Tracing real Internet attackers through information correlation. If this research accomplishes successfully, it will be a big step forward on tracing Internet attackers in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crime and terrorism. It will also greatly reduce the damage caused by Internet crime and terrorism. The prototype of the distributed information correlation tracing system can possibly be patented or even ....Tracing real Internet attackers through information correlation. If this research accomplishes successfully, it will be a big step forward on tracing Internet attackers in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crime and terrorism. It will also greatly reduce the damage caused by Internet crime and terrorism. The prototype of the distributed information correlation tracing system can possibly be patented or even be commercialised. The capability of a nation to trace the real source of any attacks on its information infrastructure is central to the control of such attacks and hence to a nation's long-term survival and prosperity.Read moreRead less
Modelling and defence against malware propagation. As the internet has become vital to our day-to-day working and living, we are witnessing a remarkable upsurge in the incidents of malicious software or malware on it. This project aims to develop key technologies that can precisely model the malware propagation on the internet. The technologies will help develop effective defence against malware propagation at an early stage, with limited defence resources, so as to minimise the damage and provi ....Modelling and defence against malware propagation. As the internet has become vital to our day-to-day working and living, we are witnessing a remarkable upsurge in the incidents of malicious software or malware on it. This project aims to develop key technologies that can precisely model the malware propagation on the internet. The technologies will help develop effective defence against malware propagation at an early stage, with limited defence resources, so as to minimise the damage and provide a capability to identify and control malware spreaders. This project is significant as it can secure the internet that is essential to the daily work of Australian people, thus addresses a fundamental problem in safeguarding Australia by protecting our critical infrastructure.Read moreRead less
Classifying Internet traffic for security applications. As the internet traffic data exponentially increases every year, traffic classification has become a fundamental approach to the security of the Internet. This project aims to develop a set of novel techniques for internet traffic classification, which is fundamentally important to defend against the serious cyber-attacks and effectively minimise the damages. This project is significant as it can help to improve cyber security, which is ess ....Classifying Internet traffic for security applications. As the internet traffic data exponentially increases every year, traffic classification has become a fundamental approach to the security of the Internet. This project aims to develop a set of novel techniques for internet traffic classification, which is fundamentally important to defend against the serious cyber-attacks and effectively minimise the damages. This project is significant as it can help to improve cyber security, which is essential for the work and daily lives of the Australian people. Furthermore, the proposed models and techniques will be important for enhancing the protection of Australian critical infrastructures against malicious cyber-attacks.Read moreRead less
Organisational Motivation as a Predictor of Benefits from the Adoption of Information Technology. IOS are becoming increasingly important for organisations to remain competitive in a global marketplace. By using organisational motivations to better understand how to design and structure the processes for IOS implementation and set more realistic expectation, Australian organisations will be able to develop more effective, evidence-based methods for IOS implementation. The theory being tested is ....Organisational Motivation as a Predictor of Benefits from the Adoption of Information Technology. IOS are becoming increasingly important for organisations to remain competitive in a global marketplace. By using organisational motivations to better understand how to design and structure the processes for IOS implementation and set more realistic expectation, Australian organisations will be able to develop more effective, evidence-based methods for IOS implementation. The theory being tested is an original contribution in a growing area of information technology research. The data and rigorously tested research protocols developed will enhance Australia'a research standing, contribute to university teaching and researcher training, and improve the effectiveness and efficiency of the Australian information technology industry. Read moreRead less
Adoption of electronic commerce-enabled supply chain management: a trans-national comparison study. The framework developed will allow practitioners to identify an appropriate strategy to promote the adoption of EC-enabled SCM in developing countries. By including Indonesia and China as two of Australia's large trading partners in this study, the relationships can be further enhanced, leading to an increase in Australia's export market and improvement in national productivity and growth. Through ....Adoption of electronic commerce-enabled supply chain management: a trans-national comparison study. The framework developed will allow practitioners to identify an appropriate strategy to promote the adoption of EC-enabled SCM in developing countries. By including Indonesia and China as two of Australia's large trading partners in this study, the relationships can be further enhanced, leading to an increase in Australia's export market and improvement in national productivity and growth. Through wider adoption of EC-enabled SCM by Australia's trading partners, Australia can trade with them more efficiently. The empirical data and the research instruments developed will also enhance Australia's research standing and contribute to university teaching and research training. Read moreRead less
Privacy-Preserving Remote Access to Health Information Infrastructure in Ubiquitous Computing Environments. The project's benefits can be summarised as follows. (a) The project will provide new solutions that enable remote access to health-care data in a secure and privacy-preserving manner. (b) This will improve health care services in northern metropolitan Melbourne, and provide shorter medical response time, which is particularly important in emergency scenarios. (c) It will exemplify advance ....Privacy-Preserving Remote Access to Health Information Infrastructure in Ubiquitous Computing Environments. The project's benefits can be summarised as follows. (a) The project will provide new solutions that enable remote access to health-care data in a secure and privacy-preserving manner. (b) This will improve health care services in northern metropolitan Melbourne, and provide shorter medical response time, which is particularly important in emergency scenarios. (c) It will exemplify advanced IT support for health care, which can be utilised by other providers. (d) The project will make a direct link between IT research and its industrial application. (e) The project will also give the opportunity to a postdoctoral researcher and PhD students to perform leading edge research on privacy protection of information in an industrial environment.Read moreRead less
Testing the Big Bets Theory of strategic IT decision making. This project will test a new theory of strategic IT decision making called the Big-Bets theory. If confirmed, senior decision makers will have grounds for requesting more evidence-based decision making for major IT projects such as the Australian Government's IT outsourcing initiative, Telstra's Siebel-based CRM, and Victoria's Myki.
A Model for IT Security Outsourcing of Critical Services. IT security outsourcing is the establishment of a contractual relationship with an outside vendor to assume responsibility for one or more security functions. The decision-making process associated with outsourcing security is complex. To improve the effectiveness of the decision-making process a conceptual model that integrates security benefits, costs and their respective performance measures will be developed. This model will support m ....A Model for IT Security Outsourcing of Critical Services. IT security outsourcing is the establishment of a contractual relationship with an outside vendor to assume responsibility for one or more security functions. The decision-making process associated with outsourcing security is complex. To improve the effectiveness of the decision-making process a conceptual model that integrates security benefits, costs and their respective performance measures will be developed. This model will support management in their aim of overseeing IT security effectively. The research will make a valuable contribution towards determining the impact of IT security outsourcing within Australia.Read moreRead less
Special Research Initiatives - Grant ID: SR0354729
Funder
Australian Research Council
Funding Amount
$10,000.00
Summary
Smart Use of Information Technologies (SUITs). The SUITs network will develop critical mass in world-class, leading-edge research into the smart use of information and communication technology (ICT) through integration of research within the dispersed Australian ICT research community and through facilitating international linkages. The network will undertake research applicable in key sectors including the health, education, service, knowledge and media industries. The aim is to establish a h ....Smart Use of Information Technologies (SUITs). The SUITs network will develop critical mass in world-class, leading-edge research into the smart use of information and communication technology (ICT) through integration of research within the dispersed Australian ICT research community and through facilitating international linkages. The network will undertake research applicable in key sectors including the health, education, service, knowledge and media industries. The aim is to establish a higher order of coordination and collaboration in research into ICT applications.
The feasibility study proposed will engage key stakeholders, refine research goals and investigate linkage mechanisms to improve Australia's ICT research and its contribution to economic and social well-being.
Read moreRead less
Development of methods to address internet crime. If this research accomplishes successfully, it will be a big step forward in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crimes more effectively and efficiently. It will also limit the damage caused by Internet crimes quickly. For example, if we can quickly identify the origins of a fast spreading virus, we will be able to prevent its propagation as fast as possible. I ....Development of methods to address internet crime. If this research accomplishes successfully, it will be a big step forward in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crimes more effectively and efficiently. It will also limit the damage caused by Internet crimes quickly. For example, if we can quickly identify the origins of a fast spreading virus, we will be able to prevent its propagation as fast as possible. If we can quickly identify and block a harmful phishing site, then less innocent people will be deceived into disclosing their credit card numbers, bank account information, passwords or other sensitive information.Read moreRead less