Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

2006

University of Wollongong

Engineering & Information Sciences - Honours Theses

Articles 1 - 3 of 3

Full-Text Articles in Entire DC Network

The Threat Of Public Data Availability On Critical Infrastructure Protection (Cip), And The Level Of Awareness Amongst Security Experts In Australila, Roba Abbas Dec 2006

The Threat Of Public Data Availability On Critical Infrastructure Protection (Cip), And The Level Of Awareness Amongst Security Experts In Australila, Roba Abbas

Engineering & Information Sciences - Honours Theses

Critical infrastructure protection (CIP) refers to safeguarding essential services from harm. CIP has gained recognition as a priority area on the national security agendas of many countries in recent years, most notably Australia, due to events that have compromised the critical infrastructure (CI) of other nations. The importance of the CIP process is evidenced extensively in the related literature, where the major phases of the process are discussed. Traditionally, the CIP focus is on the three major stages of vulnerability identification, risk assessment and risk management. A study conducted by Breeding in 2003 introduced the risk of ‘sensitive but unclassified’ …


Humancentric Applications Of Precise Location Based Services, L. Perusco Jan 2006

Humancentric Applications Of Precise Location Based Services, L. Perusco

Engineering & Information Sciences - Honours Theses

Mobile technologies, which allow users to move around while maintaining the ability to access a network and its services, now claim a significant degree of attention in both industry and academia. In this vision, one particular attribute gains critical importance: location. The ability to pinpoint a mobile user’s location creates a new class of applications and services. These location based services (LBS) exploit the known location of a user to provide services dependent on their geographic context and personalised needs. However, as newer positioning technologies are introduced into the market with a greater level of location accuracy, and existing technologies …


Minimizing Product Shrinkage In The Supply Chain Through The Use Of Radio-Frequency Identification: A Case Study On A Major Australian Retailer, N. Huber Jan 2006

Minimizing Product Shrinkage In The Supply Chain Through The Use Of Radio-Frequency Identification: A Case Study On A Major Australian Retailer, N. Huber

Engineering & Information Sciences - Honours Theses

Radio Frequency Identification (RFID) has been used for over half a century. Today, RFID is commonly used for electronic toll collection on motor highways, document management, identification of gaming tokens and chips in casinos, tracking and sorting luggage at international airports, managing diamonds for jewellery businesses, and inventory management for pharmaceutical and retail industries. These are just a few of the many thousands of applications that RFID can facilitate. Currently, the retail industry uses barcodes to identify products and Electronic Article Surveillance (EAS) as an anti-theft mechanism solely within retail outlets. Both systems have the ability to play a role …