ORCID Profile
0000-0002-3289-6599
Current Organisations
Commonwealth Scientific and Industrial Research Organisation
,
CSIRO
Does something not look right? The information on this page has been harvested from data sources that may not be up to date. We continue to work with information providers to improve coverage and quality. To report an issue, use the Feedback Form.
In Research Link Australia (RLA), "Research Topics" refer to ANZSRC FOR and SEO codes. These topics are either sourced from ANZSRC FOR and SEO codes listed in researchers' related grants or generated by a large language model (LLM) based on their publications.
Pattern Recognition and Data Mining | Computer System Security | Data Format | Data Encryption | Computer Software | Artificial Intelligence and Image Processing
Application Tools and System Utilities | Computer Software and Services not elsewhere classified | Electronic Information Storage and Retrieval Services |
Publisher: IEEE
Date: 11-2011
Publisher: Association for Computing Machinery (ACM)
Date: 30-04-2019
DOI: 10.1145/3305268
Abstract: Organizations use erse types of security solutions to prevent cyber-attacks. Multiple vendors provide security solutions developed using heterogeneous technologies and paradigms. Hence, it is a challenging rather impossible to easily make security solutions to work an integrated fashion. Security orchestration aims at smoothly integrating multivendor security tools that can effectively and efficiently interoperate to support security staff of a Security Operation Centre (SOC). Given the increasing role and importance of security orchestration, there has been an increasing amount of literature on different aspects of security orchestration solutions. However, there has been no effort to systematically review and analyze the reported solutions. We report a Multivocal Literature Review that has systematically selected and reviewed both academic and grey (blogs, web pages, white papers) literature on different aspects of security orchestration published from January 2007 until July 2017. The review has enabled us to provide a working definition of security orchestration and classify the main functionalities of security orchestration into three main areas—unification, orchestration, and automation. We have also identified the core components of a security orchestration platform and categorized the drivers of security orchestration based on technical and socio-technical aspects. We also provide a taxonomy of security orchestration based on the execution environment, automation strategy, deployment type, mode of task and resource type. This review has helped us to reveal several areas of further research and development in security orchestration.
Publisher: IEEE
Date: 11-2018
Publisher: IEEE
Date: 2012
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: IEEE
Date: 05-2021
Publisher: IEEE
Date: 05-2015
Publisher: Elsevier BV
Date: 09-2021
Publisher: Springer Science and Business Media LLC
Date: 06-10-2017
Publisher: IEEE
Date: 07-2010
DOI: 10.1109/SCC.2010.42
Publisher: Springer International Publishing
Date: 2017
Publisher: JMIR Publications Inc.
Date: 27-05-2016
Publisher: Elsevier BV
Date: 08-2013
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: ACM
Date: 30-04-2023
Publisher: IEEE
Date: 10-2017
Publisher: Springer Berlin Heidelberg
Date: 2013
Publisher: MDPI AG
Date: 27-04-2023
DOI: 10.3390/S23094346
Abstract: The use of artificial intelligence (AI) to detect phishing emails is primarily dependent on large-scale centralized datasets, which has opened it up to a myriad of privacy, trust, and legal issues. Moreover, organizations have been loath to share emails, given the risk of leaking commercially sensitive information. Consequently, it has been difficult to obtain sufficient emails to train a global AI model efficiently. Accordingly, privacy-preserving distributed and collaborative machine learning, particularly federated learning (FL), is a desideratum. As it is already prevalent in the healthcare sector, questions remain regarding the effectiveness and efficacy of FL-based phishing detection within the context of multi-organization collaborations. To the best of our knowledge, the work herein was the first to investigate the use of FL in phishing email detection. This study focused on building upon a deep neural network model, particularly recurrent convolutional neural network (RNN) and bidirectional encoder representations from transformers (BERT), for phishing email detection. We analyzed the FL-entangled learning performance in various settings, including (i) a balanced and asymmetrical data distribution among organizations and (ii) scalability. Our results corroborated the comparable performance statistics of FL in phishing email detection to centralized learning for balanced datasets and low organizational counts. Moreover, we observed a variation in performance when increasing the organizational counts. For a fixed total email dataset, the global RNN-based model had a 1.8% accuracy decrease when the organizational counts were increased from 2 to 10. In contrast, BERT accuracy increased by 0.6% when increasing organizational counts from 2 to 5. However, if we increased the overall email dataset by introducing new organizations in the FL framework, the organizational level performance improved by achieving a faster convergence speed. In addition, FL suffered in its overall global model performance due to highly unstable outputs if the email dataset distribution was highly asymmetric.
Publisher: IEEE
Date: 08-2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 08-2022
Publisher: Springer International Publishing
Date: 2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2022
Publisher: IGI Global
Date: 04-2011
Abstract: The Web enters a new era where contents are to take the back seat and services will take the driver seat to form a service-oriented Web. This paper presents a service-oriented user interface design for the next generation Web. The design leverages the advances of semantic Web and service composition technologies to provide an intelligent and generic user interface to query, compose and execute Web services for a variety of user tasks. First, a simple cost model is developed for estimating the development and learning overheads of Web service interfaces for service-oriented applications as the motivation of this work. Then, the authors present the design of the service-oriented browser and discuss the enabling technologies. A prototype system is developed using existing technologies and standards as a proof of concept.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 08-2015
Publisher: Springer International Publishing
Date: 2018
Publisher: IEEE
Date: 11-2016
DOI: 10.1109/CIC.2016.017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2022
Publisher: CSIRO
Date: 2012
Publisher: ACM
Date: 15-10-2018
Publisher: Elsevier BV
Date: 2019
Publisher: Springer Science and Business Media LLC
Date: 09-01-2020
Publisher: Oxford University Press (OUP)
Date: 07-07-2020
Abstract: Biometric information is unique to a human, so it would be desirable to use the biometric characteristic as the private key in a cryptographic system to protect data security and privacy. In this paper, we introduce a notion called two-factor decryption (TFD). Informally speaking, a TFD scheme is a variant of the public-key encryption (PKE) scheme. In a TFD scheme, messages are encrypted under public keys as that in a standard PKE scheme, but both private keys (i.e. the first factor) and biometric inputs (i.e. the second factor) are required to decrypt the ciphertexts and obtain the underlying plaintexts. We first describe a framework of TFD, and then define a formal security model for TFD. Thereafter, we present a generic construction on TFD based on the cryptographic primitives of linear sketch and functional encryption (FE) with certain properties and analyse its security. In addition, we give instantiations of TFD by applying concrete FE schemes into the generic construction and show their applications.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2022
Publisher: IEEE
Date: 12-2013
DOI: 10.1109/CSE.2013.163
Publisher: Springer International Publishing
Date: 2018
Publisher: Springer Science and Business Media LLC
Date: 25-09-2016
Publisher: IEEE
Date: 12-2016
Publisher: Springer Berlin Heidelberg
Date: 04-09-2013
Publisher: Elsevier BV
Date: 03-2018
Publisher: Springer Science and Business Media LLC
Date: 07-11-2021
Publisher: Springer Science and Business Media LLC
Date: 18-08-2018
Publisher: Springer Berlin Heidelberg
Date: 04-09-2013
Publisher: IEEE
Date: 06-2017
Publisher: Springer Berlin Heidelberg
Date: 2013
Publisher: Springer International Publishing
Date: 2015
Publisher: ACM
Date: 30-04-2023
Publisher: Association for Computing Machinery (ACM)
Date: 31-08-2019
DOI: 10.1145/3361071
Abstract: In iduals, organizations, and government agencies are increasingly relying on Internet-enabled collaboration among distributed teams of humans, computer applications, and autonomous entities such as robots to develop products and deliver services. Technology trends in areas such as networking, data analytics, and distributed systems have significantly shifted the landscape of Internet-based collaborative tools and services. This particular special issue contains articles describing novel and innovative Internet-based collaborative technologies that leverage emerging technologies and enable seamless collaboration.
Publisher: IEEE
Date: 12-2022
Publisher: Springer International Publishing
Date: 2015
Publisher: ACM
Date: 02-07-2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 08-2020
Publisher: IEEE
Date: 11-2016
DOI: 10.1109/CIC.2016.043
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2020
Publisher: IEEE
Date: 11-2012
DOI: 10.1109/CGC.2012.43
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 05-2016
DOI: 10.1109/MIC.2016.67
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: Springer Science and Business Media LLC
Date: 13-07-2022
DOI: 10.1007/S10207-022-00597-4
Abstract: The bulk of Internet interactions is highly redundant and also security sensitive. To reduce communication bandwidth and provide a desired level of security, a data stream is first compressed to squeeze out redundant bits and then encrypted using authenticated encryption. This generic solution is very flexible and works well for any pair of (compression, encryption) algorithms. Its downside, however, is the fact that the two algorithms are designed independently. One would expect that designing a single algorithm that compresses and encrypts (called compcrypt) should produce benefits in terms of efficiency and security. The work investigates how to design a compcrypt algorithm using the ANS entropy coding. First, we examine basic properties of ANS and show that a plain ANS with a hidden encoding table can be broken by statistical attacks. Next, we study ANS behavior when its states are chosen at random. Our compcrypt algorithm is built using ANS with randomized state jumps and a sponge MonkeyDuplex encryption. Its security and efficiency are discussed. The design provides 128-bit security for both confidentiality and integrity/authentication. Our implementation experiments show that our compcrypt algorithm processes symbols with a rate up to 269 MB/s (with a slight loss of compression rate) 178 MB/s.
Publisher: Elsevier BV
Date: 05-2019
Publisher: ACM
Date: 02-04-2017
Publisher: Springer Berlin Heidelberg
Date: 2013
Publisher: Springer International Publishing
Date: 2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 05-2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2015
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2018
Publisher: ACM
Date: 26-11-2012
Publisher: IEEE
Date: 12-2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2022
Publisher: ACM
Date: 30-04-2023
Publisher: IEEE
Date: 09-2013
DOI: 10.1109/CGC.2013.24
Publisher: IEEE
Date: 07-2011
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 12-2022
Publisher: Springer International Publishing
Date: 2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 15-07-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 10-02-2022
DOI: 10.36227/TECHRXIV.19127090.V1
Abstract: This is the preprint version of ZTA operationalization approaches. We discuss three distinct categories: i) centralized operationalization of ZTA (cZTA), ii) federated operationalization of ZTA (fZTA), and iii) decentralized operationalization of ZTA (dZTA).
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 10-2022
Publisher: Wiley
Date: 05-09-2019
DOI: 10.1002/CPE.4706
Publisher: Association for Computing Machinery (ACM)
Date: 24-08-2021
DOI: 10.1145/3464960
Abstract: A blueprint for leveraging the tremendous opportunities the IoT has to offer.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: Wiley
Date: 06-2022
DOI: 10.1111/APPS.12407
Abstract: The corridors of history are filled with ex les of leaders whose enduring legacies are typified by self‐sacrifice for the greater good during difficult times. Over the last two decades, scholarly interest in self‐sacrificial leader behaviours has increased. In the present article, we conduct a systematic review of prior empirical findings to highlight what we know about leader self‐sacrifice and galvanise future research to examine its implications for the workplace. To achieve this purpose, our review examines how leader self‐sacrifice has been defined and measured in previous work and develops an integrative framework that synthesises empirical work on its antecedents, outcomes, boundary conditions and underlying mechanisms. Based on our review, we articulate a comprehensive research agenda that identifies opportunities for theoretical, empirical and methodological advances in the field.
Publisher: Elsevier BV
Date: 09-2013
Publisher: Elsevier BV
Date: 08-2014
Publisher: Elsevier BV
Date: 08-2014
Publisher: IEEE
Date: 06-2020
Publisher: Springer International Publishing
Date: 2015
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2021
Publisher: ACM
Date: 09-12-2019
Publisher: IEEE
Date: 12-2013
Publisher: IEEE
Date: 11-2016
DOI: 10.1109/CIC.2016.059
Publisher: Springer International Publishing
Date: 2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2023
Publisher: Springer Science and Business Media LLC
Date: 12-03-2015
Publisher: IEEE
Date: 06-2013
Publisher: Springer Singapore
Date: 2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: IEEE
Date: 24-09-2021
Publisher: IEEE
Date: 09-2020
Publisher: Springer International Publishing
Date: 2020
Publisher: Springer International Publishing
Date: 2019
Publisher: IEEE
Date: 06-2015
Publisher: International Committee on Computational Linguistics
Date: 2020
Publisher: CSIRO
Date: 2018
Publisher: IEEE
Date: 12-2013
DOI: 10.1109/CSE.2013.125
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 08-2020
Publisher: IEEE
Date: 06-2015
Publisher: IEEE
Date: 06-2015
Publisher: Association for Computational Linguistics
Date: 2019
DOI: 10.18653/V1/P19-1460
Publisher: IEEE
Date: 11-2011
Publisher: IEEE
Date: 09-2011
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2020
Publisher: Ubiquity Press, Ltd.
Date: 16-12-2016
DOI: 10.5334/IJIC.2654
Publisher: IEEE
Date: 06-2012
DOI: 10.1109/SCC.2012.37
Publisher: Oxford University Press (OUP)
Date: 12-08-2023
Abstract: Named Data Networking (NDN) is an emerging network architecture. An important characteristic of NDN is its in-network cache, which enables Data packets to be available from multiple locations on the Internet. Hence the enforcement of access control mechanisms becomes even more critical in the NDN. This paper proposes a novel access control scheme referred to as Role-Based Encryption for NDN (NDN-RBE), which uses a broadcast encryption mechanism to achieve secure data access control. Our scheme uses the role inheritance property of the traditional Role-Based Access Control (RBAC) model to achieve efficient data access control over hierarchical content. This makes our scheme particularly suitable for large-scale real-world content-centric services like Netflix. Our scheme also supports additional design features such as anonymous signature-based authentication, batch signature verification and two types of privilege revocations. In addition, our formal security analysis demonstrates that our scheme is provably secure against Chosen Plaintext Attacks. Our performance and functionality comparison show that our scheme outperforms other notable existing works in terms of security, functionality, computation, communication and storage overhead. Furthermore, our experimental results show an improvement in content delivery time of the order of 15 percent compared with the other closely related works.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 05-2020
Publisher: Internet Society
Date: 2021
Publisher: ACM
Date: 17-10-2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2017
Publisher: IGI Global
Date: 2011
DOI: 10.4018/IJSSOE
Publisher: ACM
Date: 05-12-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 05-2016
DOI: 10.1109/MCC.2016.63
Publisher: Springer International Publishing
Date: 2020
Publisher: Elsevier BV
Date: 06-2014
Publisher: Springer Berlin Heidelberg
Date: 2012
Publisher: IEEE
Date: 11-2011
Publisher: Springer International Publishing
Date: 2015
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2022
Publisher: Springer International Publishing
Date: 2014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2012
DOI: 10.1109/MS.2012.10
Publisher: IEEE
Date: 08-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2023
Publisher: Elsevier BV
Date: 02-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2023
Publisher: ACM
Date: 23-02-2013
Publisher: IEEE
Date: 06-2012
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2023
Publisher: ACM
Date: 15-11-2019
Publisher: IEEE
Date: 12-2014
Publisher: IEEE
Date: 12-2018
Publisher: IEEE
Date: 10-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 02-2015
Publisher: Wiley
Date: 27-08-2019
DOI: 10.1002/CPE.4868
Publisher: Informa UK Limited
Date: 14-10-2014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2019
Publisher: IEEE
Date: 09-2021
Publisher: Association for Computing Machinery (ACM)
Date: 28-02-2023
DOI: 10.1145/3545570
Abstract: Multi-turn response selection is a key issue in retrieval-based chatbots and has attracted considerable attention in the NLP (Natural Language processing) field. So far, researchers have developed many solutions that can select appropriate responses for multi-turn conversations. However, these works are still suffering from the semantic mismatch problem when responses and context share similar words with different meanings. In this article, we propose a novel chatbot model based on Semantic Awareness Matching, called SAM. SAM can capture both similarity and semantic features in the context by a two-layer matching network. Appropriate responses are selected according to the matching probability made through the aggregation of the two feature types. In the evaluation, we pick 4 widely used datasets and compare SAM’s performance to that of 12 other models. Experiment results show that SAM achieves substantial improvements, with up to 1.5% R 10 @1 on Ubuntu Dialogue Corpus V2, 0.5% R 10 @1 on Douban Conversation Corpus, and 1.3% R 10 @1 on E-commerce Corpus.
Publisher: ICST
Date: 2013
Publisher: ICST
Date: 2013
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 10-02-2022
DOI: 10.36227/TECHRXIV.19127090
Abstract: This is the preprint version of ZTA operationalization approaches. We discuss three distinct categories: i) centralized operationalization of ZTA (cZTA), ii) federated operationalization of ZTA (fZTA), and iii) decentralized operationalization of ZTA (dZTA).
Publisher: Elsevier BV
Date: 07-2013
Publisher: IEEE
Date: 2011
Publisher: IEEE
Date: 02-2020
Publisher: Elsevier BV
Date: 11-2019
Publisher: IEEE
Date: 10-2020
Publisher: Wiley
Date: 10-11-2014
DOI: 10.1002/CPE.3421
Publisher: SCITEPRESS - Science and and Technology Publications
Date: 2016
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2023
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 15-07-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2021
Publisher: Springer International Publishing
Date: 2018
Publisher: Frontiers Media SA
Date: 10-03-2021
DOI: 10.3389/FDATA.2021.583723
Abstract: The effectiveness of cyber security measures are often questioned in the wake of hard hitting security events. Despite much work being done in the field of cyber security, most of the focus seems to be concentrated on system usage. In this paper, we survey advancements made in the development and design of the human centric cyber security domain. We explore the increasing complexity of cyber security with a wider perspective, defining user, usage and usability (3U’s) as three essential components for cyber security consideration, and classify developmental efforts through existing research works based on the human centric security design, implementation and deployment of these components. Particularly, the focus is on studies that specifically illustrate the shift in paradigm from functional and usage centred cyber security, to user centred cyber security by considering the human aspects of users. The aim of this survey is to provide both users and system designers with insights into the workings and applications of human centric cyber security.
Publisher: Springer Berlin Heidelberg
Date: 2010
Publisher: Elsevier BV
Date: 12-2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 12-2019
Publisher: Frontiers Media SA
Date: 17-02-2022
Publisher: IEEE
Date: 09-2021
Publisher: Elsevier BV
Date: 2024
Publisher: Elsevier BV
Date: 10-2018
Publisher: Association for Computing Machinery (ACM)
Date: 19-12-2016
DOI: 10.1145/2937755
Abstract: Applications in risk-critical domains such as emergency management and industrial control systems need near-real-time stream data processing in large-scale sensing networks. The key problem is how to ensure online end-to-end security (e.g., confidentiality, integrity, and authenticity) of data streams for such applications. We refer to this as an online security verification problem. Existing data security solutions cannot be applied in such applications as they cannot deal with data streams with high-volume and high-velocity data in real time. They introduce a significant buffering delay during security verification, resulting in a requirement for a large buffer size for the stream processing server. To address this problem, we propose a Dynamic Key-Length-Based Security Framework (DLSeF) based on a shared key derived from synchronized prime numbers the key is dynamically updated at short intervals to thwart potential attacks to ensure end-to-end security. Theoretical analyses and experimental results of the DLSeF framework show that it can significantly improve the efficiency of processing stream data by reducing the security verification time and buffer usage without compromising security.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: ICST
Date: 2013
Publisher: Springer Science and Business Media LLC
Date: 17-01-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2018
Publisher: Internet Society
Date: 2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2021
Publisher: SCITEPRESS - Science and Technology Publications
Date: 2020
Publisher: IEEE
Date: 06-2022
Publisher: Springer International Publishing
Date: 2017
Publisher: Association for Computing Machinery (ACM)
Date: 22-10-2021
DOI: 10.1145/3425662
Abstract: Edge computing, as a relatively recent evolution of cloud computing architecture, is the newest way for enterprises to distribute computational power and lower repetitive referrals to central authorities. In the edge computing environment, Generative Models (GMs) have been found to be valuable and useful in machine learning tasks such as data augmentation and data pre-processing. Federated learning and distributed learning refer to training machine learning models in the edge computing network. However, federated learning and distributed learning also bring additional risks to GMs since all peers in the network have access to the model under training. In this article, we study the vulnerabilities of federated GMs to data-poisoning-based backdoor attacks via gradient uploading. We additionally enhance the attack to reduce the required poisonous data s les and cope with dynamic network environments. Last but not least, the attacks are formally proven to be stealthy and effective toward federated GMs. According to the experiments, neural backdoors can be successfully embedded by including merely 5\\% poisonous s les in the local training dataset of an attacker.
Publisher: IEEE
Date: 12-2010
DOI: 10.1109/EUC.2010.125
Publisher: ACM
Date: 07-11-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2021
Publisher: Association for Computing Machinery (ACM)
Date: 2012
Abstract: Service-centric solutions usually require rich context to fully deliver and better reflect on the underlying applications. We present a novel use of context in the form of customized user interface services with the concept of User Interface as a Service (UIaaS). UIaaS takes user profiles as input to generate context-aware interface services. Such interface services can be used as context to augment semantic services with contextual information leading to UIaaS as a Context (UIaaSaaC). The added serendipitous benefit of the proposed concept is that the composition of a customized user interface with the requested service is performed by the service composition engine, as is the case with any other services. We use a special-purpose language (called User Interface Description Language (UIDL)) to model and realize user interfaces as services. We use a real-life e-government application, human services delivery for the citizens, as a proof-of-concept. We also present a comprehensive evaluation of the proposed approach using a functional evaluation and a nonfunctional evaluation consisting of an end user usability test and expert usability reviews.
Publisher: Springer Nature Switzerland
Date: 2022
Publisher: Springer International Publishing
Date: 2015
Publisher: Association for Computing Machinery (ACM)
Date: 08-2013
Abstract: Web-based social networks have become popular as a medium for disseminating information and connecting like-minded people. The public accessibility of such networks with the ability to share opinions, thoughts, information, and experience offers great promise to enterprises and governments. In addition to in iduals using such networks to connect to their friends and families, governments and enterprises have started exploiting these platforms for delivering their services to citizens and customers. However, the success of such attempts relies on the level of trust that members have with each other as well as with the service provider. Therefore, trust becomes an essential and important element of a successful social network. In this article, we present the first comprehensive review of social and computer science literature on trust in social networks. We first review the existing definitions of trust and define social trust in the context of social networks. We then discuss recent works addressing three aspects of social trust: trust information collection , trust evaluation , and trust dissemination . Finally, we compare and contrast the literature and identify areas for further research in social trust.
Publisher: Springer Nature Switzerland
Date: 2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 05-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2013
Publisher: IEEE
Date: 08-2019
Publisher: Springer International Publishing
Date: 2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: Springer Science and Business Media LLC
Date: 09-2016
Publisher: IEEE
Date: 06-2014
Publisher: IGI Global
Date: 2012
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 15-07-2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2022
Publisher: IEEE
Date: 12-2016
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2023
Publisher: Association for Computing Machinery (ACM)
Date: 07-12-2016
DOI: 10.1145/3013520
Abstract: The Internet of Things (IoT) is the latest Internet evolution that incorporates a erse range of things such as sensors, actuators, and services deployed by different organizations and in iduals to support a variety of applications. The information captured by IoT present an unprecedented opportunity to solve large-scale problems in those application domains to deliver services ex le applications include precision agriculture, environment monitoring, smart health, smart manufacturing, and smart cities. Like all other Internet based services in the past, IoT-based services are also being developed and deployed without security consideration. By nature, IoT devices and services are vulnerable to malicious cyber threats as they cannot be given the same protection that is received by enterprise services within an enterprise perimeter. While IoT services will play an important role in our daily life resulting in improved productivity and quality of life, the trend has also “encouraged” cyber-exploitation and evolution and ersification of malicious cyber threats. Hence, there is a need for coordinated efforts from the research community to address resulting concerns, such as those presented in this special section. Several potential research topics are also identified in this special section.
Publisher: Springer Berlin Heidelberg
Date: 2012
Publisher: ACM
Date: 05-10-2020
Publisher: ACM
Date: 13-05-2019
Publisher: World Scientific Pub Co Pte Lt
Date: 06-2018
DOI: 10.1142/S0218843018500016
Abstract: With the ubiquitous presence of smart phones and the availability of easy-to-use applications, there is an increase in the number of online services. A growing number of people now search for information and interact online. They expect to see services available and accessible online. To meet citizens’ expectations, governments have also increased their online presence. However, information and services are not the only reasons people go online. People also build their social circle online, seeking support and empathy, looking for someone with whom they can talk and who can understand their situation and worries. Online communities (and social networks in general) have been shown to have the potential to provide social and emotional peer-support. Our work aimed at determining whether online communities could be deployed in the public administration domain, in particular to support people receiving welfare payments, with similar benefits. We hypothesized that an online community could provide such support to disadvantaged citizens. Toward testing this hypothesis, after a user requirements analysis and some preparatory work, we designed and developed an online community for a specific target group of welfare recipients, as a collaboration between CSIRO and the Australian Department of Human Services. The community was deployed for one year. In this paper, we briefly explain our aims and the work that went into preparing for the community. We introduce the portal and the support it offered. We then report our observations and findings about both the informational and emotional support participants received, through an analysis of the comments posted in the community, and whether this support was perceived as welcome and useful.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2022
Publisher: IEEE
Date: 06-2012
DOI: 10.1109/SCC.2012.73
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 15-04-2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2018
Publisher: IEEE
Date: 12-2017
Publisher: IEEE
Date: 12-2017
Publisher: IEEE
Date: 05-2019
Publisher: Wiley
Date: 04-07-2013
DOI: 10.1002/CPE.3083
Publisher: IEEE
Date: 05-2012
Publisher: Springer Science and Business Media LLC
Date: 10-08-2013
Publisher: Institute of Electronics, Information and Communications Engineers (IEICE)
Date: 2012
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2022
Publisher: IEEE
Date: 06-2017
Publisher: Springer Berlin Heidelberg
Date: 2014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 05-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 02-2021
Publisher: ACM
Date: 07-12-2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 05-2022
Publisher: IEEE
Date: 07-2018
Publisher: IEEE
Date: 08-2019
Publisher: Association for Computing Machinery (ACM)
Date: 04-09-2019
DOI: 10.1145/3317699
Abstract: Android users are increasingly concerned with the privacy of their data and security of their devices. To improve the security awareness of users, recent automatic techniques produce security-centric descriptions by performing program analysis. However, the generated text does not always address users’ concerns as they are generally too technical to be understood by ordinary users. Moreover, different users have varied linguistic preferences that do not match the text. Motivated by this challenge, we develop an innovative scheme to help users avoid malware and privacy-breaching apps by generating security descriptions that explain the privacy and security related aspects of an Android app in clear and understandable terms. We implement a prototype system, PERSCRIPTION, to generate personalised security-centric descriptions that automatically learn users’ security concerns and linguistic preferences to produce user-oriented descriptions. We evaluate our scheme through experiments and user studies. The results clearly demonstrate the improvement on readability and users’ security awareness of PERSCRIPTION’s descriptions compared to existing description generators.
Publisher: JMIR Publications Inc.
Date: 08-09-2017
Publisher: IEEE
Date: 07-2019
Publisher: Mary Ann Liebert Inc
Date: 05-2014
Abstract: Australians in rural and remote areas live with far poorer health outcomes than those in urban areas. Telehealth services have emerged as a promising solution to narrow this health gap, as they improve the level and ersity of health services delivery to rural and remote Australian communities. Although the benefits of telehealth services are well studied and understood, the uptake has been very slow. To understand the underpinning issues, we conducted a literature review on barriers to telehealth adoption in rural and remote Australian communities, based on the published works of Australian clinical trials and studies. This article presents our findings using a comprehensive barrier matrix. This matrix is composed of four stakeholders (governments, technology developers and providers, health professionals, and patients) and five different categorizations of barriers (regulatory, financial, cultural, technological, and workforce). We explain each cell of the matrix (four stakeholders×five categories) and map the reported work into the matrix. Several exemplary barrier cases are also described to give more insights into the complexity and dilemma of adopting telehealth services. Finally, we outline recent technological advancements that have a great potential to overcome some of the identified barriers.
Publisher: Elsevier BV
Date: 07-2023
Publisher: Springer Science and Business Media LLC
Date: 25-08-2011
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: Wiley
Date: 12-09-2023
Publisher: IEEE
Date: 12-2021
Publisher: Springer International Publishing
Date: 2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2005
DOI: 10.1109/MCC.2015.36
Publisher: IEEE
Date: 2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 05-2020
Publisher: IEEE
Date: 09-2021
Publisher: Inderscience Publishers
Date: 2013
Publisher: Springer Berlin Heidelberg
Date: 2012
Publisher: IEEE
Date: 06-2015
Publisher: Springer International Publishing
Date: 2020
Publisher: Elsevier BV
Date: 02-2017
Publisher: Oxford University Press (OUP)
Date: 02-2015
Publisher: IEEE
Date: 11-2020
Publisher: Elsevier BV
Date: 11-2020
Publisher: Springer International Publishing
Date: 2019
Publisher: IEEE
Date: 12-2011
DOI: 10.1109/UCC.2011.55
Publisher: IEEE
Date: 05-2018
Publisher: Springer International Publishing
Date: 2021
Publisher: Springer International Publishing
Date: 2017
Publisher: IEEE
Date: 12-2021
Publisher: World Scientific Pub Co Pte Lt
Date: 06-2014
DOI: 10.1142/S0218843014410020
Abstract: Gamification, the idea of inserting game dynamics into portals or social networks, has recently evolved as an approach to encourage active participation in online communities. For an online community to start and proceed on to a sustainable operation, it is important that members are encouraged to contribute positively and frequently. We decided to introduce gamification in an online community that we designed and developed with the Australian Government's Department of Human Services to support welfare recipients transitioning from one payment to another. We first defined a formal model of gamification and a gamification design process. In instantiating our model to the online community, we realised that our context applied a number of constraints on the gamification elements that could be introduced. In this paper, we outline the design and implementation of a gamification model for online communities and its instantiation into our context, with its specific requirements. While we cannot comment on the success of gamification to drive user engagement in our context (for lack of the possibility of a controlled experiment), we found our implementation of badges-based gamification a helpful way to provide a useful abstraction on the life of the community, providing feedback enabling us to monitor and analyze the community. We thus show how feedback provided by such gamification data has a potential to be useful to community providers to better understand the community needs and addressing them appropriately to maintain a level of engagement in the community.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2022
Publisher: IEEE
Date: 07-2013
Publisher: IEEE
Date: 06-2014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2019
Publisher: Association for Computing Machinery (ACM)
Date: 24-03-2017
DOI: 10.1145/2983528
Abstract: Mapping out the challenges and strategies for the widespread adoption of service computing.
Publisher: Springer International Publishing
Date: 2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 05-2015
Publisher: American Chemical Society (ACS)
Date: 22-05-2019
Publisher: Springer International Publishing
Date: 2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 05-2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2016
Publisher: Wiley
Date: 21-04-2014
DOI: 10.1111/COIN.12041
Publisher: IEEE
Date: 07-2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: Springer International Publishing
Date: 2014
Publisher: IEEE
Date: 06-2014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 10-2017
Publisher: Springer New York
Date: 06-08-2013
Publisher: Mary Ann Liebert Inc
Date: 04-2014
Abstract: Evaluating telehealth programs is a challenging task, yet it is the most sensible first step when embarking on a telehealth study. How can we frame and report on telehealth studies? What are the health services elements to select based on the application needs? What are the appropriate terms to use to refer to such elements? Various frameworks have been proposed in the literature to answer these questions, and each framework is defined by a set of properties covering different aspects of telehealth systems. The most common properties include application, technology, and functionality. With the proliferation of telehealth, it is important not only to understand these properties, but also to define new properties to account for a wider range of context of use and evaluation outcomes. This article presents a comprehensive framework for delivery design, implementation, and evaluation of telehealth services. We first survey existing frameworks proposed in the literature and then present our proposed comprehensive multidimensional framework for telehealth. Six key dimensions of the proposed framework include health domains, health services, delivery technologies, communication infrastructure, environment setting, and socioeconomic analysis. We define a set of ex le properties for each dimension. We then demonstrate how we have used our framework to evaluate telehealth programs in rural and remote Australia. A few major international studies have been also mapped to demonstrate the feasibility of the framework. The key characteristics of the framework are as follows: (a) loosely coupled and hence easy to use, (b) provides a basis for describing a wide range of telehealth programs, and (c) extensible to future developments and needs.
Publisher: Springer International Publishing
Date: 2019
Publisher: IEEE
Date: 10-2018
Publisher: Association for Computing Machinery (ACM)
Date: 24-06-2015
DOI: 10.1145/2774974
Abstract: A key challenge in online communities is that of keeping a community active and alive. All online communities work hard to keep their members through various initiatives, such as personalisation and recommendation technologies. In online communities aimed at supporting behavioural change, that is, in domains such as diet, lifestyle, or the environment, the main reason for participation is not to connect with real-world friends for sharing and communicating, but to meet and gain support from like-minded people in an online environment. Introducing personalisation and recommendation features in these networks is challenging, as traditional approaches leverage the densely populated friendship relations found in typical social networks, and these are not present in these new community types. We address this challenge by looking beyond the articulated friendships of a community for evidence of relationships. In particular, we look at the interactions of members of an online community with other members and resources. In this article, we present a social behaviour model and apply it to two types of recommendation systems, a people recommender and a content recommender system. We evaluate our systems using the interaction logs of an online diet and lifestyle community in which 5,000 Australians participated in a 12-week programme. Our results show that our social behaviour-based recommendation algorithms outperform baselines, friendship-based, and link-prediction algorithms.
Publisher: ACM
Date: 05-12-2022
Publisher: CSIRO
Date: 2012
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2022
Publisher: ACM
Date: 02-07-2019
Publisher: Springer International Publishing
Date: 2022
Publisher: Springer Science and Business Media LLC
Date: 02-06-2013
Location: Australia
Location: No location found
Start Date: 01-2018
End Date: 05-2021
Amount: $330,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 06-2021
End Date: 10-2024
Amount: $480,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 2022
End Date: 12-2025
Amount: $450,000.00
Funder: Australian Research Council
View Funded Activity