Academic literature on the topic 'Computer security Australia Case studies'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer security Australia Case studies.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer security Australia Case studies"
E. Fluck, Andrew, Olawale Surajudeen Adebayo, and Shafi'i Muhammad Abdulhamid. "Secure E-Examination Systems Compared: Case Studies from Two Countries." Journal of Information Technology Education: Innovations in Practice 16 (2017): 107–25. http://dx.doi.org/10.28945/3705.
Full textO'Donnell, Jonathan, Margaret Jackson, Marita Shelly, and Julian Ligertwood. "Australian Case Studies in Mobile Commerce." Journal of Theoretical and Applied Electronic Commerce Research 2, no. 2 (August 1, 2007): 1–18. http://dx.doi.org/10.3390/jtaer2020010.
Full textRein, Tony. "Case studies II — Australia." Computer Law & Security Review 6, no. 6 (March 1991): 33–36. http://dx.doi.org/10.1016/0267-3649(91)90180-4.
Full textRehman, Amjad, Sultan Alqahtani, Ayman Altameem, and Tanzila Saba. "Virtual machine security challenges: case studies." International Journal of Machine Learning and Cybernetics 5, no. 5 (April 9, 2013): 729–42. http://dx.doi.org/10.1007/s13042-013-0166-4.
Full textNewman, Andrew. "The Legal In/Security of Temporary Migrant Agricultural Work: Case Studies from Canada and Australia." Deakin Law Review 18, no. 2 (December 1, 2013): 361. http://dx.doi.org/10.21153/dlr2013vol18no2art43.
Full textBurns, T. W., and E. Szczerbicki. "Implementing Concurrent Engineering: Case Studies from Eastern Australia." Concurrent Engineering 5, no. 2 (June 1997): 163–70. http://dx.doi.org/10.1177/1063293x9700500208.
Full textShaver, Sheila. "Gender, Class and the Welfare State: The Case of Income Security in Australia." Feminist Review, no. 32 (1989): 90. http://dx.doi.org/10.2307/1395365.
Full textShaver, Sheila. "Gender, Class and the Welfare State: The Case of Income Security in Australia." Feminist Review 32, no. 1 (July 1989): 90–110. http://dx.doi.org/10.1057/fr.1989.21.
Full textKimmel, Laurence, Mike Barnard, and Aysu Kuru. "“Open to the public”." Archnet-IJAR: International Journal of Architectural Research 14, no. 2 (March 17, 2020): 251–66. http://dx.doi.org/10.1108/arch-08-2019-0189.
Full textDue, Clemence, Kathleen Connellan, and Damien W. Riggs. "Surveillance, Security and Violence in a Mental Health Ward: An Ethnographic Case-Study of a Purpose-Built Unit in Australia." Surveillance & Society 10, no. 3/4 (November 28, 2012): 292–302. http://dx.doi.org/10.24908/ss.v10i3/4.4276.
Full textDissertations / Theses on the topic "Computer security Australia Case studies"
Lububu, Steven. "Perception of employees concerning information security policy compliance : case studies of a European and South African university." Thesis, Cape Peninsula University of Technology, 2018. http://hdl.handle.net/20.500.11838/2802.
Full textThis study recognises that, regardless of information security policies, information about institutions continues to be leaked due to the lack of employee compliance. The problem is that information leakages have serious consequences for institutions, especially those that rely on information for its sustainability, functionality and competitiveness. As such, institutions ensure that information about their processes, activities and services are secured, which they do through enforcement and compliance of policies. The aim of this study is to explore the extent of non-compliance with information security policy in an institution. The study followed an interpretive, qualitative case study approach to understand the meaningful characteristics of the actual situations of security breaches in institutions. Qualitative data was collected from two universities, using semi-structured interviews, with 17 participants. Two departments were selected: Human Resources and the Administrative office. These two departments were selected based on the following criteria: they both play key roles within an institution, they maintain and improve the university’s policies, and both departments manage and keep confidential university information (Human Resources transects and keeps employees’ information, whilst the Administrative office manages students’ records). This study used structuration theory as a lens to view and interpret the data. The qualitative content analysis was used to analyse documentation, such as brochures and information obtained from the websites of the case study’s universities. The documentation was then further used to support the data from the interviews. The findings revealed some factors that influence non-compliance with regards to information security policy, such as a lack of leadership skills, favouritism, fraud, corruption, insufficiency of infrastructure, lack of security education and miscommunication. In the context of this study, these factors have severe consequences on an institution, such as the loss of the institution’s credibility or the institution’s closure. Recommendations for further study are also made available.
Lukweza, Chishala. "An investigation into the state-of-practice of information security within Zambian copper mines: a case study." Thesis, Rhodes University, 2011. http://hdl.handle.net/10962/d1002776.
Full textHanus, Bartlomiej T. "The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective." Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc699974/.
Full textSeotsanyana, Motlatsi. "Formal specification and verification of safety interlock systems : a comparative case study /." Thesis, Link to the online version, 2007. http://hdl.handle.net/10019/710.
Full textChen, Tang-Li. "Designing secure, JAVA based online registration systems to meet peak load performance targets." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2767.
Full textPietsch, Susan Mary. "The effective use of three dimensional visualisation modelling in the routine development control of urban environments : a thesis submitted to Adelaide University in candidacy for the degree of Doctor of Philosophy." Title page, contents and abstract only, 2001. http://web4.library.adelaide.edu.au/theses/09PH/09php626.pdf.
Full textLui, W. C., and 雷永祥. "Flexible authorizations in workflow management systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B42577135.
Full textLabuschagne, William Aubrey. "A study regarding the effectiveness of game play as part of an information security awareness program for novices." Diss., 2015. http://hdl.handle.net/10500/21519.
Full textComputing
M. Tech. (Information Technology)
Wangwe, Carina Kabajunga. "Towards an information security framework for government to government transactions : a perspective from East Africa." Thesis, 2012. http://hdl.handle.net/10500/9485.
Full textComputing
D. Phil. (Computer Science)
Chen, Peter John. "Australia's online censorship regime : the advocacy coalition framework and governance compared." Phd thesis, 2000. http://hdl.handle.net/1885/147789.
Full textBooks on the topic "Computer security Australia Case studies"
Case studies in secure computing: Achievements and trends. Boca Raton: CRC Press/Taylor & Francis Group, 2015.
Find full textAuditing computer security: A manual with case studies. New York: Wiley, 1989.
Find full textCyberForensics: Understanding information security investigations. New York: Humana Press, 2010.
Find full textS, Kakalik John, ed. Information security: Contemporary cases. Boston: Jones and Bartlett, 2006.
Find full textWells, Joseph T. Internet fraud casebook: The World Wide Web of deceit. Hoboken, N.J: John Wiley & Sons, 2010.
Find full textCase Studies in Information Warfare and Security: For Researchers, Teachers and Students. Academic Conferences and Publishing International Limited: United Kingdom, 2013.
Find full textStruggling for self reliance: Four case studies of Australian regional force projection in the late 1980s and the 1990s. Canberra: ANU E Press, 2008.
Find full textLüthi, Martin. Information system security in health information systems: Exploratory research in US and Swiss acute-care hospitals. Lohmar: Eul, 2008.
Find full textEssinger, James. Controlling computer security: A guide for financial institutions. London: Financial Times Business Information, 1992.
Find full textPeople get screwed all the time: Protecting yourself from scams, fraud, identity theft, fine print, and more. New York: Collins, 2007.
Find full textBook chapters on the topic "Computer security Australia Case studies"
Ray, Darren, Leah Galvin, Claire Palermo, Erik Eklund, Stuart Auckland, Quynh Lê, Rebecca Lindberg, and Russell Shields. "Case Studies on Food Equity and Access." In Food Security in Australia, 153–70. Boston, MA: Springer US, 2012. http://dx.doi.org/10.1007/978-1-4614-4484-8_11.
Full textWilson, George, Maarten Ryder, Glenn Fitzgerald, Michael Tausz, Robert Norton, Garry O’Leary, Saman Seneweera, et al. "Case Studies on Food Production, Policy and Trade." In Food Security in Australia, 353–64. Boston, MA: Springer US, 2012. http://dx.doi.org/10.1007/978-1-4614-4484-8_24.
Full textJiow, Hee Jhee. "Efforts to Get People Involved in Cyber-Physical Security: Case Studies of Australia and Singapore." In Cyber-Physical Security, 221–32. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-32824-9_11.
Full textLong, Yangyu, Wei Zhao, Jilong Yang, Jincheng Deng, and Fangming Liu. "Anomaly Detection of E-commerce Econnoisseur Based on User Behavior." In Communications in Computer and Information Science, 86–98. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-8285-9_6.
Full textJacobson, Douglas, and Joseph Idziorek. "Case Studies." In Computer Security Literacy, 275–96. Chapman and Hall/CRC, 2016. http://dx.doi.org/10.1201/b13707-13.
Full text"Case Studies." In Computer and Information Security Handbook, e157-e172. Elsevier, 2013. http://dx.doi.org/10.1016/b978-0-12-394397-2.00090-8.
Full textVacca, John R. "Case Studies." In Computer and Information Security Handbook, e365-e379. Elsevier, 2017. http://dx.doi.org/10.1016/b978-0-12-803843-7.15010-0.
Full text"Case Studies." In Computer System and Network Security, edited by Gregory B. White, Eric A. Fisch, and Udo W. Pooch, 267–80. CRC Press, 2017. http://dx.doi.org/10.1201/9781315140063-15.
Full textMcCammon, Richard B. "Recent Experiences With Prospector II." In Computers in Geology - 25 Years of Progress. Oxford University Press, 1994. http://dx.doi.org/10.1093/oso/9780195085938.003.0009.
Full textPachpande, Sandeep, Asha Pachpande, and J. A. Kulkarni. "The Enlightened ‘Employee Unions’." In Indian Business Case Studies Volume I, 21–28. Oxford University PressOxford, 2022. http://dx.doi.org/10.1093/oso/9780192869371.003.0002.
Full textConference papers on the topic "Computer security Australia Case studies"
Brown, Sarah. "Session details: Information Sharing Case Studies." In CCS'15: The 22nd ACM Conference on Computer and Communications Security. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/3257850.
Full textMohan, Sibin. "Session details: Session 2: Real Case Studies and Demos." In CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3433243.
Full textOda, S. Michelle, Huirong Fu, and Ye Zhu. "Enterprise information security architecture a review of frameworks, methodology, and case studies." In 2009 2nd IEEE International Conference on Computer Science and Information Technology. IEEE, 2009. http://dx.doi.org/10.1109/iccsit.2009.5234695.
Full textKoziel, Grzegorz, and Marta Dziuba-Koziel. "THE IMPORTANCE OF COMPUTER SYSTEMS SECURITY COURSE IN COMPUTER SCIENCE STUDIES CURRICULA – A CASE STUDY." In International Conference on Education and New Learning Technologies. IATED, 2017. http://dx.doi.org/10.21125/edulearn.2017.1260.
Full textAmro, Belal M., Mohanad O. Al-Jabari, Hussein M. Jabareen, Yousef S. Khader, and Adel Taweel. "Design and Development of Case Studies in Security and Privacy for Health Informatics Education." In 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA). IEEE, 2018. http://dx.doi.org/10.1109/aiccsa.2018.8612876.
Full textPournaghshband, Vahab, and Hassan Pournaghshband. "Appending Security Theories to Projects in Upper-Division CS Courses." In 7th International Conference on Computer Science and Information Technology (CSTY 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.112203.
Full textHayes, Jan, Lynne Chester, and Dolruedee Kramnaimuang King. "Is Public Safety Impacted by the Multiple Regulatory Regimes for Gas Pipelines and Networks?" In 2018 12th International Pipeline Conference. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/ipc2018-78160.
Full textCai, Xiantao, Weidong Li, and Fazhi He. "Partial Encryption Based Secure Sharing of CAD Models for Cloud-Based Design." In ASME 2014 International Manufacturing Science and Engineering Conference collocated with the JSME 2014 International Conference on Materials and Processing and the 42nd North American Manufacturing Research Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/msec2014-4079.
Full text