furnell, and A.D. Phippen
Consensual Security Risk Assessment: Overcoming Bias, Conflicting Interests and Parochialism, Benjamin Beard and David Brooks
Freegate: A defence against the pending censorship of Australia?, C Bolan and P Hannay
A spoofing attack against an EPC class one RFID system, Christopher Bolan
From desktop to mobile: Examining the security experience, Reinhardt A. Botha, Steven Furnell, and Nathan Clarke
Defeating biometric fingerprint systems: An applied testing methodology, David Brooks
Key concepts in security risk management: A psychometric concept map to approach to understanding, David Brooks
What is security: Definition through knowledge categorisation, David Brooks
Security Decay: An Entropic Approach to Definition and Understanding, M COOLE and David Brooks
Intelligence Support to Law Enforcement: Untangling the Gordian Knot, Jeffrey Corkill
Professional Intelligence Judgement Artistry: Some early observations, Jeffrey Corkill
The function of security in reducing women's fear of crime in open public spaces: A case study of serial sex attacks at a western australian university, Christopher J. Cubbage and Clifton Smith
Secure State Deletion: Testing the efficacy and integrity of secure deletion tools on Solid State Drives, Michael Freeman and Andrew Woodward
Smartpot: Creating a 1st generation smartphone honeypot, Michael Freeman and Andrew Woodward
Mobile security: A pocket guide, Steven Furnell
Scare Tactics - A viable weapon in the security war?, Steven Furnell, Maria Papadaki, and Kerry-Lynn Thomson
From culture to disobedience: Recognising the varying user acceptance of IT security, Steven Furnell and Kerry-Lynn Thomson
Recognising and addressing 'security fatigue', Steven Furnell and Kerry-Lynn Thomson
Fun & Games: an Introduction to Console Forensics, Peter Hannay
Satellite navigation forensics techniques, Peter Hannay
Firewire Forensics in Modern Operating Systems, Peter Hannay and Andrew Woodward
Culture jamming: from activism to hactivism, Kay Hearn, Rachel Mahncke, and Patricia Williams
Cyber influence, William Hutchinson
Security as an element in environmental assessment and decision making, William Hutchinson and Matthew Warren
Assessing the usability of personal internet security tools, T Ibrahim, S M. Furnell, M Papadaki, and N L. Clarke
Evaluating web-based user authentication using graphical techniques, MZ Jali, S M. Furnell, and PS Dowland
Use of a secure portable application device as a component of network centric operations, Peter James
Security requirements engineering-the reluctant oxymoron, Michael N. Johnstone
An introduction to digital forensics, Andrew Jones
A summary of thoughts, issues and problems, Andrew Jones
Conclusions and Final Thoughts, Andrew Jones
Developing the Business Plan, Andrew Jones
Establishing and Managing a Digital Forensics Laboratory, Andrew Jones
High technology crimes: case summaries, Andrew Jones
Networking, liaison and sources of information, Andrew Jones
Responding to crimes requiring computer forensic investigation, Andrew Jones
The computer forensics unit strategic, tactical, and annual plans, Andrew Jones
The future of digital forensics in the criminal justice system, Andrew Jones
Types of forensic investigation, Andrew Jones
Why are we not getting better at Data Disposal?, Andrew Jones
Workload management and the outsourcing option, Andrew Jones
The 2009 analysis of information remaining on USB storage devices offered for sale on the second hand market, Andrew Jones, Craig Valli, and G Dabibi
The 2008 analysis of information remaining on disks offered for sale on the second hand market, Andrew Jones, Craig Valli, Glenn Dardick, Iain Sutherland, and Gareth Davies
Lessons not learned on data disposal, Andy Jones
Application of latent moderated structuring (LMS) to rank the effects of intervening variables on the IT and firm performance relationship, Abbas Keramati, Glenn Dardick, Navid Majir, and Behdad Banan
Bluetooth Hacking: A Case Study, Gary C. Kessler and Dennis Browning
An Anomaly-based Intrusion Detection Architecture to Secure Wireless Network, SY Lim and Andrew Jones
Terror attacks: Understanding social risk views between Singaporean lay and security practitioners, Yam Hoo Loo and David Brooks
Measuring information security governance within general medical practice, Rachel Mahncke, Donald McDermid, and Patricia Williams
Challenges in improving information security practice in Australian general practice, Donald Mcdermid, Rachel Mahncke, and Patricia Williams
Playing Safe: A prototype game for raising awareness of social engineering, Michael Newbould and Steven Furnell
PCI compliance: Overcoming the challenges, Benjamin Ngugi, Gina Vega, and Glenn Dardick
Security education in Singapore: A study of knowledge structures in electronic security technology, C Phinney and Clifton Smith