The Australian Research Data Commons (ARDC) invites you to participate in a short survey about your
interaction with the ARDC and use of our national research infrastructure and services. The survey will take
approximately 5 minutes and is anonymous. It’s open to anyone who uses our digital research infrastructure
services including Reasearch Link Australia.
We will use the information you provide to improve the national research infrastructure and services we
deliver and to report on user satisfaction to the Australian Government’s National Collaborative Research
Infrastructure Strategy (NCRIS) program.
Please take a few minutes to provide your input. The survey closes COB Friday 29 May 2026.
Complete the 5 min survey now by clicking on the link below.
Developing a Scalable Infrastructure for Embedded E-Security Incorporating Cryptography and Biometric Authentication. A fundamental flaw in existing embedded e-security technologies is their cryptography-plus-PIN-number infrastructure. This has generated security concerns that have proved a major obstacle to the growth of e-commerce, presently a relatively poor 2% of market share. We aim to design a new infrastructure that can solve this security problem by incorporating cryptography and biomet ....Developing a Scalable Infrastructure for Embedded E-Security Incorporating Cryptography and Biometric Authentication. A fundamental flaw in existing embedded e-security technologies is their cryptography-plus-PIN-number infrastructure. This has generated security concerns that have proved a major obstacle to the growth of e-commerce, presently a relatively poor 2% of market share. We aim to design a new infrastructure that can solve this security problem by incorporating cryptography and biometric authentication into a computing resource limited embedded e-security system. The outcomes of this project will be a set of new cryptosystems, new biometrics processing schemes and new onboard resource allocation schemes that will form the basis for the next generation of embedded systems.Read moreRead less
An Investigation of Reasons Why Customers Adopt or Reject Technologically Facilitated Services. The study aims to widen the scope of ground-breaking work already undertaken, and published, by the Chief Investigators: to test and empirically substantiate hypotheses and conclusions deriving from that work; and to provide grounds by which service organisations may better understand and cater for the different needs and requirements of markets served by technologically facilitated services.
Advanced issues in market segmentation research. We will investigate unresolved questions in market segmentation research that will provide answers to the following questions as outcome:
- How to pre-assess market segmentation data structure.
- How to improve the partitioning.
- How to visualize and present the resulting segmentation solutions.
- How to generalize the outcomes over multiple periods of time.
These tasks represent fundamental methodological research. The scientific significan ....Advanced issues in market segmentation research. We will investigate unresolved questions in market segmentation research that will provide answers to the following questions as outcome:
- How to pre-assess market segmentation data structure.
- How to improve the partitioning.
- How to visualize and present the resulting segmentation solutions.
- How to generalize the outcomes over multiple periods of time.
These tasks represent fundamental methodological research. The scientific significance consequently lies in knowledge development and methodological improvement. Findings will also enable both academic researchers using market segmentation methodology as well as practitioners applying such techniques to significantly improve the quality of their market structure analyses.Read moreRead less
Pattern Analysis and Risk Control of E-Commerce Transactions to Secure Online Payments. The instant filtering of risky online payments is critical for merchants and online payment service providers to control fraud and thus reduce immense losses every year. This project will deliver new and workable techniques for on-the-fly discovering e-payment fraudsters in e-commerce. It can safeguard Australian online businesses and build and transform Australian merchants and online payment associations by ....Pattern Analysis and Risk Control of E-Commerce Transactions to Secure Online Payments. The instant filtering of risky online payments is critical for merchants and online payment service providers to control fraud and thus reduce immense losses every year. This project will deliver new and workable techniques for on-the-fly discovering e-payment fraudsters in e-commerce. It can safeguard Australian online businesses and build and transform Australian merchants and online payment associations by delivering frontier techniques and smart e-payment fraud prevention and risk control to boost Australian online businesses and competitive capabilities globally. The resulting systems, researchers trained and publications will further enhance Australia's global leading role in tackling critical data mining challenges and applications.Read moreRead less
Securing Knowledge Processes in Organisations. This project will develop a methodology for identifying and comparing security risks associated with knowledge-intensive processes in organizations. The project addresses a significant area that has historically fallen between two research domains: organisational knowledge processes and systems, and critical information infrastructure protection. The project will establish a unified framework to balance the sharing and protection of information and ....Securing Knowledge Processes in Organisations. This project will develop a methodology for identifying and comparing security risks associated with knowledge-intensive processes in organizations. The project addresses a significant area that has historically fallen between two research domains: organisational knowledge processes and systems, and critical information infrastructure protection. The project will establish a unified framework to balance the sharing and protection of information and organizational knowledge. Outcomes include a framework for modelling knowledge-intensive processes to assess their security vulnerability, an associated methodology of creating security risk profiles of knowledge intensive processes and the validation of the methodology in 3 to 6 organizations.Read moreRead less