What works, what doesn't, and what is promising for preventing sexual violence and abuse: the effectiveness of situational prevention. The costs of sexual violence and abuse are enormous and involve immediate and long-term negative effects for the life of victims, families and the society. This project will investigate and provide critical evidence-based knowledge on the effectiveness of situational prevention measures.
Regulation of Indigenous Safety Strategies: Night Patrols & Policy. This project aims to identify the qualities that make Indigenous night patrols (NPs) unique, to inform and improve the capacities of agencies and regulatory authorities and indigenous communities to work together, leading to greater security, peace and safety. Crime and safety in Aboriginal communities remains a major concern. NPs, an Australian innovation developed by Aboriginal communities, have become key players in local cri ....Regulation of Indigenous Safety Strategies: Night Patrols & Policy. This project aims to identify the qualities that make Indigenous night patrols (NPs) unique, to inform and improve the capacities of agencies and regulatory authorities and indigenous communities to work together, leading to greater security, peace and safety. Crime and safety in Aboriginal communities remains a major concern. NPs, an Australian innovation developed by Aboriginal communities, have become key players in local crime reduction strategies, and carry the endorsement of both government and Aboriginal communities. However, they are operating in an environment of increased ‘top-down’ control and regulation. Does greater accountability to government weaken NP’s ‘cultural’ accountability to communities? This project explores the qualities that make NPs unique. This includes the prominent, and neglected, role of Indigenous women as patrollers and clients, who may lose out should NPs become like mainstream community safety mechanisms.Read moreRead less
Automatic real-time detection of infiltrated objects for security of airports and train stations. Infiltrated objects represent a very high security threat in critical areas such as airports and train stations. In order to neutralise such a threat, this project will develop new automatic technologies capable of detecting infiltrated objects in sensitive areas in real time, analysing the movements of their original carriers in the nearby areas, and raising attention accordingly. The technologies ....Automatic real-time detection of infiltrated objects for security of airports and train stations. Infiltrated objects represent a very high security threat in critical areas such as airports and train stations. In order to neutralise such a threat, this project will develop new automatic technologies capable of detecting infiltrated objects in sensitive areas in real time, analysing the movements of their original carriers in the nearby areas, and raising attention accordingly. The technologies will be based on the automatic analysis of camera videos made by computers without the need for assessing or storing the identities of common passers-by. The potential of application is huge extending beyond airports and train stations to any public areas.Read moreRead less
Defence Against Phishing Attacks. Australian businesses and citizens are losing millions of dollars in cybercrimes every year. Rural and regional businesses depend on the integrity of their Internet banking service, and yet, cybercriminals are working hard to defraud these users. This project aims to build a reliable defence against phishing attacks which rely on social engineering to steal online identities, using intelligence gathered from the brazen trade of credentials in the public domain.
Developing a Scalable Infrastructure for Embedded E-Security Incorporating Cryptography and Biometric Authentication. A fundamental flaw in existing embedded e-security technologies is their cryptography-plus-PIN-number infrastructure. This has generated security concerns that have proved a major obstacle to the growth of e-commerce, presently a relatively poor 2% of market share. We aim to design a new infrastructure that can solve this security problem by incorporating cryptography and biomet ....Developing a Scalable Infrastructure for Embedded E-Security Incorporating Cryptography and Biometric Authentication. A fundamental flaw in existing embedded e-security technologies is their cryptography-plus-PIN-number infrastructure. This has generated security concerns that have proved a major obstacle to the growth of e-commerce, presently a relatively poor 2% of market share. We aim to design a new infrastructure that can solve this security problem by incorporating cryptography and biometric authentication into a computing resource limited embedded e-security system. The outcomes of this project will be a set of new cryptosystems, new biometrics processing schemes and new onboard resource allocation schemes that will form the basis for the next generation of embedded systems.Read moreRead less
Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coord ....Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coordinated cyber-attacks that will potentially lead to catastrophic cascaded failures; and develop new solutions in detecting the false data-injection attacks that are conventionally considered as unobservable. This project will provide the benefit of enhancing our national critical infrastructure's security.Read moreRead less
Superannuation as Inheritance: Law, Practice and Reform. Given that Australian retirees are leaving behind billions of superannuation assets for inheritance, this project aims to obtain accurate real world findings about how superfunds distribute superannuation inheritances in practice. Current law has not kept pace with reality, largely leaving superfund trustees to decide how to bequest their deceased members’ excess superannuation. Australian families are at the mercy of superfunds. The expec ....Superannuation as Inheritance: Law, Practice and Reform. Given that Australian retirees are leaving behind billions of superannuation assets for inheritance, this project aims to obtain accurate real world findings about how superfunds distribute superannuation inheritances in practice. Current law has not kept pace with reality, largely leaving superfund trustees to decide how to bequest their deceased members’ excess superannuation. Australian families are at the mercy of superfunds. The expected outcomes of this project include evidence-based proposals to reform industry practice and the law. These reforms will promote respect for Australians’ testamentary wishes, safeguard against abuse, and advance societal interests in philanthropy, wealth equality and fiscal responsibility.Read moreRead less
Securing Knowledge Processes in Organisations. This project will develop a methodology for identifying and comparing security risks associated with knowledge-intensive processes in organizations. The project addresses a significant area that has historically fallen between two research domains: organisational knowledge processes and systems, and critical information infrastructure protection. The project will establish a unified framework to balance the sharing and protection of information and ....Securing Knowledge Processes in Organisations. This project will develop a methodology for identifying and comparing security risks associated with knowledge-intensive processes in organizations. The project addresses a significant area that has historically fallen between two research domains: organisational knowledge processes and systems, and critical information infrastructure protection. The project will establish a unified framework to balance the sharing and protection of information and organizational knowledge. Outcomes include a framework for modelling knowledge-intensive processes to assess their security vulnerability, an associated methodology of creating security risk profiles of knowledge intensive processes and the validation of the methodology in 3 to 6 organizations.Read moreRead less
Understanding recidivism and repeat incarceration among young male offenders: a biographical and longitudinal approach. The research focuses on the group of offenders who, as a cohort, annually commit the most crime within Australia. The production of longitudinal qualitative data about individual experiences of secure care, release, and imprisonment, will provide a foundation for empirically driven policies and debates in the area of youth crime and incarceration for each state and territory. A ....Understanding recidivism and repeat incarceration among young male offenders: a biographical and longitudinal approach. The research focuses on the group of offenders who, as a cohort, annually commit the most crime within Australia. The production of longitudinal qualitative data about individual experiences of secure care, release, and imprisonment, will provide a foundation for empirically driven policies and debates in the area of youth crime and incarceration for each state and territory. Accordingly, the community will benefit through the generation of new possibilities for intervening in cycles of persistent offending and repeat custodial sentences. This has major social, cultural and economic implications. Read moreRead less