Organisational Motivation as a Predictor of Benefits from the Adoption of Information Technology. IOS are becoming increasingly important for organisations to remain competitive in a global marketplace. By using organisational motivations to better understand how to design and structure the processes for IOS implementation and set more realistic expectation, Australian organisations will be able to develop more effective, evidence-based methods for IOS implementation. The theory being tested is ....Organisational Motivation as a Predictor of Benefits from the Adoption of Information Technology. IOS are becoming increasingly important for organisations to remain competitive in a global marketplace. By using organisational motivations to better understand how to design and structure the processes for IOS implementation and set more realistic expectation, Australian organisations will be able to develop more effective, evidence-based methods for IOS implementation. The theory being tested is an original contribution in a growing area of information technology research. The data and rigorously tested research protocols developed will enhance Australia'a research standing, contribute to university teaching and researcher training, and improve the effectiveness and efficiency of the Australian information technology industry. Read moreRead less
A Model for IT Security Outsourcing of Critical Services. IT security outsourcing is the establishment of a contractual relationship with an outside vendor to assume responsibility for one or more security functions. The decision-making process associated with outsourcing security is complex. To improve the effectiveness of the decision-making process a conceptual model that integrates security benefits, costs and their respective performance measures will be developed. This model will support m ....A Model for IT Security Outsourcing of Critical Services. IT security outsourcing is the establishment of a contractual relationship with an outside vendor to assume responsibility for one or more security functions. The decision-making process associated with outsourcing security is complex. To improve the effectiveness of the decision-making process a conceptual model that integrates security benefits, costs and their respective performance measures will be developed. This model will support management in their aim of overseeing IT security effectively. The research will make a valuable contribution towards determining the impact of IT security outsourcing within Australia.Read moreRead less
Information Health Monitor: An Instrument to Assess the Product and Service Quality of Information. Information quality problems are widespread in practice and have significant economic impacts. This project will refine and extend a rigorous theoretical framework for understanding information quality and develop and validate the Information Health Monitor, an instrument for assessing the quality of information within organisations. Existing approaches to information quality are mostly not rigoro ....Information Health Monitor: An Instrument to Assess the Product and Service Quality of Information. Information quality problems are widespread in practice and have significant economic impacts. This project will refine and extend a rigorous theoretical framework for understanding information quality and develop and validate the Information Health Monitor, an instrument for assessing the quality of information within organisations. Existing approaches to information quality are mostly not rigorously defined and view information as a product. This work is significant and innovative as it is soundly based in existing theory, rigorously defined and views information as both a product and service. The instrument will enable organisations to better identify and address their information quality problems.Read moreRead less
Development of methods to address internet crime. If this research accomplishes successfully, it will be a big step forward in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crimes more effectively and efficiently. It will also limit the damage caused by Internet crimes quickly. For example, if we can quickly identify the origins of a fast spreading virus, we will be able to prevent its propagation as fast as possible. I ....Development of methods to address internet crime. If this research accomplishes successfully, it will be a big step forward in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crimes more effectively and efficiently. It will also limit the damage caused by Internet crimes quickly. For example, if we can quickly identify the origins of a fast spreading virus, we will be able to prevent its propagation as fast as possible. If we can quickly identify and block a harmful phishing site, then less innocent people will be deceived into disclosing their credit card numbers, bank account information, passwords or other sensitive information.Read moreRead less
Adoption of electronic commerce-enabled supply chain management: a trans-national comparison study. The framework developed will allow practitioners to identify an appropriate strategy to promote the adoption of EC-enabled SCM in developing countries. By including Indonesia and China as two of Australia's large trading partners in this study, the relationships can be further enhanced, leading to an increase in Australia's export market and improvement in national productivity and growth. Through ....Adoption of electronic commerce-enabled supply chain management: a trans-national comparison study. The framework developed will allow practitioners to identify an appropriate strategy to promote the adoption of EC-enabled SCM in developing countries. By including Indonesia and China as two of Australia's large trading partners in this study, the relationships can be further enhanced, leading to an increase in Australia's export market and improvement in national productivity and growth. Through wider adoption of EC-enabled SCM by Australia's trading partners, Australia can trade with them more efficiently. The empirical data and the research instruments developed will also enhance Australia's research standing and contribute to university teaching and research training. Read moreRead less
EPOS: Efficient Processing of Moving Object Streams in Data Management Systems. Advanced moving object data management systems are becoming a core technology for a large variety of applications such as traffic management and inventory tracking. These applications play a ubiquitous, critical role in our daily lives. In the same way as the first prototype of a relational database paved the way for successive relational database management systems, we envision that EPOS will form the foundation for ....EPOS: Efficient Processing of Moving Object Streams in Data Management Systems. Advanced moving object data management systems are becoming a core technology for a large variety of applications such as traffic management and inventory tracking. These applications play a ubiquitous, critical role in our daily lives. In the same way as the first prototype of a relational database paved the way for successive relational database management systems, we envision that EPOS will form the foundation for a new generation of moving object databases. EPOS is designed to process a large number of concurrently running continuous monitoring queries on a massive set of moving objects with frequent updates. Read moreRead less
Comparative analysis and exploration of collections of data clusterings. Data clustering is an important technique for extracting knowledge from complex datasets. It is widely used by Australian science, government and industry, in areas such as genomics, proteomics, crime analysis, marketing and customer profiling. This project will develop new techniques that will allow users to explore and analyse collections of data clusterings. This will improve the current generation of clustering softw ....Comparative analysis and exploration of collections of data clusterings. Data clustering is an important technique for extracting knowledge from complex datasets. It is widely used by Australian science, government and industry, in areas such as genomics, proteomics, crime analysis, marketing and customer profiling. This project will develop new techniques that will allow users to explore and analyse collections of data clusterings. This will improve the current generation of clustering software and allow deeper investigation of challenging and complex data.
Read moreRead less
Coordinated and Cooperative Load Sharing between Content Delivery Networks. Popular web services can experience severe downtimes as the result of heavy traffic. Enabling coordinated and cooperative content delivery between existing Content Delivery Networks (CDNs) will allow a CDN provider to rapidly 'scale-out' without investing in new infrastructure, to meet both flash crowds and anticipated increases in demand. Improved cost effectiveness, performance and locality for providers and end-users ....Coordinated and Cooperative Load Sharing between Content Delivery Networks. Popular web services can experience severe downtimes as the result of heavy traffic. Enabling coordinated and cooperative content delivery between existing Content Delivery Networks (CDNs) will allow a CDN provider to rapidly 'scale-out' without investing in new infrastructure, to meet both flash crowds and anticipated increases in demand. Improved cost effectiveness, performance and locality for providers and end-users can be achieved by leveraging existing infrastructure provided by other CDNs, creating economies of scale that were previously impossible. This is crucial for uses on the so-called edges of the internet (e.g. Australia) that depend on a small number of expensive data links to the major data centres in Europe and the USA.Read moreRead less
Tracing real Internet attackers through information correlation. If this research accomplishes successfully, it will be a big step forward on tracing Internet attackers in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crime and terrorism. It will also greatly reduce the damage caused by Internet crime and terrorism. The prototype of the distributed information correlation tracing system can possibly be patented or even ....Tracing real Internet attackers through information correlation. If this research accomplishes successfully, it will be a big step forward on tracing Internet attackers in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crime and terrorism. It will also greatly reduce the damage caused by Internet crime and terrorism. The prototype of the distributed information correlation tracing system can possibly be patented or even be commercialised. The capability of a nation to trace the real source of any attacks on its information infrastructure is central to the control of such attacks and hence to a nation's long-term survival and prosperity.Read moreRead less
Testing the Big Bets Theory of strategic IT decision making. This project will test a new theory of strategic IT decision making called the Big-Bets theory. If confirmed, senior decision makers will have grounds for requesting more evidence-based decision making for major IT projects such as the Australian Government's IT outsourcing initiative, Telstra's Siebel-based CRM, and Victoria's Myki.