Submissions from 2006
The implementation of E-mail content management in a large corporation, Keir Hansen and Craig Valli
Honeypots: How do you know when you're inside one?, Simon Innes and Craig Valli
The 2006 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market, Andrew Jones, Craig Valli, Iain Sutherland, and Paula Thomas
A global review of information remaining on disks disposed of by organisations, Andy Jones
Evaluation of end-user application security from a usability perspective, Dimitris Katsabas, Steven Furnell, and Paul Dowland
Risks and responsibilities in establishing a wireless network for an educational institution, Leigh Knights, Matt Fonceca, Georgina Mack, and Andrew Woodward
Risk and Restitution: Assessing how users establish online trust, Hazel Lacohee, Andy Phippen, and Steven Furnell
Secure transmission of shared electronic health records, Rachel Mahncke and Patricia Williams
A study of the compliance of alarm installations in Perth, Western Australia: Are security alarm systems being installed to Australian Standard AS2201.1 - 'systems installed in a client's premises', Robert Mclaughlin and David J. Brooks
A Forensic Log File Extraction Tool for ICQ Instant Messaging Clients, Kim Morfitt and Craig Valli
Achieving Automated Intrusion Response: A Prototype Implementation, Maria Papadaki and Steven Furnell
Designing and explaining programs with a literate pseudocode, Geoffrey Roy
An assessment of threats of the Physical and MAC Address Layers in WiMAX/802.16, Krishnun Sansurooah
A Digital forensic practitioner's guide to giving evidence in a court of law, Shayne Sherman
Personal Firewalls - Testing Robustness, Patryk Szewczyk and Craig Valli
Tags at war: A review of the United States Department of Defence RFID tag data standard, Nadezda Urosevic and Christopher Bolan
SQL Injection - Threats to Medical Systems: The Issues and Countermeasures, Craig Valli
Use of bootable Linux CDs for the delivery of educational course content, Craig Valli
Telemedicine and the digital door doctor, Darren Webb and Patricia Williams
Apprasing information security rituals in primary care medical practice, Patricia Williams
Making research real: Is action research a suitable methodology for medical information security, Patricia Williams
Security immunization using basic countermeasures, Patricia Williams
The role of standards in medical information security: an opportunity for improvement, Patricia Williams
Primary care information security: a case study for practical assistance, Patricia Williams and Rachel Mahncke
Shared Electronic Health Records: A changing landscape for security in medical practice, Patricia Williams and Rachel Mahncke
Data Security and wireless networks - mutually exclusive?, Andrew Woodward
LIARS: Laptop Inspector and Recovery System, Andrew Woodward
Submissions from 2005
RFID-Evaluation of Tag Security Schemes, Christopher Bolan
The Growth of 802.11b and 802.11g Networks in the Perth CBD, Western Australia, Christopher Bolan
The introduction of RFID Security into computer security courses, Christopher Bolan
Is CCTV a social benefit? Is psychometric study of perceived social risk, David Brooks
Authentication of users on mobile telephones - A survey of attitudes and practices, Nathan Clarke and Steven Furnell
User Authentication for Mobile Devices: A Composite Approach, Nathan Clarke and Steven Furnell
A protection profiles approach to risk analysis for small and medium enterprises, Vassilis Dimopoulos and Steven Furnell
A Security Infrastructure for Cross-Domain Development of Script-Based Business Processes in SOC Environments, Klaus Fischer, Udo Bleimann, Woldemar Fuhrmann, and Steven Furnell
TCP performance estimation using neural networks modelling, Bogdan Ghita, Steven Furnell, Benn Lines, and Emmanuel Ifeachor
Using human computer interaction principles to promote usable security, D Katsabas, S M. Furnell, and P S. Dowland
A computer network laboratory based on the concept of virtual machines, Wojciech Kuczborski
Artifical Impostor Profiling for Keystroke Analysis on a Mobile Handset, Julien Lecomte, Nathan Clarke, and Steven Furnell
After Conversation - A Forensic ICQ Logfile Extraction Tool, Kim Morfitt and Craig Valli
Effects of Steganography In The Business World: How Mobile Devices Can Make A Difference, Danny Ng
HTTP-aware anonymisation of packet traces, Eric Salama, Bogdan Ghita, and Steven Furnell
Individuals perceptions of wireless security in the home environment, Patryk Szewczyk
Securing PDAs in the healthcare environment, Emiko Terado and Patricia Williams
Honeypot Technologies and Their Applicability as an Internal Countermeasure, Craig Valli
Integrating Open Source Protections into SCADA Networks, Craig Valli
A UK and Australian Study of Hard Disk Disposal, Craig Valli and Andrew Jones
An Investigation into the Efficiency of Forensic Erasure Tools for Hard Disk Mechanisms, Craig Valli and Paul Patak
An Investigation into Long Range Detection of Passive UHF RFID Tags, Craig Valli, Andrew Woodward, Ken Wild, and Reino Karvinen
Awareness invoking positive change: Reflections on lecturing practice in Computer and Information Science, Patricia Williams
Information security awareness of medical practitioners, Patricia Williams
Physician secure thyself, Patricia Williams
The underestimation of threats to patients data in clinical practice, Patricia Williams
Where are the policies for PDA usage in the Australian healthcare environment?, Patricia A. H. Williams
Using online courseware for information literacy skills development in a multinational program, Patricia Williams and Julie Johnson
A new breed of risk: Electronic medical records security, Patricia Williams and Rachel Mahncke
Investigating student interaction: A forum analysis, Patricia Williams and Rachel Mahncke
The blurring of on-campus and off-campus education: A position paper, Patricia Williams and Rachel Mahncke
Elicitation and customisation of generic skills in a security major, Patricia Williams and Andrew Woodward
The effectiveness of commercial erasure programs on BitTorrent activity, Andrew Woodward
WPA/WPA2: Placebo or Panacea?, Andrew Woodward
Submissions from 2003
Security management education online, Peter J. Hosie, Clifton L. Smith, and Joseph Luca
A new minor in network administration and design, Wojciech Kuczborski
High-Radix Arithmetic Systems on Signed Digit Number Representation and Residue Number System, Wojciech Kuczborski
The significance of virtual computer networks in distance education, Wojciech Kuczborski
Socialism in Mozambique? The 'Mozambican revolution' in critical perspective, David Robinson
Honeyd - A OS Fingerprinting Artifice, Craig Valli
Industry Certification: Challenges for the conduct of University security based courses, Craig Valli
An Initial Investigation into the Performance of the Honeyd Virtual Honeypot System, Craig Valli and Nirbhay Gupta
A Case Study in the Security of Network-Enabled Devices, Simeon Xenitellis and Craig Valli