Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Physical Sciences and Mathematics

Personal Exposure Of Children To Formaldehyde In Perth, Western Australia, Victoria S. Lazenby Jan 2010

Personal Exposure Of Children To Formaldehyde In Perth, Western Australia, Victoria S. Lazenby

Theses: Doctorates and Masters

Formaldehyde is a common air pollutant that tends to be found in elevated concentrations in indoor air. Exposure to formaldehyde has the potential to impact on respiratory health, particularly amongst sensitive individuals and populations, including children. Children spend most of their time indoors at home, however, there are very little data on the contribution of formaldehyde concentrations in homes to personal exposure in children. The principal aim of this cross sectional study was to investigate whether the domestic environment is the most significant source of personal exposure of formaldehyde in children. Forty-one primary school children (aged between 8 and 12) …


Analysis Avoidance Techniques Of Malicious Software, Murray Brand Jan 2010

Analysis Avoidance Techniques Of Malicious Software, Murray Brand

Theses: Doctorates and Masters

Anti Virus (AV) software generally employs signature matching and heuristics to detect the presence of malicious software (malware). The generation of signatures and determination of heuristics is dependent upon an AV analyst having successfully determined the nature of the malware, not only for recognition purposes, but also for the determination of infected files and startup mechanisms that need to be removed as part of the disinfection process. If a specimen of malware has not been previously extensively analyzed, it is unlikely to be detected by AV software. In addition, malware is becoming increasingly profit driven and more likely to incorporate …


Theory Of Entropic Security Decay: The Gradual Degradation In Effectiveness Of Commissioned Security Systems, Michael P. Coole Jan 2010

Theory Of Entropic Security Decay: The Gradual Degradation In Effectiveness Of Commissioned Security Systems, Michael P. Coole

Theses: Doctorates and Masters

As a quantitative auditing tool for Physical Protection Systems (PPS) the Estimated Adversary Sequence Interruption (EASI) model has been available for many years. Nevertheless, once a systems macro-state measure has been commissioned (Pi) against its defined threat using EASI, there must be a means of articulating its continued efficacy (steady state) or its degradation over time. The purpose of this multi-phase study was to develop the concept and define the term entropic security decay. Phase one presented documentary benchmarks for security decay. This phase was broken into three stages; stage one presented General Systems Theory (GST) as a systems benchmark …


The Identification, Development And Application Of Information Culture In The Western Australian Public Sector, Janine Douglas Jan 2010

The Identification, Development And Application Of Information Culture In The Western Australian Public Sector, Janine Douglas

Theses: Doctorates and Masters

Information can be found in government departments in many forms. It exists, for example, as performance indicators, statistics, economic analysis, policy advice, political know-how or opinions. Using information is a daily and oft repeated activity in government departments. Information is central to the achievement of outcomes and the delivery of services. It is critical to the government’s success in the information economy. It is central to the development of products and services. It supports policy making and it underpins accountability. Government departments are built on the generation and use of information that is relevant to the largest of all customer …