Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Organizational culture (2)
- Partial least square (PLS) (2)
- Security (2)
- Analytical dualism (1)
- Artificial Neural Networks (1)
-
- Building Automation (1)
- Business (1)
- Business students (1)
- Ccitical realism (1)
- Community engagement (1)
- Complexity (1)
- Controls (1)
- Employability (1)
- Enterprise Architecture (1)
- Graduates (1)
- Heating Ventilation and Air Conditioning (1)
- Higher education (1)
- Industry engagement (1)
- Internship (1)
- Intrusion Detection (1)
- Moderator (1)
- Morphogenetic approach (1)
- Objectives (1)
- Perceived behavioral control (1)
- Performance (1)
- Second-order factor (1)
- Situational logics (1)
- Tertiary education (1)
- Theory of planned behavior (1)
- University (1)
Articles 1 - 6 of 6
Full-Text Articles in Business
Evaluating Policy Layer Security Controls For Value Realisation In Secure Systems, Brian Cusack, Maher Al-Khazrajy
Evaluating Policy Layer Security Controls For Value Realisation In Secure Systems, Brian Cusack, Maher Al-Khazrajy
Australian Information Security Management Conference
A strategic question for any business is: What value do control frameworks give? The question concerns the costs associated with implementing and maintaining control frameworks compared with the benefits gained. Each control framework contains many controls that may or may not benefit a situation and this research is aimed at testing different selections and combinations of controls to forecast probable impacts on business outcomes. The scope of the research is limited to a representative set of security controls and the lesser question: What are the criteria for selecting the most effective and efficient security control configurations for best business value? …
Timing Attack Detection On Bacnet Via A Machine Learning Approach, Michael N. Johnstone, Matthew Peacock, J I. Den Hartog
Timing Attack Detection On Bacnet Via A Machine Learning Approach, Michael N. Johnstone, Matthew Peacock, J I. Den Hartog
Australian Information Security Management Conference
Building Automation Systems (BAS), alternatively known as Building Management Systems (BMS), which centralise the management of building services, are often connected to corporate networks and are routinely accessed remotely for operational management and emergency purposes. The protocols used in BAS, in particular BACnet, were not designed with security as a primary requirement, thus the majority of systems operate with sub-standard or non-existent security implementations. As intrusion is thus likely easy to achieve, intrusion detection systems should be put in place to ensure they can be detected and mitigated. Existing intrusion detection systems typically deal only with known threats (signature-based approaches) …
How System Complexity And Organizational Culture Affect Ais Misuse, Mohd Saiyidi Mokhtar Mat Roni, Mohamad Azmi Nias Ahmad, Hadrian Djajadikerta
How System Complexity And Organizational Culture Affect Ais Misuse, Mohd Saiyidi Mokhtar Mat Roni, Mohamad Azmi Nias Ahmad, Hadrian Djajadikerta
Research outputs 2014 to 2021
The demands for more studies on precarious practices in the AIS environment indicate that employees pose greater threats than outsiders. Addressing internally-bred security pandemonium with external-threat-oriented solutions further complicates the matter. The real issue is obscured rather than solved. Based on theory of planned behaviour (TPB), organisational culture and complexity of an accounting information system (AIS) were introduced to see how these factors affect employees’ mal-intention when working with an organisation AIS. Using partial-least-square structural equation modelling (PLS-SEM) approach, it was found that culture and complexity acting as pure moderating variables affecting certain forms of predictor-criterion relationship in TPB model. …
Examining The Social Aspects Of Enterprise Architecture Implementation: A Morphogenetic Approach, Edi Nuryatno, Philip Dobson
Examining The Social Aspects Of Enterprise Architecture Implementation: A Morphogenetic Approach, Edi Nuryatno, Philip Dobson
Research outputs 2014 to 2021
This paper argues that existing research in Enterprise Architecture (EA) tends to emphasise the technical aspects of implementation and neglects the role of ‘people’. The paper uses Archer’s Morphogenetic Approach (MA) to elaborate the social context of EA. This approach examines the relationships between agency, structure and culture to understand how stakeholders affect and are affected by EA implementation. A university just commencing an EA program is used as a case example. The case example describes the challenging university environment and provides an illustration of the important situational logics that direct agency action within the complex social context of a …
Working Together To Achieve Better Work Integrated Learning Outcomes: Improving Productivity Through Better Employer Involvement, Denise Jackson, Sonia Ferns, David Rowbottom, Diane Mclaren
Working Together To Achieve Better Work Integrated Learning Outcomes: Improving Productivity Through Better Employer Involvement, Denise Jackson, Sonia Ferns, David Rowbottom, Diane Mclaren
Research outputs 2014 to 2021
The overarching aim of this twelve-month project, funded by the Australian Chamber of Commerce and Industry, was to develop industry understanding of Work-Integrated Learning (WIL) and assess the support needed by employers to better engage in WIL. Data gathered in a survey of Western Australian employers and industry focus groups prompted the establishment of a WIL Advisory Service (WAS). The service was founded by the Chamber of Commerce and Industry of Western Australia (CCIWA) to broker relationships between employers and universities, and provide support to improve WIL outcomes. In this study, student and employer users of WAS were asked to …
Pls-Sem Approach To Second-Order Factor Of Deviant Behaviour: Constructing Perceived Behavioural Control, Saiyidi Mat Roni, Hadrian Djajadikerta, Mohamad Azmi Nias Ahmad
Pls-Sem Approach To Second-Order Factor Of Deviant Behaviour: Constructing Perceived Behavioural Control, Saiyidi Mat Roni, Hadrian Djajadikerta, Mohamad Azmi Nias Ahmad
Research outputs 2014 to 2021
Partial least square structural equation modelling (PLS-SEM) provides researchers with a predictive tool for theory building. In an attempt to understand deviant behaviour which can potentially become a criminal offence, PLS-SEM opens up a valuable mean to analyse latent constructs are designed from a composite of indicators. At its basic, this is called a first-order variable. Using the first-order variable in a basic predictor-criterion research model illuminates in-depth structure on how each component of these variables affects each other. However, as an analysis moves to a more complex level, the first-order variable poses a great challenge to the researchers. This …