Submissions from 2007
Proceedings of the Sixth International Workshop for Applied PKC (IWAP2007), Dongguang Li
User perception of the security & privacy concerns of RFID technology, F Li, N L. Clarke, and C Bolan
Realising B2B e-commerce benefits: the link with IT maturity, evaluation practices, and B2BEC adoption readiness, Chad Lin, Yu-An Huang, and Janice Burn
Issues and recommendations in evaluating and managing the benefits of public sector IS/IT outsourcing, Chad Lin, G Pervan, and Donald Mcdermid
Stem cell and kinase activity-independent pathway in resistance of leukaemia to BCR-ABL kinase inhibitors, Shaoguang Li and Dongguang Li
Monitoring Wetlands in a Salinizing Landscape: Case Studies from the Wheatbelt Region of Western Australia, M N. Lyons, Stuart Halse, N Gibson, D J. Cale, J A. Lane, C D. Walker, D A. Mickle, and Raymond Froend
Varying foraging strategies of Labridae in seagrass habitats: Herbivory in temperate seagrass meadows?, Lachlan D. MacArthur and Glenn A. Hyndes
Effects of experimental reduction of light availability on the seagrass Amphibolis griffithii, P Mackey, CJ Collier, and Paul Lavery
An Investigation Into the Application of Data Mining Techniques to Characterize Agricultural Soil Profiles, Rowan J. Maddern
The issues in securing electronic health information in transit, Rachel Mahncke and Patricia Williams
State model diagrams - A systems tool for teaching network technologies and network management, S P. Maj, B Tran, and D Veal
Network Technology Education: A novel pedagogical model for novices and practicing professionals, Stanislaw Maj and Bao Tran
State Model Diagrams as a Pedagogical Tool - An International Evaluation, Stanislaw Maj and David Veal
Use of online tools to aid group work, Martin Masek
Distribution and reproductive biology of the sandbar shark, Carcharhinus plumbeus (Nardo), in Western Australian waters, Rory Brian Mcauley, C. A. Simpfendorfer, Glenn A. Hyndes, and R. C.J. Lenanton
Implications for use of different encryption algorithms on power consumption for mobile devices in the healthcare industry, Danny Ng and Andrew Woodward
Network security devices and protocols using state model diagrams, C Nuangjamnong, D Veal, and S P. Maj
Detritivores as indicators of landscape stress and soil degradation, M. Paoletti, G. Osler, Adrianne Kinnear, D. Black, L. Thomson, A. Tsitsilas, D. Sharley, S. Judd, P. Neville, and A. D'Inca
Heat Shock Protein 90: A Potential Therapeutic Target in Leukemic Progenitor and Stem Cells Harboring Mutant BCR-ABL Resistant to Kinase Inhibitors, C Peng, Dongguang Li, and L Shaoguang
The relationship between outdoor air quality and respiratory symptoms in young children, Clemencia Rodriguez, Russell Tonkin, J Heyworth, M Kusel, N De Klerk, P Sly, P Franklin, T Runnion, A Blockley, L Landau, and Andrea Hinwood
A Non-Intrusive Biometric Authentication Mechanism Utilising Physiological Characteristics of the Human Head, PM Rodwell, Steven Furnell, and PL Reynolds
An implementation of the method of aperture meridians for the ISO/CIE standard general sky, Geoffrey Roy, R. Kittler, and S. Darula
An overview and examination of digital PDA devices under forensics toolkits, Krishnun Sansurooah
Intrusion Dection System (IDS) Techniques and Responses for Mobile Wireless Networks, Krishnun Sansurooah
Beyond chip monks and paper tigers: Towards a new culture of archival format specialists, Joanna Sassoon
Sharing our story. An archaeology of archival thought, Joanna Sassoon
Keeping up to date with history: Indigenous people and the recordkeeping professions, Joanna Sassoon, Kirsten Thorpe, and Anne Wright
Cryptic diversity in Engaeus Erichson, Geocharax Clark and Gramastacus Riek (Decapoda:Parastacidae) revealed by mitochondrial 16S rDNA sequences, Mark B. Schultz, Sarah A. Smith, Alastair MM Richardson, Pierre Horwitz, Keith A. Crandall, and Christopher M. Austin
The systemic nature of critical infrastructure protection using a medium sized company as the case study, Jeffery Sewell
Considerations for the design of exergames, Jeffrey Ronald Sinclair, Philip Hingston, and Martin Masek
Information seeking behaviour of Electronic Document and Records Management Systems (EDRMS) users: implications for records management practices, Pauline Singh, Jane E. Klobas, and Karen Anderson
Information Seeking Behaviour of Electronic Records Management Systems (ERMS) Users: Implications for Records Management Practices, Pauline Singh, Jane E. Klobas, and Karen Anderson
Using machine learning techniques to create AI controlled players for video games, Bhuman Soni
Field survival and growth of clonal, micropropagated Eucalyptus marginata selected for resistance to Phytophthora cinnamomi, M. Stukely, C. Crane, J. McComb, and Ian J. Bennett
Food web analysis in two permanently open temperate estuaries: consequences of saltmarsh loss?, CJ Svensson, Glenn Hyndes, and Paul Lavery
ADSL router forensics part 1: An introduction to a new source of electronic evidence, Patryk Szewczyk
An examination of the Asus WL-HDD 2.5 as a nepenthes malware collector, Patryk Szewczyk
Success? The impact of involving customers in E-commerce development, Julian Terry and Craig Standing
Alien macroalgae in Denmark - a broad-scale national perspective, Mads S. Thomsen, Thomas Wernberg, Peter Stææhr, Dorte Krause-Jensen, Nils Risgaard-Petersen, and Brian R. Silliman
An investigation of network management methods, Bao Tran
A New Taxonomy for Comparing Intrusion Detection Systems, CJ Tucker, Steven Furnell, BV Ghita, and PJ Brooke
Bathymetric segregation of sea urchins on reefs of the Canarian Archipelago: Role of flow-induced forces, Fernando Tuya, J. Cisneros-Aguirre, L. Ortega-Borges, and R. J. Haroun
The use of the internet as a bibliotherapeutic tool for parents with children with disabilities or special needs : an exploratory study, Lynsey Uridge
Food web interactions along seagrass–coral reef boundaries: Effects of piscivore reductions on cross-habitat energy exchange, J. F. Valentine, K. L. Heck Jr., D. Blackmon, M. E. Goecker, J. Christian, R. M. Kroutil, K. D. Kirsch, B. J. Peterson, M. Beck, and Mathew A. Vanderklift
Honeypot Technologies and Their Applicability as a Strategic Internal Countermeasure, Craig Valli
IT Sharps: Issues Relating to Securely Disposing of Hard Disks From Medical Information Systems, Craig Valli
Oops they did it again: The 2007 Australian study of remnant data contained on 2nd hand hard disks, Craig Valli and Andrew Woodward
An overview of ADSL homed nepenthes honeypots in Western Australia, Craig Valli and Aaron Wooten
Defunking Dewey: Taking fiction out of the equation, Robyn Valli and Barbara Combes
Proximity to reef influences density of small predatory fishes, while type of seagrass influences intensity of their predation on crabs, Mathew A. Vanderklift, Jason How, Thomas Wernberg, Lachlan D. MacArthur, K. L. Heck Jr., and J. F. Valentine
A GUI for the Deaf-Blind: An additional concepts paper, David Veal
Improving security for vision impaired ATM access via dynamic patterns, David Veal
IT Devices and Energy Consumption, David Veal
Some problems in Network and Data Centre Management, David Veal and Gurpreet Kohli
State model diagrams and home security system control , David Veal and Stanislaw Maj
A Bipartite Graph Matching Approach to Generate Optimal Test Sequences for Protocol Conformance Testing, Jun Wang, Huaizhong Li, Jitian Xiao, and Chiou Peng Lam
Vulnerability of seagrasses in the Great Barrier Reef to climate change, M Waycott, C Collier, Kathryn Mcmahon, P Ralph, Len McKenzie, J Udy, and A Grech
Description of grinding patches found on granite bedrock near Cue, in central Western Australia, and a discussion of their significance, R. Esmee Webb
A holistic perspective on models for medical information security, Patricia Williams
Information Governance: A Model for Security in Medical Practice, Patricia Williams
Medical data security: Are you informed or afraid?, Patricia Williams
Medical insecurity: when one size does not fit all, Patricia Williams
The effects of IT on information culture in general medical practice, Patricia Williams
An investigation into information security in general medical practice, Patricia A. Williams
Do Current Erasure Programs Remove Evidence of BitTorrent Activity?, Andrew Woodward and Craig Valli
Wireless Rx - Risk assessment and recommendations for securing a wireless network in a medical practice, Andrew Woodward and Patricia Williams
A similarity-aware web content caching scheme and agent-based web document pre-fetching, Jitian Xiao
Sequencing Clusters of Spatial Join Operations Using Weighted Match, Jitian Xiao
A Systematic Approach to Automatically Generate Test Scenarios from UML Activity Diagrams, Dong Xu, Huaizhong Li, and Chiou Peng Lam
Profiling Through a Digital Mobile Device, Lee Fueng Yap and Andrew Jones
Functional group identity does not predict invader impacts: differential effects of nitrogen-fixing exotic plants on ecosystem function, Stephanie Yelenik, William Stock, and David M Rickhardson
Submissions from 2006
The AtmosFear of terror: Australian Muslims as Objects of Fear and Othering, Anne Aly
Mobile handset forensic evidence: a challenge for law enforcement, Marwan Al-Zarouni
Developing recordkeeping: Australians working together, Karen Anderson
Using online Discussion to Provide an Authentic Learning Experience for Professional Recordkeepers, Karen Anderson
Empowering International and Culturally Diverse Honours and Project Students Through Mentoring Activities, Leisa J. Armstrong and Sundrakanthi Singh
Fixture-scheduling for the Australian Football League using a Multi-objective Evolutionary Algorithm, Luigi Barone, Lyndon While, Paul Hughes, and Philip Hingston
The effects of light reduction treatments on mobile Epifaunain an Amphibolis Griffithii (black) den Hartog seagrass ecosystem, Helen Barwick
Security risk assessment: Group approach to a consensual outcome, Benjamin Beard and David J. Brooks
The effect of nitrogen source and concentration, medium pH and buffering on in vitro shoot growth and rooting in Eucalyptus marginata, Ian Bennett, Andrew Woodward, and Surachai Pusswonge
Strategies for the blocking of RFID tags, C Bolan
Do no harm: The use of RFID tags in a medical environment, Christopher Bolan
The Lazarus Effect: Resurrecting Killed RFID Tag, Christopher Bolan
Application of electrokinetic chromatography to food and beverages, Mary Boyce
Managing information security complexity, Murray Brand
Transformation theory and e-commerce adoption, Mark P. Brogan
Mapping the consensual knowledge of security risk management experts, David Brooks
Teaching Web Applications Development in a Fully Online Environment: Challenges, Approaches and Implementation, Justin Brown
What are they taking us for? The Participatory Nature of Western Australia's Regional Forest Agreement Process, Martin Brueckner, John Duff, Richard Mckenna, and Pierre Horwitz
Emus as non-standard seed dispersers and their potential for long-distance dispersal, Maria Calvino-Cancela, Robert Dunn, Eddie Van Etten, and Byron Lamont
Water stress vulnerability of four Banksia species in contrasting Ecohydrological habitats on the Gnangara Mound, Western Australia, Caroline Canham
Modelling layer 2 and layer 3 device bandwidth using B-Node theory, Steven Cikara, Stanislaw Maj, and David Thomas Shaw
A Composite User Authentication Architecture for Mobile Devices, Nathan Clarke and Steven Furnell
An automated sampling soil reduction-oxygenation RF sensor network for cereal crop management, Michael Collins, Christopher C. Holme, Keng T. Tan, and Leisa Armstrong
Opening Pandora's box: Teacher librarianship in the twenty-first century, Barbara Combes
Techno savvy and all-knowing or techno-oriented? Information seeking behaviour and the Net Generation, Barbara Combes
Techno savvy or techno oriented: Who are the Net Generation?, Barbara Combes
Visions of learning (ASLA Online II Conference Preceedings), Barbara Combes