Academic literature on the topic 'Computer security Australia Case studies'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer security Australia Case studies.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer security Australia Case studies"

1

E. Fluck, Andrew, Olawale Surajudeen Adebayo, and Shafi'i Muhammad Abdulhamid. "Secure E-Examination Systems Compared: Case Studies from Two Countries." Journal of Information Technology Education: Innovations in Practice 16 (2017): 107–25. http://dx.doi.org/10.28945/3705.

Full text
Abstract:
Aim/Purpose: Electronic examinations have some inherent problems. Students have expressed negative opinions about electronic examinations (e-examinations) due to a fear of, or unfamiliarity with, the technology of assessment, and a lack of knowledge about the methods of e-examinations. Background: Electronic examinations are now a viable alternative method of assessing student learning. They provide freedom of choice, in terms of the location of the examination, and can provide immediate feedback; students and institutions can be assured of the integrity of knowledge testing. This in turn motivates students to strive for deeper learning and better results, in a higher quality and more rigorous educational process. Methodology : This paper compares an e-examination system at FUT Minna Nigeria with one in Australia, at the University of Tasmania, using case study analysis. The functions supported, or inhibited, by each of the two e-examination systems, with different approaches to question types, cohort size, technology used, and security features, are compared. Contribution: The researchers’ aim is to assist stakeholders (including lecturers, invigilators, candidates, computer instructors, and server operators) to identify ways of improving the process. The relative convenience for students, administrators, and lecturer/assessors and the reliability and security of the two systems are considered. Challenges in conducting e-examinations in both countries are revealed by juxtaposing the systems. The authors propose ways of developing more effective e-examination systems. Findings: The comparison of the two institutions in Nigeria and Australia shows e-examinations have been implemented for the purpose of selecting students for university courses, and for their assessment once enrolled. In Nigeria, there is widespread systemic adoption for university entrance merit selection. In Australia this has been limited to one subject in one state, rather than being adopted nationally. Within undergraduate courses, the Nigerian scenario is quite extensive; in Australia this adoption has been slower, but has penetrated a wide variety of disciplines. Recommendations for Practitioners: Assessment integrity and equipment reliability were common issues across the two case studies, although the delivery of e-examinations is different in each country. As with any procedural process, a particular solution is only as good as its weakest attribute. Technical differences highlight the link between e-examination system approaches and pedagogical implications. It is clear that social, cultural, and environmental factors affect the success of e-examinations. For example, an interrupted electrical power supply and limited technical know-how are two of the challenges affecting the conduct of e-examinations in Nigeria. In Tasmania, the challenge with the “bring your own device” (BYOD) is to make the system operate on an increasing variety of user equipment, including tablets. Recommendation for Researchers: The comparisons between the two universities indicate there will be a productive convergence of the approaches in future. One key proposal, which arose from the analysis of the existing e-examination systems in Nigeria and Australia, is to design a form of “live” operating system that is deployable over the Internet. This method would use public key cryptography for lecturers to encrypt their questions online. Impact on Society : If institutions are to transition to e-examinations, one way of facilitating this move is by using computers to imitate other assessment techniques. However, higher order thinking is usually demonstrated through open-ended or creative tasks. In this respect the Australian system shows promise by providing the same full operating system and software application suite to all candidates, thereby supporting assessment of such creative higher order thinking. The two cases illustrate the potential tension between “online” or networked reticulation of questions and answers, as opposed to “offline” methods. Future Research: A future design proposition is a web-based strategy for a virtual machine, which is launched into candidates’ computers at the start of each e-examination. The new system is a form of BYOD externally booted e-examination (as in Australia) that is deployable over the Internet with encryption and decryption features using public key cryptography (Nigeria). This will allow lecturers to encrypt their questions and post them online while the questions are decrypted by the administrator or students are given the key. The system will support both objective and open-ended questions (possibly essays and creative design tasks). The authors believe this can re-define e-examinations as the “gold standard” of assessment.
APA, Harvard, Vancouver, ISO, and other styles
2

O'Donnell, Jonathan, Margaret Jackson, Marita Shelly, and Julian Ligertwood. "Australian Case Studies in Mobile Commerce." Journal of Theoretical and Applied Electronic Commerce Research 2, no. 2 (August 1, 2007): 1–18. http://dx.doi.org/10.3390/jtaer2020010.

Full text
Abstract:
Sixteen wireless case studies highlight issues relating to mobile commerce in Australia. The issues include: the need for a clear business case; difficulty of achieving critical mass and acceptance of a new service; training and technical issues, as well as staff acceptance issues; that privacy and security issues arise through the potential to track the location of people and through the amounts of personal data collected; difficulties in integrating with existing back-end systems; projects being affected by changes to legislation, or requiring changes to the law; and that while there is potential for mobile phone operators to develop new billing methods that become new models for issuing credit, they are not covered by existing credit laws. We have placed the case studies in a Fit-Viability framework and analyzed the issues according to key success criteria. While many organizations are keen to use the technology, they are struggling to find a compelling business case for adoption and that without a strong business case projects are unlikely to progress past the pilot stage.
APA, Harvard, Vancouver, ISO, and other styles
3

Rein, Tony. "Case studies II — Australia." Computer Law & Security Review 6, no. 6 (March 1991): 33–36. http://dx.doi.org/10.1016/0267-3649(91)90180-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rehman, Amjad, Sultan Alqahtani, Ayman Altameem, and Tanzila Saba. "Virtual machine security challenges: case studies." International Journal of Machine Learning and Cybernetics 5, no. 5 (April 9, 2013): 729–42. http://dx.doi.org/10.1007/s13042-013-0166-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Newman, Andrew. "The Legal In/Security of Temporary Migrant Agricultural Work: Case Studies from Canada and Australia." Deakin Law Review 18, no. 2 (December 1, 2013): 361. http://dx.doi.org/10.21153/dlr2013vol18no2art43.

Full text
Abstract:
Despite differing labour law systems and program structures, temporary migrant agricultural workers under the Canadian Seasonal Agricultural Worker Program and Australian Seasonal Worker Program often possess minimal security of employment rights and protections, despite potentially lengthy periods of consecutive seasonal service to the same employer. Such lesser rights and protections are partly due to the central role played by continuity of service in determining the length of reasonable notice periods and the strength of unfair dismissal protections and stand-down/recall rights. Although it is often presumed that the temporary duration of the seasonal work visa necessarily severs the legal continuity of the employment relationship, such is not the case. This article argues that security of employment rights and protections can be re-conceptualised to recognise non-continuous seasonal service within the current parameters of a fixed-term work visa. In both Canada and Australia this could be accomplished through contractual or collective agreement terms or through the amendment of labour law legislation. Such reforms would recognise a form of unpaid ‘migrant worker leave’, whereby the legal continuity of employment would be preserved despite periods of mandatory repatriation, thus allowing accrual of security of employment rights and protections.
APA, Harvard, Vancouver, ISO, and other styles
6

Burns, T. W., and E. Szczerbicki. "Implementing Concurrent Engineering: Case Studies from Eastern Australia." Concurrent Engineering 5, no. 2 (June 1997): 163–70. http://dx.doi.org/10.1177/1063293x9700500208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shaver, Sheila. "Gender, Class and the Welfare State: The Case of Income Security in Australia." Feminist Review, no. 32 (1989): 90. http://dx.doi.org/10.2307/1395365.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shaver, Sheila. "Gender, Class and the Welfare State: The Case of Income Security in Australia." Feminist Review 32, no. 1 (July 1989): 90–110. http://dx.doi.org/10.1057/fr.1989.21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kimmel, Laurence, Mike Barnard, and Aysu Kuru. "“Open to the public”." Archnet-IJAR: International Journal of Architectural Research 14, no. 2 (March 17, 2020): 251–66. http://dx.doi.org/10.1108/arch-08-2019-0189.

Full text
Abstract:
PurposeThe cultural imperative for public buildings in countries like Australia to maintain their intrinsic “openness” – physically and symbolically – faces particular challenges in the context of current global terrorism concerns. Building regulations and counter-terrorism guidelines coexist uneasily, with implications for both public amenity and safety. This is particularly evident in the context of current approaches to hostile vehicle (HV) mitigation.Design/methodology/approachBased on a review of comparative literature, this multidisciplinary project assimilates design aesthetics and security expertise to assess the advantages and limitations of current counter-terrorism design approaches in Australia, the UK and the USA. The research focusses on public buildings of high cultural symbolic value (e.g. concert halls) in the context of HV mitigation.FindingsTwo key recommendations emerge. The first presents the benefits of adopting a layered security strategy tailored to a building's security and symbolic profile mix. The second proposes enhancements to the existing counter-terrorism guidelines based on a model that accounts for both symbolic value and openness.Originality/valueThe research presents new strategies for urban design and security stakeholders to balance openness and security in the design of publicly accessible buildings. While existing research addresses the challenges of terrorism in the design of public space, a literature (and practice) gap exists in Australia, the UK and the USA regarding current approaches to the design of public buildings. Using Australia as a case study, the findings will inform government and industry practitioners seeking more complementary approaches to public amenity and safety in comparable counter-security design contexts globally.
APA, Harvard, Vancouver, ISO, and other styles
10

Due, Clemence, Kathleen Connellan, and Damien W. Riggs. "Surveillance, Security and Violence in a Mental Health Ward: An Ethnographic Case-Study of a Purpose-Built Unit in Australia." Surveillance & Society 10, no. 3/4 (November 28, 2012): 292–302. http://dx.doi.org/10.24908/ss.v10i3/4.4276.

Full text
Abstract:
This paper discusses the potential relationship between surveillance techniques, the enactment of security measures, and patient violence in mental health wards. The paper draws upon data from an ethnographic study conducted in a purpose-built mental health unit containing two wards (one locked and one open) in South Australia, and argues that acts of violence observed in the unit were typically preceded by an incident within the unit that was related to the implementation of security measures aimed at controlling non-compliant behaviours. The paper argues that if a relationship between security measures and violence does exist in mental health wards, then close attention must be paid to the ways in which forms of surveillance may arguably exacerbate, rather than prevent, the need for security measures.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Computer security Australia Case studies"

1

Lububu, Steven. "Perception of employees concerning information security policy compliance : case studies of a European and South African university." Thesis, Cape Peninsula University of Technology, 2018. http://hdl.handle.net/20.500.11838/2802.

Full text
Abstract:
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2018.
This study recognises that, regardless of information security policies, information about institutions continues to be leaked due to the lack of employee compliance. The problem is that information leakages have serious consequences for institutions, especially those that rely on information for its sustainability, functionality and competitiveness. As such, institutions ensure that information about their processes, activities and services are secured, which they do through enforcement and compliance of policies. The aim of this study is to explore the extent of non-compliance with information security policy in an institution. The study followed an interpretive, qualitative case study approach to understand the meaningful characteristics of the actual situations of security breaches in institutions. Qualitative data was collected from two universities, using semi-structured interviews, with 17 participants. Two departments were selected: Human Resources and the Administrative office. These two departments were selected based on the following criteria: they both play key roles within an institution, they maintain and improve the university’s policies, and both departments manage and keep confidential university information (Human Resources transects and keeps employees’ information, whilst the Administrative office manages students’ records). This study used structuration theory as a lens to view and interpret the data. The qualitative content analysis was used to analyse documentation, such as brochures and information obtained from the websites of the case study’s universities. The documentation was then further used to support the data from the interviews. The findings revealed some factors that influence non-compliance with regards to information security policy, such as a lack of leadership skills, favouritism, fraud, corruption, insufficiency of infrastructure, lack of security education and miscommunication. In the context of this study, these factors have severe consequences on an institution, such as the loss of the institution’s credibility or the institution’s closure. Recommendations for further study are also made available.
APA, Harvard, Vancouver, ISO, and other styles
2

Lukweza, Chishala. "An investigation into the state-of-practice of information security within Zambian copper mines: a case study." Thesis, Rhodes University, 2011. http://hdl.handle.net/10962/d1002776.

Full text
Abstract:
Zambian copper mines have embraced the use of information technologies for strategic operations and competitive advantage. This dependence on these technologies has not only been seen in the physical aspects of business operations but also in the use of information systems such as Enterprise Resource Planning Systems (ERPs) for strategic decision making and increased usage of Industrial Control Systems (ICS’) that are meant to enhance operational efficiency in production areas. A survey was conducted to explore leadership perceptions on information security practices in Zambian copper mines and an ISO/IEC 27002 Audit Tool was administered to middle management in a particular mine for an in-depth analysis of their information security practices. Results revealed that although information security controls may have been put in place in these organisations, there are still areas that require attention. Senior management and middle management have different perceptions as to the extent to which information security practices are conducted in these copper mines. This implies that management may not be fully involved in certain aspects of these organisations’ information security practices. The results concluded that management needs to be fully involved and provide support for information security programs. Furthermore, these information security programs should be standardised so as to effectively protect these organisations’ information assets. This should also include the involvement of personnel as key players in the information security process.
APA, Harvard, Vancouver, ISO, and other styles
3

Hanus, Bartlomiej T. "The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective." Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc699974/.

Full text
Abstract:
This research seeks to derive and examine a multidimensional definition of information security awareness, investigate its antecedents, and analyze its effects on compliance with organizational information security policies. The above research goals are tested through the theoretical lens of technology threat avoidance theory and protection motivation theory. Information security awareness is defined as a second-order construct composed of the elements of threat and coping appraisals supplemented by the responsibilities construct to account for organizational environment. The study is executed in two stages. First, the participants (employees of a municipality) are exposed to a series of phishing and spear-phishing messages to assess if there are any common characteristics shared by the phishing victims. The differences between the phished and the not phished group are assessed through multiple discriminant analysis. Second, the same individuals are asked to participate in a survey designed to examine their security awareness. The research model is tested using PLS-SEM approach. The results indicate that security awareness is in fact a second-order formative construct composed of six components. There are significant differences in security awareness levels between the victims of the phishing experiment and the employees who maintain compliance with security policies. The study extends the theory by proposing and validating a universal definition of security awareness. It provides practitioners with an instrument to examine awareness in a plethora of settings and design customized security training activities.
APA, Harvard, Vancouver, ISO, and other styles
4

Seotsanyana, Motlatsi. "Formal specification and verification of safety interlock systems : a comparative case study /." Thesis, Link to the online version, 2007. http://hdl.handle.net/10019/710.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Tang-Li. "Designing secure, JAVA based online registration systems to meet peak load performance targets." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2767.

Full text
Abstract:
This project "Designing Secure, Java Based Online Registration Systems to Meet Peak Load Performance Targets" is a simulation of a Web-based exposition management system plus a performance testing procedure to examine this web application.
APA, Harvard, Vancouver, ISO, and other styles
6

Pietsch, Susan Mary. "The effective use of three dimensional visualisation modelling in the routine development control of urban environments : a thesis submitted to Adelaide University in candidacy for the degree of Doctor of Philosophy." Title page, contents and abstract only, 2001. http://web4.library.adelaide.edu.au/theses/09PH/09php626.pdf.

Full text
Abstract:
"June 2001." Includes bibliographical references (leaves 346-352) Investigates technical and cultural issues in using three dimensional computer visualisation modelling in a busy Australian city planning office, the local Council of the City of Adelaide, taking two directions: a modelling approach that emphasizes abstract, quick to create 3D models; and, by examining the social and organizational issues. This dual view paints a broader picture of the potential of 3D modelling within planning practice including the impediments and possible solutions to them.
APA, Harvard, Vancouver, ISO, and other styles
7

Lui, W. C., and 雷永祥. "Flexible authorizations in workflow management systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B42577135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Labuschagne, William Aubrey. "A study regarding the effectiveness of game play as part of an information security awareness program for novices." Diss., 2015. http://hdl.handle.net/10500/21519.

Full text
Abstract:
Technology has become intertwined into society daily life which is not only limited to personal life but also extending into the business world. Availability, integrity and confidentiality are critical information security factors to consider when interacting with technology. Conversely many unsuspecting users have fallen prey to cyber criminals. The majority of threats encountered could have been prevented by the victims if they had sufficient knowledge to first identify and then mitigate the threat. The use of information security awareness programs provides a platform whereby users are informed about such threats. The success of these programs is significantly reduced if the content is not transferred in the most effective method to improve understanding and result in a change of behaviour. This dissertation addresses the effectiveness of using a gaming platform within an information security awareness program. The use of games allows for the users to apply knowledge within a potential scenario as seen with pilots using flight simulators. End users who have no information security background should have a safe platform where threats can be identified and methods taught to mitigate the threats. A wide selection of security awareness frameworks exist, the most appropriate framework should be considered first. The different phases of the framework would be applied within the dissertation with the main objective to ultimately determine the effectiveness of games within security awareness programs. Data was collected during the implemented information security awareness program using quantitative instruments. These included questionnaires and a developed online game designed from the literature reviewed during the study. The analysed data highlighted the effects of extrinsic motivation on knowledge transfer and validated the positive impact of game play.
Computing
M. Tech. (Information Technology)
APA, Harvard, Vancouver, ISO, and other styles
9

Wangwe, Carina Kabajunga. "Towards an information security framework for government to government transactions : a perspective from East Africa." Thesis, 2012. http://hdl.handle.net/10500/9485.

Full text
Abstract:
The need for a regional framework for information security in e-Government for the East African Community (EAC) has become more urgent with the signing in 2009 of the EAC Common Market Protocol. This protocol will entail more electronic interactions amongst government agencies in the EAC partner states which are Burundi, Kenya, Rwanda, Tanzania, and Uganda. Government to Government (G2G) transactions are the backbone of e-Government transactions. If a government wants to provide comprehensive services that are easy to use by citizens, employees or businesses, it needs to be able to combine information or services that are provided by different government agencies or departments. Furthermore, the governments must ensure that the services provided are secure so that citizens trust that an electronic transaction is as good as or better than a manual one. Thus governments in the EAC must address information security in ways that take into consideration that these governments have limited resources and skills to use for e-Government initiatives. The novel contribution of this study is an information security framework dubbed the TOG framework, comprising of technical, operational, governance, process and maturity models to address information security requirements for G2G transactions in the EAC. The framework makes reference to standards that can be adopted by the EAC while taking into consideration contextual factors which are resource, legislative and cultural constraints. The process model uses what is termed a ‘Plug and Play’ approach which provides the resource poor countries with a means of addressing information security that can be implemented as and when resources allow but eventually leading to a comprehensive framework. Thus government agencies can start implementation based on the operational and technical guidelines while waiting for governance structures to be put in place, or can specifically address governance requirements where they already exist. Conversely, governments using the same framework can take into consideration existing technologies and operations while putting governance structures in place. As a proof of concept, the proposed framework is applied to a case study of a G2G transaction in Tanzania. The framework is evaluated against critical success factors.
Computing
D. Phil. (Computer Science)
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Peter John. "Australia's online censorship regime : the advocacy coalition framework and governance compared." Phd thesis, 2000. http://hdl.handle.net/1885/147789.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Computer security Australia Case studies"

1

Case studies in secure computing: Achievements and trends. Boca Raton: CRC Press/Taylor & Francis Group, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Auditing computer security: A manual with case studies. New York: Wiley, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

CyberForensics: Understanding information security investigations. New York: Humana Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

S, Kakalik John, ed. Information security: Contemporary cases. Boston: Jones and Bartlett, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wells, Joseph T. Internet fraud casebook: The World Wide Web of deceit. Hoboken, N.J: John Wiley & Sons, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Case Studies in Information Warfare and Security: For Researchers, Teachers and Students. Academic Conferences and Publishing International Limited: United Kingdom, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Struggling for self reliance: Four case studies of Australian regional force projection in the late 1980s and the 1990s. Canberra: ANU E Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lüthi, Martin. Information system security in health information systems: Exploratory research in US and Swiss acute-care hospitals. Lohmar: Eul, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Essinger, James. Controlling computer security: A guide for financial institutions. London: Financial Times Business Information, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

People get screwed all the time: Protecting yourself from scams, fraud, identity theft, fine print, and more. New York: Collins, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Computer security Australia Case studies"

1

Ray, Darren, Leah Galvin, Claire Palermo, Erik Eklund, Stuart Auckland, Quynh Lê, Rebecca Lindberg, and Russell Shields. "Case Studies on Food Equity and Access." In Food Security in Australia, 153–70. Boston, MA: Springer US, 2012. http://dx.doi.org/10.1007/978-1-4614-4484-8_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wilson, George, Maarten Ryder, Glenn Fitzgerald, Michael Tausz, Robert Norton, Garry O’Leary, Saman Seneweera, et al. "Case Studies on Food Production, Policy and Trade." In Food Security in Australia, 353–64. Boston, MA: Springer US, 2012. http://dx.doi.org/10.1007/978-1-4614-4484-8_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jiow, Hee Jhee. "Efforts to Get People Involved in Cyber-Physical Security: Case Studies of Australia and Singapore." In Cyber-Physical Security, 221–32. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-32824-9_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Long, Yangyu, Wei Zhao, Jilong Yang, Jincheng Deng, and Fangming Liu. "Anomaly Detection of E-commerce Econnoisseur Based on User Behavior." In Communications in Computer and Information Science, 86–98. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-8285-9_6.

Full text
Abstract:
AbstractEconnoisseur refers to users who obtain high returns from the Internet at low cost. It is of great significance for platform to identify econnoisseur to reduce unnecessary losses. At present, econnoisseur is mainly intercepted by rules. This method will fail when the new get the best deal method appears, and there is a certain lag. This paper identifies the econnoisseur from Knownsec Security Intelligence Brain’s e-commerce website visitors. First of all, it is found that the precision and recall of the Isolation Forest are better than the Local Outlier Factor and DBSCAN in econnoisseur detection. Secondly, we merged the similar URLs visited by users with Bi-directional Long Short-Term Memory (BiLSTM), then use the merged data in Isolation Forest Model. It is found that the improved Isolation Forest model based on BiLSTM can further improve the detection ability. Practical case studies showed that this method has certain validity and reference for the detection of econnoisseur.
APA, Harvard, Vancouver, ISO, and other styles
5

Jacobson, Douglas, and Joseph Idziorek. "Case Studies." In Computer Security Literacy, 275–96. Chapman and Hall/CRC, 2016. http://dx.doi.org/10.1201/b13707-13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"Case Studies." In Computer and Information Security Handbook, e157-e172. Elsevier, 2013. http://dx.doi.org/10.1016/b978-0-12-394397-2.00090-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vacca, John R. "Case Studies." In Computer and Information Security Handbook, e365-e379. Elsevier, 2017. http://dx.doi.org/10.1016/b978-0-12-803843-7.15010-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"Case Studies." In Computer System and Network Security, edited by Gregory B. White, Eric A. Fisch, and Udo W. Pooch, 267–80. CRC Press, 2017. http://dx.doi.org/10.1201/9781315140063-15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

McCammon, Richard B. "Recent Experiences With Prospector II." In Computers in Geology - 25 Years of Progress. Oxford University Press, 1994. http://dx.doi.org/10.1093/oso/9780195085938.003.0009.

Full text
Abstract:
Three recent case studies in which Prospector II was used illustrate a variety of constructive responses that contribute to regional mineral resource assessments. The case studies included a group of precious-metal vein deposits in the Quartzville Mining District in Oregon, United States; a stratabound gold-silver deposit in Manitoba, Canada; and an Archean tin deposit from Western Australia. In each case, the objective was to see how Prospector II would classify the deposit in terms of deposit models in the Cox-Singer compendium. The precious-metal vein deposits in the Quartzville Mining District were interpreted by Prospector II to be part of a larger system likely to contain porphyry copper deposits. The stratabound gold-silver deposit in Manitoba fit the description of the Homestake gold deposit model. The Archean tin deposit from Western Australia bore little resemblance to any of the tin deposit models in the Cox-Singer compendium. In recent years, quantitative mineral resource assessments have gained recognition among land managers and national policymakers, who have found that numerical measures of potential mineral values are essential when considering alternative strategies. Such quantitative assessments allow land managers to plan optimum use of public lands and allow national policymakers to assess the need for securing long-term mineral supplies from international sources. In addition, quantitative assessments encourage the discovery and development of new deposits. Significant advances have been made in developing new techniques for the quantitative assessment of metallic mineral resources (Drew et al, 1986; Reed et al., 1989). In large part, these techniques are based on an earlier method of regional mineral resource assessment proposed by Singer (1975) and subsequently applied to areas in Alaska. The technique is based on the size distribution of mineral deposits of specified geologic types and on the probability of deposit occurrence. This approach to the quantitative assessment of undiscovered mineral resources is being applied to many of the mineral resource assessments being carried out by the U.S. Geological Survey (USGS) (Singer and Cox, 1988). Critical in this approach to quantitative assessment is the geologist's ability to relate the geologic environment in an area to specific deposit types.
APA, Harvard, Vancouver, ISO, and other styles
10

Pachpande, Sandeep, Asha Pachpande, and J. A. Kulkarni. "The Enlightened ‘Employee Unions’." In Indian Business Case Studies Volume I, 21–28. Oxford University PressOxford, 2022. http://dx.doi.org/10.1093/oso/9780192869371.003.0002.

Full text
Abstract:
Abstract The IT implosion in all aspects of business management also has demanded appropriate levels of education and training in the skills required at all levels of an organization. Today everyone from the gate security to the salesmen is required to be computer literate to be able to manage their day-to-day organizational roles. Every workman (sorry, they need to be addressed as ‘Associates’) in today’s situation needs to be able to handle operations which are in majority of cases computer-controlled. In general this has led to an overall improvement of the educational levels at all business processes and also in understanding, the parameters which decide the business survival.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer security Australia Case studies"

1

Brown, Sarah. "Session details: Information Sharing Case Studies." In CCS'15: The 22nd ACM Conference on Computer and Communications Security. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/3257850.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mohan, Sibin. "Session details: Session 2: Real Case Studies and Demos." In CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3433243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Oda, S. Michelle, Huirong Fu, and Ye Zhu. "Enterprise information security architecture a review of frameworks, methodology, and case studies." In 2009 2nd IEEE International Conference on Computer Science and Information Technology. IEEE, 2009. http://dx.doi.org/10.1109/iccsit.2009.5234695.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Koziel, Grzegorz, and Marta Dziuba-Koziel. "THE IMPORTANCE OF COMPUTER SYSTEMS SECURITY COURSE IN COMPUTER SCIENCE STUDIES CURRICULA – A CASE STUDY." In International Conference on Education and New Learning Technologies. IATED, 2017. http://dx.doi.org/10.21125/edulearn.2017.1260.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Amro, Belal M., Mohanad O. Al-Jabari, Hussein M. Jabareen, Yousef S. Khader, and Adel Taweel. "Design and Development of Case Studies in Security and Privacy for Health Informatics Education." In 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA). IEEE, 2018. http://dx.doi.org/10.1109/aiccsa.2018.8612876.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pournaghshband, Vahab, and Hassan Pournaghshband. "Appending Security Theories to Projects in Upper-Division CS Courses." In 7th International Conference on Computer Science and Information Technology (CSTY 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.112203.

Full text
Abstract:
Software systems have been under continued attacks by malicious entities, and in some cases, the consequences have been catastrophic. To tackle this pervasive problem, the academic world has significantly increased the offering of computer security-related courses during the past decade. In fact, offering these courses has become a standard part of the curriculum for many computing disciplines. While many proposals suggest adding this appealing topic into the nonsecurity CS courses, many faculties do not entirely support the idea for a convincing reason. They rightfully claim that each one of these courses is already packed with concepts and materials developed toward that course, leaving not much room for other topics. In this study, we show how exposing students to security concepts can be incorporated into upper-division CS courses without increasing the normally required efforts needed by students as well as the instructor. We show how to develop a project of this nature that can be appended to an already existing course project. We have successfully employed our proposed approach in two of our core CS courses and present them in this paper as case studies.
APA, Harvard, Vancouver, ISO, and other styles
7

Hayes, Jan, Lynne Chester, and Dolruedee Kramnaimuang King. "Is Public Safety Impacted by the Multiple Regulatory Regimes for Gas Pipelines and Networks?" In 2018 12th International Pipeline Conference. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/ipc2018-78160.

Full text
Abstract:
Gas pipelines and networks are subject to multiple regulatory governance arrangements. One regime is economic regulation which is designed to ensure fair access to gas markets and emulate the price pressures of competition in a sector dominated by a few companies. Another regime is technical regulation which is designed to ensure pipeline system integrity is sufficient for the purposes of public safety, environmental protection and physical security of supply. As was highlighted in analysis of the San Bruno pipeline failure, these two regulatory regimes have substantially different orientations towards expenditure on things such as maintenance and inspection which ultimately impact public safety. Drawing on more than 50 interviews, document review and case studies of specific price determinations, we have investigated the extent to which these two regulatory regimes as enacted in Australia may conflict, and particularly whether economic regulation influences long-term public safety outcomes. We also draw on a comparison with how similar regulatory requirements are enacted in the United Kingdom (UK). Analysis shows that the overall orientation towards risk varies between the two regimes. The technical regulatory regime is a typical goal-setting style of risk governance with an overarching requirement that ‘reasonably practicable’ measures are put in place to minimize risk to the public. In contrast, the incentive-based economic regulatory regime requires that expenditure should be ‘efficient’ to warrant inclusion in the determination of acceptable charges to customers. How safety is considered within this remains an open question. Best practice in performance-based safety regimes such as those used in the UK and Australia require that regulators adopt an attitude towards companies based on the principle of ‘trust but verify’ as, generally speaking, all parties aim for the common goal of no accidents. Equally, in jurisdictions that favor prescriptive safety requirements such as the United States (US) the common goal remains. In contrast, stakeholders in the economic regulatory regime have significantly diverse interests; companies seek to maximize their individual financial returns and regulators seek to exert downward price pressures. We argue that these differences in the two regulatory regimes are significant for the management of public safety risk and conclude that minimizing risk to the public from a major pipeline failure would be better served by the economic regulatory regime’s separate consideration of safety-related from other expenditure and informed by the technical regulator’s view of safety.
APA, Harvard, Vancouver, ISO, and other styles
8

Cai, Xiantao, Weidong Li, and Fazhi He. "Partial Encryption Based Secure Sharing of CAD Models for Cloud-Based Design." In ASME 2014 International Manufacturing Science and Engineering Conference collocated with the JSME 2014 International Conference on Materials and Processing and the 42nd North American Manufacturing Research Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/msec2014-4079.

Full text
Abstract:
Model security for collaborative product design in a networked environment (or called networked manufacture, grid manufacture, and cloud manufacture) is an important but also challenging research issue. In order to support collaborative product design in a secure and flexible means, a partial encryption based secure sharing method for Computer Aided Design (CAD) model is presented in this paper. Based on the above method, parts of a CAD model can be selected flexibly by users for encrypting according to different users’ requirements. The secret keys for the different parts of the CAD model can be customized to meet the requirements of users. Case studies have been developed to demonstrate the effectiveness of the proposed method.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography