Submissions from 2009
Raising heart rate with dance pad based computer games, Martin Masek, Philip Hingston, Matthew Carrigy, Liam Collins, and Kazunori Nosaka
PAX3 Across the Spectrum: From Melanoblast to Melanoma, Sandra Medic and Melanie Ziman
Comparison between electrically evoked and voluntary isometric contractions for biceps brachii muscle oxidative metabolism using near-infrared spectroscopy, Makii Mishan Muthalib, Marc Jubeau, Guillaume Y. Millet, Nicola A. Maffiuletti, and Kazunori Nosaka
Synchronous Asynchronicity: The Use of Mobiles to Pattern Face-to-Face Encounters in Chaotic Environments, Jason Raymond Noble and Lelia Rosalind Green
Nano-Structured Magnetic Photonic Crystals for Magneto-Optic Polarization Controllers at the Communication-band Wavelengths, Mohammad Nur-E-Alam, Mikhail Vasiliev, and Kamal Alameh
The 2009 Personal Firewall Robustness Evaluation, Ken Pydayya, Peter Hannay, and Patryk Szewczyk
Using a Virtual Body to Aid in Exergaming System Development, Jeffrey Ronald Sinclair, Philip Hingston, Martin Masek, and Kazunori Nosaka
Management practices and the valuing of sessional staff, Heather Sparrow
Surviving and sustaining teaching excellence: A narrative of ‘entrapment’, Heather Sparrow
A technology ecosystem perspective on hospital management information systems: Lessons from the health literature, Craig Standing and Christopher Bain
The use and perception of e-marketplaces: An institutional perspective, Craig Standing, Ian Michael Sims, and Susan Standing
The relationship between electronic marketplace strategy and structure, Susan Standing and Craig Standing
Ambassadorial role playing as a competitive advantage in international hospitality: Pourquoi Pas?, Charlotte Tocanne and Alfred Ogle
RF magnetron sputtered (BiDy)3(FeGa)5O12:Bi2O3 composite garnet-oxide materials possessing record magneto-optic quality in the visible spectral region, Mikhail Vasiliev, Mohammad Alam, V.A. Kotov, Kamal Alameh, V.I. Belotelov, V.I. Burkov, and A.K. Zvezdin
Higher education students’ perceptions of effective assessment, Julia Wren, Heather Sparrow, Jeremy Northcote, and Sue Sharp
A new algorithm to improve mobile sensor node connectivity based on link quality indicator, Kartinah Zen, Daryoush Habibi, and Iftekhar Ahmad
Submissions from 2008
iPhone forensics methodology and tools, Haitham Al-Hajri and Krishnun Sansurooah
Organisational security: A propositional study to map expert knowledge, Adel Alruwaii and David Brooks
Psychometric risk perception: Why some individuals elect not to act on risks?, Jaber Alsuhaimi and David Brooks
Digital forensics and the legal system: A dilemma of our times, James Tetteh Ami-Narh and Patricia Williams
Digital forensics and the legal system: A dilemma of our times, James Tetteh Ami-Narh and Patricia A.H. Williams
Freedom fighters or terrorists by another name?, William J. Bailey and Adam Mcgill
Soft Computing In The Forecasting Of The Stock Exchange Of Thailand, Suchira Chaigusin, Chaiyaporn Chirathamjaree, and Judith Clayden
Australia's oil refining industry - Importance, threats and emergency response, Amanda East and William Bailey
A dynamic four-dimensional model of occupational balance, Kiah Evans
Testing parallelization paradigms for MOEAs, Sadeesha Gamhewa and Philip Hingston
Drift, Susie Greenhill
An examination of corporate social disclosures in the annual reports of Indonesian listed companies, Juniati Gunawan, Geri Djajadikerta, and George Smith
Willingness to buy non-deceptive counterfeit products: A case study of Indonesian consumers, Anas Hidayat, Katherine Mizerski, and Madeleine Ogilvie
Preventing the Acquisition of Data from Virtual Machine based Secure PortableExecution Environments, Peter James
Secure Portable Execution Environments: A Review of Available Technologies, Peter James
Stepped mirrored structures for generating true time delays in stationary optical delay line proof-of-principle experiments for application to optical coherence tomography, Paul V. Jansz, G Wild, and Steven Hinckley
A micro-photonic stationary optical delay line for fibre optic time domain OCT, Paul V. Jansz, Graham Wild, and Steven Hinckley
A comparison of wet and dry etching to fabricate a micro-photonic structure for use in OCT, Paul Jansz, G Wild, and Steven Hinckley
A proposed fibre optic time domain optical coherence tomography system using a micro-photonic stationary optical delay line, Paul Jansz, G Wild, and Steven Hinckley
A new definition of piracy in South East Asia required?, Paul Kevans and William J. Bailey
Nocturnally active western rock lobsters, Panulirus cygnus, forage close to shallow coastal reefs, Lachlan D. MacArthur, Glenn A. Hyndes, R. Babcock, and Mathew Vanderklift
Australian Defense Force Policy and the use of WPA2 as a security option for deployment of 802.11 wireless devices in the field, Drew Mceniery and Andrew Woodward
Luxury purchases by working class, middle aged males in regional Western Australia, Brad Orr, Kate Mizerski, Natalie Collins, and Jamie Murphy
Evaluation Of An Optical Image Sensor For Use In The Microphotonic Real-Time Vegetation Discrimination System, Arie Paap, Sreten Askraba, Kamal Alameh, and John Rowe
Photonic-based spectral reflectance sensor for ground-based plant detection and weed discrimination, Arie Paap, Sreten Askraba, Kamal Alameh, and John Rowe
Data recovery from PalmmsgV001, Satheesaan Pasupatheeswaran
Email 'Message-IDs' helpful for forensic analysis?, Satheesaan Pasupatheswaran
Subverting national internet censorship-an investigation into existing tools and techniques, Jason Smart, Kyle Tedeschi, Daniel Meakins, Peter Hannay, and Christopher Bolan
Bots Trained to Play Like a Human are More Fun, Bhuman Soni and Philip Hingston
Teaching awards and their impact on university teachers' sense of self-worth, Heather Sparrow
What's in it for me: The role of personal goals in student persistence and success, Heather Sparrow, Adrianne Kinnear, Mary C. Boyce, Sharon Middleton, and Marguerite Mary Cullity
An Analysis of E-Marketplace Literature, Craig Standing, Susan Standing, and Peter Love
We've thrown away the pens, but are they learning? Using blogs in higher education, Katrina Strampel and Ron Oliver
Malware, Viruses and Log Visualisation, Iain Swanson
Virtual Environments Support Insider Security Violations, Iain Swanson and Patricia Williams
Virtual Environments Support Insider Security Violations, Iain Swanson and Patricia A.H. Williams
Malware Detection and Removal: An Examination of Personal Anti-Virus Software, Patryk Szewczyk and Murray Brand
The impact of U3 devices on forensic analysis, Ravi Tank and Patricia Williams
The Impact of U3 Devices on Forensic Analysis, R. Tank and Patricia A.H. Williams
Decision support systems to support international students: Potential for practice?, Khumphicha Tantisantisom and Judith Clayden
Introducing a new technology to enhance community sustainability: An investigation of the possibilities of sun spots, Suppachart Tantisureeporn and Leisa J. Armstrong
The Malware Analysis Body of Knowledge (MABOK), Craig Valli and Murray William Brand
Luteinizing Hormone Levels are Positively Correlated with Plasma Amyloid-beta Protein Levels in Elderly Men, Giuseppe Verdile, Bu Yeap, Roger Clarnette, Satvinder Dhaliwal, Melanie Burkhardt, S A Paul Chubb, Karl De Ruyck, Mark Rodrigues, Pankaj D. Mehta, Jonathan Foster, David Bruce, and Ralph Martins
Web-based Courses to Support EFL Learning for Pre-service Teachers: A Thai Pilot Study, Vijittra Vonganusith and Pagram Jeremy
Distinct Effects of Testosterone on Plasma and Cerebrospinal Fluid Amyloid-beta Levels, Eka Wahjoepramono, Linda Wijaya, Kevin Taddei, Georgia Martins, Matthew Howard, Karl De Ruyck, Kristyn Bates, Satvinda Dhaliwal, Giuseppe Verdile, Malcolm Carruthers, and Ralph Martins
Improving the IEEE802.15.4 Re-Association Process in Mobile Sensor Networks, Kartinah Zen and Daryoush Habibi
Improving Mobile Sensor Connectivity Time in the IEEE 802.15.4 Networks, Kartinah Zen, Daryoush Habibi, and Iftekhar Ahmad
Performance Evaluation of IEEE 802.15.4 for Mobile Sensor Network, Kartinah Zen, Daryoush Habibi, Alexander Rassau, and Iftekhar Ahmad
Submissions from 2007
The effectiveness of investigative tools for Secure Digital (SD) Memory Card forensics, Haitham Al Hajri and Patricia Williams
The effectiveness of investigative tools for Secure Digital (SD) Memory Card forensics, Haitham Al-Hajri and Patricia Williams
Modelling interstate tourism demand in Australia: A cointegration approach, David Allen, Ghialy Yap, and Riaz Shareef
Introduction to Mobile Phone Flasher Devices and Considerations for their Use in Mobile Phone Forensics, Marwan Al-Zarouni
A Proof-of-Concept Project for Utilizing U3 Technology in Incident Response, Marwan Al-Zarouni and Haitham Al-Hajri
Taxonomy of iPhone Activation and SIM Unlocking Methods, Marwan Al-Zarouni and Haitham Al-Hajri
The need for a security/privacy model for the health sector in Ghana, James Tetteh Ami-Narh and Patricia Williams
The need for a security/privacy model for the health sector in Ghana, James Tetteh Ami-Narh and Patricia A. Williams
Data mining can empower grower's crop decision making, L. Armstrong, Y. Vaugh, and D. Diepeveen
Light-emitting diode-compatible probes for indirect detection of anions in CE, Peter Balding, Mary Boyce, MC Breadmore, and M Macka
Opening up thinking: Reflections of group work in a bilingual postgraduate program, Margaret Bowering, Bridget M. Leggett, Michael Harvey, and Leng Hui
A Comprehensive Firewall Testing Methodology, Murray Brand
Forensic analysis avoidance techniques of malware, Murray Brand
Information Dichotomy Article Schools Version, Barbara Combes and Robyn Valli
Methodological concerns for determining power output in the jump squat, Prue Cormie, R Deane, and JM McBride
The influence of body mass on calculation of power during lower body resistance exercises, Prue Cormie, JM McBride, and GO McCaulley
The role of different types of detached macrophytes in the food and habitat choice of a surf-zone inhabiting amphipod, Karen R. Crawley and Glenn A. Hyndes
Variation among diets in discrimination of delta13C and delta15N in the amphipod Allorchestes compressa, Karen R. Crawley, Glenn A. Hyndes, and Mathew A. Vanderklift
Explaining IT usage in the non-government human service organisation (NGHSO), Zane D'Mello and Philip Dobson
Making the case for critical realism: Examining the implementation of automated performance management systems, Phillip Dobson, John Myles, and Paul Jackson
A dynamic four-dimensional model of occupational balance, Kiah Evans
Increasing security in the physical layer of wireless communication, Luke Golygowski
Information Security Surveys: A Review of the Methodologies, the Critics and a Pragmatic Approach to their Purposes and Usage., Alexis Guillot and Sue Kennedy
Technological Barriers to Successful eLearning in Computer Science, Yuwanuch Gulatee and Barbara Combes
Corporate social disclosures by Indonesian listed companies: A pilot study, Juniati Gunawan
Minimizing the Number of Constraints for Shared Backup Path Protection (SBPP) in Shared Risk Link Group (SRLG) Optical Mesh Networks, Daryoush Habibi, Viet Quoc Phung, and Hoang N. Nguyen
Pocket SDV with SDGuardian: A Secure & Forensically Safe Portable Execution Environment, Peter Hannay and Peter James
A forensically tested tool for identification of notebook computers to aid recovery: LIARS phase I proof of concept, Peter Hannay, Andrew Woodward, and Nic Cope
Network Security – Is IP Telephony Helping The Cause?, Paul Hansen and Andrew Woodward
The Need for an Investigation into Possible Security Threats Associated with SQL Based EMR software, Lee Heinke
Mood 300 IPTV decoder forensics, An Hilven
How safe is Azeroth, or, are MMORPGs a security risk?, An Hilven and Andrew Woodward
Steganalysis in computer forenics, Ahmed Ibrahim
Bait Uptake and Caching by Red Foxes and Nontarget Species in Urban Reserves, Jennifer Jackson, Dorian Moro, Peter Mawson, Mark Lund, and Amanda Mellican
Can SDV technology be utilised in a smartphone to prevent forensic analysis?, Peter James
Securing VoIP: A Framework to Mitigate or Manage Risks, Peter James and Andrew Woodward