Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Physical Sciences and Mathematics

Attitudes And Perceptions Towards Privacy And Surveillance In Australia, Aleatha J. Shanley Jan 2024

Attitudes And Perceptions Towards Privacy And Surveillance In Australia, Aleatha J. Shanley

Theses: Doctorates and Masters

Understanding attitudes towards privacy and surveillance technologies used to enhance security objectives is a complex, but crucial aspect for policy makers to consider. Historically, terrorism-related incidents justified the uptake of surveillance practices. More recently however, biosecurity concerns have motivated nation-states to adopt more intrusive surveillance measures. There is a growing body of literature that supports the public’s desire to maintain privacy despite fears of biological or physical threats.

This research set out to explore attitudes towards privacy and surveillance in an Australian context. Throughout the course of this endeavour, the COVID-19 pandemic emerged bringing with it a variety of track …


Opportunities And Challenges Posed By Disruptive And Converging Information Technologies For Australia's Future Defence Capabilities: A Horizon Scan, Pi-Shen Seet, Anton Klarin, Janice Jones, Mike Johnstone, Helen Cripps, Jalleh Sharafizad, Violetta Wilk, David Suter, Tony Marceddo Jan 2024

Opportunities And Challenges Posed By Disruptive And Converging Information Technologies For Australia's Future Defence Capabilities: A Horizon Scan, Pi-Shen Seet, Anton Klarin, Janice Jones, Mike Johnstone, Helen Cripps, Jalleh Sharafizad, Violetta Wilk, David Suter, Tony Marceddo

Research outputs 2022 to 2026

Introduction: The research project's objective was to conduct a comprehensive horizon scan of Network Centric Warfare (NCW) technologies—specifically, Cyber, IoT/IoBT, AI, and Autonomous Systems. Recognised as pivotal force multipliers, these technologies are critical to reshaping the mission, design, structure, and operations of the Australian Defence Force (ADF), aligning with the Department of Defence (Defence)’s offset strategies and ensuring technological advantage, especially in the Indo-Pacific's competitive landscape.

Research process: Employing a two-pronged research approach, the study first leveraged scientometric analysis, utilising informetric mapping software (VOSviewer) to evaluate emerging trends and their implications on defence capabilities. This approach facilitated a broader understanding …


Cyber-Aidd: A Novel Approach To Implementing Improved Cyber Security Resilience For Large Australian Healthcare Providers Using A Unified Modelling Language Ontology, Martin Dart, Mohiuddin Ahmed Jan 2023

Cyber-Aidd: A Novel Approach To Implementing Improved Cyber Security Resilience For Large Australian Healthcare Providers Using A Unified Modelling Language Ontology, Martin Dart, Mohiuddin Ahmed

Research outputs 2022 to 2026

Purpose: This paper proposes a novel cyber security risk governance framework and ontology for large Australian healthcare providers, using the structure and simplicity of the Unified Modelling Language (UML). This framework is intended to mitigate impacts from the risk areas of: (1) cyber-attacks, (2) incidents, (3) data breaches, and (4) data disclosures. Methods Using a mixed-methods approach comprised of empirical evidence discovery and phenomenological review, existing literature is sourced to confirm baseline ontological definitions. These are supplemented with Australian government reports, professional standards publications and legislation covering cyber security, data breach reporting and healthcare governance. Historical examples of healthcare cyber …


Evaluating Staff Attitudes, Intentions, And Behaviors Related To Cyber Security In Large Australian Health Care Environments: Mixed Methods Study, Martin Dart, Mohiuddin Ahmed Jan 2023

Evaluating Staff Attitudes, Intentions, And Behaviors Related To Cyber Security In Large Australian Health Care Environments: Mixed Methods Study, Martin Dart, Mohiuddin Ahmed

Research outputs 2022 to 2026

Background: Previous studies have identified that the effective management of cyber security in large health care environments is likely to be significantly impacted by human and social factors, as well as by technical controls. However, there have been limited attempts to confirm this by using measured and integrated studies to identify specific user motivations and behaviors that can be managed to achieve improved outcomes.

Objective: This study aims to document and analyze survey and interview data from a diverse range of health care staff members, to determine the primary motivations and behaviors that influence their acceptance and application of cyber …


A Framework For Development Of Android Mobile Electronic Prescription Transfer Applications In Compliance With Security Requirements Mandated By The Australian Healthcare Industry, Kyaw Kyaw Htat Jan 2018

A Framework For Development Of Android Mobile Electronic Prescription Transfer Applications In Compliance With Security Requirements Mandated By The Australian Healthcare Industry, Kyaw Kyaw Htat

Theses: Doctorates and Masters

This thesis investigates mobile electronic transfer of prescription (ETP) in compliance with the security requirements mandated by the Australian healthcare industry and proposes a framework for the development of an Android mobile electronic prescription transfer application. Furthermore, and based upon the findings and knowledge from constructing this framework, another framework is also derived for assessing Android mobile ETP applications for their security compliance.

The centralised exchange model-based ETP solution currently used in the Australian healthcare industry is an expensive solution for on-going use. With challenges such as an aging population and the rising burden of chronic disease, the cost of …


A Forecasting Tool For Predicting Australia's Domestic Airline Passenger Demand Using A Genetic Algorithm, Panarat Srisaeng, Glenn Baxter, Steven Richardson, Graham Wild Oct 2015

A Forecasting Tool For Predicting Australia's Domestic Airline Passenger Demand Using A Genetic Algorithm, Panarat Srisaeng, Glenn Baxter, Steven Richardson, Graham Wild

Research outputs 2014 to 2021

This study has proposed and empirically tested for the first time genetic algorithm optimization models for modelling Australia’s domestic airline passenger demand, as measured by enplaned passengers (GAPAXDE model) and revenue passenger kilometres performed (GARPKSDE model). Data was divided into training and testing datasets; 74 training datasets were used to estimate the weighting factors of the genetic algorithm models and 13 out-of-sample datasets were used for testing the robustness of the genetic algorithm models. The genetic algorithm parameters used in this study comprised population size (n): 200; the generation number: 1,000; and mutation rate: 0.01. The modelling results have shown …


The Syrian Calling: Western Jihad Recruitment And Martyrdom, Robyn Torok Dec 2013

The Syrian Calling: Western Jihad Recruitment And Martyrdom, Robyn Torok

Australian Counter Terrorism Conference

The crisis in Syria has attracted worldwide attention as well as condemnation and has degraded into a violent civil conflict. Not only are there more than a thousand rebel groups including a number of hard‐line jihadist groups operating within Syria, but these jihadist groups are attracting a significant number of foreigners including Australians. This study examined social media discourses from Facebook and embedded YouTube links for recruiting Westerners to the war in Syria. Findings suggest that the perceived inaction of the international community and in particular the West coupled with the atrocities committed has become a platform for jihadi recruitment. …


Boko Haram: Terrorist Organization, Freedom Fighters Or Religious Fanatics? An Analysis Of Boko Haram Within Nigeria, An Australian Perspective And The Need For Counter Terrorism Responses That Involves Prescribing Them As A Terrorist Organization., Gabrielle Blanquart Dec 2012

Boko Haram: Terrorist Organization, Freedom Fighters Or Religious Fanatics? An Analysis Of Boko Haram Within Nigeria, An Australian Perspective And The Need For Counter Terrorism Responses That Involves Prescribing Them As A Terrorist Organization., Gabrielle Blanquart

Australian Counter Terrorism Conference

The adoption of Sharia law and the creation of an Islamic government are prominent motivations for religious terrorism within the current climate. Throughout history, Nigeria has been exposed to ethno religious violence and political discontent and has recently seen an escalation in associated violence threatening its sovereignty, territorial integrity, peace and stability. This paper explores Boko Haram, a Nigerian Islamist sect, responsible for numerous attacks in northern and central Nigeria on infrastructure and people. The origins and ideological motivations of this group are examined and compared to the current wave of religious terrorism in relation to tactics, leadership and objectives. …


A Holistic Approach To Ehealth Security In Australia: Developing A National Ehealth Sercurity And Access Framework (Nesaf), Yvette Lejins, John Leitch Jan 2012

A Holistic Approach To Ehealth Security In Australia: Developing A National Ehealth Sercurity And Access Framework (Nesaf), Yvette Lejins, John Leitch

Research outputs 2012

The Australian ehealth landscape is confronted with new challenges for healthcare providers in appropriately managing and protecting personal health information. The vision of the National eHealth Security and Access Framework (NESAF) is to adopt a consistent approach to the application of health information security standards and provide better practice guidance in relation to eHealth specific security and access practices. The eHealth information security landscape has a number of unique attributes, many that are faced by other business that provide a service or products – but we see that there is no industry in Australia where such widespread changes in the …


A Holistic Approach To Ehealth Security In Australia: Developing A National Ehealth Sercurity And Access Framework (Nesaf), Yvette Lejins, John Leitch Jan 2012

A Holistic Approach To Ehealth Security In Australia: Developing A National Ehealth Sercurity And Access Framework (Nesaf), Yvette Lejins, John Leitch

Australian eHealth Informatics and Security Conference

The Australian ehealth landscape is confronted with new challenges for healthcare providers in appropriately managing and protecting personal health information. The vision of the National eHealth Security and Access Framework (NESAF) is to adopt a consistent approach to the application of health information security standards and provide better practice guidance in relation to eHealth specific security and access practices. The eHealth information security landscape has a number of unique attributes, many that are faced by other business that provide a service or products – but we see that there is no industry in Australia where such widespread changes in the …


Web Accessibility In Corporate Australia: Perceptions Versus Reality, Justin Brown, Vivienne Conway Jan 2012

Web Accessibility In Corporate Australia: Perceptions Versus Reality, Justin Brown, Vivienne Conway

Research outputs 2012

In this paper we describe the results of website audits and survey responses for organizations involved in the Australia Web Awards for 2011. 160 organizations entered their sites or sites they had developed as part of the awards, and in doing so were required to select the level of WCAG compliance for their site. Audits conducted on these sites after the awards completion showed that very few of the entrants actually met their selected level of accessibility compliance, regardless of the organization type. Survey responses from participating entrants in the AWA indicated that they were aware of the WCAG guidelines …


A Comparative Analysis Of The Security Of Internet Banking In Australia:A Customer Perspective, Panida Subsorn, Sunsern Limwiriyakul Aug 2011

A Comparative Analysis Of The Security Of Internet Banking In Australia:A Customer Perspective, Panida Subsorn, Sunsern Limwiriyakul

International Cyber Resilience conference

Internet has its own inherent security issues in terms of confidentiality, integrity and privacy. The main impact of these kinds of issues is specifically on the banking industry as they have increased their Internet banking facilities in order to reduce costs and provide better services and banking convenience to their Internet banking customers. However, banking customers have not had a choice of Internet banking mainly due to the fact that they are already tied to whatever form of Internet banking that their current bank provides. This paper therefore examined Internet banking security systems in Australian banks by creating the proposed …


Australian Critical Infrastructure Protection: A Case Of Two Tales, Matthew Warren, Graeme Pye, William Hutchinson Nov 2010

Australian Critical Infrastructure Protection: A Case Of Two Tales, Matthew Warren, Graeme Pye, William Hutchinson

Australian Information Warfare and Security Conference

The protection of critical infrastructures and the choices made in terms of priorities and cost, all impact upon the planning, precautions and security aspects of protecting these important systems. Often the when choices made is difficult to assess at the time the decision is taken and it is only after an incident that the truth of the choices made become fully evident. The paper focuses on two recent examples of Australian Critical Infrastructure protection and the issues that related to those examples.


The Significance Of Learning Style With Respect To Achievement In First Year Programming Students, Vivian Campbell, Michael Johnstone Jan 2010

The Significance Of Learning Style With Respect To Achievement In First Year Programming Students, Vivian Campbell, Michael Johnstone

Research outputs pre 2011

Study investigates the relationship between the Kolb learning style of first-year programming students and their level of achievement. The method of data collection is described and the process of hypothesis testing is explained. The students in this study were predominately converger and accommodator learning styles. Statistical tests indicated no overall difference between the results of students with different learning styles but a difference was found along Kolb's concrete-abstract axis. A number of possible impacts on teaching are discussed and suggestions made for future research.


The Impact Of Security Surveys Within Australia And New Zealand, Matthew J. Warren, Shona Leitch Dec 2007

The Impact Of Security Surveys Within Australia And New Zealand, Matthew J. Warren, Shona Leitch

Australian Information Security Management Conference

Information security is portrayed as a global problem that impacts all countries that are considered as part of the Information Society. Recent surveys show that there are increased concerns about computer crime. The paper will focus upon recent national security surveys from Australia and New Zealand and the trends that this research shows. Is it fair to assume the security practices are the same all over the world? The paper looks at security practices from a number of different countries perspectives and shows that security practices are not generic and vary from country to country. The paper will also evaluate …


Australian Firearm Identification System Based On The Ballistics Images Of Projectile Specimens, Dongguang Li Jan 2007

Australian Firearm Identification System Based On The Ballistics Images Of Projectile Specimens, Dongguang Li

Research outputs pre 2011

Charactetistic markings on the cartridge case and projectile of a fired bullet are created when it is fired. Over thirty different features within these marks can be distinguished, which in combination produce a "fingerprint" for a firearm. By analyzing features within such a set of fireann :fingerprints, it will be possible to identify not only the type and model of a fireann, but also each every individual weapon as effectively as human :fingerprint identification. A new analytic system based on fast Fourier transform (FFT) for identifying the projectile specimens by the line-scan imaging technique is proposed in this paper. Experimental …


User Response And Organisational Fit For Information Systems In Earth Observation, Jeff Kingwell Jan 1998

User Response And Organisational Fit For Information Systems In Earth Observation, Jeff Kingwell

Theses: Doctorates and Masters

A group of seventy six scientists and data managers in the Australian research agency CSIRO were surveyed to establish their needs and preferences in relation to information systems for Earth observation data. After study of available alternatives, three prototype Earth observation information management systems were installed and the user response was evaluated through interview of fifteen of the group. The prototypes consisted of web-based client servers which permitted users to interrogate databases of Earth observation datasets; to search for information about sensor or satellite performance, and to retrieve data and information products. The chosen systems were CILS, the CEOS (Committee …


The Management Of Information Technology Investments In The Australian Ambulance Services, Anthony J. Ahern Jan 1994

The Management Of Information Technology Investments In The Australian Ambulance Services, Anthony J. Ahern

Theses: Doctorates and Masters

Information Technology plays a significant role in the administration and operation of most organisations today. This is certainly the case with each of the Australian Ambulance Services. With the rapid increase in the use of Information Technology and the expectation about its use by both staff and the general public, the Ambulance Service managements' are faced with the dilemma of trying to ensure that their organisations are able to get the full advantage of advances in Information Technology and at the same time ensure that investments in IT are maintained at appropriate levels that will ensure the maximum return on …