Trusted business processes. This project aims to use conceptual design, process modelling and co-design approaches to create a structured approach for the management of trust. With a focus on business processes, it is intended to develop research- informed methods in order to (1) identify and specify trust concerns and opportunities, (2) model these within a common process modelling language and (3) propose patterns for how to mitigate trust concerns and how to benefit from opportunities. If suc ....Trusted business processes. This project aims to use conceptual design, process modelling and co-design approaches to create a structured approach for the management of trust. With a focus on business processes, it is intended to develop research- informed methods in order to (1) identify and specify trust concerns and opportunities, (2) model these within a common process modelling language and (3) propose patterns for how to mitigate trust concerns and how to benefit from opportunities. If successful, this would lead to an operational, and world first, detailed trust methodology for organisations in all sectors. As a result, Australian customers would engage with business processes with reduced trust concerns and experience increased integrity and benevolence.Read moreRead less
A theory of communicative practices within financial internet discussion site communities. This project aims to use online financial investment communities to identify factors that drive communication and influence knowledge co-creation, examine how systematic variations in these factors influence investor decision making, and develop a mid-range theory for explaining and predicting the influence of online communication patterns on individual decisions and market outcomes. By developing and vali ....A theory of communicative practices within financial internet discussion site communities. This project aims to use online financial investment communities to identify factors that drive communication and influence knowledge co-creation, examine how systematic variations in these factors influence investor decision making, and develop a mid-range theory for explaining and predicting the influence of online communication patterns on individual decisions and market outcomes. By developing and validating a new mid-range theory, initially in the financial investment context, this project will provide significant benefits, such as help to secure Australia’s place in a changing world through improved information flow.Read moreRead less
Digital nomadism: How IT enables new forms of working and organising. This project aims to gain a better understanding of digital nomadism. Digital nomads use IT platforms to work remotely over the Internet while perpetually travelling. The project will develop new knowledge by better understanding of how IT transforms work and enable digital nomadism, the motivations and values of workers and their clients/organisations engaged in digital nomadism and the implications and consequences of digita ....Digital nomadism: How IT enables new forms of working and organising. This project aims to gain a better understanding of digital nomadism. Digital nomads use IT platforms to work remotely over the Internet while perpetually travelling. The project will develop new knowledge by better understanding of how IT transforms work and enable digital nomadism, the motivations and values of workers and their clients/organisations engaged in digital nomadism and the implications and consequences of digital nomadism for workers and clients/organisations. The project is expected to have a significant impact on policy and public discourse by providing an in-depth explanation and understanding of digital nomadism based on rigorous research.Read moreRead less
Developing Adversary-Aware Classifiers for Android Malware Detection. Smartphones have become increasingly ubiquitous in people’s everyday life. However, it was reported that one in every five Android applications were actually malware, considering that Android has taken 88% market share of mobile phones. As an effective technique, machine learning has been widely adopted to detect Android malware. However, recent work suggests that deliberately-crafted malware makes machine learning ineffective ....Developing Adversary-Aware Classifiers for Android Malware Detection. Smartphones have become increasingly ubiquitous in people’s everyday life. However, it was reported that one in every five Android applications were actually malware, considering that Android has taken 88% market share of mobile phones. As an effective technique, machine learning has been widely adopted to detect Android malware. However, recent work suggests that deliberately-crafted malware makes machine learning ineffective. In this project, we propose to develop a series of new techniques, such as 1) Android contextual analysis, 2) wrapper-based hill climbing algorithm, and 3) ensemble learning, to solve this problem. The outcomes will help Australia gain cutting edge technologies in adversarial machine learning and mobile security.Read moreRead less
Unlocking benefits from digital investments. This project aims to address one of the most vexing questions in the management of information systems: how to unlock the value of digital investments. The project expects to develop new theory and evidence on how to achieve meaningful use of information systems at multiple levels of analysis. The project will especially benefit the health sector, and society, by helping health providers and vendors to maximise the value obtained from substantial inve ....Unlocking benefits from digital investments. This project aims to address one of the most vexing questions in the management of information systems: how to unlock the value of digital investments. The project expects to develop new theory and evidence on how to achieve meaningful use of information systems at multiple levels of analysis. The project will especially benefit the health sector, and society, by helping health providers and vendors to maximise the value obtained from substantial investment in digital technologies, and by developing evidence-based policies to optimise digital service delivery.Read moreRead less
Diagnosis and prediction of business process deviances. This project aims to develop an innovative approach based on process execution semantics, to analyse event data logged by IT systems in order to diagnose and predict business process deviance. Anticipated outcomes include novel business intelligence algorithms producing deviance diagnostics, predictions and recommendations and exposing results via interactive visual analytics. The outcomes are expected to aid process workers in steering bus ....Diagnosis and prediction of business process deviances. This project aims to develop an innovative approach based on process execution semantics, to analyse event data logged by IT systems in order to diagnose and predict business process deviance. Anticipated outcomes include novel business intelligence algorithms producing deviance diagnostics, predictions and recommendations and exposing results via interactive visual analytics. The outcomes are expected to aid process workers in steering business operations towards consistent and compliant outcomes and higher performance, and assist analysts and auditors to explain deviant operations. This should significantly benefit industries such as healthcare, insurance, retail and the government where compliance and integrity management are imperative.Read moreRead less
An advanced framework for multi-agent strategic interactions. Communication security protocols and computer algorithms are expressible in terms of strategic interactions between competing agents, which can be analyzed in a game theory setting. This project will exploit the recent advances in extending this game theory framework to multidimensional spaces, thereby strengthening the theoretical foundations. This will provide new insights into the working of algorithms, potentially improving futur ....An advanced framework for multi-agent strategic interactions. Communication security protocols and computer algorithms are expressible in terms of strategic interactions between competing agents, which can be analyzed in a game theory setting. This project will exploit the recent advances in extending this game theory framework to multidimensional spaces, thereby strengthening the theoretical foundations. This will provide new insights into the working of algorithms, potentially improving future secure key distribution. Multi-agent interactions in higher dimensional spaces are considered intractable using traditional matrix methods and this project will build on our exciting new breakthrough showing that such interactions are tractable using geometric multivectors.Read moreRead less
Stream Data Classification in the Age of 5G Networks. This project aims to develop a novel stream data classification model to handle the challenges in the era of 5G networks, such as the scope of the stream data, the complexity of their relationship, the diversity of contained information and the incorrect readings of numerous sensors. The project addresses a significant knowledge gap by exploring and modelling the stronger correlation between data instances in the streams. The outcome is a sys ....Stream Data Classification in the Age of 5G Networks. This project aims to develop a novel stream data classification model to handle the challenges in the era of 5G networks, such as the scope of the stream data, the complexity of their relationship, the diversity of contained information and the incorrect readings of numerous sensors. The project addresses a significant knowledge gap by exploring and modelling the stronger correlation between data instances in the streams. The outcome is a system that is highly efficient, accurate and corrupted-data-tolerant classification solutions for individual stream data as well as multiple stream data. The expected benefits will be far-ranging and adaptable to many domains, such as smart home, medical and healthcare, transportation and manufacturing. Read moreRead less
Immersive Technologies for Rapid Metallic Tank Inspection and Repairs. Metal tank silos house some of the most dangerous chemicals, which erode the internal structure of the tank over time. It is critical to check the integrity of the tank to prevent disasters from occurring. NDE solutions uses a rapid motion scanner (RMS) to scan the interior surface of the container while it is still full of its storage material. It is the aim of this project to use Augmented Reality, to overlay the scan provi ....Immersive Technologies for Rapid Metallic Tank Inspection and Repairs. Metal tank silos house some of the most dangerous chemicals, which erode the internal structure of the tank over time. It is critical to check the integrity of the tank to prevent disasters from occurring. NDE solutions uses a rapid motion scanner (RMS) to scan the interior surface of the container while it is still full of its storage material. It is the aim of this project to use Augmented Reality, to overlay the scan provided by the RMS, onto the worker's view of the tank, control the robot via. hand gestures, and facilitate remote training/guidance. The result will allow for inspection workers to quickly and accurately the location of critical failures, without performing the hazardous procedures of internal tank inspection. Read moreRead less
Examining multi-level Information Technology (IT) project alignment in government services: the case of contracted employment services. Improved Information Technology (IT) alignment is essential for the delivery of government services within a complex public-private, inter-organisational environment. This project will investigate the extent to which well-aligned IT support systems contribute positively to the efficient and effective delivery of contracted employment services.