Submissions from 2010
Breaches in Medical Information Security: The Problem of Reporting, Neha Patel and Patricia Williams
Defining appropriate options for post-closure land use of the Tamala Park Landfill in Western Australia, Marie Lourdes Raphael
Information technology capability within small-medium enterprises, Aurelio Ravarini
Employee Engagement with a Corporate Physical Activity Program: the Global Corporate Challenge, Pascal Scherrer, Lynnaire Sheridan, Ruth Sibson, Maria Ryan, and Nadine Henley
Interrogation of Water Catchment Data Sets Using Data Mining Techniques, Ajdin Sehovic, Leisa Armstrong, and Dean Diepeveen
Testing an exergame for effectiveness and attractiveness, Jeffrey Ronald Sinclair, Philip Hingston, Martin Masek, and Kazunori Nosaka
Assemblage turnover and taxonomic sufficiency of subtidal macroalgae at multiplespatial scales, Dan A. Smale, Gary A. Kendrick, and Thomas Wernberg
An Evaluation of Agile Software Methodology Techniques, Anuradha Sutharshan and Stanislaw Maj
An Efficient Method for Collecting Large Samples of Live Copepods Free from Detritus, Carl J Svensson, Glenn Hyndes, and Paul Lavery
The ADSL Router Forensics Process, Patryk Szewczyk
Ignorant Experts: Computer and Network Security Support From Internet Service Providers, Patryk Szewczyk and Craig Valli
An Analysis of Information Security Awareness within Home and Work Environments, Shuhaili Talib, Nathan Clarke, and Steven Furnell
The Western Australian charter boat industry: Working towards long-term sustainability, Carli Telfer
Ecological performance and possible origin of a ubiquitous but under-studied gastropod, Mad S. Thomsen, Thomas Wernberg, Fernando Tuya, and Brian Silliman
Proximity to rocky reefs alters the balance between positive and negative effects on seagrass fauna, Fernando Tuya, Mathew Vanderklift, Glenn Hyndes, Thomas Wernberg, Mads Thomsen, and Christine Hanson
Application of a Data Mining Framework for the Identification of Agricultural Production Areas in WA, Yunous Vagh, Leisa Armstrong, and Dean Diepeveen
Developing VoIP Router honeypots, Craig Valli and Mohammed Al Lawati
Geotagging Where Cyberspace Comes to Your Place, Craig Valli and Peter Hannay
Stable isotopes reveal a consistent consumer-diet relationship across hundreds of kilometres, Mathew A. Vanderklift and Thomas Wernberg
Fire in Rangelands and its Role in Management, Eddie Van Etten
A Graphical User Interface for the Visually Impaired - an Evaluation, David Veal and Stanislaw Maj
Origin, diversification and classification of the Australasian genus Dracophyllum (Richeeae, Ericaceae), Steven J. Wagstaff, Murray I. Dawson, Stephanus Venter, Jerome Munzinger, Darren M. Crayn, Dorothy A. Steane, and Kristina Lemson
Investigating the surface of solid gold electrode to improve the sensitivity of anodic stripping voltammetry for arsenic detection, Magdalena Wajrak
Investigation of electrochemically deposited arsenic on the surface of solid gold electrodes using SIMS, SEM and synchrotron soft X-rays, Magdalena Wajrak, Rob Hart, and Kathryn Prince
Turban Snails as Habitat for Foliose Algae: Contrasting Geographical Patterns in Species Richness, Thomas Wernberg, Fernando Tuya, Mads Thomsen, and Gary Kendrick
Contribution of temporal and spatial components to morphological variation in the kelp Ecklonia (Laminariales), Thomas Wernberg and Mathew Vanderklift
An ill-defined problem : effective biomedical informatics curriculum?, Patricia Williams
Improving Medical Information Security using Contextualization Models, Patricia Williams
Medical Information Security: Is it all too hard?, Patricia Williams
Exogenous Putrescine, Not Spermine or Spermidine, Enhances Root Mycorrhizal Development and Plant Growth of Trifoliate Orange (Poncirus trifoliata) seedlings, Qiangsheng Wu, Ying-Ning Zou, and Xinhua He
Construction of Similarity Profile of Dynamic Web Documents for Similarity-aware Web Content Management, Jitian Xiao
Cross-cultural learning challenges and teaching strategies for first-year Asian students in Australian universities, Jitian Xiao, Jie Lu, Kum Chin, Jun Xu, and Juan Yao
Autonomous Bee Colony Optimization for Multi-objective Function, F Zeng, James Decraene, Malcolm Low, Philip Hingston, C Wentong, Z Suiping, and M Chandramohan
Submissions from 2009
The challenge of preserving rural industries and traditions in ultraperipheral Europe: Evidence from the Canary Islands, Abel D. Alonso, Pascal Scherrer, and Lynnaire Sheridan
Media hegemony, activism and identity: Muslim women re-presenting Muslim women, Anne Aly
The terrorists' audience: A model of internet radicalisation, Anne Aly
An Intervention to Increase Positive Attitudes and Address Misconceptions About Australian Muslims: A Call for Education and Open Mindedness, Anne Aly, Anne Pedersen, Lisa Hartley, and Craig McGarty
An evaluation of Methodologies for eAgriculture in an Australian Context, Leisa J. Armstrong and Dean A. Diepeveen
An information-based decision support framework for eAgriculture, Leisa J. Armstrong and Dean A. Diepeveen
Feeding ecology of green turtles (Chelonia mydas) from Shoalwater Bay, Australia, Karen Arthur, Kathryn Mcmahon, Col Limpus, and William Dennison
Risk culture influences in internet safety and security, S Atkinson, S M. Furnell, and A.D. Phippen
Consensual Security Risk Assessment: Overcoming Bias, Conflicting Interests and Parochialism, Benjamin Beard and David Brooks
Peat fires and air quality: Volatile organic compounds and particulates, David J. Blake, Andrea L. Hinwood, and Pierre Horwitz
Freegate: A defence against the pending censorship of Australia?, C Bolan and P Hannay
A spoofing attack against an EPC class one RFID system, Christopher Bolan
From desktop to mobile: Examining the security experience, Reinhardt A. Botha, Steven Furnell, and Nathan Clarke
Clipping Mercury's Wings: The Challenge of Email Archiving, Mark Brogan
RMAA Technology Survey 2008: From mainstream to bleeding edge-technology in the RIM workspace, Mark Brogan and David Roberts
Defeating biometric fingerprint systems: An applied testing methodology, David Brooks
Key concepts in security risk management: A psychometric concept map to approach to understanding, David Brooks
What is security: Definition through knowledge categorisation, David Brooks
Water stress vulnerability of four Banksia species in contrasting ecohydrological habitats on the Gnangara Mound, Western Australia [journal article], Caroline Canham, Raymond Froend, and William Stock
Health and the nature of urban green spaces, May Elizabeth Carter
Tourism research to tourism practice: The need for adaptive institutions in Western Australia's Ningaloo region, Kelly Chapman, Pierre Horwitz, Pascal Scherrer, and Jeremy Northcote
The Alox5 gene is a novel therapeutic target in cancer stem cells of chronic myeloid leukemia, Yaoyu Chen, Dongguang Li, and Shaoguang Li
Cross-cultural learning and teaching in Australian universities, Kum Leng Chin, Jie Lu, Jun Xu, Jitian Xiao, and Juan Yao
Shade-induced response and recovery of the seagrass Posidonia sinuosa, Catherine Collier, Paul Lavery, Peter J Ralph, and Ray J Masini
Digital natives or digital refugees? Why we have failed Gen Y?, Barbara Combes
Generation Y: Are they really digital natives or more like digital refugees?, Barbara Combes
Security Decay: An Entropic Approach to Definition and Understanding, M COOLE and David Brooks
Intelligence Support to Law Enforcement: Untangling the Gordian Knot, Jeffrey Corkill
Professional Intelligence Judgement Artistry: Some early observations, Jeffrey Corkill
Global patterns of foliar nitrogen isotopes and their relationships with climate, mycorrhizal fungi, foliar nutrient concentrations, and nitrogen availability, Joseph Craine, Andrew Elmore, Marcos Aidar, Mercedes Bustamante, Todd Dawson, Erik Hobbie, Ansgar Kahmen, Michelle Mack, Kendra McLauchaln, Anders Michelsen, Gabriela Nardoto, Linda Pardo, Josep Penuelas, Peter Reich, Edward Schuur, William Stock, Pamela Templer, Ross Virginia, Jeffrey Welker, and Ian Wright
Grazing and landscape controls on nitrogen availability across 330 South African savanna sites, Joseph M Craine, Fiona Ballantyne, Michael Peel, Nick Zambatis, Carl Morrow, and William Stock
Allochthonous brown algae are the primary food source for consumers in a temperate, coastal environment, Karen Crawley, Glenn Hyndes, Mathew Vanderklift, Peter Nichols, and Andrew Revill
The function of security in reducing women's fear of crime in open public spaces: A case study of serial sex attacks at a western australian university, Christopher J. Cubbage and Clifton Smith
Fuel characteristics and dynamics in shrublands of the transitional rainfall zone, Western Australia, Sarah Dalgleish
Investigating data mining techniques for extracting information from Alzheimer's disease data, Vinh Quoc Dang
Applying Data Mining Techniques in the Selection of Plant Traits, Dean A. Diepeveen and Leisa J. Armstrong
Dietary preferences of two seagrass inhabiting gastropods: Allocthanous vs autochthanous resources, Christopher Doropoulos, Glenn Hyndes, Paul Lavery, and Fernando Tuya
Selecting Areas for Land Use Change in a Catchment, Neil Dunstan, Leisa J. Armstrong, and Dean A. A. Diepeveen
Effects of Multiple Disturbances in Seagrass Meadows: Shading Decreases Resilience to Grazing, Johan S Eklöf, Kathryn Mcmahon, and Paul Lavery
A Max-Min Multiobjective Technique to Optimize Model Based Test Suite, Usman Farooq and Chiou P. Lam
Evolving the Quality of a Model-Based Test Suite, Usman Farooq and Chiou P. Lam
Pines and the ecology of Carnaby‘s Black-Cockatoos (Calyptorhynchus latirostris) in the Gnangara sustainability strategy area, Hugh Finn, William Stock, and Leonie Valentine
Pines and the ecology of Carnaby‘s Black-Cockatoos (Calyptorhynchus latirostris) in the Gnangara Sustainability Strategy study area, Hugh Finn, William Stock, and Leonie Valentine
Secure State Deletion: Testing the efficacy and integrity of secure deletion tools on Solid State Drives, Michael Freeman and Andrew Woodward
Smartpot: Creating a 1st generation smartphone honeypot, Michael Freeman and Andrew Woodward
Mobile security: A pocket guide, Steven Furnell
Scare Tactics - A viable weapon in the security war?, Steven Furnell, Maria Papadaki, and Kerry-Lynn Thomson
From culture to disobedience: Recognising the varying user acceptance of IT security, Steven Furnell and Kerry-Lynn Thomson
Recognising and addressing 'security fatigue', Steven Furnell and Kerry-Lynn Thomson
Is it possible to use passive spectral characteristics of wireless network client devices for forensic identification purposes?, Luke Golygowski and Andrew Woodward
Fun & Games: an Introduction to Console Forensics, Peter Hannay
Satellite navigation forensics techniques, Peter Hannay
Firewire Forensics in Modern Operating Systems, Peter Hannay and Andrew Woodward
Selective uptake of prokaryotic picoplankton by a marine sponge (Callyspongia sp.) within an oligotrophic coastal system, Christine Hanson, Martin Mclaughlin, Glenn Hyndes, and Joanna Strzelecki
Consequences of climate-driven biodiversity changes for ecosystem functioning of North European rocky shores, Stephen Hawkins, Heather Sugden, Nova Mieszkowska, Philippa Moore, Elvira Poloczanska, Rebecca Leaper, Roger Herbert, Martin Genner, Paula Moschella, Richard Thompson, Stuart Jenkins, Alan Southward, and Michael Burrows
Culture jamming: from activism to hactivism, Kay Hearn, Rachel Mahncke, and Patricia Williams
A Turing Test for Computer Game Bots, Philip Hingston
Iterated Prisoner's Dilemma for Species, Philip Hingston
Wetland Invertebrate Richness and Endemism on the Swan Coastal Plain, Western Australia, Pierre Horwitz, Ruth Rogan, Stuart Halse, Jenny Davis, and Beate Sommer
Cultural conservation biology, Pierre Horwitz and Grant Wardell-Johnson
Cyber influence, William Hutchinson
Security as an element in environmental assessment and decision making, William Hutchinson and Matthew Warren
Assessing the usability of personal internet security tools, T Ibrahim, S M. Furnell, M Papadaki, and N L. Clarke
Evaluating web-based user authentication using graphical techniques, MZ Jali, S M. Furnell, and PS Dowland
Use of a secure portable application device as a component of network centric operations, Peter James