Follow

Submissions from 2007

Link

An implementation of the method of aperture meridians for the ISO/CIE standard general sky, Geoffrey Roy, R. Kittler, and S. Darula

Link

An overview and examination of digital PDA devices under forensics toolkits, Krishnun Sansurooah

Link

Intrusion Dection System (IDS) Techniques and Responses for Mobile Wireless Networks, Krishnun Sansurooah

Link

Beyond chip monks and paper tigers: Towards a new culture of archival format specialists, Joanna Sassoon

Link

Sharing our story. An archaeology of archival thought, Joanna Sassoon

Link

Keeping up to date with history: Indigenous people and the recordkeeping professions, Joanna Sassoon, Kirsten Thorpe, and Anne Wright

Link

Cryptic diversity in Engaeus Erichson, Geocharax Clark and Gramastacus Riek (Decapoda:Parastacidae) revealed by mitochondrial 16S rDNA sequences, Mark B. Schultz, Sarah A. Smith, Alastair MM Richardson, Pierre Horwitz, Keith A. Crandall, and Christopher M. Austin

PDF

The systemic nature of critical infrastructure protection using a medium sized company as the case study, Jeffery Sewell

PDF

The value of oil mallee plantations and revegetated farm land in the southern wheatbelt region of Western Australia for the conservation of the Western Pygmy Possum (Cercartetus concinnus), Marie Short

Link

Considerations for the design of exergames, Jeffrey Ronald Sinclair, Philip Hingston, and Martin Masek

Information seeking behaviour of Electronic Document and Records Management Systems (EDRMS) users: implications for records management practices, Pauline Singh, Jane E. Klobas, and Karen Anderson

Link

Information Seeking Behaviour of Electronic Records Management Systems (ERMS) Users: Implications for Records Management Practices, Pauline Singh, Jane E. Klobas, and Karen Anderson

PDF

Using machine learning techniques to create AI controlled players for video games, Bhuman Soni

Link

Field survival and growth of clonal, micropropagated Eucalyptus marginata selected for resistance to Phytophthora cinnamomi, M. Stukely, C. Crane, J. McComb, and Ian J. Bennett

Link

Food web analysis in two permanently open temperate estuaries: consequences of saltmarsh loss?, CJ Svensson, Glenn Hyndes, and Paul Lavery

Link

ADSL router forensics part 1: An introduction to a new source of electronic evidence, Patryk Szewczyk

Link

An examination of the Asus WL-HDD 2.5 as a nepenthes malware collector, Patryk Szewczyk

PDF

Success? The impact of involving customers in E-commerce development, Julian Terry and Craig Standing

Link

Alien macroalgae in Denmark - a broad-scale national perspective, Mads S. Thomsen, Thomas Wernberg, Peter Stææhr, Dorte Krause-Jensen, Nils Risgaard-Petersen, and Brian R. Silliman

PDF

An investigation of network management methods, Bao Tran

Link

A New Taxonomy for Comparing Intrusion Detection Systems, CJ Tucker, Steven Furnell, BV Ghita, and PJ Brooke

Link

Bathymetric segregation of sea urchins on reefs of the Canarian Archipelago: Role of flow-induced forces, Fernando Tuya, J. Cisneros-Aguirre, L. Ortega-Borges, and R. J. Haroun

PDF

The use of the internet as a bibliotherapeutic tool for parents with children with disabilities or special needs : an exploratory study, Lynsey Uridge

Link

Food web interactions along seagrass–coral reef boundaries: Effects of piscivore reductions on cross-habitat energy exchange, J. F. Valentine, K. L. Heck Jr., D. Blackmon, M. E. Goecker, J. Christian, R. M. Kroutil, K. D. Kirsch, B. J. Peterson, M. Beck, and Mathew A. Vanderklift

Link

Honeypot Technologies and Their Applicability as a Strategic Internal Countermeasure, Craig Valli

PDF

IT Sharps: Issues Relating to Securely Disposing of Hard Disks From Medical Information Systems, Craig Valli

Link

Oops they did it again: The 2007 Australian study of remnant data contained on 2nd hand hard disks, Craig Valli and Andrew Woodward

Link

An overview of ADSL homed nepenthes honeypots in Western Australia, Craig Valli and Aaron Wooten

Defunking Dewey: Taking fiction out of the equation, Robyn Valli and Barbara Combes

Link

Proximity to reef influences density of small predatory fishes, while type of seagrass influences intensity of their predation on crabs, Mathew A. Vanderklift, Jason How, Thomas Wernberg, Lachlan D. MacArthur, K. L. Heck Jr., and J. F. Valentine

PDF

A GUI for the Deaf-Blind: An additional concepts paper, David Veal

Improving security for vision impaired ATM access via dynamic patterns, David Veal

PDF

IT Devices and Energy Consumption, David Veal

PDF

Some problems in Network and Data Centre Management, David Veal and Gurpreet Kohli

State model diagrams and home security system control , David Veal and Stanislaw Maj

Link

A Bipartite Graph Matching Approach to Generate Optimal Test Sequences for Protocol Conformance Testing, Jun Wang, Huaizhong Li, Jitian Xiao, and Chiou Peng Lam

Link

Vulnerability of seagrasses in the Great Barrier Reef to climate change, M Waycott, C Collier, Kathryn Mcmahon, P Ralph, Len McKenzie, J Udy, and A Grech

Link

Description of grinding patches found on granite bedrock near Cue, in central Western Australia, and a discussion of their significance, R. Esmee Webb

Link

A holistic perspective on models for medical information security, Patricia Williams

PDF

Information Governance: A Model for Security in Medical Practice, Patricia Williams

Link

Medical data security: Are you informed or afraid?, Patricia Williams

Link

Medical insecurity: when one size does not fit all, Patricia Williams

The effects of IT on information culture in general medical practice, Patricia Williams

PDF

An investigation into information security in general medical practice, Patricia A. Williams

PDF

Do Current Erasure Programs Remove Evidence of BitTorrent Activity?, Andrew Woodward and Craig Valli

Link

Wireless Rx - Risk assessment and recommendations for securing a wireless network in a medical practice, Andrew Woodward and Patricia Williams

A similarity-aware web content caching scheme and agent-based web document pre-fetching, Jitian Xiao

Sequencing Clusters of Spatial Join Operations Using Weighted Match, Jitian Xiao

Link

A Systematic Approach to Automatically Generate Test Scenarios from UML Activity Diagrams, Dong Xu, Huaizhong Li, and Chiou Peng Lam

PDF

Profiling Through a Digital Mobile Device, Lee Fueng Yap and Andrew Jones

PDF

The development of an attack vector using applied levels of deceptive strategy for directing attack in a honeynet, Suen Yek

Link

Functional group identity does not predict invader impacts: differential effects of nitrogen-fixing exotic plants on ecosystem function, Stephanie Yelenik, William Stock, and David M Rickhardson

Submissions from 2006

The AtmosFear of terror: Australian Muslims as Objects of Fear and Othering, Anne Aly

Link

Mobile handset forensic evidence: a challenge for law enforcement, Marwan Al-Zarouni

PDF

Developing recordkeeping: Australians working together, Karen Anderson

Link

Using online Discussion to Provide an Authentic Learning Experience for Professional Recordkeepers, Karen Anderson

Link

Empowering International and Culturally Diverse Honours and Project Students Through Mentoring Activities, Leisa J. Armstrong and Sundrakanthi Singh

PDF

Fixture-scheduling for the Australian Football League using a Multi-objective Evolutionary Algorithm, Luigi Barone, Lyndon While, Paul Hughes, and Philip Hingston

PDF

The effects of light reduction treatments on mobile Epifaunain an Amphibolis Griffithii (black) den Hartog seagrass ecosystem, Helen Barwick

Link

Security risk assessment: Group approach to a consensual outcome, Benjamin Beard and David J. Brooks

Link

The effect of nitrogen source and concentration, medium pH and buffering on in vitro shoot growth and rooting in Eucalyptus marginata, Ian Bennett, Andrew Woodward, and Surachai Pusswonge

Link

Strategies for the blocking of RFID tags, C Bolan

Link

Do no harm: The use of RFID tags in a medical environment, Christopher Bolan

Link

The Lazarus Effect: Resurrecting Killed RFID Tag, Christopher Bolan

Link

Application of electrokinetic chromatography to food and beverages, Mary Boyce

Link

Managing information security complexity, Murray Brand

PDF

Transformation theory and e-commerce adoption, Mark P. Brogan

Link

Mapping the consensual knowledge of security risk management experts, David Brooks

Teaching Web Applications Development in a Fully Online Environment: Challenges, Approaches and Implementation, Justin Brown

Link

What are they taking us for? The Participatory Nature of Western Australia's Regional Forest Agreement Process, Martin Brueckner, John Duff, Richard Mckenna, and Pierre Horwitz

Link

Emus as non-standard seed dispersers and their potential for long-distance dispersal, Maria Calvino-Cancela, Robert Dunn, Eddie Van Etten, and Byron Lamont

PDF

Water stress vulnerability of four Banksia species in contrasting Ecohydrological habitats on the Gnangara Mound, Western Australia, Caroline Canham

Link

Modelling layer 2 and layer 3 device bandwidth using B-Node theory, Steven Cikara, Stanislaw Maj, and David Thomas Shaw

Link

A Composite User Authentication Architecture for Mobile Devices, Nathan Clarke and Steven Furnell

PDF

An automated sampling soil reduction-oxygenation RF sensor network for cereal crop management, Michael Collins, Christopher C. Holme, Keng T. Tan, and Leisa Armstrong

PDF

Opening Pandora's box: Teacher librarianship in the twenty-first century, Barbara Combes

Link

Techno savvy and all-knowing or techno-oriented? Information seeking behaviour and the Net Generation, Barbara Combes

Link

Techno savvy or techno oriented: Who are the Net Generation?, Barbara Combes

Link

Visions of learning (ASLA Online II Conference Preceedings), Barbara Combes

Link

Supporting first year e-learners in courses for the information professions, Barbara Combes and Karen Anderson

Link

Influence of different volumes and types of detached macrophytes on fish community structure in surf zones of sandy beaches, Karen Crawley, Glenn Hyndes, and Susanne Ayvazian

PDF

Detached macrophyte accumulations in surf zones: Significance of macrophyte type and volume in supporting secondary production, Karen Ruth Crawley

Link

Does your wireless LAN have criminal intent?, Michael Crowley and Andrew Woodward

PDF

Coastal aquaculture and conservation can work together, Tim Dempster, Pablo Sanchez-Jerez, Fernando Tuya, Damian Fernandez-Jover, Just Bayle-Sempere, Arturo Boyra, and Ricardo Haroun

Link

Groundwater-Dependent Ecosystems: The Where, What and Why of GDEs, Derek Eamus and Raymond Froend

Link

A Functional Methodology for Determining the Groundwater Regime Needed to Maintain the Health of Groundwater-Dependent Vegetation, Derek Eamus, Raymond Froend, Robyn Loomes, Grant Hose, and Brad Murray

Link

Guia visual de Especies Marinas de Canarias, Fernando Espino, Arturo Boyra, Fernando Tuya, and Ricardo J Haroun

Link

Security-relevant semantic patterns of BPEL in cross-organisational business processes, K P Fischer, U Bleimann, W Fuhrmann, and S M. Furnell

Link

Differences in kelp morphology between wave sheltered and exposed localities: Morphologically plastic or fixed traits?, Meegan Fowler-Walker, Thomas Wernberg, and Sean Connell

Link

Defining Phreatophyte Response to Reduced Water Availability: Preliminary Investigations on the Use of Xylem Cavitation Vulnerability in Banksia Woodland Species, Raymond Froend and Paul Drake

Link

The challenges of understanding and using security: A survey of end-users, Steven Furnell, A Jusoh, and D Katsabas

PDF

Determining carbon and nitrogen stable isotope discrimination for marine consumers, Emily N. Gates

Assessing the usability of WLAN security for SOHO users, Bogdan Ghita and Steven Furnell

PDF

The challenges of ITIL implementations, Jason Gray

PDF

A Study of the Impact of the Affect Heuristic on the Risk Perception of Security Experts, Zack A. Gurdon

Link

A methodology for the examination of the effectiveness of secure erasure tools running on Windows XP - research in progress, Anthony Hadfield, Michael Ahern, Leo Sell, and Andrew Woodward

Link

The implementation of E-mail content management in a large corporation, Keir Hansen and Craig Valli

PDF

Reintroduction ecology of mala (Lagorchestes hirsutus) and merrnine (Lagostrophus fasciatus) at Shark Bay, Western Australia, Blair Hardman

Link

Importance of diurnal refugia to a hare-wallaby reintroduction in Western Australia, Blair Hardman and Dorian Moro

PDF

The influence of seabird-derived nutrients on island ecosystems in the oligotrophic marine waters of south-western Australia, Sofie A. Harrison