Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Physical Sciences and Mathematics

A Study Of The Influences Of Computer Interfaces And Training Approaches On End User Training Outcomes, Raj Gururajan Jan 2002

A Study Of The Influences Of Computer Interfaces And Training Approaches On End User Training Outcomes, Raj Gururajan

Theses: Doctorates and Masters

Effective and efficient training is a key factor in determining the success of end user computing (EUC) in organisations. This study examines the influences of two application interfaces, namely icons and menus, on training outcomes. The training outcomes are measured in terms of effectiveness, efficiency and perceived ease of use. Effectiveness includes the keystrokes used to accomplish tasks, the accuracy of correct keystrokes, backtracks and errors committed. Efficiency includes the time taken to accomplish the given tasks. Perceived ease of use rates the ease of the training environment including training materials, operating system, application software and associated resources provided to …


Cutting Hacking: Breaking From Tradition, Rick Duley, Stanislaw P. Maj Jan 2002

Cutting Hacking: Breaking From Tradition, Rick Duley, Stanislaw P. Maj

Research outputs pre 2011

Code construction is the one inescapable phase of the software development cycle yet educators seem unable to escape the mind-set which equates programming with syntax and semantics. Accumulated coding wisdom of more than four decades, now being codified in the SWEBOK, should smooth the process of learning to develop software if presented early in the student's career. Typically, however, it continues to be presented in advanced programming units rather than as fundamental understanding. As a consequence, code hacking is the norm in undergraduate years. This paper examines current practice and presents the view that what is needed is not a …


If You Go Down The Internet Today - Deceptive Honeypots, Craig Valli, Suen Yek Jan 2002

If You Go Down The Internet Today - Deceptive Honeypots, Craig Valli, Suen Yek

Research outputs pre 2011

This is preliminary research into the effectiveness of deceptive defensive measures in particular honeypots that use deceit as a primary defensive and offensive mechanism. Initial research has been conducted using the Deception Tool Kit and its ability to fool commonly available network scanning tools such as Nessus and Nmap The preliminary research indicates that these deceptive tools have a place in modern network defence architecture.


With Speed The Hacker Cometh, Craig Valli Jan 2002

With Speed The Hacker Cometh, Craig Valli

Research outputs pre 2011

This paper is an examination of six months of IDS reports and firewall logs for a small enterprise that has a new broadband ADSL connection. The paper examines the information contained in the logfiles and the implications of detected activities by would be attackers. An examination of the issues that the deployment of broadband has for home and small business users is also undertaken.


Protecting The Infrastructure: 3rd Australian Information Warfare & Security Conference 2002, William Hutchinson (Ed.) Jan 2002

Protecting The Infrastructure: 3rd Australian Information Warfare & Security Conference 2002, William Hutchinson (Ed.)

Research outputs pre 2011

The conference is hosted by the We-B Centre (working with a-business) in the School of Management Information System, the School of Computer & Information Sciences at Edith Cowan University. This year's conference is being held at the Sheraton Perth Hotel in Adelaide Terrace, Perth. Papers for this conference have been written by a wide range of academics and industry specialists. We have attracted participation from both national and international authors and organisations.

The papers cover many topics, all within the field of information warfare and its applications, now and into the future.

The papers have been grouped into six streams: …


Evolving Crushers, Philip Hingston, Luigi Barone, Ronald While Jan 2002

Evolving Crushers, Philip Hingston, Luigi Barone, Ronald While

Research outputs pre 2011

This paper describes the use of an evolutionary algorithm to solve an engineering design problem. The problem involves determining the geometry and operating settings for a crusher in a comminution circuit for ore processing. The intention is to provide a tool for consulting engineers that can be used to explore candidate designs for various scenarios. The algorithm has proved capable of deriving designs that are clearly superior to existing designs, promising significant financial benefits


The Mediated Integration Arcitecture For Heterogeneous Data Integration, Chaiyaporn Chirathamjaree, Suvimol Mukviboonchai Jan 2002

The Mediated Integration Arcitecture For Heterogeneous Data Integration, Chaiyaporn Chirathamjaree, Suvimol Mukviboonchai

Research outputs pre 2011

To interoperate data sources which differ structurally and semantically, particular problems occur, for example, problems of changing schemas in data sources will affect the integrated schema. In this paper, we propose the mediated integration architecture (MedInt), which employs mediation and wrapping techniques as the main components for the integration of heterogeneous systems. With MedInt, a mediator acts as an intermediate medium transforming queries to sub-queries, integrating result data and resolving conflicts. Wrappers then transform sub-queries to specific local queries so that each local system is able to understand the queries.


Firewall Or Folly - An Initial Investigation Into The Effectiveness Of Personal Firewalls In Securing Personal Computers From Attack, Jeshua Yee Jan 2002

Firewall Or Folly - An Initial Investigation Into The Effectiveness Of Personal Firewalls In Securing Personal Computers From Attack, Jeshua Yee

Research outputs pre 2011

With the increase in the use of Personal Computer (PC) firewall, this study looks at the security features provided by eight PC firewall; they are BlackICE, Deerfield, Kirio, MacAfee, Outpost, Sygate, Tiny and Zonealarm. The Nessus network scanner was used to probe these systems in a variety of configurations. The paper discusses the results and their implications for users of this new range of software.


Mobile Home Security With Gprs, Duy Nguyen Jan 2002

Mobile Home Security With Gprs, Duy Nguyen

Theses : Honours

This thesis presents the results of an honours project on the development of a security system for use on mobile devices. Mobile Home Security (MHS) is a prototype system that aimed to fully investigate a potential use of the wireless high-speed technology General Packet Radio Service (GPRS) in transmitting video from a static location. This thesis Mobile Home Security with GPRS describes in detail the design and developmental stages for the system. The research focused on the sending of video from a security capture device over a high speed radio network. The first stage of the research involved the design …