Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

PDF

Edith Cowan University

2005

Discipline
Keyword
Publication
Publication Type

Articles 31 - 60 of 273

Full-Text Articles in Entire DC Network

Tackling Talk : Teaching And Assessing Oral Language, Rhonda Oliver, Yvonne Haig, Judith Rochecouste Jan 2005

Tackling Talk : Teaching And Assessing Oral Language, Rhonda Oliver, Yvonne Haig, Judith Rochecouste

Research outputs pre 2011

Tackling Talk was a collaborative research project sponsored by several bodies: the English Teachers Association (ETA), the Australian Literacy Educators' Association (ALEA) through Quality Teacher Program funding and the Association of Independent Schools of WA (AISWA). A team of researchers from the Centre for Applied Language and Literacy Research (CALLR), Edith Cowan University, guided teachers from the public and independent sectors through an action research program involving online/ electronic materials, professional development sessions and personal mentoring. Some 49 teachers from 28 schools from both metropolitan and regional districts of Western Australia were involved in the project.


Smart Card Authentication For Mobile Devices, Wayne Jansen, Serban Gavrila, Clément Séveillac Jan 2005

Smart Card Authentication For Mobile Devices, Wayne Jansen, Serban Gavrila, Clément Séveillac

Research outputs pre 2011

While mobile handheld devices provide productivity benefits, they also pose new risks. User authentication is the best safeguard against the risk of unauthorized use and access to a device’s contents. This paper describes two novel types of smart card with unconventional form factors, designed to take advantage of common interfaces built into many current handheld devices.


On-Line Training For Smes: Final Report, Beth Walker, Beverley Webster, Sue Stoney Jan 2005

On-Line Training For Smes: Final Report, Beth Walker, Beverley Webster, Sue Stoney

Research outputs pre 2011

This research aimed to explore the appropriateness of on-line training delivery methods for small business owner/managers.

It is widely recognised that training and education are effective ways to reduce small business failure. In Australia, small business accounts for 96 percent of Australian private sector, non-agricultural businesses and they employ 47 percent of the private sector, non-agricultural workforce. Not surprisingly then, encouraging the development of the skills of the workforce has emerged as a major priority for government policy. However, what is also recognised is that many small business owner/managers (SBOs) have limited e-competencies.

Results of this research confirmed this and …


Can Blogs Promote Fair And Equitable Teamwork?, Joseph Luca, Catherine E Mcloughlin Jan 2005

Can Blogs Promote Fair And Equitable Teamwork?, Joseph Luca, Catherine E Mcloughlin

Research outputs pre 2011

Online collaboration tools can provide an opportunity to enhance community building while at the same time motivate students to actively participate in their learning. In this investigation an online learning environment was designed with the aim of promoting clear and transparent communication between higher education students to enable fair and equitable teamwork. The environment was designed with a combination of authentic project work, self-regulated tasks and reflective activity through the use of Bloggers. An evaluation of the learning environment was conducted through both qualitative and quantitative survey instruments.


An Investigation Into Long Range Detection Of Passive Uhf Rfid Tags, Craig Valli, Andrew Woodward, Ken Wild, Reino Karvinen Jan 2005

An Investigation Into Long Range Detection Of Passive Uhf Rfid Tags, Craig Valli, Andrew Woodward, Ken Wild, Reino Karvinen

Research outputs pre 2011

Radio frequency identification tags (RFID) have been in use for a number of years, in a variety of applications. They are a small computer chip like device that can range in size from a thumbnail to a credit card size device. They consist of a small silicon chip, and an antenna used to receive and transmit data. When a tag receives a signal from a valid reader it sends a response, typically a tag ID and any other requested/available data back to the reader device. The newer range of RFID chips that are coming into use now use higher frequencies …


The Investigation Of The Processes Of Is/It Investment Evaluation And Benefits Realization In B2b-Ec Organisations, Chad Lin, Craig Standing Jan 2005

The Investigation Of The Processes Of Is/It Investment Evaluation And Benefits Realization In B2b-Ec Organisations, Chad Lin, Craig Standing

Research outputs pre 2011

ISIIT investments in B2B-EC are used by organizations, as part of their business strategies, to assist in the inter-organization acquisition of goods into the value chain and to provide interfaces between customers, vendors, suppliers and sellers. However, the issue of expected and actual benefits realized from ISIIT investments in B2B-EC has generated a significant amount of debote in the ISIIT literature amongst researchers and practitioners. This research study showed that organizational satisfaction of B2BEC usage had a direct relationship with the adoption of the ISIIT investment evaluation methodology. There was also a tendency for organizations to evaluate less when their …


Optical Cavity Design Of Integrated Microphotonic Wideband Adaptive Rf Signal Processor, Rong Zheng, Zhenglin Wang, Kamal Alameh Jan 2005

Optical Cavity Design Of Integrated Microphotonic Wideband Adaptive Rf Signal Processor, Rong Zheng, Zhenglin Wang, Kamal Alameh

Research outputs pre 2011

In this paper. we analyse the beam propagation within the optical cavities of all integrated MicroPhotonic adaptive RF signal processor, and optimize the optical beam diameter and incidence angle that maximize the number of taps to realise high-resolution R F processor. Simulation results show that for a 1m-diameter collimated Gallssioll beam, 16 taps per cavity can be achieved for a 20mm-long cavity, and that there is no need for a diffractive optical element (DOE) to re- collimate the Gaussian beam within the cavity. The tolerance of the MicrnPhotonic processor to changes in optical cavity length which degrade the beam overlapping …


Risk Management In Crm Security Management, Mahdi Seify Jan 2005

Risk Management In Crm Security Management, Mahdi Seify

Research outputs pre 2011

In an increasing competitive world, marketing survival can be depended simply on timely new information on customers and market trend. One of the most important strategies in CRM (Customer Relationship Management) is to capture enough information from customers and using this information carefully [Ryals , Tinsley]. Of course security of this information is very important in CRM data management [Bryan]. Data management is a method for scheduling and controlling data saving, recovering and processing. This activity has been done continually or periodically[Bryan]. Security level of this information depends on the security policy of the organization. CRM security policy is the …


Benchmarking E-Business Security: A Model And Framework, Graeme Pye, Matthew J. Warren Jan 2005

Benchmarking E-Business Security: A Model And Framework, Graeme Pye, Matthew J. Warren

Research outputs pre 2011

The dynamic nature of threats and vulnerabilities within the E-business environment can impede online functionality, compromise organisational or customer information, contravene security implementations and thereby undermine online customer confidence. To negate these problems, E-business security has to become proactive, by reviewing and continuously improving security to strengthen E-business security measures and policies. This can be achieved through benchmarking the security measures and policies utilised within the E-business, against recognised information technology (IT) and information security (IS) security standards.


My Problem Or Our Problem? Exploring The Use Of Information Sharing As A Component Of A Holistic Approach To E-Security In Response To The Growth Of ‘Malicious Targeted Attacks’, Aaron Olding, Paul Turner Jan 2005

My Problem Or Our Problem? Exploring The Use Of Information Sharing As A Component Of A Holistic Approach To E-Security In Response To The Growth Of ‘Malicious Targeted Attacks’, Aaron Olding, Paul Turner

Research outputs pre 2011

There is now a growing recognition amongst e-security specialists that the e-security environment faced by organisations is changing rapidly. This environment now sees a situation where maliciously targeted attacks are conducted by ‘guns for hire’ (hackers) and/or criminal organisations (Illett 2005; Keiser 2005). As a consequence, conventional organisational approaches to e-security are becoming increasingly problematic and inadequate. There is a need to raise awareness of these issues amongst organisations and to contribute to the generation of effective integrated solutions that address this emerging e-security environment without sacrificing user privacy and/or breaching user trust. This paper considers the potential role of …


Non-Repudiation In Pure Mobile Ad Hoc Network, Yi-Chi Lin, Jill Slay Jan 2005

Non-Repudiation In Pure Mobile Ad Hoc Network, Yi-Chi Lin, Jill Slay

Research outputs pre 2011

Within the last decade, the use of wireless technologies has become more prevalent. Wireless networks have flexible architectures with data transferred via radio waves and can be divided into two categories; infrastructure-based wireless networks and mobile ad hoc network.

The mobile ad hoc network (MANET) is an autonomous system which can be dynamically built without pre-existing infrastructure or a trusted third party (TTP). Due to these infrastructure-less and self-organized characteristics, MANET encounters different problems from infrastructure-based wired network, such as key management, power shortage, and security issues. This paper will further divide MANETs into pure ad hoc networks which do …


Throughput And Delay Optimization In Wdm Fddi Optical Network, Muhsen Aljada, Kamal Alameh, Khalid Al-Begain Jan 2005

Throughput And Delay Optimization In Wdm Fddi Optical Network, Muhsen Aljada, Kamal Alameh, Khalid Al-Begain

Research outputs pre 2011

The rapidly growing Internet traffic are driving the demands for higher transmission capacity and higher processing speed, especially for the backbone networks. To support such bandwidth usage an optical Fiber Distributed Data Interface Wavelengtg Division Multiplexed (FDDI/WDM) network is proposed, wherein the wavelength channels are amplified using Erbium-Doped Fiber Amplifiers (EDFA's) to compensate for the losses over the optical fiber span. In this paper we investigate the network performance for both asynchronous and synchronous transmissions by measuring the amplified spontaneous emission (ASE) along the ring, the optical signal to noise ratio (OSNR) and the electrical SNR at different destinations. The …


The Lived Experience Of Rural Mental Health Nurses, Vicki Drury, Karen Francis, Geoffery Dulhunty Jan 2005

The Lived Experience Of Rural Mental Health Nurses, Vicki Drury, Karen Francis, Geoffery Dulhunty

Research outputs pre 2011

The lived experiences of five registered mental health nurses employed in community settings in the southwest region of Western Australia were examined in this study. The study was generated in response to concerns of clinicians working in the area about their scope of practice. Study participants were interviewed concerning their everyday “lived experience.” Interviews were audio taped, transcribed and coded numerically to ensure participant confidentiality. Data was analysed using van Manen’s hermeneutic phenomenological approach. Five essential themes were identified. They were holistic care of clients; isolation, autonomy and advanced practice; professional development and status recognition; educational support; and caseload numbers …


Honeypot Technologies And Their Applicability As An Internal Countermeasure, Craig Valli Jan 2005

Honeypot Technologies And Their Applicability As An Internal Countermeasure, Craig Valli

Research outputs pre 2011

Honeypots or honeynets are a technology that is rapidly maturing and establishing this archetype of countermeasure as viable and useful in modern network defence. Honeypot technology is now at a point of development where near real-time monitoring and forensic analysis of security events can occur. This paper explores the hurdles to be overcome for the internal deployment of honeypot technologies.


Security Governance: Its Impact On Security Culture, K. Koh, A. B. Ruighaver, S. B. Maynard, A. Ahmad Jan 2005

Security Governance: Its Impact On Security Culture, K. Koh, A. B. Ruighaver, S. B. Maynard, A. Ahmad

Research outputs pre 2011

While there is an overwhelming amount of literature that recognises the need for organisations to create a security culture in order to effectively manage security, little is known about how to create a good security culture or even what constitutes a good security culture. In this paper, we report on one of two case studies performed to examine how security governance influences security culture and in particular, the sense of responsibility and ownership of security. The results indicate that although the structural and functional mechanisms in security governance are influencing factors, it is the extent of social participation that may …


Diversity In Information And Communication Technologies: The Cost Of Lost Opportunities, Susan Gail Webb Jan 2005

Diversity In Information And Communication Technologies: The Cost Of Lost Opportunities, Susan Gail Webb

Research outputs pre 2011

The Information and Communication Technology (ICT) industry develops products that are used by many people regardless of gender, age, social status, ethnicity, or religion. Technology has had a significant impact on the way that information is produced, stored and communicated, especially in the fields that have traditionally been heavy producers of information such as libraries and education institutions. Though all types of people use technology, not all types of people are involved in the design and development of technology. Women represent just twenty percent of Australian ICT professionals. They often receive less pay than their male colleagues and are greatly …


Recommendations For Wireless Network Security Policy: An Analysis And Classification Of Current And Emerging Threats And Solutions For Different Organisations, Andrew Woodward Jan 2005

Recommendations For Wireless Network Security Policy: An Analysis And Classification Of Current And Emerging Threats And Solutions For Different Organisations, Andrew Woodward

Research outputs pre 2011

Since their inception, 802.11 wireless networks have been plagued by a wide range of security problems. These problems relate to both data security and denial of service attacks, and there have been many solutions created by different vendors address these problems. However, the number of different types of attack, and the many possible solutions, makes it a difficult task to put in place an appropriate wireless network security policy. Such a policy must address both the size and nature of the enterprise, and the resources available to it. Measures such as WEP and MAC filtering are only appropriate for home …


Attenuation Of Protective Effect Against Eccentric Exercise-Induced Muscle Damage, Kazunori Nosaka, Michael J. Newton, Paul Sacco Jan 2005

Attenuation Of Protective Effect Against Eccentric Exercise-Induced Muscle Damage, Kazunori Nosaka, Michael J. Newton, Paul Sacco

Research outputs pre 2011

No abstract provided.


The Law And Racism: Some Reflections On The Australian Experience, Laksiri Jayasuriya Jan 2005

The Law And Racism: Some Reflections On The Australian Experience, Laksiri Jayasuriya

Research outputs pre 2011

Racism in Australian society is not something new and surprising. For a variety of historical and socio-political reasons it has existed from the earliest days ·of colonisation, and there have been a variety of strategies tried over the years to deal with racism as a social problem. One strategy most frequently resorted to, especially in recent years, has been to use the law as a means of combating racism. Before considering the questions of law and racism, we need first to clarify what we mean by the term racism...


Heuristics For Optimising The Calculation Of Hypervolume For Multi-Objective Optimisation Problems, Lyndon While, Lucas Bradstreet, Luigi Barone, Philip Hingston Jan 2005

Heuristics For Optimising The Calculation Of Hypervolume For Multi-Objective Optimisation Problems, Lyndon While, Lucas Bradstreet, Luigi Barone, Philip Hingston

Research outputs pre 2011

The fastest known algorithm for calculating the hypervolume of a set of solutions to a multi-objective optimization problem is the HSO algorithm (hypervolume by slicing objectives). However, the performance of HSO for a given front varies a lot depending on the order in which it processes the objectives in that front. We present and evaluate two alternative heuristics that each attempt to identify a good order for processing the objectives of a given front. We show that both heuristics make a substantial difference to the performance of HSO for randomly-generated and benchmark data in 5-9 objectives, and that they both …


Exploring System Factors That Influence Community Development In Online Settings, Christopher Brook, Ron Oliver Jan 2005

Exploring System Factors That Influence Community Development In Online Settings, Christopher Brook, Ron Oliver

Research outputs pre 2011

This paper presents an exploration of the community experience in online settings where the development of a learning community was a key instructional aim. The inquiry used the Learning Community Development Model (Brook & Oliver, 2003) to guide the exploration of the community experience in online settings. The paper reports the findings of a multi-case study that sought to investigate system factors that influence the development of online communities of learning.


Integrating Open Source Protections Into Scada Networks, Craig Valli Jan 2005

Integrating Open Source Protections Into Scada Networks, Craig Valli

Research outputs pre 2011

SCADA (Supervisory Control And Data Acquisition) networks control much of the industrialised nations production and supply complexes. Various government reports and investigations have highlighted the vulnerability of these systems. Many of these systems are on private networks which are increasingly being connected to systems that are accessible from other networks such as the Internet. There are a range of open source tools that now offer fonctionality that can be used to secure SCADA networks from intrusion or compromise. This paper explores some of the issues with current SCADA deployment trends from a network security perspective and then examines open source …


Online Learning As Information Delivery: Digital Myopia, Jan Herrington, Thomas Reeves, Ron Oliver Jan 2005

Online Learning As Information Delivery: Digital Myopia, Jan Herrington, Thomas Reeves, Ron Oliver

Research outputs pre 2011

In business and commerce, the concept of marketing myopia has been a useful tool to predict, analyze and explain the rise and fall of businesses. In this paper, we question whether the concept can also be used to predict the ultimate downfall of online learning in higher education, if universities continue to confuse their key mission— education—with the much more product-oriented aim of information delivery. The proliferation of information-based online courses is examined within the context of the limitations imposed by widely used course management systems, institutional impediments and other factors that encourage teachers to adopt information delivery in preference …


Design Of Reconfigurable Optical Interconnects Employing Opto-Vlsi Processors, Roger Jeffery, Kamal Alameh, Mikhail Vasiliev Jan 2005

Design Of Reconfigurable Optical Interconnects Employing Opto-Vlsi Processors, Roger Jeffery, Kamal Alameh, Mikhail Vasiliev

Research outputs pre 2011

We investigate the design and performance of a reconfigurable optical interconnect structure based on vertical-cavity surface-emitting lasers (VCSEL), Opto-VLSI processors and photodetector arrays. We optimise a proof-of-concept 3-VCSEL-element structure that eliminates crosstalk caused by unwanted diffracted optical beams and show that a bit error role (BER) of 10'17 is feasible at 3.2 Gbps for each channel.


Rome: A Poem In Three Parts, Andrew Taylor Jan 2005

Rome: A Poem In Three Parts, Andrew Taylor

Research outputs pre 2011

This poem was written during a six month period, in 2004 and early 2005, as Writer in Residence at the EB Whiting Library in Rome, and in Perth during the weeks preparatory to going to Italy.


Seeking Information Superiority: Strategies For Business In The Commercial Application Of Information Operations, Martin Dart Jan 2005

Seeking Information Superiority: Strategies For Business In The Commercial Application Of Information Operations, Martin Dart

Research outputs pre 2011

Information superiority is a condition that many businesses attempt to attain without truly understanding what it is, or how to get there. This paper presents an overview to help businesspeople recognize the road to information superiority, and some of the essential strategies to implement along the way. Information operations is a concept described to enable information superiority, when used with a network form of organization (as opposed to simply being networked). This paper describes information operations across their fundamental structure of intelligence, surveillance, and reconnaissance (ISR); and suggests a separation between industrial espionage and legitimate business information gathering. A model …


Physician Secure Thyself, Patricia Williams Jan 2005

Physician Secure Thyself, Patricia Williams

Research outputs pre 2011

Whilst discussion rages on the issues relating to security of medical data and the reason why it is important, there is little published information on how to tackle even basic security challenges for medical practice in Australia. Research suggests an underestimation of the threats to medical data by medical practitioners, hence there is sufficient reason to promote development of tools to assist medical practice with technical issues they are unfamiliar with. This paper provides an initial dialogue on how these security issues should be addressed. Included is a framework for risk assessment and elaboration of the implementation process to make …


Similarity-Aware Web Content Management And Document Pre-Fetching, Jitian Xiao, Michael Collins Jan 2005

Similarity-Aware Web Content Management And Document Pre-Fetching, Jitian Xiao, Michael Collins

Research outputs pre 2011

Web caching is intended to reduce network traffic, server load and user-perceived retrieval latency. Web pre-fetching, which can be considered as "active" caching, builds on regular Web caching, minimizing further a Web user's access delay. To be effective, however, the pre-fetching techniques must be able to predict subsequent Web access with minimum computational overheads. This paper presents a similarity-based mechanism to support similarity-aware Web document pre-fetching between proxy caches and browsing clients. We first define a set of measures to assess similarities between Web documents, and then propose a multi-cache architecture to cache Web documents based on those similarities. A …


A Critical Exploration Of The School Context For Young Adolescents Completing Primary Education, Sasha Stumpers, Lauren Breen, Julie Ann Pooley, Lynne Cohen, Lisbeth Pike Jan 2005

A Critical Exploration Of The School Context For Young Adolescents Completing Primary Education, Sasha Stumpers, Lauren Breen, Julie Ann Pooley, Lynne Cohen, Lisbeth Pike

Research outputs pre 2011

Many schools have adopted relational approaches to attend to the social context in which learning transpires. More recently however, such approaches and their supporters have been criticized for not examining the school context in its entirety and the student experience within this context. The current research sought to critically explore young adolescents' experiences within the context of their school. Fifteen year seven students in an Australian primary school were interviewed about their experiences of their school context. The data were analysed using a thematic analysis and a question-ordered matrix was constructed to aid the detection of themes and sub-themes from …


Dynamic Wavefront Generation Technology Using Optovlsi Processor, Zhenglin Wang, Kamal Alameh, Rong Zheng Jan 2005

Dynamic Wavefront Generation Technology Using Optovlsi Processor, Zhenglin Wang, Kamal Alameh, Rong Zheng

Research outputs pre 2011

In this paper we present a novel approach for dynamic wavefront generatio based on reconfigurable Opto-VLSI processing. Computer algorithms are developed to generate arbitrary quadric-phse lense and lenslet array with programmable focal lenght, beam steering and lens diameter by driving the Opto-VLSI processor with different computer generated phase holograms. Proff-of-concept experimental results show that multiple spheric and aspheric lens/lenslet wavefrongs can be generated with each lens independently addressed. The measured meaximum focal length tuning range is from +80mm to infinity and the beam scanning angular range is +7mrad, which are in excellent agreement with theory. Difference spatial profiles for wavefront …