Deakin University

Displaying 1-36 of 36 results

  • White Papers // Jul 2013

    Clonewise - Detecting Package-level Clones Using Machine Learning

    Developers sometimes maintain an internal copy of another software or fork development of an existing project. This practice can lead to software vulnerabilities when the embedded code is not kept up to date with upstream sources. The authors propose an automated solution to identify clones of packages without any prior...

    Provided By Deakin University

  • White Papers // May 2013

    Enhanced Security for Preventing Man-in-the Middle Attacks in Authentication, Data Entry and Transaction Verification

    There is increasing coverage in the literature highlighting threats to online financial systems. Attacks range from the prevalent reverse social engineering technique known as phishing; where spam emails are sent to customers with links to fake websites, to Trojans that monitor a customer's account log on process that captures authentication...

    Provided By Deakin University

  • White Papers // Apr 2013

    Fuzzy Logic Optimized Wireless Sensor Networks Routing Protocol

    Wireless Sensor Networks (WSNs) are used in health monitoring, tracking and security applications. Such networks are usually applying to be able to transfer data from specific areas to a nominated destination. For this aim, sometimes, sensor nodes transmit their sensed data through multiple hops. Each sensor node acts as a...

    Provided By Deakin University

  • White Papers // Dec 2012

    Business Process Affordances Through the Lens of Activity Theory

    Business process designers are increasingly being challenged to develop processes that are not only useful in achieving business objectives but also accepted by the process participants and followed in the work place. Those objectives can only be achieved when both the business and the social/cultural aspects of the specific business...

    Provided By Deakin University

  • White Papers // Sep 2012

    Hybrid Cloud Resource Provisioning Policy in the Presence of Resource Failures

    Resource provisioning is an important and challenging problem in distributed systems. Resource management issues such as Quality of Service (QoS) further exacerbate the resource provisioning problem. Furthermore, with the increasing functionality and complexity of Cloud computing, resource failures are inevitable. Therefore, the question the authors address in this paper is...

    Provided By Deakin University

  • White Papers // Dec 2011

    An Agile IT Security Model for Project Risk Assessment

    There are two fundamental challenges in effectively performing security risk assessment in today's IT projects. The first is the project manager's need to know what IT security risks face the project before the project begins. At this stage IT security staff is unable to answer this question without first knowing...

    Provided By Deakin University

  • White Papers // Dec 2011

    Attack Vectors Against Social Networking Systems: The Facebook Example

    Social Networking Systems (SNS's) such as Facebook are an ever evolving and developing means of social interaction, which is not only being used to disseminate information to family, friends and colleagues but as a way of meeting and interacting with "Strangers" through the advent of a large number of social...

    Provided By Deakin University

  • White Papers // Sep 2011

    Malware Variant Detection Using Similarity Search Over Sets of Control Flow Graphs

    Static detection of polymorphic malware variants plays an important role to improve system security. Control flow has shown to be an effective characteristic that represents polymorphic malware instances. In the authors' research, they propose a similarity search of malware using novel distance metrics of malware signatures. They describe a malware...

    Provided By Deakin University

  • White Papers // Sep 2011

    Trust Ticket Deployment: A Notion of a Data Owner's Trust in Cloud Computing

    While Cloud Computing (CC) is a scalable model of shared infrastructure and on-demand computing, it lacks a transparent trust and security mechanism. A Data Owner (DO) loses control over the data outsourced to a machine in the cloud controlled and operated by a Cloud Service Provider (CSP). This machine is...

    Provided By Deakin University

  • White Papers // Jul 2011

    A Method for Examining Corporate Social Responsibility Descriptions on SME Websites

    There is growing IS research concerning SME use of websites and limited but growing research on Corporate Social Responsibility (CSR) by SMEs. However, to-date these two bodies of literature have remained largely separate. This paper links these fields by presenting an SME website content analysis method. Melville in his seminal...

    Provided By Deakin University

  • White Papers // Feb 2011

    Comprehensive Study of Selective Forwarding Attack in Wireless Sensor Networks

    Sensor networks are becoming closer towards widespread deployment so security issues become a vital concern. Selective forwarding attack is one of the harmful attacks against sensor networks and can affect the whole sensor network communication. The variety of defense approaches against selective forwarding attack is overwhelming. In this paper, the...

    Provided By Deakin University

  • White Papers // Dec 2010

    Foreign Aid And Enlightened Leaders

    To study whether foreign aid fuels personal, regional and ethnic favoritism, the authors use satellite data on nighttime light for any region in any aid-recipient country, and they determine for each year and each country the region in which the current political leader was born. Having a panel with 22,850...

    Provided By Deakin University

  • White Papers // Dec 2010

    Micro-Blogging in the Workplace

    Micro-blogging services such as Twitter, Yammer, Plurk and Google Buzz have generated substantial interest among members of the business community in recent years. Many CEOs, managers and front-line employees have embraced micro-blogs as a tool for interacting with colleagues, employees, customers, suppliers and investors. Micro-blogs are considered a more informal...

    Provided By Deakin University

  • White Papers // Dec 2010

    Information Security Disclosure: A Victorian Case Study

    This paper will focus upon the impact of Generation Y and their attitudes to security. The paper will be based around discussing the findings of a recent report by the Office of Police Integrity (OPI) on "Information Security and the Victoria Police State Surveillance Unit". Issues that will be discussed...

    Provided By Deakin University

  • White Papers // Dec 2010

    Various Tax Policy Alternatives To Delay Retirement: Some Computations And Implications

    Demographic challenges have been threatening the fiscal sustainability of pension systems across most of the developed world. A popular policy response to pension financing difficulties is the encouragement (or enforcement) of later retirement, as well the legislation of higher payroll taxes over time. In this paper the authors analyze how...

    Provided By Deakin University

  • White Papers // Oct 2010

    Unions, Innovation, And Technology Adoption: New Insights From The Cross-Country Evidence

    There is currently no consensus regarding the effect of unions on technology. The authors apply met regression analysis to the extant econometric studies and find that unions depress investment in new technology. However, this adverse effect has been declining over time and is moderated by country differences in industrial relations...

    Provided By Deakin University

  • White Papers // Aug 2010

    Foreign Direct Investment And Economic Growth: A Real Relationship Or Wishful Thinking?

    The macroeconomic impact of FDI has been a longstanding source of debate. This paper provides a comprehensive assessment of the empirical evidence accumulated over the past three decades on the effects of FDI on economic growth. Meta-regression analysis is applied to 880 estimates of this effect from 108 empirical studies....

    Provided By Deakin University

  • White Papers // Jul 2010

    Some Hypotheses On Commonality In Liquidity: New Evidence From The Chinese Stock Market

    In this paper, the authors examine four specific hypotheses relating to commonality in liquidity on the Chinese stock markets. These hypotheses are: that market-wide liquidity determines liquidity of individual stocks; that liquidity varies with firm size; that sectoral-based liquidity affects individual stock liquidities differently; and that commonality in liquidity has...

    Provided By Deakin University

  • White Papers // Jul 2010

    Do Market Capitalisation And Stocks Traded Converge? New Global Evidence

    In this paper, the authors examine convergence of stocks markets. This empirical exercise is based on 12 different panels, including a full panel consisting of 120 countries and disaggregated panels, such as high income, middle income, low income, OECD, CSI, and developing countries. In addition, they used regional panels, such...

    Provided By Deakin University

  • White Papers // Jul 2010

    The Impact Of Social Influence Pressure On Professional Accountants~ Ethical Reasoning

    The advent of the 21st century brought with it an explosion of corporate accounting scandals and related financial irregularities. Names such as Enron, WorldCom, HLH, and others became household names for the wrong reasons. Arthur Anderson, one of the largest accounting firms in the world collapsed in the wake of...

    Provided By Deakin University

  • White Papers // Jul 2010

    Accounting Professionalisation And Occupational Context: The Role Of The Public Accounting Profession In China

    While applied broadly within the setting of accounting and some other occupations, 'Profession' is a particularly Western concept with peculiarly British origins. However, the significance of such status and the process by which it is acquired has defied precise explication. Examination of the sociology of the accounting occupation within non-Western...

    Provided By Deakin University

  • White Papers // Jul 2010

    Regulating For Corporate Human Rights Abuses: The Emergence Of Corporate Reporting On The ILOs Human Rights Standards Within The Global Garment Manufacturing And Retail Industry

    This paper investigates the adoption of the International Labour Organisation's (ILO) workplace standards by major multinational companies that source products from developing countries, as disclosed through their reporting media. Despite the ubiquitous nature of the discourse on human rights, there is currently little research on the emergence of corporate disclosure...

    Provided By Deakin University

  • White Papers // Jul 2010

    Environmental Incidents In A Developing Country And Corporate Environmental Disclosures: A Study Of Multinational Gas Company

    This paper examines the environmental disclosure initiatives of Niko Resources - a Canadian based multinational oil and gas company - following the two major environmental blowouts at a gas field in Bangladesh in 2005. As part of the examination, the authors particularly focus on whether Niko's disclosure strategy was associated...

    Provided By Deakin University

  • White Papers // Jun 2010

    Cloud Security Defence to Protect Cloud Computing Against HTTP-DoS and XML-DoS Attacks

    Cloud computing is still in its infancy in regards to its Software As Services (SAS), web services, utility computing and Platform As Services (PAS). All of these have remained individualized systems that you still need to plug into, even though these systems are heading towards full integration. One of the...

    Provided By Deakin University

  • White Papers // Jun 2010

    Factors Affecting SMEs' Willingness to Share Knowledge Online: A Path Model

    This paper presents the findings of a study of SME owner-managers that examined their willingness to share information online with other members of a local business network. The main variables associated with willingness to share knowledge online were found to be willingness to share information in conventional modes and the...

    Provided By Deakin University

  • White Papers // Jun 2010

    Virtual Backbone Routing Structures in Wireless Ad-Hoc Networks

    In this paper the authors studied several virtual routing structures (ring, ring-tree, cord, and mesh) which are scalable, independent on addresses, based on local information and partial global information for routing packets. These virtual routing structures are built on the top of the backbone nodes which are selected by considering...

    Provided By Deakin University

  • White Papers // Apr 2010

    Analysis of Intrusion Detection Systems (IDS)

    An IDS is an acronym which stands for Intrusion Detection System. It is a security system that monitors any given network(s) for unauthorized access violations and malicious activities. Depending on the type and scale of the network as well as security requirements, either software and/or hardware can be deployed to...

    Provided By Deakin University

  • White Papers // Feb 2010

    Safeguarding Australia From Cyber-Terrorism: A Proposed Cyber-Terrorism SCADA Risk Framework for Industry Adoption

    Terrorist groups are currently using Information and Communication Technologies (ICTs) to orchestrate their conventional physical attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to coordinate cyber-based attacks. This paper identifies that cyber-terrorism capabilities are an integral, imperative, yet under-researched component in establishing, and...

    Provided By Deakin University

  • White Papers // Feb 2010

    The Ascent of Asymmetric Risk in Information Security: An Initial Evaluation

    Dramatic changes in the information security risk landscape over several decades have not yet been matched by similar changes in organizational information security, which is still mainly based on a mindset that security is achieved through extensive preventive controls. As a result, maintenance cost of information security is increasing rapidly,...

    Provided By Deakin University

  • White Papers // Nov 2009

    Virtual Backbone Content Routing in Wireless Ad-Hoc Network

    The authors developed a new content routing based on the virtual backbone structure, which groups wireless nodes and contents into a virtual architecture. The approach is scalable, works with local information, and does not rely on address information. The naming system uses flat naming to identify nodes and contents, and...

    Provided By Deakin University

  • White Papers // Oct 2009

    Weakest Collective Rationality And The Nash Bargaining Solution

    The authors propose a new axiom, Weakest Collective Rationality (WCR) which is weaker than both Weak Pareto Optimality (WPO) in Nash (1950)'s original characterization and Strong Individual Rationality (SIR) in Roth (1977)'s characterization of the Nash bargaining solution. They then characterize the Nash solution by Symmetry (SYM), Scale Invariance (SI),...

    Provided By Deakin University

  • White Papers // Sep 2009

    Robustness Of Intermediate Agreements And Bargaining Solutions

    Most real-life bargaining is resolved gradually; two parties reach inter-mediate agreements without knowing the whole range of possibilities. These intermediate agreements serve as disagreement points in subsequent rounds. Cooperative bargaining solutions ignore these dynamics and can therefore yield accurate predictions only if they are robust to its specification. The authors...

    Provided By Deakin University

  • White Papers // Jun 2009

    Using GPS in Forensic Science

    This paper covers the introduction of GIS and handheld GPS as problem solving tools in a forensic science class. The students looked at crime mapping and considered how crimes can be location based and conversely how safety can be related to location as well. The students used GIS and GPS...

    Provided By Deakin University

  • White Papers // May 2009

    Information Security Management Curriculum Development: An Australian Example

    The development of Information Security as a discipline has only occurred in recent years. Currently Information Security topics are widely taught at tertiary institutions but these topics are taught from a technical perspective and in other cases from a business perspective. This paper discusses the development of a new security...

    Provided By Deakin University

  • White Papers // May 2009

    Decision-Making In A Social Welfare Context

    This paper presents analysis of the decision-making strategies adopted by respondents when confronted with potential environmental policy options that include changes in both aggregate levels of welfare and equity in distribution. The analysis is based on the results of a choice experiment designed to estimate intergenerational distribution preferences. Non-linear welfare...

    Provided By Deakin University

  • White Papers // Jun 2006

    Communities of Enterprise: SMEs, Ict and Regional Development

    Many regional economies have pursued a strategy of stimulating the development of regional clusters. Such clusters typically include Small and Medium size Enterprises (SMEs) as a core component of those economies. Effective cluster development in that context depends on SMEs sharing knowledge and generating innovation. ICT networks can be an...

    Provided By Deakin University

  • White Papers // Sep 2011

    Malware Variant Detection Using Similarity Search Over Sets of Control Flow Graphs

    Static detection of polymorphic malware variants plays an important role to improve system security. Control flow has shown to be an effective characteristic that represents polymorphic malware instances. In the authors' research, they propose a similarity search of malware using novel distance metrics of malware signatures. They describe a malware...

    Provided By Deakin University

  • White Papers // Sep 2011

    Trust Ticket Deployment: A Notion of a Data Owner's Trust in Cloud Computing

    While Cloud Computing (CC) is a scalable model of shared infrastructure and on-demand computing, it lacks a transparent trust and security mechanism. A Data Owner (DO) loses control over the data outsourced to a machine in the cloud controlled and operated by a Cloud Service Provider (CSP). This machine is...

    Provided By Deakin University

  • White Papers // Apr 2013

    Fuzzy Logic Optimized Wireless Sensor Networks Routing Protocol

    Wireless Sensor Networks (WSNs) are used in health monitoring, tracking and security applications. Such networks are usually applying to be able to transfer data from specific areas to a nominated destination. For this aim, sometimes, sensor nodes transmit their sensed data through multiple hops. Each sensor node acts as a...

    Provided By Deakin University

  • White Papers // May 2009

    Information Security Management Curriculum Development: An Australian Example

    The development of Information Security as a discipline has only occurred in recent years. Currently Information Security topics are widely taught at tertiary institutions but these topics are taught from a technical perspective and in other cases from a business perspective. This paper discusses the development of a new security...

    Provided By Deakin University

  • White Papers // Jun 2009

    Using GPS in Forensic Science

    This paper covers the introduction of GIS and handheld GPS as problem solving tools in a forensic science class. The students looked at crime mapping and considered how crimes can be location based and conversely how safety can be related to location as well. The students used GIS and GPS...

    Provided By Deakin University

  • White Papers // Apr 2010

    Analysis of Intrusion Detection Systems (IDS)

    An IDS is an acronym which stands for Intrusion Detection System. It is a security system that monitors any given network(s) for unauthorized access violations and malicious activities. Depending on the type and scale of the network as well as security requirements, either software and/or hardware can be deployed to...

    Provided By Deakin University

  • White Papers // Jun 2010

    Virtual Backbone Routing Structures in Wireless Ad-Hoc Networks

    In this paper the authors studied several virtual routing structures (ring, ring-tree, cord, and mesh) which are scalable, independent on addresses, based on local information and partial global information for routing packets. These virtual routing structures are built on the top of the backbone nodes which are selected by considering...

    Provided By Deakin University

  • White Papers // Dec 2010

    Foreign Aid And Enlightened Leaders

    To study whether foreign aid fuels personal, regional and ethnic favoritism, the authors use satellite data on nighttime light for any region in any aid-recipient country, and they determine for each year and each country the region in which the current political leader was born. Having a panel with 22,850...

    Provided By Deakin University

  • White Papers // Dec 2010

    Various Tax Policy Alternatives To Delay Retirement: Some Computations And Implications

    Demographic challenges have been threatening the fiscal sustainability of pension systems across most of the developed world. A popular policy response to pension financing difficulties is the encouragement (or enforcement) of later retirement, as well the legislation of higher payroll taxes over time. In this paper the authors analyze how...

    Provided By Deakin University

  • White Papers // May 2009

    Decision-Making In A Social Welfare Context

    This paper presents analysis of the decision-making strategies adopted by respondents when confronted with potential environmental policy options that include changes in both aggregate levels of welfare and equity in distribution. The analysis is based on the results of a choice experiment designed to estimate intergenerational distribution preferences. Non-linear welfare...

    Provided By Deakin University

  • White Papers // Oct 2009

    Weakest Collective Rationality And The Nash Bargaining Solution

    The authors propose a new axiom, Weakest Collective Rationality (WCR) which is weaker than both Weak Pareto Optimality (WPO) in Nash (1950)'s original characterization and Strong Individual Rationality (SIR) in Roth (1977)'s characterization of the Nash bargaining solution. They then characterize the Nash solution by Symmetry (SYM), Scale Invariance (SI),...

    Provided By Deakin University

  • White Papers // Sep 2009

    Robustness Of Intermediate Agreements And Bargaining Solutions

    Most real-life bargaining is resolved gradually; two parties reach inter-mediate agreements without knowing the whole range of possibilities. These intermediate agreements serve as disagreement points in subsequent rounds. Cooperative bargaining solutions ignore these dynamics and can therefore yield accurate predictions only if they are robust to its specification. The authors...

    Provided By Deakin University

  • White Papers // Jul 2010

    Some Hypotheses On Commonality In Liquidity: New Evidence From The Chinese Stock Market

    In this paper, the authors examine four specific hypotheses relating to commonality in liquidity on the Chinese stock markets. These hypotheses are: that market-wide liquidity determines liquidity of individual stocks; that liquidity varies with firm size; that sectoral-based liquidity affects individual stock liquidities differently; and that commonality in liquidity has...

    Provided By Deakin University

  • White Papers // Jul 2010

    Do Market Capitalisation And Stocks Traded Converge? New Global Evidence

    In this paper, the authors examine convergence of stocks markets. This empirical exercise is based on 12 different panels, including a full panel consisting of 120 countries and disaggregated panels, such as high income, middle income, low income, OECD, CSI, and developing countries. In addition, they used regional panels, such...

    Provided By Deakin University

  • White Papers // Aug 2010

    Foreign Direct Investment And Economic Growth: A Real Relationship Or Wishful Thinking?

    The macroeconomic impact of FDI has been a longstanding source of debate. This paper provides a comprehensive assessment of the empirical evidence accumulated over the past three decades on the effects of FDI on economic growth. Meta-regression analysis is applied to 880 estimates of this effect from 108 empirical studies....

    Provided By Deakin University

  • White Papers // Oct 2010

    Unions, Innovation, And Technology Adoption: New Insights From The Cross-Country Evidence

    There is currently no consensus regarding the effect of unions on technology. The authors apply met regression analysis to the extant econometric studies and find that unions depress investment in new technology. However, this adverse effect has been declining over time and is moderated by country differences in industrial relations...

    Provided By Deakin University

  • White Papers // Nov 2009

    Virtual Backbone Content Routing in Wireless Ad-Hoc Network

    The authors developed a new content routing based on the virtual backbone structure, which groups wireless nodes and contents into a virtual architecture. The approach is scalable, works with local information, and does not rely on address information. The naming system uses flat naming to identify nodes and contents, and...

    Provided By Deakin University

  • White Papers // Jul 2010

    The Impact Of Social Influence Pressure On Professional Accountants~ Ethical Reasoning

    The advent of the 21st century brought with it an explosion of corporate accounting scandals and related financial irregularities. Names such as Enron, WorldCom, HLH, and others became household names for the wrong reasons. Arthur Anderson, one of the largest accounting firms in the world collapsed in the wake of...

    Provided By Deakin University

  • White Papers // Jul 2010

    Accounting Professionalisation And Occupational Context: The Role Of The Public Accounting Profession In China

    While applied broadly within the setting of accounting and some other occupations, 'Profession' is a particularly Western concept with peculiarly British origins. However, the significance of such status and the process by which it is acquired has defied precise explication. Examination of the sociology of the accounting occupation within non-Western...

    Provided By Deakin University

  • White Papers // Jul 2010

    Environmental Incidents In A Developing Country And Corporate Environmental Disclosures: A Study Of Multinational Gas Company

    This paper examines the environmental disclosure initiatives of Niko Resources - a Canadian based multinational oil and gas company - following the two major environmental blowouts at a gas field in Bangladesh in 2005. As part of the examination, the authors particularly focus on whether Niko's disclosure strategy was associated...

    Provided By Deakin University

  • White Papers // Jul 2010

    Regulating For Corporate Human Rights Abuses: The Emergence Of Corporate Reporting On The ILOs Human Rights Standards Within The Global Garment Manufacturing And Retail Industry

    This paper investigates the adoption of the International Labour Organisation's (ILO) workplace standards by major multinational companies that source products from developing countries, as disclosed through their reporting media. Despite the ubiquitous nature of the discourse on human rights, there is currently little research on the emergence of corporate disclosure...

    Provided By Deakin University

  • White Papers // Feb 2011

    Comprehensive Study of Selective Forwarding Attack in Wireless Sensor Networks

    Sensor networks are becoming closer towards widespread deployment so security issues become a vital concern. Selective forwarding attack is one of the harmful attacks against sensor networks and can affect the whole sensor network communication. The variety of defense approaches against selective forwarding attack is overwhelming. In this paper, the...

    Provided By Deakin University

  • White Papers // Dec 2010

    Micro-Blogging in the Workplace

    Micro-blogging services such as Twitter, Yammer, Plurk and Google Buzz have generated substantial interest among members of the business community in recent years. Many CEOs, managers and front-line employees have embraced micro-blogs as a tool for interacting with colleagues, employees, customers, suppliers and investors. Micro-blogs are considered a more informal...

    Provided By Deakin University

  • White Papers // Dec 2010

    Information Security Disclosure: A Victorian Case Study

    This paper will focus upon the impact of Generation Y and their attitudes to security. The paper will be based around discussing the findings of a recent report by the Office of Police Integrity (OPI) on "Information Security and the Victoria Police State Surveillance Unit". Issues that will be discussed...

    Provided By Deakin University

  • White Papers // Feb 2010

    Safeguarding Australia From Cyber-Terrorism: A Proposed Cyber-Terrorism SCADA Risk Framework for Industry Adoption

    Terrorist groups are currently using Information and Communication Technologies (ICTs) to orchestrate their conventional physical attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to coordinate cyber-based attacks. This paper identifies that cyber-terrorism capabilities are an integral, imperative, yet under-researched component in establishing, and...

    Provided By Deakin University

  • White Papers // Feb 2010

    The Ascent of Asymmetric Risk in Information Security: An Initial Evaluation

    Dramatic changes in the information security risk landscape over several decades have not yet been matched by similar changes in organizational information security, which is still mainly based on a mindset that security is achieved through extensive preventive controls. As a result, maintenance cost of information security is increasing rapidly,...

    Provided By Deakin University

  • White Papers // Dec 2011

    An Agile IT Security Model for Project Risk Assessment

    There are two fundamental challenges in effectively performing security risk assessment in today's IT projects. The first is the project manager's need to know what IT security risks face the project before the project begins. At this stage IT security staff is unable to answer this question without first knowing...

    Provided By Deakin University

  • White Papers // Dec 2011

    Attack Vectors Against Social Networking Systems: The Facebook Example

    Social Networking Systems (SNS's) such as Facebook are an ever evolving and developing means of social interaction, which is not only being used to disseminate information to family, friends and colleagues but as a way of meeting and interacting with "Strangers" through the advent of a large number of social...

    Provided By Deakin University

  • White Papers // Sep 2012

    Hybrid Cloud Resource Provisioning Policy in the Presence of Resource Failures

    Resource provisioning is an important and challenging problem in distributed systems. Resource management issues such as Quality of Service (QoS) further exacerbate the resource provisioning problem. Furthermore, with the increasing functionality and complexity of Cloud computing, resource failures are inevitable. Therefore, the question the authors address in this paper is...

    Provided By Deakin University

  • White Papers // Jun 2006

    Communities of Enterprise: SMEs, Ict and Regional Development

    Many regional economies have pursued a strategy of stimulating the development of regional clusters. Such clusters typically include Small and Medium size Enterprises (SMEs) as a core component of those economies. Effective cluster development in that context depends on SMEs sharing knowledge and generating innovation. ICT networks can be an...

    Provided By Deakin University

  • White Papers // Jul 2011

    A Method for Examining Corporate Social Responsibility Descriptions on SME Websites

    There is growing IS research concerning SME use of websites and limited but growing research on Corporate Social Responsibility (CSR) by SMEs. However, to-date these two bodies of literature have remained largely separate. This paper links these fields by presenting an SME website content analysis method. Melville in his seminal...

    Provided By Deakin University

  • White Papers // Jun 2010

    Cloud Security Defence to Protect Cloud Computing Against HTTP-DoS and XML-DoS Attacks

    Cloud computing is still in its infancy in regards to its Software As Services (SAS), web services, utility computing and Platform As Services (PAS). All of these have remained individualized systems that you still need to plug into, even though these systems are heading towards full integration. One of the...

    Provided By Deakin University

  • White Papers // May 2013

    Enhanced Security for Preventing Man-in-the Middle Attacks in Authentication, Data Entry and Transaction Verification

    There is increasing coverage in the literature highlighting threats to online financial systems. Attacks range from the prevalent reverse social engineering technique known as phishing; where spam emails are sent to customers with links to fake websites, to Trojans that monitor a customer's account log on process that captures authentication...

    Provided By Deakin University

  • White Papers // Dec 2012

    Business Process Affordances Through the Lens of Activity Theory

    Business process designers are increasingly being challenged to develop processes that are not only useful in achieving business objectives but also accepted by the process participants and followed in the work place. Those objectives can only be achieved when both the business and the social/cultural aspects of the specific business...

    Provided By Deakin University

  • White Papers // Jun 2010

    Factors Affecting SMEs' Willingness to Share Knowledge Online: A Path Model

    This paper presents the findings of a study of SME owner-managers that examined their willingness to share information online with other members of a local business network. The main variables associated with willingness to share knowledge online were found to be willingness to share information in conventional modes and the...

    Provided By Deakin University

  • White Papers // Jul 2013

    Clonewise - Detecting Package-level Clones Using Machine Learning

    Developers sometimes maintain an internal copy of another software or fork development of an existing project. This practice can lead to software vulnerabilities when the embedded code is not kept up to date with upstream sources. The authors propose an automated solution to identify clones of packages without any prior...

    Provided By Deakin University