Private Security and Public Interest: Exploring Private Security Trends and Directions for Reform in the New Era of Plural Policing. This study will provide the first ever comprehensive assessment of private security and what it can and cannot offer society in terms of fair and effective order maintenance, crime prevention and law enforcement in Australia. Stemming from problems incurred by the sector, the research will address how governments should regulate the growing range of policing functi ....Private Security and Public Interest: Exploring Private Security Trends and Directions for Reform in the New Era of Plural Policing. This study will provide the first ever comprehensive assessment of private security and what it can and cannot offer society in terms of fair and effective order maintenance, crime prevention and law enforcement in Australia. Stemming from problems incurred by the sector, the research will address how governments should regulate the growing range of policing functions undertaken by private providers. It will also address the issue of how private police can best satisfy legal and justice criteria, meet the demands of accountability and develop mutually beneficial models of cooperation with the public sector. The research will recommend to policy-makers preferred 'plural' policing models for the 21st century.Read moreRead less
Developing a Scalable Infrastructure for Embedded E-Security Incorporating Cryptography and Biometric Authentication. A fundamental flaw in existing embedded e-security technologies is their cryptography-plus-PIN-number infrastructure. This has generated security concerns that have proved a major obstacle to the growth of e-commerce, presently a relatively poor 2% of market share. We aim to design a new infrastructure that can solve this security problem by incorporating cryptography and biomet ....Developing a Scalable Infrastructure for Embedded E-Security Incorporating Cryptography and Biometric Authentication. A fundamental flaw in existing embedded e-security technologies is their cryptography-plus-PIN-number infrastructure. This has generated security concerns that have proved a major obstacle to the growth of e-commerce, presently a relatively poor 2% of market share. We aim to design a new infrastructure that can solve this security problem by incorporating cryptography and biometric authentication into a computing resource limited embedded e-security system. The outcomes of this project will be a set of new cryptosystems, new biometrics processing schemes and new onboard resource allocation schemes that will form the basis for the next generation of embedded systems.Read moreRead less
Automatic real-time detection of infiltrated objects for security of airports and train stations. Infiltrated objects represent a very high security threat in critical areas such as airports and train stations. In order to neutralise such a threat, this project will develop new automatic technologies capable of detecting infiltrated objects in sensitive areas in real time, analysing the movements of their original carriers in the nearby areas, and raising attention accordingly. The technologies ....Automatic real-time detection of infiltrated objects for security of airports and train stations. Infiltrated objects represent a very high security threat in critical areas such as airports and train stations. In order to neutralise such a threat, this project will develop new automatic technologies capable of detecting infiltrated objects in sensitive areas in real time, analysing the movements of their original carriers in the nearby areas, and raising attention accordingly. The technologies will be based on the automatic analysis of camera videos made by computers without the need for assessing or storing the identities of common passers-by. The potential of application is huge extending beyond airports and train stations to any public areas.Read moreRead less
Pattern Analysis and Risk Control of E-Commerce Transactions to Secure Online Payments. The instant filtering of risky online payments is critical for merchants and online payment service providers to control fraud and thus reduce immense losses every year. This project will deliver new and workable techniques for on-the-fly discovering e-payment fraudsters in e-commerce. It can safeguard Australian online businesses and build and transform Australian merchants and online payment associations by ....Pattern Analysis and Risk Control of E-Commerce Transactions to Secure Online Payments. The instant filtering of risky online payments is critical for merchants and online payment service providers to control fraud and thus reduce immense losses every year. This project will deliver new and workable techniques for on-the-fly discovering e-payment fraudsters in e-commerce. It can safeguard Australian online businesses and build and transform Australian merchants and online payment associations by delivering frontier techniques and smart e-payment fraud prevention and risk control to boost Australian online businesses and competitive capabilities globally. The resulting systems, researchers trained and publications will further enhance Australia's global leading role in tackling critical data mining challenges and applications.Read moreRead less
Scalable Robust Video Surveillance over Constrained Networks. Real-time monitoring of large numbers of people is becoming increasingly important for applications such as efficient service delivery and security against both common crime and terrorism. The use of human operators for such tasks is infeasible due to the large amount of data collected. Existing autonomous video surveillance systems are prone to high numbers of false alarms and often require expensive hardware. This proposal seeks ....Scalable Robust Video Surveillance over Constrained Networks. Real-time monitoring of large numbers of people is becoming increasingly important for applications such as efficient service delivery and security against both common crime and terrorism. The use of human operators for such tasks is infeasible due to the large amount of data collected. Existing autonomous video surveillance systems are prone to high numbers of false alarms and often require expensive hardware. This proposal seeks to address both difficulties by using rigorous statistical signal processing methods to optimally fuse information from a network of low-cost cameras.Read moreRead less
Securing Knowledge Processes in Organisations. This project will develop a methodology for identifying and comparing security risks associated with knowledge-intensive processes in organizations. The project addresses a significant area that has historically fallen between two research domains: organisational knowledge processes and systems, and critical information infrastructure protection. The project will establish a unified framework to balance the sharing and protection of information and ....Securing Knowledge Processes in Organisations. This project will develop a methodology for identifying and comparing security risks associated with knowledge-intensive processes in organizations. The project addresses a significant area that has historically fallen between two research domains: organisational knowledge processes and systems, and critical information infrastructure protection. The project will establish a unified framework to balance the sharing and protection of information and organizational knowledge. Outcomes include a framework for modelling knowledge-intensive processes to assess their security vulnerability, an associated methodology of creating security risk profiles of knowledge intensive processes and the validation of the methodology in 3 to 6 organizations.Read moreRead less