Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 44

Full-Text Articles in Entire DC Network

A Proposed Method For Examining Wireless Device Vulnerability To Brute Force Attacks Via Wps External Registrar Pin Authentication Design Vulnerability, Symon Aked, Christopher Bolan, Murray Brand Jan 2012

A Proposed Method For Examining Wireless Device Vulnerability To Brute Force Attacks Via Wps External Registrar Pin Authentication Design Vulnerability, Symon Aked, Christopher Bolan, Murray Brand

Research outputs 2012

Wi-Fi Protected Setup (WPS) is a certification scheme introduced in 2007 to ensure that wireless SOHO (Small Office, Home Office) and home networks could be connected to in a trusted, yet user friendly manner. Recently, WPS was shown to have a design and implementation flaw which makes the feature highly susceptible to attack. Although open-source tools have been written and released, no formal testing methodology has been developed. This research presents a proposed method for the testing of this vulnerability in a measured and systematic way.


Developing Governance Capability To Improve Information Security Resilience In Healthcare, Rachel Mahncke, Patricia Williams Jan 2012

Developing Governance Capability To Improve Information Security Resilience In Healthcare, Rachel Mahncke, Patricia Williams

Research outputs 2012

General medical practices’ in Australia are vulnerable to information security threats and insecure practices. It is becoming well accepted in the healthcare environment that information security is both a technical and a human endeavour, and that the human behaviours, particularly around integration with healthcare workflow, are key barriers to good information security practice. This paper develops a holistic capability approach to information security by completing a preliminary iteration of mapping operational capabilities to governance capabilities. Using an operational backup capability matrix exemplar, the approach is analysed against the governance policy capability matrix. The resultant mapping between the operational and governance …


Building Patient Trust In Electronic Health Records, Helen Cripps, Craig Standing Jan 2012

Building Patient Trust In Electronic Health Records, Helen Cripps, Craig Standing

Research outputs 2012

While electronic medical records have the potential to vastly improve a patient’s health care, their introduction also raises new and complex security and privacy issues. The challenge of preserving what patients’ believe as their privacy in the context of the introduction of the Personally Controlled Electronic Health Record (PCEHR), into the multi-layered and decentralised Australian health system is discussed. Based on a number of European case studies the paper outlines the institutional measures for privacy and security that have been put in place, and compares them with the current status in Australia. The implementation of the PCEHR has not been …


Cloud Security: A Case Study In Telemedicine, Michael Johnstone Jan 2012

Cloud Security: A Case Study In Telemedicine, Michael Johnstone

Research outputs 2012

Security as part of requirements engineering is now seen as an essential part of systems development in several modern methodologies. Unfortunately, medical systems are one domain where security is seen as an impediment to patient care and not as an essential part of a system. Cloud computing may offer a seamless way to allow medical data to be transferred from patient to medical practitioners, whilst maintaining security requirements. This paper uses a case study to investigate the use of cloud computing in a mobile application for Parkinson Disease. It was found that functionality took precedence over security requirements and standards.


Mobile Device Management For Personally Controlled Electronic Health Records: Effective Selection Of Evaluation Criteria, Murray Brand, Patricia Williams Jan 2012

Mobile Device Management For Personally Controlled Electronic Health Records: Effective Selection Of Evaluation Criteria, Murray Brand, Patricia Williams

Research outputs 2012

Enterprises are faced with the task of managing a plethora of mobile computing devices in the workplace that are employed for both business purposes and private use. This integration can contribute to the demands of security protection and add significant threats to the enterprise. The introduction of the Personally Controlled Electronic Health Record (PCEHR) system is a significant step in e-health for Australia and will likely result in sensitive information being accessed from mobile computing devices. Mobile Device Management (MDM) offers a potential solution to manage these devices, however there is a variety of vendors with a range of solutions. …


Accountable-Ehealth Systems: The Next Step Forward For Privacy, Randike Gajanayake, Tony Iannella, Bill Lane, Tony Sahama Jan 2012

Accountable-Ehealth Systems: The Next Step Forward For Privacy, Randike Gajanayake, Tony Iannella, Bill Lane, Tony Sahama

Research outputs 2012

EHealth systems promise enviable benefits and capabilities for healthcare, yet the technologies that make these capabilities possible brings with them undesirable drawback such as information security related threats which need to be appropriately addressed. Lurking in these threats are patient privacy concerns. Resolving these privacy concerns have proven to be difficult since they often conflict with information requirements of healthcare providers. It is important to achieve a proper balance between these requirements. We believe that information accountability can achieve this balance. In this paper we introduce accountable-eHealth systems. We will discuss how our designed protocols can successfully address the aforementioned …


A Holistic Approach To Ehealth Security In Australia: Developing A National Ehealth Sercurity And Access Framework (Nesaf), Yvette Lejins, John Leitch Jan 2012

A Holistic Approach To Ehealth Security In Australia: Developing A National Ehealth Sercurity And Access Framework (Nesaf), Yvette Lejins, John Leitch

Research outputs 2012

The Australian ehealth landscape is confronted with new challenges for healthcare providers in appropriately managing and protecting personal health information. The vision of the National eHealth Security and Access Framework (NESAF) is to adopt a consistent approach to the application of health information security standards and provide better practice guidance in relation to eHealth specific security and access practices. The eHealth information security landscape has a number of unique attributes, many that are faced by other business that provide a service or products – but we see that there is no industry in Australia where such widespread changes in the …


Wikis: Transactive Memory Systems In Digital Form, Paul Jackson Jan 2012

Wikis: Transactive Memory Systems In Digital Form, Paul Jackson

Research outputs 2012

Wikis embed information about authors, tags, hyperlinks and other metadata into the information they create. Wiki functions use this metadata to provide pointers which allow users to track down, or be informed of, the information they need. In this paper we provide a firm theoretical conceptualization for this type of activity by showing how this metadata provides a digital foundation for a Transactive Memory System (TMS). TMS is a construct from group psychology which defines directory-based knowledge sharing processes to explain the phenomenon of "group mind". We analyzed the functions and data of two leading Wiki products to understand where …


Use Of Information And Communication Technology (Ict) Tools By Rural Famers In Ratnagiri District Of Maharashtra, India, Leisa Armstrong, N. Gandhi Jan 2012

Use Of Information And Communication Technology (Ict) Tools By Rural Famers In Ratnagiri District Of Maharashtra, India, Leisa Armstrong, N. Gandhi

Research outputs 2012

This study made an attitude assessment of farmers from the rural villages of Ratnagiri district of Maharashtra in the dissemination of agricultural information using Information and Communication technologies. A structured questionnaire and interviews were used to gather information on a number of aspects related to the use of ICT from randomly selected farmers from one Tehsil and key stakeholders (government officials and agricultural industry workers). Two different questionnaires were provided to farmers and key stakeholders. The questionnaire completed by the farmer participants sought general demographic data, education level and information concerning household income and their agricultural activities. Information related to …


Real-Time Evolutionary Learning Of Cooperative Predator-Prey Strategies, Mark Wittkamp, Luigi Barone, Philip Hingston, Lyndon While Jan 2012

Real-Time Evolutionary Learning Of Cooperative Predator-Prey Strategies, Mark Wittkamp, Luigi Barone, Philip Hingston, Lyndon While

Research outputs 2012

Despite games often being used as a testbed for new computational intelligence techniques, the majority of artificial intelligence in commercial games is scripted. This means that the computer agents are non-adaptive and often inherently exploitable because of it. In this paper, we describe a learning system designed for team strategy development in a real time multi-agent domain. We test our system in a prey and predators domain, evolving adaptive team strategies for the predators in real time against a single prey opponent. Our learning system works by continually training and updating the predator strategies, one at a time for a …


An Overview Of Cloud Computing Challenges And Its Security Concerns, Krishnun Sansurooah Jan 2012

An Overview Of Cloud Computing Challenges And Its Security Concerns, Krishnun Sansurooah

Research outputs 2012

There has been an increasing advancement about Cloud computing during the past couple of years. Cloud computing has become a new computer model which aims to deliver reliable, customizable and scalable computing environment for end-users. Companies are choosing to move their data, applications and services to the Cloud. The advantages are significant ranging from increasing the availability, reliability, light weight, easily accessible applications, and low cost but so are the risks associated with. Companies that require application hosting could potentially benefit from the provisioning of computing infrastructure resources as a service. In addition to the economic advantages of an on-demand …


Utilizing The Rfid Lock Command Against Multiple Targets, Christopher Bolan Jan 2012

Utilizing The Rfid Lock Command Against Multiple Targets, Christopher Bolan

Research outputs 2012

An unlocked Electronic Product Code (EPC) tag allows for issuance of most commands without the need for any authorization. This means that a system with unlocked tags would allow any attacker to modify tag data at will, whilst also opening the door to a range of other misuse. One possible avenue of active misuse against unlocked tags would be to issue LockID commands and ‘permanently’ lock some or all of a system‘s RFID tags. As this attack is simply an issuance of a valid command it fits firmly in the category of an active misuse and could also be considered …


Online Course Content Auditing: Templates And Practices, Justin Brown, Gregory Baatard Jan 2012

Online Course Content Auditing: Templates And Practices, Justin Brown, Gregory Baatard

Research outputs 2012

This paper introduces and discusses the Blackboard Content Audit tool developed by a CS school within an Australian university. Based upon the key sections of a unit’s site in the Blackboard LMS, the tool establishes sets of basic, intermediate and advanced criteria and a rating scale upon which to assess the criteria. By specifying the basic criteria as a minimum standard, the consistency of unit sites can be improved. This helps to close the perceived quality gap between the schools online unit offerings, where in the past some staff had engaged more than others with the features of Blackboard. The …


Pit Lakes As Evaporative 'Terminal' Sinks: An Approach To Best Available Practice Mine Closure, Clinton Mccullough, Genevieve Marchant, Jorg Unseld, Michael Robinson, Benjamin O'Grady Jan 2012

Pit Lakes As Evaporative 'Terminal' Sinks: An Approach To Best Available Practice Mine Closure, Clinton Mccullough, Genevieve Marchant, Jorg Unseld, Michael Robinson, Benjamin O'Grady

Research outputs 2012

Pit lakes may form when open cut mining operations extend below groundwater level and then fill at cessation of mining and associated dewatering operations by ground and surface water influx. Pit lake hydrogeology may function as an evaporative “sink” when pit lake water evaporation rates exceed influx rates. Although not ideal closure, management of local surface and groundwaters contaminated by Acid and Metalliferous Drainage (AMD) through entrainment toward an evaporative terminal pit lake may provide a best-case scenario for protection of regional water resources required by typical mine closure time scales of hundreds to thousands of years. We present two …


The 2011 Idn Homograph Attack Mitigation Survey, Peter Hannay, Gregory Baatard Jan 2012

The 2011 Idn Homograph Attack Mitigation Survey, Peter Hannay, Gregory Baatard

Research outputs 2012

The advent of internationalized domain names (IDNs) has introduced a new threat, with the non-English character sets allowing for visual mimicry of domain names. Whilst this potential for this form of attack has been well recognized, many applications such as Internet browsers and e-mail clients have been slow to adopt successful mitigation strategies and countermeasures. This research examines those strategies and countermeasures, identifying areas of weakness that allow for homograph attacks. As well as examining the presentation of IDNs in e-mail clients and Internet browser URL bars, this year’s study examines the presentation of IDNs in browser-based security certificates and …


Assessing The Accessibility Of E-Learning, Morten Goodwin, Iain Sutherland, Frode Roarson, Tom Drange Jan 2012

Assessing The Accessibility Of E-Learning, Morten Goodwin, Iain Sutherland, Frode Roarson, Tom Drange

Research outputs 2012

Equal participation for people with special needs is an important objective in education politics. Governments have a strong emphasis on enabling education for all citizens. The trend of using e-learning both for on campus and remote delivery of students has the potential of enabling new opportunities for people who previously faced challenges following education. On the other hand, providing online education bears the risk of creating new barriers. This paper examines different stages of providing educational content and delivering teaching material online. This is based on practical experiences from Noroff University College providing a bachelor degree in a security related …


Noise Tolerance For Real-Time Evolutionary Learning Of Cooperative Predator-Prey Strategies, Mark Wittkamp, Luigi Barone, Philip Hingston, Lyndon While Jan 2012

Noise Tolerance For Real-Time Evolutionary Learning Of Cooperative Predator-Prey Strategies, Mark Wittkamp, Luigi Barone, Philip Hingston, Lyndon While

Research outputs 2012

Learning team-based strategies in real-time is a difficult task, much more so in the presence of noise. In our previous work in the Prey and Predators domain we introduced an algorithm capable of evolving cooperative team strategies in real-time using fitness evaluations against a perfect opponent model. This paper continues our work within the same domain, training a team of predators to capture a prey. We investigate the effect of varying degrees of opponent model noise in our learning system. In the presence of and in the effort to mitigate the effects of such noise we present modifications to our …


Measurement And Simulation Of Dissolved Oxygen In Zayandehrood River, Ahmad Reza Rahsepar, Mehdi Khiadani, Mohammad Mehdi Amin Jan 2012

Measurement And Simulation Of Dissolved Oxygen In Zayandehrood River, Ahmad Reza Rahsepar, Mehdi Khiadani, Mohammad Mehdi Amin

Research outputs 2012

Aims: This study aims to simulate dissolved oxygen of Zayandehrood river from regulating dam to Polle-Kalleh bridge using MIKE11 software that is a hydrodynamics and water quality model. Materials and Methods: During 5 months the samples were taken from four hydrometric stations and water quality parameters such as dissolved oxygen, pH, BOD (1 day, 3 days, 5 days, and 7 days), NH 4 , NO 3 - phosphate (PO4 3- ), and temperature were measured. Morphological and hydrological data were provided and introduced into the model. The model was calibrated and its accuracy was investigated. Results: The results indicated that …


Recreational Use Of Acidic Pit Lakes—Human Health Considerations For Post Closure Planning, Andrea Hinwood, Jane Heyworth, Helen Tanner, Clinton Mccullough Jan 2012

Recreational Use Of Acidic Pit Lakes—Human Health Considerations For Post Closure Planning, Andrea Hinwood, Jane Heyworth, Helen Tanner, Clinton Mccullough

Research outputs 2012

Pit lakes may form in mining voids that extend below groundwater level after mining ceases and many have been found to have elevated metals concentrations and low pH through acidic and metalliferous drainage (AMD). Pit lakes are often used for recreational activities including swimming, fishing and boating and poor water quality may present health risks to recreational users. Pit lakes also provide the opportunity for additional water resource uses. The Collie Coal Basin in south-western Australia currently has a number of pit lakes with moderate AMD effects which are also used for recreational pursuits. Twelve hundred questionnaires were mailed to …


Corporate Security: Using Knowledge Construction To Define A Practising Body Of Knowledge, David Brooks Jan 2012

Corporate Security: Using Knowledge Construction To Define A Practising Body Of Knowledge, David Brooks

Research outputs 2012

Security is a multidimensional concept, with many meanings, practising domains, and heterogeneous occupations. Therefore, it is difficult to define security as a singular concept, although understanding may be achieved by its applied context in presenting a domicile body of knowledge. There have been studies that have presented a number of corporate security bodies of knowledge; however, there is still restricted consensus. From these past body of knowledge studies, and supported by multidimensional scaling knowledge mapping, a body of knowledge framework is put forward, integrating core and allied knowledge categories. The core knowledge categories include practise areas such as risk management, …


An Australian Perspective On The Challenges For Computer And Network Security For Novice End-Users, Patryk Szewczyk Jan 2012

An Australian Perspective On The Challenges For Computer And Network Security For Novice End-Users, Patryk Szewczyk

Research outputs 2012

A good portion of today's investigations include, at least in part, an examination of the user's web history. Although it has lost ground over the past several years, Microsoft's Internet Explorer still accounts for a large portion of the web browser market share. Most users are now aware that Internet Explorer will save browsing history, user names, passwords and form history. Consequently some users seek to eliminate these artifacts, leaving behind less evidence for examiners to discover during investigations. However, most users, and probably a good portion of examiners are unaware Automatic Crash Recovery can leave a gold mine of …


A Technical Guide To Effective And Accessible Web Surveys, Gregory Baatard Jan 2012

A Technical Guide To Effective And Accessible Web Surveys, Gregory Baatard

Research outputs 2012

The Internet is becoming an increasingly prominent medium for the administration of surveys. Although individual findings vary, the majority of the literature agrees that the appropriateness and response rates of web surveys is expected to rise in the future as we enter a generation of "digital natives" and mail-based communication becomes increasingly antiquated. Just about every aspect and tenet of traditional survey methodology has received attention in academic literature, positioning it as one of the most mature data collection techniques and a mainstay in all areas of research. While much of this accumulated knowledge is applicable and relevant to web …


Holocene Subsurface Temperature Variability In The Eastern Antarctic Continental Margin, J H Kim, X Crosta, V Willmott, H Renssen, J Bonnin, Peer Helmke, S Schouten, J S Sinninghe Damste Jan 2012

Holocene Subsurface Temperature Variability In The Eastern Antarctic Continental Margin, J H Kim, X Crosta, V Willmott, H Renssen, J Bonnin, Peer Helmke, S Schouten, J S Sinninghe Damste

Research outputs 2012

We reconstructed subsurface (∼45-200m water depth) temperature variability in the eastern Antarctic continental margin during the late Holocene, using an archaeal lipid-based temperature proxy (TEX 86 L). Our results reveal that subsurface temperature changes were probably positively coupled to the variability of warmer, nutrient-rich Modified Circumpolar Deep Water (MCDW, deep water of the Antarctic circumpolar current) intrusion onto the continental shelf. The TEX 86 L record, in combination with previously published climatic records, indicates that this coupling was probably related to the thermohaline circulation, seasonal variability in sea ice extent, sea temperature, and wind associated with high frequency climate dynamics …


A Technical Guide To Designing And Implementing Effective Web Surveys, Gregory Baatard Jan 2012

A Technical Guide To Designing And Implementing Effective Web Surveys, Gregory Baatard

Research outputs 2012

: The Internet is becoming an increasingly prominent medium for the administration of surveys. Although individual findings vary, the major‐ ity of the literature agrees that the appropriateness and response rates of web surveys is expected to rise in the future as we enter a generation of “digital natives” and mail‐based communication becomes increasingly an‐ tiquated. Just about every aspect and tenet of traditional survey metho‐ dology has received attention in academic literature, positioning it as one of the most mature data collection techniques and a mainstay in all areas of research. While much of this accumulated knowledge is applicable …


An Exploratory Study Of The Implementation Of Electronic Health Records: A Two Country Comparison, Helen Cripps, Craig Standing, Vesna Prijatelj Jan 2012

An Exploratory Study Of The Implementation Of Electronic Health Records: A Two Country Comparison, Helen Cripps, Craig Standing, Vesna Prijatelj

Research outputs 2012

The adoption of electronic health records has been significantly slower in Australia than many European countries. This paper compares the implementation process in Australia with Slovenia, looking at the benefits, drawbacks and success factors of e-health implementation. The authors use case studies collected in each country to discuss issues around e-health implementation. Though Slovenia has progressed much further down the road of e-health the commonality of the experiences between both cases was striking.


User Reaction Towards End User License Agreements On Android Smartphones, Hamish Cotton, Christopher Bolan Jan 2012

User Reaction Towards End User License Agreements On Android Smartphones, Hamish Cotton, Christopher Bolan

Research outputs 2012

Smartphones are increasingly recognized as the most popular computing platform, forming an integral part of the way users interact with the online world. Accompanied with the advent of user-installed content, End User License Agreements have surfaced mirroring issues previously arising on more traditional platforms. This survey conducted in Perth, Western Australia looked at user behavior when viewing and accepting EULAs on smartphone devices. The results show that a majority of users do not read such agreements citing issues of readability and length.


Riverine Breach And Subsequent Decant Of An Acidic Pit Lake: Evaluating The Effects Of Riverine Flow-Through On Lake Stratification And Chemistry, Clinton Mccullough, Naresh Radhakrishnan, Mark Lund, Michelle Newport, Elmien Ballot, Digby Short Jan 2012

Riverine Breach And Subsequent Decant Of An Acidic Pit Lake: Evaluating The Effects Of Riverine Flow-Through On Lake Stratification And Chemistry, Clinton Mccullough, Naresh Radhakrishnan, Mark Lund, Michelle Newport, Elmien Ballot, Digby Short

Research outputs 2012

Breach and subsequent decant of an acidic brackish pit lake in the Collie Coal region in south-western Australia occurred during flooding of a pre-mining diverted eutrophic river. Inflowing fresher river water with high alkalinity and nutrient concentrations settled over more saline and acidic pit lake water. This created a halocline with better mixoliminion water quality and monimolimnion water quality typical of the pre-breach lake. Flow-through may represent the best long-term mine closure option for this and other pit lakes in the state and internationally where pit lake water quality degrades over time when excised from regional water systems.


Security Specialists Are From Mars; Healthcare Practitioners Are From Venus: The Case For A Community-Of-Practice Approach To Security Architectures For Healthcare, Elizabeth Coles-Kemp, Patricia Williams Jan 2012

Security Specialists Are From Mars; Healthcare Practitioners Are From Venus: The Case For A Community-Of-Practice Approach To Security Architectures For Healthcare, Elizabeth Coles-Kemp, Patricia Williams

Research outputs 2012

Information security is a necessary requirement of information sharing in the healthcare environment. Research shows that the application of security in this setting is sometimes subject to work-arounds where healthcare practitioners feel forced to incorporate practices that they have not had an input into and with which they have not engaged with. This can result in a sense of security practitioners and healthcare practitioners being culturally very different in their approach to information systems. As a result such practices do not constitute part of their community of practice nor their identity. In order to respond to this, systems designers typically …


Closure Planning In A Developing Country - A Case Study From The Phu Kham Mine, Laos, Southeast Asia, Amy Mauric, Clinton Mccullough, Charlie Wilson-Clark, Andrew Witcomb, Jeff Millgate Jan 2012

Closure Planning In A Developing Country - A Case Study From The Phu Kham Mine, Laos, Southeast Asia, Amy Mauric, Clinton Mccullough, Charlie Wilson-Clark, Andrew Witcomb, Jeff Millgate

Research outputs 2012

Mining in developing regions face significant challenges for effective closure planning. A maturing mine closure regulatory environment and limited capacity within government to regulate mine closure issues can present considerable risk from an operation to the regional community and environment. Alternatively, if the operation adopts leading practice international standards in recognition of their corporate responsibilities and social license‐to‐mine in developing countries, there may be significant opportunities for enhanced social and environmental outcomes for host country and mining company. Using a case study from the Phu Kham Mine, Lao People’s Democratic Republic (Laos), we discuss some of the key challenges to …


Science Or Experience; What Is More Relevant ?, Kenneth Fowle, Hadyn Green Jan 2012

Science Or Experience; What Is More Relevant ?, Kenneth Fowle, Hadyn Green

Research outputs 2012

It is very important that when we use science to determine the validity of evidence or information that it is done in a manner that is acceptable to the scientific community and the legal community, but what happens when “experience” is used. The use of forensic practitioners to provide „expert‟ evidence and opinion must meet the Daubert/Frye and now Kumho tests. This paper will endeavour to demonstrate .what is best for a practitioner to have and what does the judiciary require for „expert‟ evidence to be accepted? Science and/or Experience, what is more relevant? Evidence and the Courts depend upon …