Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 58

Full-Text Articles in Physical Sciences and Mathematics

Ten More Years Of Educational Technologies In Education: How Far Have We Travelled?, Ron Oliver Jan 2005

Ten More Years Of Educational Technologies In Education: How Far Have We Travelled?, Ron Oliver

Research outputs pre 2011

This paper describes the advancements that have occurred in the use of educational technologies over the past ten years (1995-2005) and argues that progress has been slow and reminiscent of the slow progress observed in the previous decade (1985-1995). The paper argues that one of the principal reasons for the less than spectacular results stems from the top-down approaches that always seem to drive technology use in education and schools. It argues the need for applications and activities to be driven by bottom-up forces, by the teachers and students themselves and presents the argument that more applied and grounded research …


Smart Card Authentication For Mobile Devices, Wayne Jansen, Serban Gavrila, Clément Séveillac Jan 2005

Smart Card Authentication For Mobile Devices, Wayne Jansen, Serban Gavrila, Clément Séveillac

Research outputs pre 2011

While mobile handheld devices provide productivity benefits, they also pose new risks. User authentication is the best safeguard against the risk of unauthorized use and access to a device’s contents. This paper describes two novel types of smart card with unconventional form factors, designed to take advantage of common interfaces built into many current handheld devices.


An Investigation Into Long Range Detection Of Passive Uhf Rfid Tags, Craig Valli, Andrew Woodward, Ken Wild, Reino Karvinen Jan 2005

An Investigation Into Long Range Detection Of Passive Uhf Rfid Tags, Craig Valli, Andrew Woodward, Ken Wild, Reino Karvinen

Research outputs pre 2011

Radio frequency identification tags (RFID) have been in use for a number of years, in a variety of applications. They are a small computer chip like device that can range in size from a thumbnail to a credit card size device. They consist of a small silicon chip, and an antenna used to receive and transmit data. When a tag receives a signal from a valid reader it sends a response, typically a tag ID and any other requested/available data back to the reader device. The newer range of RFID chips that are coming into use now use higher frequencies …


Risk Management In Crm Security Management, Mahdi Seify Jan 2005

Risk Management In Crm Security Management, Mahdi Seify

Research outputs pre 2011

In an increasing competitive world, marketing survival can be depended simply on timely new information on customers and market trend. One of the most important strategies in CRM (Customer Relationship Management) is to capture enough information from customers and using this information carefully [Ryals , Tinsley]. Of course security of this information is very important in CRM data management [Bryan]. Data management is a method for scheduling and controlling data saving, recovering and processing. This activity has been done continually or periodically[Bryan]. Security level of this information depends on the security policy of the organization. CRM security policy is the …


Benchmarking E-Business Security: A Model And Framework, Graeme Pye, Matthew J. Warren Jan 2005

Benchmarking E-Business Security: A Model And Framework, Graeme Pye, Matthew J. Warren

Research outputs pre 2011

The dynamic nature of threats and vulnerabilities within the E-business environment can impede online functionality, compromise organisational or customer information, contravene security implementations and thereby undermine online customer confidence. To negate these problems, E-business security has to become proactive, by reviewing and continuously improving security to strengthen E-business security measures and policies. This can be achieved through benchmarking the security measures and policies utilised within the E-business, against recognised information technology (IT) and information security (IS) security standards.


My Problem Or Our Problem? Exploring The Use Of Information Sharing As A Component Of A Holistic Approach To E-Security In Response To The Growth Of ‘Malicious Targeted Attacks’, Aaron Olding, Paul Turner Jan 2005

My Problem Or Our Problem? Exploring The Use Of Information Sharing As A Component Of A Holistic Approach To E-Security In Response To The Growth Of ‘Malicious Targeted Attacks’, Aaron Olding, Paul Turner

Research outputs pre 2011

There is now a growing recognition amongst e-security specialists that the e-security environment faced by organisations is changing rapidly. This environment now sees a situation where maliciously targeted attacks are conducted by ‘guns for hire’ (hackers) and/or criminal organisations (Illett 2005; Keiser 2005). As a consequence, conventional organisational approaches to e-security are becoming increasingly problematic and inadequate. There is a need to raise awareness of these issues amongst organisations and to contribute to the generation of effective integrated solutions that address this emerging e-security environment without sacrificing user privacy and/or breaching user trust. This paper considers the potential role of …


Non-Repudiation In Pure Mobile Ad Hoc Network, Yi-Chi Lin, Jill Slay Jan 2005

Non-Repudiation In Pure Mobile Ad Hoc Network, Yi-Chi Lin, Jill Slay

Research outputs pre 2011

Within the last decade, the use of wireless technologies has become more prevalent. Wireless networks have flexible architectures with data transferred via radio waves and can be divided into two categories; infrastructure-based wireless networks and mobile ad hoc network.

The mobile ad hoc network (MANET) is an autonomous system which can be dynamically built without pre-existing infrastructure or a trusted third party (TTP). Due to these infrastructure-less and self-organized characteristics, MANET encounters different problems from infrastructure-based wired network, such as key management, power shortage, and security issues. This paper will further divide MANETs into pure ad hoc networks which do …


Honeypot Technologies And Their Applicability As An Internal Countermeasure, Craig Valli Jan 2005

Honeypot Technologies And Their Applicability As An Internal Countermeasure, Craig Valli

Research outputs pre 2011

Honeypots or honeynets are a technology that is rapidly maturing and establishing this archetype of countermeasure as viable and useful in modern network defence. Honeypot technology is now at a point of development where near real-time monitoring and forensic analysis of security events can occur. This paper explores the hurdles to be overcome for the internal deployment of honeypot technologies.


Security Governance: Its Impact On Security Culture, K. Koh, A. B. Ruighaver, S. B. Maynard, A. Ahmad Jan 2005

Security Governance: Its Impact On Security Culture, K. Koh, A. B. Ruighaver, S. B. Maynard, A. Ahmad

Research outputs pre 2011

While there is an overwhelming amount of literature that recognises the need for organisations to create a security culture in order to effectively manage security, little is known about how to create a good security culture or even what constitutes a good security culture. In this paper, we report on one of two case studies performed to examine how security governance influences security culture and in particular, the sense of responsibility and ownership of security. The results indicate that although the structural and functional mechanisms in security governance are influencing factors, it is the extent of social participation that may …


Diversity In Information And Communication Technologies: The Cost Of Lost Opportunities, Susan Gail Webb Jan 2005

Diversity In Information And Communication Technologies: The Cost Of Lost Opportunities, Susan Gail Webb

Research outputs pre 2011

The Information and Communication Technology (ICT) industry develops products that are used by many people regardless of gender, age, social status, ethnicity, or religion. Technology has had a significant impact on the way that information is produced, stored and communicated, especially in the fields that have traditionally been heavy producers of information such as libraries and education institutions. Though all types of people use technology, not all types of people are involved in the design and development of technology. Women represent just twenty percent of Australian ICT professionals. They often receive less pay than their male colleagues and are greatly …


Recommendations For Wireless Network Security Policy: An Analysis And Classification Of Current And Emerging Threats And Solutions For Different Organisations, Andrew Woodward Jan 2005

Recommendations For Wireless Network Security Policy: An Analysis And Classification Of Current And Emerging Threats And Solutions For Different Organisations, Andrew Woodward

Research outputs pre 2011

Since their inception, 802.11 wireless networks have been plagued by a wide range of security problems. These problems relate to both data security and denial of service attacks, and there have been many solutions created by different vendors address these problems. However, the number of different types of attack, and the many possible solutions, makes it a difficult task to put in place an appropriate wireless network security policy. Such a policy must address both the size and nature of the enterprise, and the resources available to it. Measures such as WEP and MAC filtering are only appropriate for home …


Heuristics For Optimising The Calculation Of Hypervolume For Multi-Objective Optimisation Problems, Lyndon While, Lucas Bradstreet, Luigi Barone, Philip Hingston Jan 2005

Heuristics For Optimising The Calculation Of Hypervolume For Multi-Objective Optimisation Problems, Lyndon While, Lucas Bradstreet, Luigi Barone, Philip Hingston

Research outputs pre 2011

The fastest known algorithm for calculating the hypervolume of a set of solutions to a multi-objective optimization problem is the HSO algorithm (hypervolume by slicing objectives). However, the performance of HSO for a given front varies a lot depending on the order in which it processes the objectives in that front. We present and evaluate two alternative heuristics that each attempt to identify a good order for processing the objectives of a given front. We show that both heuristics make a substantial difference to the performance of HSO for randomly-generated and benchmark data in 5-9 objectives, and that they both …


Integrating Open Source Protections Into Scada Networks, Craig Valli Jan 2005

Integrating Open Source Protections Into Scada Networks, Craig Valli

Research outputs pre 2011

SCADA (Supervisory Control And Data Acquisition) networks control much of the industrialised nations production and supply complexes. Various government reports and investigations have highlighted the vulnerability of these systems. Many of these systems are on private networks which are increasingly being connected to systems that are accessible from other networks such as the Internet. There are a range of open source tools that now offer fonctionality that can be used to secure SCADA networks from intrusion or compromise. This paper explores some of the issues with current SCADA deployment trends from a network security perspective and then examines open source …


Seeking Information Superiority: Strategies For Business In The Commercial Application Of Information Operations, Martin Dart Jan 2005

Seeking Information Superiority: Strategies For Business In The Commercial Application Of Information Operations, Martin Dart

Research outputs pre 2011

Information superiority is a condition that many businesses attempt to attain without truly understanding what it is, or how to get there. This paper presents an overview to help businesspeople recognize the road to information superiority, and some of the essential strategies to implement along the way. Information operations is a concept described to enable information superiority, when used with a network form of organization (as opposed to simply being networked). This paper describes information operations across their fundamental structure of intelligence, surveillance, and reconnaissance (ISR); and suggests a separation between industrial espionage and legitimate business information gathering. A model …


Physician Secure Thyself, Patricia Williams Jan 2005

Physician Secure Thyself, Patricia Williams

Research outputs pre 2011

Whilst discussion rages on the issues relating to security of medical data and the reason why it is important, there is little published information on how to tackle even basic security challenges for medical practice in Australia. Research suggests an underestimation of the threats to medical data by medical practitioners, hence there is sufficient reason to promote development of tools to assist medical practice with technical issues they are unfamiliar with. This paper provides an initial dialogue on how these security issues should be addressed. Included is a framework for risk assessment and elaboration of the implementation process to make …


Similarity-Aware Web Content Management And Document Pre-Fetching, Jitian Xiao, Michael Collins Jan 2005

Similarity-Aware Web Content Management And Document Pre-Fetching, Jitian Xiao, Michael Collins

Research outputs pre 2011

Web caching is intended to reduce network traffic, server load and user-perceived retrieval latency. Web pre-fetching, which can be considered as "active" caching, builds on regular Web caching, minimizing further a Web user's access delay. To be effective, however, the pre-fetching techniques must be able to predict subsequent Web access with minimum computational overheads. This paper presents a similarity-based mechanism to support similarity-aware Web document pre-fetching between proxy caches and browsing clients. We first define a set of measures to assess similarities between Web documents, and then propose a multi-cache architecture to cache Web documents based on those similarities. A …


Using Process Modelling To Capture Requirements For A Digital Library, Michael Johnstone Jan 2005

Using Process Modelling To Capture Requirements For A Digital Library, Michael Johnstone

Research outputs pre 2011

This paper describes the results of an action research study which explored how IT professionals used process modelling to capture requirements and design artefacts concerning a digital library system. The intention was to produce a web-based, non-relational (XML) database system to store publications of various types and to allow public domain access to the system. Traditionally, such systems are constructed with a data-oriented design, with little attention being paid to process concerns. In this study, process, described by business rules, was defined first which provides advantages as many business systems (including library systems) are often process-oriented. The team involved in …


An Ant Colony Optimization Approach To Test Sequence Generation For State-Based Software Testing, Huaizhong Li, Chiou Peng Lam Jan 2005

An Ant Colony Optimization Approach To Test Sequence Generation For State-Based Software Testing, Huaizhong Li, Chiou Peng Lam

Research outputs pre 2011

Properly generated test suites may not only locate the defects in software systems, but also help in reducing the high cost associated with software testing, ft is often desired that test sequences in a test suite can be automatically generated to achieve required test coverage. However, automatic test sequence generation remains a major problem in software testing. This paper proposes an ant colony optimization approach to automatic test sequence generation for state-based software testing. The proposed approach can directly use UML artifacts to automatically generate test sequences to achieve required test coverage.


Using Adaptive Agents To Automatically Generate Test Scenarios From The Uml Activity Diagrams, Dong Xu, Huaizhong Li, Chiou Peng Lam Jan 2005

Using Adaptive Agents To Automatically Generate Test Scenarios From The Uml Activity Diagrams, Dong Xu, Huaizhong Li, Chiou Peng Lam

Research outputs pre 2011

Test case generation is one of the most important issues in software testing research and industrial practice. Test scenarios are frequently used to derive test cases for scenario-based software testing. However, the generation of the test scenarios is usually a manual and labor-intensive task. It is desired that test scenarios can be automatically generated. In this paper, we propose an automated approach using adaptive agents to directly generate test scenarios from the UML activity diagrams.


Storybook: Extending A Personalised Interactive Learning Environment To Children With Severe Learning Disabilities, Michael Collins, Sundrakanthi Singh Jan 2005

Storybook: Extending A Personalised Interactive Learning Environment To Children With Severe Learning Disabilities, Michael Collins, Sundrakanthi Singh

Research outputs pre 2011

Not all recipients of eLearning map well for measurement by such as the Kirkpatrick model, especially young students with severe learning disabilities. StoryBook is a tool specifically designed to aid teachers to create and include a simple, enjoyable, tailored interactive computer-based audio/visual learning environment as part of a custom curriculum for such students. In it, stories are currently gathered into libraries suitable for unique individuals or more common content, on a local, classroom basis. We describe prototype software for eLearning for such students, already trialled in a special educational unit in Perth, Western Australia. We then outline plans for a …


A Uk And Australian Study Of Hard Disk Disposal, Craig Valli, Andrew Jones Jan 2005

A Uk And Australian Study Of Hard Disk Disposal, Craig Valli, Andrew Jones

Research outputs pre 2011

Recent studies in Australia and the United Kingdom indicate that a broad cross-section of organisations are failing to adequately protect or erase confidential data stored on hard disk drives before subsequent disposal. Over 90% of hard disks that were examined as a result of the two Independent studies were in an easily recoverable state with some drives simply requiring a boot. This paper will give an overview and comparison of the two studies conducted. Then an examination of possible factors responsible for the inadequate erasure of hard disk devices will be undertaken. Furthermore, possible future research directions will also be …


After Conversation - A Forensic Icq Logfile Extraction Tool, Kim Morfitt, Craig Valli Jan 2005

After Conversation - A Forensic Icq Logfile Extraction Tool, Kim Morfitt, Craig Valli

Research outputs pre 2011

Instant messenger programs such as ICQ are often used by hackers and criminals for illicit purposes and consequently the logfiles from such programs are of forensic interest. This paper outlines research in progress that has resulted in the development of a tool for the extraction of ICQ logfile entries. Detailed reconstruction of data from logfiles was achieved with a number of different ICQ software, with other programs still to be tested. There are several limitations including timestamp information not adjusted for the time zone, data could be altered, and conversations must be manually reconstructed. Future research will aim to address …


Analysis Of Channel Estimation Error Of Ofdm Systems In Rayleigh Fading, Bin Jiao, Jitian Xiao, Jinlin Wang Jan 2005

Analysis Of Channel Estimation Error Of Ofdm Systems In Rayleigh Fading, Bin Jiao, Jitian Xiao, Jinlin Wang

Research outputs pre 2011

In wireless OFDM applications, since the radio channel is frequency selective and time-varying, a dynamic estimation of channel must be achieved before the demodulation of the transmitted OFDM signals. As an effective approach for solving the channel estimation problems, the pilot-assisted channel estimation technique has received considerable attention in recent years. In this paper, we investigate the channel estimation error in the existing pilot-assisted channel estimation approaches in detail, a new effective channel estimation approach with lower estimation error is proposed as well.


A Bipartite Graph Approach To Generate Optimal Test Sequences For Protocol Conformance Testing Using The Wp-Method, Jun Wang, Jitian Xiao, Chiou Peng Lam, Huaizhong Li Jan 2005

A Bipartite Graph Approach To Generate Optimal Test Sequences For Protocol Conformance Testing Using The Wp-Method, Jun Wang, Jitian Xiao, Chiou Peng Lam, Huaizhong Li

Research outputs pre 2011

Conformance testing using test sequences is used to ensure that a protocol implementation conforms to its specification. A commonly used technique to generate test sequences for specifications described by the finite state machines is the Wp-method with the Reset technique, which frequently results in long test sequences. In this paper, we propose a bipartite graph approach to generate optimal test sequences for protocol conformance testing. Our approach significantly reduces the length of the test sequences required for conformance testing while maintaining the same fault detection capability.


Using In-Depth Interviewing To Evaluate Deep Learning In Students Who Use Online Curriculum: A Literature Review, Maria Woodhouse Jan 2005

Using In-Depth Interviewing To Evaluate Deep Learning In Students Who Use Online Curriculum: A Literature Review, Maria Woodhouse

Research outputs pre 2011

There are numerous difficulties associated with evaluating student experience of online curriculum, not least of which is the fact that different research methods elicit different types of information. The usefulness of choosing either quantitative or qualitative methods depends on their power to bear upon the research questions. This concept paper presents the learning experience as a qualitative event and argues that the in-depth interview is an apt tool for discovering to what extent students experience deep-learning in studying online subjects. To this end, this concept paper will consider the literature surrounding the in-depth interview as a research method. It will …


Potential Bluetooth Vulnerabilities In Smartphones, Lih Wern Wong Jan 2005

Potential Bluetooth Vulnerabilities In Smartphones, Lih Wern Wong

Research outputs pre 2011

Smartphone vendors have been increasingly integrating Bluetooth technology into their devices to increase accessible and convenience for users. As the current inclination of integrating PDA and telephony increase, the likelihood of sensitive information being stored on such a device is also increased. Potential Bluetooth vulnerabilities could provide alternative means to compromise Bluetooth-enable smartphones, leading to severe data breaches. This paper gives an insight on potential security vulnerabilities in Bluetooth-enabled smartphones and how these vulnerabilities may affect smartphone users. This paper is discussed from the viewpoint of Bluetooth weaknesses and implementation flaws, which includes pairing, weak key storage, key disclosure, key …


Identity Synthesis: Creating An Identity From Scratch, Lennon Hopkins Jan 2005

Identity Synthesis: Creating An Identity From Scratch, Lennon Hopkins

Research outputs pre 2011

A substantial quantity of research has previously been conducted into the identification and application of measures related to the detection and prevention of identity theft and identity fraud. In the current security conscious environment, the concept of creating an artificial identity is generally met with both caution and suspicion. Much of the attention placed on the concept of identity fabrication has been focused on the unlawful or the malicious use of created identities. Admittedly, the primary intention of a falsified identity is to usually gain a financial benefit however, instances such as long-term witness protection would provide a legitimate need …


Taxonomy Of Wrt54g(S) Hardware And Custom Firmware, Marwan Al-Zarouni Jan 2005

Taxonomy Of Wrt54g(S) Hardware And Custom Firmware, Marwan Al-Zarouni

Research outputs pre 2011

This paper discusses the different versions of hardware and firmware currently available for the Linksys WRT54G and WRT54GS router models. It covers the advantages, disadvantages, and compatibility issues of each one of them. The paper goes further to compare firmware added features and associated filesystems and then discusses firmware installation precautions and ways to recover from a failed install.


A Discussion On Developing Online Learning Communities For Student Information Professionals, Karen Anderson Jan 2005

A Discussion On Developing Online Learning Communities For Student Information Professionals, Karen Anderson

Research outputs pre 2011

The Internet provides a wealth of resources and opportunities for enhancing professional education. In professional education courses for archivists and records managers, students can shape their own learning and develop professional skills through authentic assessment strategies which require them to find, analyse and evaluate policy documents and best practice standards published by leading archival organizations. Use of online discussion facilities provided by the ECU School of Computer and Information Science's eCourse system allows students to engage in professional discussion just as they would in the workplace while developing communication and information literacy skills. Student evaluations of this form of assessment …


Ad2us: An Automated Approach To Generating Usage Scenarios From Uml Activity Diagrams, Robert Chandler, Chiou Peng Lam, Huaizhong Li Jan 2005

Ad2us: An Automated Approach To Generating Usage Scenarios From Uml Activity Diagrams, Robert Chandler, Chiou Peng Lam, Huaizhong Li

Research outputs pre 2011

Although attention has been given to the use of UML (Unified Modelling Language) activity diagrams in the generation of scenarios, thin-threads and test-cases, the processes described in the literature rely heavily on manual intervention either in the information extraction process or in the process of transforming them to an alternate structure. This paper introduces an approach that capture, store and output usage scenarios derived automatically from UML activity diagrams.