Submissions from 2009
Effects of Multiple Disturbances in Seagrass Meadows: Shading Decreases Resilience to Grazing, Johan S Eklöf, Kathryn Mcmahon, and Paul Lavery
A Max-Min Multiobjective Technique to Optimize Model Based Test Suite, Usman Farooq and Chiou P. Lam
Evolving the Quality of a Model-Based Test Suite, Usman Farooq and Chiou P. Lam
Pines and the ecology of Carnaby‘s Black-Cockatoos (Calyptorhynchus latirostris) in the Gnangara sustainability strategy area, Hugh Finn, William Stock, and Leonie Valentine
Pines and the ecology of Carnaby‘s Black-Cockatoos (Calyptorhynchus latirostris) in the Gnangara Sustainability Strategy study area, Hugh Finn, William Stock, and Leonie Valentine
Secure State Deletion: Testing the efficacy and integrity of secure deletion tools on Solid State Drives, Michael Freeman and Andrew Woodward
Smartpot: Creating a 1st generation smartphone honeypot, Michael Freeman and Andrew Woodward
Mobile security: A pocket guide, Steven Furnell
Scare Tactics - A viable weapon in the security war?, Steven Furnell, Maria Papadaki, and Kerry-Lynn Thomson
From culture to disobedience: Recognising the varying user acceptance of IT security, Steven Furnell and Kerry-Lynn Thomson
Recognising and addressing 'security fatigue', Steven Furnell and Kerry-Lynn Thomson
Is it possible to use passive spectral characteristics of wireless network client devices for forensic identification purposes?, Luke Golygowski and Andrew Woodward
Fun & Games: an Introduction to Console Forensics, Peter Hannay
Satellite navigation forensics techniques, Peter Hannay
Firewire Forensics in Modern Operating Systems, Peter Hannay and Andrew Woodward
Selective uptake of prokaryotic picoplankton by a marine sponge (Callyspongia sp.) within an oligotrophic coastal system, Christine Hanson, Martin Mclaughlin, Glenn Hyndes, and Joanna Strzelecki
Consequences of climate-driven biodiversity changes for ecosystem functioning of North European rocky shores, Stephen Hawkins, Heather Sugden, Nova Mieszkowska, Philippa Moore, Elvira Poloczanska, Rebecca Leaper, Roger Herbert, Martin Genner, Paula Moschella, Richard Thompson, Stuart Jenkins, Alan Southward, and Michael Burrows
Culture jamming: from activism to hactivism, Kay Hearn, Rachel Mahncke, and Patricia Williams
A Turing Test for Computer Game Bots, Philip Hingston
Iterated Prisoner's Dilemma for Species, Philip Hingston
Wetland Invertebrate Richness and Endemism on the Swan Coastal Plain, Western Australia, Pierre Horwitz, Ruth Rogan, Stuart Halse, Jenny Davis, and Beate Sommer
Cultural conservation biology, Pierre Horwitz and Grant Wardell-Johnson
Cyber influence, William Hutchinson
Security as an element in environmental assessment and decision making, William Hutchinson and Matthew Warren
Assessing the usability of personal internet security tools, T Ibrahim, S M. Furnell, M Papadaki, and N L. Clarke
Evaluating web-based user authentication using graphical techniques, MZ Jali, S M. Furnell, and PS Dowland
Use of a secure portable application device as a component of network centric operations, Peter James
Security requirements engineering-the reluctant oxymoron, Michael N. Johnstone
An introduction to digital forensics, Andrew Jones
A summary of thoughts, issues and problems, Andrew Jones
Conclusions and Final Thoughts, Andrew Jones
Developing a Career in Digital Forensic Management, Andrew Jones
Developing the Business Plan, Andrew Jones
Establishing and Managing a Digital Forensics Laboratory, Andrew Jones
High technology crimes: case summaries, Andrew Jones
Networking, liaison and sources of information, Andrew Jones
Responding to crimes requiring computer forensic investigation, Andrew Jones
The computer forensics unit strategic, tactical, and annual plans, Andrew Jones
The future of digital forensics in the criminal justice system, Andrew Jones
Types of forensic investigation, Andrew Jones
Why are we not getting better at Data Disposal?, Andrew Jones
Workload management and the outsourcing option, Andrew Jones
The 2009 analysis of information remaining on USB storage devices offered for sale on the second hand market, Andrew Jones, Craig Valli, and G Dabibi
The 2008 analysis of information remaining on disks offered for sale on the second hand market, Andrew Jones, Craig Valli, Glenn Dardick, Iain Sutherland, and Gareth Davies
Lessons not learned on data disposal, Andy Jones
Journalism research and democracy: Moving out of the Western orbit, Beate Josephi
Application of latent moderated structuring (LMS) to rank the effects of intervening variables on the IT and firm performance relationship, Abbas Keramati, Glenn Dardick, Navid Majir, and Behdad Banan
Bluetooth Hacking: A Case Study, Gary C. Kessler and Dennis Browning
Using Event-Intervals to Analyze Alarm Sequences in a Chemical Plant, Savo Kordic, Chiou Peng Lam, Jitian Xiao, and Huaizhong Li
Effects of different mobilities of leaf and woody litters on litter carbon dynamics in arid ecosystems in Western Australia, Shungo Kumada, Takuya Kawanishi, Yoshishige Hayashi, Hiroyuki Hamano, Satoko Kawarasaki, Shin-ichi Aikawa, Nobuhide Takahashi, Yasuyuki Egashira, Hiroyuki Tanouchi, T Kojima, Adrianne Kinnear, and K Yamada
Interactive effects of timing, intensity and duration of experimental shading on Amphibolis griffithii, Paul Lavery, Kathryn Mcmahon, Michael Mulligan, and Andrew Tennyson
Advances in Fetal Heart Rate Monitoring using Smart Phones, Chang Su Lee, Martin Masek, Chiou Peng Lam, and Keng Tiong Tan
Towards higher accuracy and better noise tolerance for fetal heart rate monitoring using doppler ultrasound, Chang Su Lee, Martin Masek, Chiou Peng Lam, and Keng Tiong Tan
Ballistics firearm identification by digital holography, Dong-guang Li
Ballistics image processing and analysis for firearm identification, Dongguang Li
DNA microarray expression analysis and data mining for blood cancer, Dongguang Li
Firearm identification system for Australian police services, Dongguang Li
An Anomaly-based Intrusion Detection Architecture to Secure Wireless Network, SY Lim and Andrew Jones
Terror attacks: Understanding social risk views between Singaporean lay and security practitioners, Yam Hoo Loo and David Brooks
Cross-Cultural Teaching and Learning Methodology Analysis for Asian Students in Australian Universities, Jie Lu, Kum Leng Chin, Juan Yao, Jun Xu, and Jitian Xiao
Biological Remediation of Low Sulphate Acidic Pit Lake Waters With Limestone PH Neutralisation and Nutrients, Mark Lund and Clint Mccullough
Measuring information security governance within general medical practice, Rachel Mahncke, Donald McDermid, and Patricia Williams
Raising heart rate with dance pad based computer games, Martin Masek, Philip Hingston, Matthew Carrigy, Liam Collins, and Kazunori Nosaka
Remote Home-Based Ante and Post Natal Care, Martin Masek, Chang Su Lee, Chiou Peng Lam, Keng Tiong Tan, and Angela Fyneman
Applying a Reusable Framework for Software Selection, Valerie Maxville, Jocelyn Armarego, and Chiou Peng Lam
Aquatic pollutant assessment across multiple scales, Clint D. Mccullough
Sustainable development of open pit mines: Creating beneficial end uses for pit lakes, Clinton Mccullough, Douglas Hunt, and Louis Evans
More Than Water Quality: Environmental Limitations to a Fishery in Acid Pit Lakes of Collie, South-West Australia, Clint McCullough, Joseph Steenbergen, Carlieke te Beest, and Mark Lund
Challenges in improving information security practice in Australian general practice, Donald Mcdermid, Rachel Mahncke, and Patricia Williams
New record for Halophila decipiens Ostenfeld in Kenya based on morphological and molecular evidence, Kathryn Mcmahon and Michelle Waycott
Drug prevention programmes for young people: where have we been and where should we be going?, Richard Midford
Investigating metal exposure on the general populace of the copper mining town of Kitwe, Zambia, Wesu Ndilila
Toxicity of Acid Mine Pit Lake Water Remediated with Limestone and Phosphorus, Luke Neil, Clinton Mccullough, Mark Lund, Yuri Tsvetnenko, and Louis Evans
Playing Safe: A prototype game for raising awareness of social engineering, Michael Newbould and Steven Furnell
PCI compliance: Overcoming the challenges, Benjamin Ngugi, Gina Vega, and Glenn Dardick
The sea urchin Diadema antillarum Phillipi, 1845 influences the diversity and composition of the mobile mega-invertebrate community on rocky bottoms off the Canary Archipelago, Leonor Ortega, Fernando Tuya, and Ricardo J. Haroun
Water, ecology and health: Ecosystems as settings for promoting health and sustainability, Margot Parkes and Pierre Horwitz
Security education in Singapore: A study of knowledge structures in electronic security technology, C Phinney and Clifton Smith
The 2009 Personal Firewall Robustness Evaluation, Ken Pydayya, Peter Hannay, and Patryk Szewczyk
Water Resources in Australian Mine Pit Lakes, Naresh Radhakrishnan, Clinton Mccullough, and Mark Lund
Potential effects of man harvesting on gastropod molluscs of commercial interest (Osilinus spp. and Patella spp.) in the Canarian Archipelago, Rubén RamÃrez, Fernando Tuya, and Ricardo Haroun
Spatial patterns in the population structure of the whelk Stramonita haemastoma (Linnaeus, 1766) in an Atlantic oceanic Archipelago: comparison with continental areas, Rubén Ramírez, Fernando Tuya, and Ricardo J. Haroun
The consequences of allowing unrestricted tourist access at an Aboriginal site in a fragile environment: the erosive effect of trampling, Alana Rossi and Esmee Webb
An assessment of people's vulnerabilities in relation to personal and sensitive data, B.G. Sanders, P.S. Dowland, and S M. Furnell
A forensics overview and analysis of USB flash memory devices, Krishnun Sansurooah
Heritage, Joanna Sassoon
Japanese postcards of Broome, Joanna Sassoon
Photography, Joanna Sassoon
Expanding the destination image: wine tourism in the Canary Islands, Pascal Scherrer, Abel Alonso, and Lynnaire Sheridan
Expedition Cruising in Australia: Proactive Steps Towards Change for Sustainability, Pascal Scherrer, Amanda Smith, and Ross Dowling
Developing an academic curriculum in information operations: The first step, C.D. Schou, J Ryan, and Leigh Armistead
Evolution underground: A molecular phylogenetic investigation of Australian burrowing freshwater crayfish (Decapoda: Parastacidae) with particular focus on Engaeus Erichson, Mark B. Schultz, Sarah A. Smith, Pierre Horwitz, Alastair MM Richardson, Keith A. Crandall, and Christopher M. Austin
Wine tourism as a development initiative in rural Canary Island communities, Lynnaire Sheridan, Abel Alonso, and Pascal Scherrer
Oil mallees provide foraging habitat for the Western Pygmy Possum (Cercartetus concinnus) in the wheatbelt of Western Australia, Marie Short, Francis Patrick Smith, and Eddie Van Etten
Exergame development using the dual flow model, Jeffrey Sinclair, Philip Hingston, and Martin Masek
Using a Virtual Body to Aid in Exergaming System Development, Jeffrey Ronald Sinclair, Philip Hingston, Martin Masek, and Kazunori Nosaka
Satellite-derived SST Data as a Proxy for Water Temperature in Nearshore Benthic Ecology, Daniel A. Smale and Thomas Wernberg
Impacts on Aboriginal Spirituality and Culture from Tourism in the Coastal Waterways of the Kimberley Region, North West Australia, Amanda J. Smith, Pascal Scherrer, and Ross Dowling
Macroinvertebrate Cycles of Decline and Recovery in Swan Coastal Plain (Western Australia) Wetlands Affected by Drought Induced Acidification, Beate Sommer and Pierre Horwitz
Current Issues in Aviation Security, Narayanan Srinivasan and Shreeman Prabhakaran