Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Entire DC Network
The Threat Of Public Data Availability On Critical Infrastructure Protection (Cip), And The Level Of Awareness Amongst Security Experts In Australila, Roba Abbas
Engineering & Information Sciences - Honours Theses
Critical infrastructure protection (CIP) refers to safeguarding essential services from harm. CIP has gained recognition as a priority area on the national security agendas of many countries in recent years, most notably Australia, due to events that have compromised the critical infrastructure (CI) of other nations. The importance of the CIP process is evidenced extensively in the related literature, where the major phases of the process are discussed. Traditionally, the CIP focus is on the three major stages of vulnerability identification, risk assessment and risk management. A study conducted by Breeding in 2003 introduced the risk of ‘sensitive but unclassified’ …
Humancentric Applications Of Precise Location Based Services, L. Perusco
Humancentric Applications Of Precise Location Based Services, L. Perusco
Engineering & Information Sciences - Honours Theses
Mobile technologies, which allow users to move around while maintaining the ability to access a network and its services, now claim a significant degree of attention in both industry and academia. In this vision, one particular attribute gains critical importance: location. The ability to pinpoint a mobile user’s location creates a new class of applications and services. These location based services (LBS) exploit the known location of a user to provide services dependent on their geographic context and personalised needs. However, as newer positioning technologies are introduced into the market with a greater level of location accuracy, and existing technologies …
Minimizing Product Shrinkage In The Supply Chain Through The Use Of Radio-Frequency Identification: A Case Study On A Major Australian Retailer, N. Huber
Engineering & Information Sciences - Honours Theses
Radio Frequency Identification (RFID) has been used for over half a century. Today, RFID is commonly used for electronic toll collection on motor highways, document management, identification of gaming tokens and chips in casinos, tracking and sorting luggage at international airports, managing diamonds for jewellery businesses, and inventory management for pharmaceutical and retail industries. These are just a few of the many thousands of applications that RFID can facilitate. Currently, the retail industry uses barcodes to identify products and Electronic Article Surveillance (EAS) as an anti-theft mechanism solely within retail outlets. Both systems have the ability to play a role …