Open Access. Powered by Scholars. Published by Universities.®

Edith Cowan University

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 20 of 20

Full-Text Articles in Defense and Security Studies

Opportunities And Challenges Posed By Disruptive And Converging Information Technologies For Australia's Future Defence Capabilities: A Horizon Scan, Pi-Shen Seet, Anton Klarin, Janice Jones, Mike Johnstone, Helen Cripps, Jalleh Sharafizad, Violetta Wilk, David Suter, Tony Marceddo Jan 2024

Opportunities And Challenges Posed By Disruptive And Converging Information Technologies For Australia's Future Defence Capabilities: A Horizon Scan, Pi-Shen Seet, Anton Klarin, Janice Jones, Mike Johnstone, Helen Cripps, Jalleh Sharafizad, Violetta Wilk, David Suter, Tony Marceddo

Research outputs 2022 to 2026

Introduction: The research project's objective was to conduct a comprehensive horizon scan of Network Centric Warfare (NCW) technologies—specifically, Cyber, IoT/IoBT, AI, and Autonomous Systems. Recognised as pivotal force multipliers, these technologies are critical to reshaping the mission, design, structure, and operations of the Australian Defence Force (ADF), aligning with the Department of Defence (Defence)’s offset strategies and ensuring technological advantage, especially in the Indo-Pacific's competitive landscape.

Research process: Employing a two-pronged research approach, the study first leveraged scientometric analysis, utilising informetric mapping software (VOSviewer) to evaluate emerging trends and their implications on defence capabilities. This approach facilitated a broader understanding …


Real-Time Monitoring As A Supplementary Security Component Of Vigilantism In Modern Network Environments, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan Jan 2021

Real-Time Monitoring As A Supplementary Security Component Of Vigilantism In Modern Network Environments, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan

Research outputs 2014 to 2021

© 2020, The Author(s). The phenomenon of network vigilantism is autonomously attributed to how anomalies and obscure activities from adversaries can be tracked in real-time. Needless to say, in today’s dynamic, virtualized, and complex network environments, it has become undeniably necessary for network administrators, analysts as well as engineers to practice network vigilantism, on traffic as well as other network events in real-time. The reason is to understand the exact security posture of an organization’s network environment at any given time. This is driven by the fact that modern network environments do, not only present new opportunities to organizations but …


Quantifying The Need For Supervised Machine Learning In Conducting Live Forensic Analysis Of Emergent Configurations (Eco) In Iot Environments, Victor R. Kebande, Richard A. Ikuesan, Nickson M. Karie, Sadi Alawadi, Kim-Kwang Raymond Choo, Arafat Al-Dhaqm Jan 2020

Quantifying The Need For Supervised Machine Learning In Conducting Live Forensic Analysis Of Emergent Configurations (Eco) In Iot Environments, Victor R. Kebande, Richard A. Ikuesan, Nickson M. Karie, Sadi Alawadi, Kim-Kwang Raymond Choo, Arafat Al-Dhaqm

Research outputs 2014 to 2021

© 2020 The Author(s) Machine learning has been shown as a promising approach to mine larger datasets, such as those that comprise data from a broad range of Internet of Things devices, across complex environment(s) to solve different problems. This paper surveys existing literature on the potential of using supervised classical machine learning techniques, such as K-Nearest Neigbour, Support Vector Machines, Naive Bayes and Random Forest algorithms, in performing live digital forensics for different IoT configurations. There are also a number of challenges associated with the use of machine learning techniques, as discussed in this paper.


No Soldiers Left Behind: An Iot-Based Low-Power Military Mobile Health System Design, James Jin Kang, Wencheng Yang, Gordana Dermody, Mohammadreza Ghasemian, Sasan Adibi, Paul Haskell-Dowland Jan 2020

No Soldiers Left Behind: An Iot-Based Low-Power Military Mobile Health System Design, James Jin Kang, Wencheng Yang, Gordana Dermody, Mohammadreza Ghasemian, Sasan Adibi, Paul Haskell-Dowland

Research outputs 2014 to 2021

© 2013 IEEE. There has been an increasing prevalence of ad-hoc networks for various purposes and applications. These include Low Power Wide Area Networks (LPWAN) and Wireless Body Area Networks (WBAN) which have emerging applications in health monitoring as well as user location tracking in emergency settings. Further applications can include real-Time actuation of IoT equipment, and activation of emergency alarms through the inference of a user's situation using sensors and personal devices through a LPWAN. This has potential benefits for military networks and applications regarding the health of soldiers and field personnel during a mission. Due to the wireless …


Understanding And Combatting Terrorist Networks: Coupling Social Media Mining With Social Network Analysis, Benn Van Den Ende Jan 2016

Understanding And Combatting Terrorist Networks: Coupling Social Media Mining With Social Network Analysis, Benn Van Den Ende

Australian Information Security Management Conference

Throughout the past decade the methods employed by terrorist organisations have changed drastically. One of these key changes has been associated with the rise of social media such as Facebook, Twitter, YouTube and blogging in general. Terrorist organisations appear to be using the wide reach and vast network capabilities created by social media to disseminate propaganda, radicalise susceptible individuals, recruit potential fighters and communicate strategic and operational objectives. However, this growing terrorist presence on Social Media can also offer invaluable insights into the social networks of terrorist organisations through the use of Social Media Mining and Social Network Analysis. By …


Formation Of The Radical Self: Constructs Of Change In Western Youth To Acts Of Terrorism On Home-Soil, Robyn Torok Jan 2015

Formation Of The Radical Self: Constructs Of Change In Western Youth To Acts Of Terrorism On Home-Soil, Robyn Torok

Australian Security and Intelligence Conference

The terrorist attack on a member of the Police service by a 15 year old boy in late 2015 sent shock waves not only through Australia but also throughout the world as the realisation of Islamic State targeting teenagers becomes a reality. This paper uses a blend of theoretical and empirical evidence to examine how the radicalised self is formed. Insights from various frameworks including: developmental psychology (teenage identity formation and role confusion), Foucault’s technologies of the self, governmentality and sociological issues including the perceived gap between Muslim values and those of the West. Coupled with these theoretical frameworks are …


Symbiotic Radicalisation Strategies: Propaganda Tools And Neuro Linguistic Programming, Robyn Torok Jan 2015

Symbiotic Radicalisation Strategies: Propaganda Tools And Neuro Linguistic Programming, Robyn Torok

Australian Security and Intelligence Conference

The rise of Islamic State has seen a rise in the threat and incidences of domestic terrorism. Sophisticated strategies are being used to target youth and draw them into the ideology of Islamic state and other terrorist groups. Two common strategies used by Islamic State are the use of propaganda tools as well as Neuro linguistic programming strategies. This paper looks at how these strategies were used through a longitudinal online ethnographic study on the social media site Facebook. Data collected revealed that these two strategies were used in a targeted manner and worked together in a symbiotic fashion to …


Institutionalised Moral Reframing: A Research Based Model On Islamic Radicalisation On Social Media, Robyn Torok Jan 2015

Institutionalised Moral Reframing: A Research Based Model On Islamic Radicalisation On Social Media, Robyn Torok

Australian Security and Intelligence Conference

Institutionalised Moral Reframing is a new research model on Islamic radicalisation based on a longitudinal ethnographic research on social media. Prior to introducing the model, an overview of other radicalisation models will be presented with a brief overview of each. Critical to the Institutionalised Moral Reframing model is the concept of socialisation via an online institution of social media where an individual is isolated from competing discourses. The model uses two axis, a moral authority axis and a moral discourses axis. These two axis are mutually reinforcing and enable an individual to progress along stages in a context that includes …


Intensity Based Interrogation Of Optical Fibre Sensors For Industrial Automation And Intrusion Detection Systems, Gary Andrew Allwood Jan 2015

Intensity Based Interrogation Of Optical Fibre Sensors For Industrial Automation And Intrusion Detection Systems, Gary Andrew Allwood

Theses: Doctorates and Masters

In this study, the use of optical fibre sensors for intrusion detection and industrial automation systems has been demonstrated, with a particular focus on low cost, intensity-based, interrogation techniques. The use of optical fibre sensors for intrusion detection systems to secure residential, commercial, and industrial premises against potential security breaches has been extensively reviewed in this thesis. Fibre Bragg grating (FBG) sensing is one form of optical fibre sensing that has been underutilised in applications such as in-ground, in-fence, and window and door monitoring, and addressing that opportunity has been a major goal of this thesis. Both security and industrial …


7th Australian Security And Intelligence Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University, Security Research Institute, Edith Cowan University Jan 2014

7th Australian Security And Intelligence Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University, Security Research Institute, Edith Cowan University

Australian Security and Intelligence Conference

No abstract provided.


Security, Control And Deviance: Mapping The Security Domain And Why It Matters, Jeffrey D. Corkill, Michael P. Coole Jan 2013

Security, Control And Deviance: Mapping The Security Domain And Why It Matters, Jeffrey D. Corkill, Michael P. Coole

Research outputs 2013

Security is one of the foundations on which a stable and cohesive society is built. It is this security that allows citizens to go about their daily lives with freedom and certainty,affording them the ability to make their own choices as to what they do. Yet it may be argued that security is a concept that is misunderstood and perceived in a myriad of ways by the various stratum of society. Since the tragic events of 9 September 2001, security has become a much used and abused term. Law and legislation have been changed and enacted to protectand control the …


Reconceputualising Security Strategies For Courts: Developing A Typology For Safer Court Environments, Anne Wallace, Deborah Blackman, Emma Rowden Jan 2013

Reconceputualising Security Strategies For Courts: Developing A Typology For Safer Court Environments, Anne Wallace, Deborah Blackman, Emma Rowden

Research outputs 2013

There have been heightened concerns about security in courts in recent years, prompting a strong response that has largely been focused on perimeter security. This paper draws on recent research conducted in Australian on court user’s safety needs, to propose a typology for designing safer courtroom environments that moves beyond the entry point to the court, and incorporates consideration of process and design elements.


Selling Sin: How Culture Influences The Sale Of Firearm Suppressors In Australia And New Zealand, Martin Maccarthy, Martin O'Neill, Helen Cripps Jan 2011

Selling Sin: How Culture Influences The Sale Of Firearm Suppressors In Australia And New Zealand, Martin Maccarthy, Martin O'Neill, Helen Cripps

Research outputs 2011

This paper is a summary of a 2011 academic study commissioned by the New South Wales Government (Game Council) investigating the possible legalizing of firearm sound moderators for hunting and shooting. The study examined the pragmatic advantages and disadvantages of this product in the event it could be made available to the general public in Australia. A comparison between Australia and New Zealand vis-à-vis public access to sound moderators highlights not only the opposite ends of the continuum adopted by two similar countries, but also the arbitrary nature of how attitudes influence product acceptability and availability. Advantages of de-criminalisation in …


Professional Intelligence Judgement Artistry: Some Early Observations, Jeff Corkill Jan 2009

Professional Intelligence Judgement Artistry: Some Early Observations, Jeff Corkill

Australian Security and Intelligence Conference

Intelligence analysis is critical national security and law enforcement function dependant on the intellectual capacity of individual analysts. The practice of intelligence is undertaken in an extremely complex environment often under a veil of secrecy, and where uncertain and deceptive information represents the norm. In order to develop as a profession appropriate constructs with which to explore and explain how analysts process intelligence, make decisions and reach judgements are needed. An improved understanding will offer opportunities to develop appropriate training and professional development for intelligence analysts. This paper introduces the construct of Professional Intelligence Judgement Artistry together with some very …


Men Of Steel Or Plastic Cops: The Use Of Ethnography As A Transformative Agent, Christine Teague, David Leith Jan 2008

Men Of Steel Or Plastic Cops: The Use Of Ethnography As A Transformative Agent, Christine Teague, David Leith

Research outputs pre 2011

The Perth urban rail system, like many other rail systems in Australia and overseas, is subject to crime and anti-social behaviour around the railway environs from a small minority of the travelling public. The transit officers, who form part of the security section of the Public Transport Authority, are the people employed to deal with these incidents, which can result in transit officers being injured. To fully understand the violence and antisocial behaviour that they deal with on a regular basis and develop strategies to reduce this risk of injury, it was necessary to enter their world. The researcher in …


Terrorism, Millenarianism, And Death: A Study Of Hezbollah And Aum Shinrikyo, Steven Nicholls Jan 2007

Terrorism, Millenarianism, And Death: A Study Of Hezbollah And Aum Shinrikyo, Steven Nicholls

Theses : Honours

The relationship ·between death and the millennium is not an area of scholarship that has received adequate attention. Millenarian groups desire the creation of a paradise in the temporal world. The world is seen as corrupt and evil without hope of reform. This viewpoint leads millenarians to conclude that the temporal world must be completely destroyed and created a new, eliminating the corrupt and providing a utopia where the faithful can exist in peace. Hezbollah and Aum Shinrikyo are two terrorist groups which share this worldview, and believe that they can hasten the millennium by eliminating their enemies. This thesis …


The Recognition And Application Of Security Risk Management In Corporate Governance, Chris J. Cubbage Jan 2005

The Recognition And Application Of Security Risk Management In Corporate Governance, Chris J. Cubbage

Theses : Honours

Security as a profession and discipline has emerged principally in the later half of the twentieth century and has developed to become a more defined, usual, respectable and visual part of management. This study aimed to determine the degree of recognition and application of security risk management to corporate governance practices in Australia. Formal research design used descriptive research methodology, consisting of a literature review, primary document analysis and a questionnaire survey to collect data. This research was contrasted to a Corporate Governance Security Model formulated to determine if the model is applicable to the recognition, or application, of a …


A Cross-Institutional Evaluation On The Supply And Demand Of The Security Function, Shane J. Norton Jan 2000

A Cross-Institutional Evaluation On The Supply And Demand Of The Security Function, Shane J. Norton

Theses : Honours

The security industry has undergone dramatic changes over the last twenty years due to a continually increasing demand for security services and products. Internal organisational pressure to the security function has forced a rethink in the way security managers conduct business. Traditionally, security managers have only been aware of the level of service that customers receive by procedures these managers initiated. The availability of a comprehensive study detailing customer attitudes towards security supply is useful for understanding the security demand from the end user perspective, and providing knowledge to fine-tune the service. A security manager with realistic and recent end …


Image Matching Of Firearm Fingerprints, A. J. Mehnert, J. M. Cross, C. L. Smith, G. A. Comber Jan 1995

Image Matching Of Firearm Fingerprints, A. J. Mehnert, J. M. Cross, C. L. Smith, G. A. Comber

Research outputs pre 2011

A spent cartridge case exhibits characteristic markings (firearm fingerprint) that can be used to identify the type and possibly make of weapon in which the cartridge was fired. This report details research into the use of discriminant analysis for the purpose of matching spent rim-fire cartridge cases to specific make and model firearms. The discrimination and classification are based on several scalar shape parameters for the two-dimensional silhouette of the firing pin (FP) impression-- shape factor calculated from the second order moment of inertia, G factor calculated from the distance transform, and the P2A factor- as well as the distance …


An Analysis Of The Monitored Electronic Alarm Activations In The Perth Metropolitan Area, Lynnette M. Bloom, James M. Cross, David Mcdougall Jan 1991

An Analysis Of The Monitored Electronic Alarm Activations In The Perth Metropolitan Area, Lynnette M. Bloom, James M. Cross, David Mcdougall

Research outputs pre 2011

This study as indicated in [7] was carried out under the auspices of Edith Cowan University's Institute of Security and Applied Technology and had the support of the Western Australian Police and the Perth-based Central Monitoring Agencies. The data analysed was obtained essentially from Police records, backed up by data from two of Perth's larger security companies, and consists of all the monitored alarms in the Perth Metropolitan Area which were attended by the police in the months of May and September 1989.In our consideration of the frequency of alarms by time of day and day of week, and the …