Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 31

Full-Text Articles in Physical Sciences and Mathematics

An Exploratory Study Of The Implementation Of Electronic Health Records: A Two Country Comparison, Helen Cripps, Craig Standing, Vesna Prijatelj Jan 2012

An Exploratory Study Of The Implementation Of Electronic Health Records: A Two Country Comparison, Helen Cripps, Craig Standing, Vesna Prijatelj

Research outputs 2012

The adoption of electronic health records has been significantly slower in Australia than many European countries. This paper compares the implementation process in Australia with Slovenia, looking at the benefits, drawbacks and success factors of e-health implementation. The authors use case studies collected in each country to discuss issues around e-health implementation. Though Slovenia has progressed much further down the road of e-health the commonality of the experiences between both cases was striking.


User Reaction Towards End User License Agreements On Android Smartphones, Hamish Cotton, Christopher Bolan Jan 2012

User Reaction Towards End User License Agreements On Android Smartphones, Hamish Cotton, Christopher Bolan

Research outputs 2012

Smartphones are increasingly recognized as the most popular computing platform, forming an integral part of the way users interact with the online world. Accompanied with the advent of user-installed content, End User License Agreements have surfaced mirroring issues previously arising on more traditional platforms. This survey conducted in Perth, Western Australia looked at user behavior when viewing and accepting EULAs on smartphone devices. The results show that a majority of users do not read such agreements citing issues of readability and length.


A Proposed Method For Examining Wireless Device Vulnerability To Brute Force Attacks Via Wps External Registrar Pin Authentication Design Vulnerability, Symon Aked, Christopher Bolan, Murray Brand Jan 2012

A Proposed Method For Examining Wireless Device Vulnerability To Brute Force Attacks Via Wps External Registrar Pin Authentication Design Vulnerability, Symon Aked, Christopher Bolan, Murray Brand

Research outputs 2012

Wi-Fi Protected Setup (WPS) is a certification scheme introduced in 2007 to ensure that wireless SOHO (Small Office, Home Office) and home networks could be connected to in a trusted, yet user friendly manner. Recently, WPS was shown to have a design and implementation flaw which makes the feature highly susceptible to attack. Although open-source tools have been written and released, no formal testing methodology has been developed. This research presents a proposed method for the testing of this vulnerability in a measured and systematic way.


Developing Governance Capability To Improve Information Security Resilience In Healthcare, Rachel Mahncke, Patricia Williams Jan 2012

Developing Governance Capability To Improve Information Security Resilience In Healthcare, Rachel Mahncke, Patricia Williams

Research outputs 2012

General medical practices’ in Australia are vulnerable to information security threats and insecure practices. It is becoming well accepted in the healthcare environment that information security is both a technical and a human endeavour, and that the human behaviours, particularly around integration with healthcare workflow, are key barriers to good information security practice. This paper develops a holistic capability approach to information security by completing a preliminary iteration of mapping operational capabilities to governance capabilities. Using an operational backup capability matrix exemplar, the approach is analysed against the governance policy capability matrix. The resultant mapping between the operational and governance …


Building Patient Trust In Electronic Health Records, Helen Cripps, Craig Standing Jan 2012

Building Patient Trust In Electronic Health Records, Helen Cripps, Craig Standing

Research outputs 2012

While electronic medical records have the potential to vastly improve a patient’s health care, their introduction also raises new and complex security and privacy issues. The challenge of preserving what patients’ believe as their privacy in the context of the introduction of the Personally Controlled Electronic Health Record (PCEHR), into the multi-layered and decentralised Australian health system is discussed. Based on a number of European case studies the paper outlines the institutional measures for privacy and security that have been put in place, and compares them with the current status in Australia. The implementation of the PCEHR has not been …


Cloud Security: A Case Study In Telemedicine, Michael Johnstone Jan 2012

Cloud Security: A Case Study In Telemedicine, Michael Johnstone

Research outputs 2012

Security as part of requirements engineering is now seen as an essential part of systems development in several modern methodologies. Unfortunately, medical systems are one domain where security is seen as an impediment to patient care and not as an essential part of a system. Cloud computing may offer a seamless way to allow medical data to be transferred from patient to medical practitioners, whilst maintaining security requirements. This paper uses a case study to investigate the use of cloud computing in a mobile application for Parkinson Disease. It was found that functionality took precedence over security requirements and standards.


Mobile Device Management For Personally Controlled Electronic Health Records: Effective Selection Of Evaluation Criteria, Murray Brand, Patricia Williams Jan 2012

Mobile Device Management For Personally Controlled Electronic Health Records: Effective Selection Of Evaluation Criteria, Murray Brand, Patricia Williams

Research outputs 2012

Enterprises are faced with the task of managing a plethora of mobile computing devices in the workplace that are employed for both business purposes and private use. This integration can contribute to the demands of security protection and add significant threats to the enterprise. The introduction of the Personally Controlled Electronic Health Record (PCEHR) system is a significant step in e-health for Australia and will likely result in sensitive information being accessed from mobile computing devices. Mobile Device Management (MDM) offers a potential solution to manage these devices, however there is a variety of vendors with a range of solutions. …


Accountable-Ehealth Systems: The Next Step Forward For Privacy, Randike Gajanayake, Tony Iannella, Bill Lane, Tony Sahama Jan 2012

Accountable-Ehealth Systems: The Next Step Forward For Privacy, Randike Gajanayake, Tony Iannella, Bill Lane, Tony Sahama

Research outputs 2012

EHealth systems promise enviable benefits and capabilities for healthcare, yet the technologies that make these capabilities possible brings with them undesirable drawback such as information security related threats which need to be appropriately addressed. Lurking in these threats are patient privacy concerns. Resolving these privacy concerns have proven to be difficult since they often conflict with information requirements of healthcare providers. It is important to achieve a proper balance between these requirements. We believe that information accountability can achieve this balance. In this paper we introduce accountable-eHealth systems. We will discuss how our designed protocols can successfully address the aforementioned …


A Holistic Approach To Ehealth Security In Australia: Developing A National Ehealth Sercurity And Access Framework (Nesaf), Yvette Lejins, John Leitch Jan 2012

A Holistic Approach To Ehealth Security In Australia: Developing A National Ehealth Sercurity And Access Framework (Nesaf), Yvette Lejins, John Leitch

Research outputs 2012

The Australian ehealth landscape is confronted with new challenges for healthcare providers in appropriately managing and protecting personal health information. The vision of the National eHealth Security and Access Framework (NESAF) is to adopt a consistent approach to the application of health information security standards and provide better practice guidance in relation to eHealth specific security and access practices. The eHealth information security landscape has a number of unique attributes, many that are faced by other business that provide a service or products – but we see that there is no industry in Australia where such widespread changes in the …


Wikis: Transactive Memory Systems In Digital Form, Paul Jackson Jan 2012

Wikis: Transactive Memory Systems In Digital Form, Paul Jackson

Research outputs 2012

Wikis embed information about authors, tags, hyperlinks and other metadata into the information they create. Wiki functions use this metadata to provide pointers which allow users to track down, or be informed of, the information they need. In this paper we provide a firm theoretical conceptualization for this type of activity by showing how this metadata provides a digital foundation for a Transactive Memory System (TMS). TMS is a construct from group psychology which defines directory-based knowledge sharing processes to explain the phenomenon of "group mind". We analyzed the functions and data of two leading Wiki products to understand where …


Use Of Information And Communication Technology (Ict) Tools By Rural Famers In Ratnagiri District Of Maharashtra, India, Leisa Armstrong, N. Gandhi Jan 2012

Use Of Information And Communication Technology (Ict) Tools By Rural Famers In Ratnagiri District Of Maharashtra, India, Leisa Armstrong, N. Gandhi

Research outputs 2012

This study made an attitude assessment of farmers from the rural villages of Ratnagiri district of Maharashtra in the dissemination of agricultural information using Information and Communication technologies. A structured questionnaire and interviews were used to gather information on a number of aspects related to the use of ICT from randomly selected farmers from one Tehsil and key stakeholders (government officials and agricultural industry workers). Two different questionnaires were provided to farmers and key stakeholders. The questionnaire completed by the farmer participants sought general demographic data, education level and information concerning household income and their agricultural activities. Information related to …


Real-Time Evolutionary Learning Of Cooperative Predator-Prey Strategies, Mark Wittkamp, Luigi Barone, Philip Hingston, Lyndon While Jan 2012

Real-Time Evolutionary Learning Of Cooperative Predator-Prey Strategies, Mark Wittkamp, Luigi Barone, Philip Hingston, Lyndon While

Research outputs 2012

Despite games often being used as a testbed for new computational intelligence techniques, the majority of artificial intelligence in commercial games is scripted. This means that the computer agents are non-adaptive and often inherently exploitable because of it. In this paper, we describe a learning system designed for team strategy development in a real time multi-agent domain. We test our system in a prey and predators domain, evolving adaptive team strategies for the predators in real time against a single prey opponent. Our learning system works by continually training and updating the predator strategies, one at a time for a …


An Overview Of Cloud Computing Challenges And Its Security Concerns, Krishnun Sansurooah Jan 2012

An Overview Of Cloud Computing Challenges And Its Security Concerns, Krishnun Sansurooah

Research outputs 2012

There has been an increasing advancement about Cloud computing during the past couple of years. Cloud computing has become a new computer model which aims to deliver reliable, customizable and scalable computing environment for end-users. Companies are choosing to move their data, applications and services to the Cloud. The advantages are significant ranging from increasing the availability, reliability, light weight, easily accessible applications, and low cost but so are the risks associated with. Companies that require application hosting could potentially benefit from the provisioning of computing infrastructure resources as a service. In addition to the economic advantages of an on-demand …


Utilizing The Rfid Lock Command Against Multiple Targets, Christopher Bolan Jan 2012

Utilizing The Rfid Lock Command Against Multiple Targets, Christopher Bolan

Research outputs 2012

An unlocked Electronic Product Code (EPC) tag allows for issuance of most commands without the need for any authorization. This means that a system with unlocked tags would allow any attacker to modify tag data at will, whilst also opening the door to a range of other misuse. One possible avenue of active misuse against unlocked tags would be to issue LockID commands and ‘permanently’ lock some or all of a system‘s RFID tags. As this attack is simply an issuance of a valid command it fits firmly in the category of an active misuse and could also be considered …


Online Course Content Auditing: Templates And Practices, Justin Brown, Gregory Baatard Jan 2012

Online Course Content Auditing: Templates And Practices, Justin Brown, Gregory Baatard

Research outputs 2012

This paper introduces and discusses the Blackboard Content Audit tool developed by a CS school within an Australian university. Based upon the key sections of a unit’s site in the Blackboard LMS, the tool establishes sets of basic, intermediate and advanced criteria and a rating scale upon which to assess the criteria. By specifying the basic criteria as a minimum standard, the consistency of unit sites can be improved. This helps to close the perceived quality gap between the schools online unit offerings, where in the past some staff had engaged more than others with the features of Blackboard. The …


The 2011 Idn Homograph Attack Mitigation Survey, Peter Hannay, Gregory Baatard Jan 2012

The 2011 Idn Homograph Attack Mitigation Survey, Peter Hannay, Gregory Baatard

Research outputs 2012

The advent of internationalized domain names (IDNs) has introduced a new threat, with the non-English character sets allowing for visual mimicry of domain names. Whilst this potential for this form of attack has been well recognized, many applications such as Internet browsers and e-mail clients have been slow to adopt successful mitigation strategies and countermeasures. This research examines those strategies and countermeasures, identifying areas of weakness that allow for homograph attacks. As well as examining the presentation of IDNs in e-mail clients and Internet browser URL bars, this year’s study examines the presentation of IDNs in browser-based security certificates and …


Assessing The Accessibility Of E-Learning, Morten Goodwin, Iain Sutherland, Frode Roarson, Tom Drange Jan 2012

Assessing The Accessibility Of E-Learning, Morten Goodwin, Iain Sutherland, Frode Roarson, Tom Drange

Research outputs 2012

Equal participation for people with special needs is an important objective in education politics. Governments have a strong emphasis on enabling education for all citizens. The trend of using e-learning both for on campus and remote delivery of students has the potential of enabling new opportunities for people who previously faced challenges following education. On the other hand, providing online education bears the risk of creating new barriers. This paper examines different stages of providing educational content and delivering teaching material online. This is based on practical experiences from Noroff University College providing a bachelor degree in a security related …


Noise Tolerance For Real-Time Evolutionary Learning Of Cooperative Predator-Prey Strategies, Mark Wittkamp, Luigi Barone, Philip Hingston, Lyndon While Jan 2012

Noise Tolerance For Real-Time Evolutionary Learning Of Cooperative Predator-Prey Strategies, Mark Wittkamp, Luigi Barone, Philip Hingston, Lyndon While

Research outputs 2012

Learning team-based strategies in real-time is a difficult task, much more so in the presence of noise. In our previous work in the Prey and Predators domain we introduced an algorithm capable of evolving cooperative team strategies in real-time using fitness evaluations against a perfect opponent model. This paper continues our work within the same domain, training a team of predators to capture a prey. We investigate the effect of varying degrees of opponent model noise in our learning system. In the presence of and in the effort to mitigate the effects of such noise we present modifications to our …


Corporate Security: Using Knowledge Construction To Define A Practising Body Of Knowledge, David Brooks Jan 2012

Corporate Security: Using Knowledge Construction To Define A Practising Body Of Knowledge, David Brooks

Research outputs 2012

Security is a multidimensional concept, with many meanings, practising domains, and heterogeneous occupations. Therefore, it is difficult to define security as a singular concept, although understanding may be achieved by its applied context in presenting a domicile body of knowledge. There have been studies that have presented a number of corporate security bodies of knowledge; however, there is still restricted consensus. From these past body of knowledge studies, and supported by multidimensional scaling knowledge mapping, a body of knowledge framework is put forward, integrating core and allied knowledge categories. The core knowledge categories include practise areas such as risk management, …


An Australian Perspective On The Challenges For Computer And Network Security For Novice End-Users, Patryk Szewczyk Jan 2012

An Australian Perspective On The Challenges For Computer And Network Security For Novice End-Users, Patryk Szewczyk

Research outputs 2012

A good portion of today's investigations include, at least in part, an examination of the user's web history. Although it has lost ground over the past several years, Microsoft's Internet Explorer still accounts for a large portion of the web browser market share. Most users are now aware that Internet Explorer will save browsing history, user names, passwords and form history. Consequently some users seek to eliminate these artifacts, leaving behind less evidence for examiners to discover during investigations. However, most users, and probably a good portion of examiners are unaware Automatic Crash Recovery can leave a gold mine of …


Using Monte Carlo Tree Search For Replanning In A Multistage Simultaneous Game, Daniel Beard, Philip Hingston, Martin Masek Jan 2012

Using Monte Carlo Tree Search For Replanning In A Multistage Simultaneous Game, Daniel Beard, Philip Hingston, Martin Masek

Research outputs 2012

In this study, we introduce MC-TSAR, a Monte Carlo Tree Search algorithm for strategy selection in simultaneous multistage games. We evaluate the algorithm using a battle planning scenario in which replanning is possible. We show that the algorithm can be used to select a strategy that approximates a Nash equilibrium strategy, taking into account the possibility of switching strategies part way through the execution of the scenario in the light of new information on the progress of the battle.


The Application Of A Visual Data Mining Framework To Determine Soil, Climate And Land-Use Relationships, Yunous Vagh Jan 2012

The Application Of A Visual Data Mining Framework To Determine Soil, Climate And Land-Use Relationships, Yunous Vagh

Research outputs 2012

In this research study, the methodology of action research dynamics and a case study was employed in constructing a visual data mining framework for the processing and analysis of geographic land-use data in an agricultural context. The geographic data was made up of a digital elevation model (DEM), soil and land use profiles that were juxtaposed with previously captured climatic data from fixed weather stations in Australia. In this pilot study, monthly rainfall profiles for a selected study area were used to identify areas of soil variability. The rainfall was sampled for the beginning (April) of the rainy season for …


Exploration Games Played On A Ddr Pad Can Constitute Beneficial Physical Exercise, Kimthy Nguyen, Bohan Li, Martin Masek, Yuwanuch Gulatee Jan 2012

Exploration Games Played On A Ddr Pad Can Constitute Beneficial Physical Exercise, Kimthy Nguyen, Bohan Li, Martin Masek, Yuwanuch Gulatee

Research outputs 2012

The addition of an exercise component to computer games is a method that attempts to increase exercise compliance among the population. Various attempts at such games have been made, both commercially and as research projects, but the set of studied game mechanics that are both entertaining and provide beneficial exercise are relatively small. In our work, a game mechanic was designed for a floor-based input controller (DDR Pad). Rather than the standard mechanic usually employed for this device, our approach allows the player to explore a virtual world, requiring exertive movements on the input device in order to progress. The …


A Multimodal Problem For Competitive Coevolution, Philip Hingston, Tirtha Ranjeet, Chiou Peng Lam, Martin Masek Jan 2012

A Multimodal Problem For Competitive Coevolution, Philip Hingston, Tirtha Ranjeet, Chiou Peng Lam, Martin Masek

Research outputs 2012

Coevolutionary algorithms are a special kind of evolutionary algorithm with advantages in solving certain specific kinds of problems. In particular, competitive coevolutionary algorithms can be used to study problems in which two sides compete against each other and must choose a suitable strategy. Often these problems are multimodal - there is more than one strong strategy for each side. In this paper, we introduce a scalable multimodal test problem for competitive coevolution, and use it to investigate the effectiveness of some common coevolutionary algorithm enhancement techniques.


On The Effectiveness Of Intrusions Into Zigbee-Based Wireless Sensor Networks, Michael Johnstone, Jeremy Jarvis Jan 2012

On The Effectiveness Of Intrusions Into Zigbee-Based Wireless Sensor Networks, Michael Johnstone, Jeremy Jarvis

Research outputs 2012

Wireless Sensor Networks are becoming popular as a means of collecting data by military organisations, public utilities, motor vehicle manufacturers and security firms. Unfortunately, the devices on such networks are often insecure by default, which creates problems in terms of the confidentiality and integrity of data transmitted across such networks. This paper discusses attacks that were successful on a simple network consisting of nodes using the ZigBee protocol stack and proposes defences to thwart these attacks, thus leading to increased user confidence in the ability of organisations to provide secure and effective services. The outcomes were that it was possible …


A Data Mining Perspective Of The Dual Effect Of Rainfall And Temperature On Wheat Yield, Yunous Vagh, Jitian Xiao Jan 2012

A Data Mining Perspective Of The Dual Effect Of Rainfall And Temperature On Wheat Yield, Yunous Vagh, Jitian Xiao

Research outputs 2012

This paper presents the final investigation within the series of qualitative and quantitative investigations carried out for the processing and analysis of geographic land-use data in an agricultural context. The geographic data was made up of crop and cereal production land use profiles. These were linked to previously recorded climatic data from fixed weather stations in Australia that was interpolated using ordinary krigeing to fit a grid surface. In this study, the profiles for the stochastic average monthly temperature and rainfall for a selected study area were used to determine their simultaneous effects on crop production at the shire level. …


Web Accessibility In Corporate Australia: Perceptions Versus Reality, Justin Brown, Vivienne Conway Jan 2012

Web Accessibility In Corporate Australia: Perceptions Versus Reality, Justin Brown, Vivienne Conway

Research outputs 2012

In this paper we describe the results of website audits and survey responses for organizations involved in the Australia Web Awards for 2011. 160 organizations entered their sites or sites they had developed as part of the awards, and in doing so were required to select the level of WCAG compliance for their site. Audits conducted on these sites after the awards completion showed that very few of the entrants actually met their selected level of accessibility compliance, regardless of the organization type. Survey responses from participating entrants in the AWA indicated that they were aware of the WCAG guidelines …


A Technical Guide To Effective And Accessible Web Surveys, Gregory Baatard Jan 2012

A Technical Guide To Effective And Accessible Web Surveys, Gregory Baatard

Research outputs 2012

The Internet is becoming an increasingly prominent medium for the administration of surveys. Although individual findings vary, the majority of the literature agrees that the appropriateness and response rates of web surveys is expected to rise in the future as we enter a generation of "digital natives" and mail-based communication becomes increasingly antiquated. Just about every aspect and tenet of traditional survey methodology has received attention in academic literature, positioning it as one of the most mature data collection techniques and a mainstay in all areas of research. While much of this accumulated knowledge is applicable and relevant to web …


Security Specialists Are From Mars; Healthcare Practitioners Are From Venus: The Case For A Community-Of-Practice Approach To Security Architectures For Healthcare, Elizabeth Coles-Kemp, Patricia Williams Jan 2012

Security Specialists Are From Mars; Healthcare Practitioners Are From Venus: The Case For A Community-Of-Practice Approach To Security Architectures For Healthcare, Elizabeth Coles-Kemp, Patricia Williams

Research outputs 2012

Information security is a necessary requirement of information sharing in the healthcare environment. Research shows that the application of security in this setting is sometimes subject to work-arounds where healthcare practitioners feel forced to incorporate practices that they have not had an input into and with which they have not engaged with. This can result in a sense of security practitioners and healthcare practitioners being culturally very different in their approach to information systems. As a result such practices do not constitute part of their community of practice nor their identity. In order to respond to this, systems designers typically …


Science Or Experience; What Is More Relevant ?, Kenneth Fowle, Hadyn Green Jan 2012

Science Or Experience; What Is More Relevant ?, Kenneth Fowle, Hadyn Green

Research outputs 2012

It is very important that when we use science to determine the validity of evidence or information that it is done in a manner that is acceptable to the scientific community and the legal community, but what happens when “experience” is used. The use of forensic practitioners to provide „expert‟ evidence and opinion must meet the Daubert/Frye and now Kumho tests. This paper will endeavour to demonstrate .what is best for a practitioner to have and what does the judiciary require for „expert‟ evidence to be accepted? Science and/or Experience, what is more relevant? Evidence and the Courts depend upon …