Diagnosis and prediction of business process deviances. This project aims to develop an innovative approach based on process execution semantics, to analyse event data logged by IT systems in order to diagnose and predict business process deviance. Anticipated outcomes include novel business intelligence algorithms producing deviance diagnostics, predictions and recommendations and exposing results via interactive visual analytics. The outcomes are expected to aid process workers in steering bus ....Diagnosis and prediction of business process deviances. This project aims to develop an innovative approach based on process execution semantics, to analyse event data logged by IT systems in order to diagnose and predict business process deviance. Anticipated outcomes include novel business intelligence algorithms producing deviance diagnostics, predictions and recommendations and exposing results via interactive visual analytics. The outcomes are expected to aid process workers in steering business operations towards consistent and compliant outcomes and higher performance, and assist analysts and auditors to explain deviant operations. This should significantly benefit industries such as healthcare, insurance, retail and the government where compliance and integrity management are imperative.Read moreRead less
Improved Businesss Decision-Making via Liquid Process Model Collections. This project aims to develop an innovative approach to create and update as necessary the large collection of business process models that represent a complex organisation, so that this collection captures the actual way in which the organisation performs its business processes. Deploying theoretical, conceptual and empirical research, this project aims to capitalise on the value hidden in large process data, as recorded in ....Improved Businesss Decision-Making via Liquid Process Model Collections. This project aims to develop an innovative approach to create and update as necessary the large collection of business process models that represent a complex organisation, so that this collection captures the actual way in which the organisation performs its business processes. Deploying theoretical, conceptual and empirical research, this project aims to capitalise on the value hidden in large process data, as recorded in event logs. The approach is intended to be implemented in an open-source technology to facilitate advanced investigations and predictions that can ultimately lead to better strategic decision-making. This technology also has the potential to become a research-enabling tool for the large research community in business process management.Read moreRead less
Developing Adversary-Aware Classifiers for Android Malware Detection. Smartphones have become increasingly ubiquitous in people’s everyday life. However, it was reported that one in every five Android applications were actually malware, considering that Android has taken 88% market share of mobile phones. As an effective technique, machine learning has been widely adopted to detect Android malware. However, recent work suggests that deliberately-crafted malware makes machine learning ineffective ....Developing Adversary-Aware Classifiers for Android Malware Detection. Smartphones have become increasingly ubiquitous in people’s everyday life. However, it was reported that one in every five Android applications were actually malware, considering that Android has taken 88% market share of mobile phones. As an effective technique, machine learning has been widely adopted to detect Android malware. However, recent work suggests that deliberately-crafted malware makes machine learning ineffective. In this project, we propose to develop a series of new techniques, such as 1) Android contextual analysis, 2) wrapper-based hill climbing algorithm, and 3) ensemble learning, to solve this problem. The outcomes will help Australia gain cutting edge technologies in adversarial machine learning and mobile security.Read moreRead less
Sonification for complex, mission-critical work environments. Human operators must often pay attention to an immediate task while monitoring background information, but intrusive alarms often capture operators' attention inappropriately. We investigate how continuous auditory information ("sonification") can provide low-level background information when all is normal, yet capture attention to abnormalities only when needed. The results of three experiments will determine the most effective combi ....Sonification for complex, mission-critical work environments. Human operators must often pay attention to an immediate task while monitoring background information, but intrusive alarms often capture operators' attention inappropriately. We investigate how continuous auditory information ("sonification") can provide low-level background information when all is normal, yet capture attention to abnormalities only when needed. The results of three experiments will determine the most effective combination of visual and auditory information delivery; how well sonification captures attention when needed; and whether sonification captures attention to deviations from expected changes. Our findings will help establish principles of attentional mapping that significantly extend current approaches to interactive systems design.Read moreRead less
Development of methods to address internet crime. If this research accomplishes successfully, it will be a big step forward in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crimes more effectively and efficiently. It will also limit the damage caused by Internet crimes quickly. For example, if we can quickly identify the origins of a fast spreading virus, we will be able to prevent its propagation as fast as possible. I ....Development of methods to address internet crime. If this research accomplishes successfully, it will be a big step forward in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crimes more effectively and efficiently. It will also limit the damage caused by Internet crimes quickly. For example, if we can quickly identify the origins of a fast spreading virus, we will be able to prevent its propagation as fast as possible. If we can quickly identify and block a harmful phishing site, then less innocent people will be deceived into disclosing their credit card numbers, bank account information, passwords or other sensitive information.Read moreRead less
Coordinated and Cooperative Load Sharing between Content Delivery Networks. Popular web services can experience severe downtimes as the result of heavy traffic. Enabling coordinated and cooperative content delivery between existing Content Delivery Networks (CDNs) will allow a CDN provider to rapidly 'scale-out' without investing in new infrastructure, to meet both flash crowds and anticipated increases in demand. Improved cost effectiveness, performance and locality for providers and end-users ....Coordinated and Cooperative Load Sharing between Content Delivery Networks. Popular web services can experience severe downtimes as the result of heavy traffic. Enabling coordinated and cooperative content delivery between existing Content Delivery Networks (CDNs) will allow a CDN provider to rapidly 'scale-out' without investing in new infrastructure, to meet both flash crowds and anticipated increases in demand. Improved cost effectiveness, performance and locality for providers and end-users can be achieved by leveraging existing infrastructure provided by other CDNs, creating economies of scale that were previously impossible. This is crucial for uses on the so-called edges of the internet (e.g. Australia) that depend on a small number of expensive data links to the major data centres in Europe and the USA.Read moreRead less
Framing and Enabling Children’s Active Play using Novel Technology. This project aims to address inactivity in the 3-5 age group through understanding and exploring innovative interactive active play experiences for children, with a view to increasing their physical activity over the long term. This project will be based on empirical research with real children undertaking real interactive experiences in real contexts, in order to understand issues around sustained engagement with these types of ....Framing and Enabling Children’s Active Play using Novel Technology. This project aims to address inactivity in the 3-5 age group through understanding and exploring innovative interactive active play experiences for children, with a view to increasing their physical activity over the long term. This project will be based on empirical research with real children undertaking real interactive experiences in real contexts, in order to understand issues around sustained engagement with these types of systems. We will design and develop solutions that may address the issues and test those interventions in a longitudinal manner. The outcome will be a framework which can be applied in a variety of situations and modalities by designers and developers of such systems, and feed into childhood technology guidelines.
Read moreRead less
Designing for Reliability and Maintainability in Service-Oriented Architectures. This project aims to build expertise in the design of computer software, especially enterprise systems in domains such as finance and logistics that are vast in scale and highly complex and geographically separated. By fostering and formalising techniques for improving developer productivity and the reliability and maintainability of enterprise systems, Australia can secure a place as a world leader in software meth ....Designing for Reliability and Maintainability in Service-Oriented Architectures. This project aims to build expertise in the design of computer software, especially enterprise systems in domains such as finance and logistics that are vast in scale and highly complex and geographically separated. By fostering and formalising techniques for improving developer productivity and the reliability and maintainability of enterprise systems, Australia can secure a place as a world leader in software methodology, with an emphasis on technology production rather than consumption. Australian computer consulting services are a $19.5b industry, whilst the wider services sector, which is increasingly reliant on automation to stay competitive, accounts for 70% of Australia's GNP.Read moreRead less
Cross-Community Information Systems: Understanding Technology-Practice Fit in Healthcare. This project addresses unsolved issues of usability of e-health information systems across diverse stakeholder communities that need to coordinate to deliver the expected revolution in patient-centred health care. The project will help realise the Nation's large investment in e-health by improving the likelihood of system acceptance, thus making a significant contribution to facilitating the important insti ....Cross-Community Information Systems: Understanding Technology-Practice Fit in Healthcare. This project addresses unsolved issues of usability of e-health information systems across diverse stakeholder communities that need to coordinate to deliver the expected revolution in patient-centred health care. The project will help realise the Nation's large investment in e-health by improving the likelihood of system acceptance, thus making a significant contribution to facilitating the important institutional transformations expected of these systems. The timeliness, depth and breadth of the study will yield outcomes that will enhance Australia's research reputation. This project directly addresses the 'smart information use' and 'promoting and maintaining good health' national research prioritiesRead moreRead less
Managing private location data in a mobile and networked world: getting the balance right. Location based data are transforming the mobile service industry and this project will develop novel approaches to safeguard the location privacy of mobile individuals. This will facilitate the development of privacy-aware services which can be used for real time traffic monitoring, care for the elderly and smartphone enabled location services.