Next-Generation Reference Process Models. Business process modelling is a key tool for organisations striving to create efficiencies by leveraging their IT infrastructure. This project will develop techniques for increasing the productivity of business process analysts by allowing them to reuse as much as possible existing models rather than systematically desigining new ones from scratch. Specifically, the project will develop and validate a language for designing highly configurable process mo ....Next-Generation Reference Process Models. Business process modelling is a key tool for organisations striving to create efficiencies by leveraging their IT infrastructure. This project will develop techniques for increasing the productivity of business process analysts by allowing them to reuse as much as possible existing models rather than systematically desigining new ones from scratch. Specifically, the project will develop and validate a language for designing highly configurable process models. This language will enable superior approaches to business process modelling and hence smarter use of information. This will place Australia at the forefront of developments in business process management: a crucial technology in today's global, dynamic and heterogeneous environments.Read moreRead less
Improved Businesss Decision-Making via Liquid Process Model Collections. This project aims to develop an innovative approach to create and update as necessary the large collection of business process models that represent a complex organisation, so that this collection captures the actual way in which the organisation performs its business processes. Deploying theoretical, conceptual and empirical research, this project aims to capitalise on the value hidden in large process data, as recorded in ....Improved Businesss Decision-Making via Liquid Process Model Collections. This project aims to develop an innovative approach to create and update as necessary the large collection of business process models that represent a complex organisation, so that this collection captures the actual way in which the organisation performs its business processes. Deploying theoretical, conceptual and empirical research, this project aims to capitalise on the value hidden in large process data, as recorded in event logs. The approach is intended to be implemented in an open-source technology to facilitate advanced investigations and predictions that can ultimately lead to better strategic decision-making. This technology also has the potential to become a research-enabling tool for the large research community in business process management.Read moreRead less
Developing Adversary-Aware Classifiers for Android Malware Detection. Smartphones have become increasingly ubiquitous in people’s everyday life. However, it was reported that one in every five Android applications were actually malware, considering that Android has taken 88% market share of mobile phones. As an effective technique, machine learning has been widely adopted to detect Android malware. However, recent work suggests that deliberately-crafted malware makes machine learning ineffective ....Developing Adversary-Aware Classifiers for Android Malware Detection. Smartphones have become increasingly ubiquitous in people’s everyday life. However, it was reported that one in every five Android applications were actually malware, considering that Android has taken 88% market share of mobile phones. As an effective technique, machine learning has been widely adopted to detect Android malware. However, recent work suggests that deliberately-crafted malware makes machine learning ineffective. In this project, we propose to develop a series of new techniques, such as 1) Android contextual analysis, 2) wrapper-based hill climbing algorithm, and 3) ensemble learning, to solve this problem. The outcomes will help Australia gain cutting edge technologies in adversarial machine learning and mobile security.Read moreRead less
Development of methods to address internet crime. If this research accomplishes successfully, it will be a big step forward in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crimes more effectively and efficiently. It will also limit the damage caused by Internet crimes quickly. For example, if we can quickly identify the origins of a fast spreading virus, we will be able to prevent its propagation as fast as possible. I ....Development of methods to address internet crime. If this research accomplishes successfully, it will be a big step forward in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crimes more effectively and efficiently. It will also limit the damage caused by Internet crimes quickly. For example, if we can quickly identify the origins of a fast spreading virus, we will be able to prevent its propagation as fast as possible. If we can quickly identify and block a harmful phishing site, then less innocent people will be deceived into disclosing their credit card numbers, bank account information, passwords or other sensitive information.Read moreRead less
Reconceptualising the information system as a service. Through parallel efforts in Australia and China, the study aims to propel 'IS-Impact', the Australia-originated and most extensively validated IS success measurement model, to become the Information Systems evaluation approach of choice globally, in both research and practice.
Developing a Theory of Green Information Systems. Reducing the environmental impact and increasing the environmental sustainability of organisations is a priority for Australia. Technology is meant to assist in this challenge, but knowledge is lacking about how information systems can meaningfully assist organisations in becoming sustainable. The goal of this project is to develop and test a theory of Green Information Systems, which describes design principles for information systems that allow ....Developing a Theory of Green Information Systems. Reducing the environmental impact and increasing the environmental sustainability of organisations is a priority for Australia. Technology is meant to assist in this challenge, but knowledge is lacking about how information systems can meaningfully assist organisations in becoming sustainable. The goal of this project is to develop and test a theory of Green Information Systems, which describes design principles for information systems that allow organisations to engage in sustainability sense-making and implement sustainable practices. The outcomes are expected to assist in the development of systems to support sustainability initiatives, the management of sustainability programs, and the reduction of organisations' environmental footprint.Read moreRead less
Privacy Preservation over 5G and IoT Smart Devices. This project aims to investigate privacy preservation protocols in a 5G integrated IoT environment through an analysis of the depth of smart-device use in common smart domains. 5G’s addition to IoT-based smart devices will be effectively deployed and utilised by a large majority of individual and organisation-based users. The knowledge-based ontology and tools developed in the project will help form the new privacy preservation mechanisms that ....Privacy Preservation over 5G and IoT Smart Devices. This project aims to investigate privacy preservation protocols in a 5G integrated IoT environment through an analysis of the depth of smart-device use in common smart domains. 5G’s addition to IoT-based smart devices will be effectively deployed and utilised by a large majority of individual and organisation-based users. The knowledge-based ontology and tools developed in the project will help form the new privacy preservation mechanisms that are required for the 5G enabled environment. The construction of new AI-based tools and testing facilities as well as the generation of new knowledge in the field of privacy preservation and collaboration between universities are expected outcomes of this project. Read moreRead less
Strategic evaluation model for business-to-business electronic marketplace participation. Striving to become a knowledge-based nation is dependent upon the effective adoption, diffusion and implementation of ICT throughout the business community. The developing world markets, brought about by e-commerce and the increased ability to trade globally facilitated by e-markets, have created significant opportunities for Australian organisations. This research will produce a dynamic model that can be ....Strategic evaluation model for business-to-business electronic marketplace participation. Striving to become a knowledge-based nation is dependent upon the effective adoption, diffusion and implementation of ICT throughout the business community. The developing world markets, brought about by e-commerce and the increased ability to trade globally facilitated by e-markets, have created significant opportunities for Australian organisations. This research will produce a dynamic model that can be used to not only evaluate e-marketplace participation but a wide range of Internet applications. The research will provide Australian managers with the foundation of knowledge needed to guide and support their decision-making when implementing new technology.Read moreRead less
Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current comme ....Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current commercial IT product environments. The safety and security of information systems against attack and illicit usage form an essential component of ?National Information Infrastructure Protection (NIIP)?, a move to better ?e-security?. Existing commercial (untrusted) operating systems lack the critical security bases for e-security making e-applications vulnerable to tampering and bypass which can cause failures in overall system security.Read moreRead less
Governance of information technology programmes: achieving accountability, control and success. This project aims to improve the effectiveness with which IT-enabled programmes are managed by public and private organisations. The theoretical knowledge and guides for good practice emerging from this study will contribute to increased success in managing and delivering complex and vital programmes across Australia.