Griffith University

Displaying 1-14 of 14 results

  • White Papers // Oct 2013

    Compliant Business Process Design by Declarative Specifications

    The authors propose algorithms to synthesize the specifications modeling the capabilities of an agent, the environment they acts in, and the governing norms, into a process graph. This process graph corresponds to a collection of courses of action and represents all the licit alternatives the agent may choose to meet...

    Provided By Griffith University

  • White Papers // Jan 2013

    IEEE 802.11i WLAN Security Protocol - A Software Engineer's Model

    Wireless Local Area Networks (WLANs) based on the IEEE 802.11 standards are one of today's fastest growing technologies in businesses, schools, and homes, for good reasons. In this paper, the authors propose the use of GSE methodology to analyze the incompleteness and uncertainties in specifications. The IEEE 802.11i security protocol...

    Provided By Griffith University

  • White Papers // Oct 2012

    To What Extent Would E-Mall Enable SMEs to Adopt E-Commerce?

    This paper presents findings from a study of e-commerce adoption by Small and Medium Enterprises (SMEs) in Saudi Arabia. Only tiny number of Saudi commercial organizations, mostly medium and large companies from the manufacturing sector, in involved in e-commerce implementation. The latest report released in 2010 by The Communications and...

    Provided By Griffith University

  • White Papers // Jul 2011

    Enterprise Resource Planning (ERP) System in Higher Education: A Literature Review and Implications

    ERP systems are the largest software applications adopted by universities, along with quite significant investments in their implementation. However, unlike other applications little research has been conducted regarding these systems in a university environment. This paper aims at providing a critical review of previous research in ERP system in higher...

    Provided By Griffith University

  • White Papers // Apr 2011

    Improving the Performance of Intrusion Detection Using Dialog-Based Payload Aggregation

    The authors propose Dialog-based Payload Aggregation (DPA) that extracts relevant payload data from TCP/IP packet streams based on sequence numbers in the TCP header for improved intrusion detection performance. Typical network-based Intrusion Detection Systems (IDSs) like Snort, which use rules for matching payload data, show severe performance problems in high-speed...

    Provided By Griffith University

  • White Papers // Feb 2011

    A Primer On Islamic Finance: Definitions, Sources, Principles And Methods

    Islamic finance is one of the most rapidly growing segments of the global financial system. However, despite the increasing importance of Islamic finance, particularly in developing economies in the Middle East and South-East Asia, religious and social complexity has acted against a fuller understanding by regulators, policymakers, researchers and practitioners....

    Provided By Griffith University

  • White Papers // Jan 2010

    Routine Activity Theory and Phishing Victimisation: Who Gets Caught in the 'Net'?

    Phishing is the use of fraudulent emails to obtain personal financial information from victims by posing as legitimate financial institutions or commerce sites. This exploratory paper involved interviewing 104 participants, 50 of whom reported having received a phishing email. The theoretical foundation for this research is routine activity theory, whereby...

    Provided By Griffith University

  • White Papers // Nov 2009

    Securing Route and Path Integrity in Multi-Hop Wireless Networks

    Wireless networks are becoming ubiquitous and can be found in domestic, commercial, industrial, military, and healthcare applications. In these application areas network security assumes an increasingly important role because security breaches may result in the loss of human lives. This paper examines the problem of ensuring route integrity in multi-hop...

    Provided By Griffith University

  • White Papers // Jun 2009

    Use of Semantic Networks as Learning Material and Evaluation of the Approach by Students

    This paper first summarizes reasons why current approaches supporting Open Learning and Distance Education need to be complemented by tools permitting lecturers, researchers and students to cooperatively organize the semantic content of Learning related materials (courses, discussions, etc.) into a fine-grained shared semantic network. This first part of the paper...

    Provided By Griffith University

  • White Papers // Feb 2009

    Self-Organizing Network Security Environments - A Simulative Analysis

    The authors discuss the need for adaptive load control in network security environments in order to cope with the increasing bandwidth requirements. In earlier work, they developed a simple model to study the behavior of feedback loops for self-configuring security environments. They primarily considered the traffic between the monitoring probes,...

    Provided By Griffith University

  • White Papers // Dec 2008

    Customer Portfolio Analysis Using The SOM

    In order to compete for profitable customers, companies are looking to add value using Customer Relationship Management (CRM). One subset of CRM is customer segmentation, which is the process of dividing customers into groups based upon common features or needs. Segmentation methods can be used for customer portfolio analysis (CPA),...

    Provided By Griffith University

  • White Papers // Oct 2008

    Trust, Social Network and Electronic Commerce Adoption

    This paper uses an empirical case study methodology to examine the impact of trust within social networks on Thai SMEs' adoption of Electronic Commerce (EC). In particular, the paper examines the significance of dispositional and experiential trust between social network members on EC adoption. The findings suggest that dispositional trust...

    Provided By Griffith University

  • White Papers // Jun 2008

    Analysis of Proposed Key Establishment Protocols in Multi-Tiered Sensor Networks

    Wireless sensor networks provide solutions to a range of monitoring problems. However, they introduce a new set of problems mainly due to small memories, weak processors, limited energy and small packet size. Thus only a very few conventional protocols can readily be used in sensor networks. This paper closely examines...

    Provided By Griffith University

  • White Papers // Apr 2007

    Formal Verification of the IEEE 802.11i WLAN Security Protocol

    With the increased usage of Wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. In this paper, the authors investigate the integrity of the security model developed by them based on 802.11i Robust Security Network (RSN), strengthening their desire towards establishing a secure wireless...

    Provided By Griffith University

  • White Papers // Apr 2011

    Improving the Performance of Intrusion Detection Using Dialog-Based Payload Aggregation

    The authors propose Dialog-based Payload Aggregation (DPA) that extracts relevant payload data from TCP/IP packet streams based on sequence numbers in the TCP header for improved intrusion detection performance. Typical network-based Intrusion Detection Systems (IDSs) like Snort, which use rules for matching payload data, show severe performance problems in high-speed...

    Provided By Griffith University

  • White Papers // Feb 2009

    Self-Organizing Network Security Environments - A Simulative Analysis

    The authors discuss the need for adaptive load control in network security environments in order to cope with the increasing bandwidth requirements. In earlier work, they developed a simple model to study the behavior of feedback loops for self-configuring security environments. They primarily considered the traffic between the monitoring probes,...

    Provided By Griffith University

  • White Papers // Oct 2012

    To What Extent Would E-Mall Enable SMEs to Adopt E-Commerce?

    This paper presents findings from a study of e-commerce adoption by Small and Medium Enterprises (SMEs) in Saudi Arabia. Only tiny number of Saudi commercial organizations, mostly medium and large companies from the manufacturing sector, in involved in e-commerce implementation. The latest report released in 2010 by The Communications and...

    Provided By Griffith University

  • White Papers // Jul 2011

    Enterprise Resource Planning (ERP) System in Higher Education: A Literature Review and Implications

    ERP systems are the largest software applications adopted by universities, along with quite significant investments in their implementation. However, unlike other applications little research has been conducted regarding these systems in a university environment. This paper aims at providing a critical review of previous research in ERP system in higher...

    Provided By Griffith University

  • White Papers // Dec 2008

    Customer Portfolio Analysis Using The SOM

    In order to compete for profitable customers, companies are looking to add value using Customer Relationship Management (CRM). One subset of CRM is customer segmentation, which is the process of dividing customers into groups based upon common features or needs. Segmentation methods can be used for customer portfolio analysis (CPA),...

    Provided By Griffith University

  • White Papers // Jun 2009

    Use of Semantic Networks as Learning Material and Evaluation of the Approach by Students

    This paper first summarizes reasons why current approaches supporting Open Learning and Distance Education need to be complemented by tools permitting lecturers, researchers and students to cooperatively organize the semantic content of Learning related materials (courses, discussions, etc.) into a fine-grained shared semantic network. This first part of the paper...

    Provided By Griffith University

  • White Papers // Feb 2011

    A Primer On Islamic Finance: Definitions, Sources, Principles And Methods

    Islamic finance is one of the most rapidly growing segments of the global financial system. However, despite the increasing importance of Islamic finance, particularly in developing economies in the Middle East and South-East Asia, religious and social complexity has acted against a fuller understanding by regulators, policymakers, researchers and practitioners....

    Provided By Griffith University

  • White Papers // Nov 2009

    Securing Route and Path Integrity in Multi-Hop Wireless Networks

    Wireless networks are becoming ubiquitous and can be found in domestic, commercial, industrial, military, and healthcare applications. In these application areas network security assumes an increasingly important role because security breaches may result in the loss of human lives. This paper examines the problem of ensuring route integrity in multi-hop...

    Provided By Griffith University

  • White Papers // Jan 2013

    IEEE 802.11i WLAN Security Protocol - A Software Engineer's Model

    Wireless Local Area Networks (WLANs) based on the IEEE 802.11 standards are one of today's fastest growing technologies in businesses, schools, and homes, for good reasons. In this paper, the authors propose the use of GSE methodology to analyze the incompleteness and uncertainties in specifications. The IEEE 802.11i security protocol...

    Provided By Griffith University

  • White Papers // Apr 2007

    Formal Verification of the IEEE 802.11i WLAN Security Protocol

    With the increased usage of Wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. In this paper, the authors investigate the integrity of the security model developed by them based on 802.11i Robust Security Network (RSN), strengthening their desire towards establishing a secure wireless...

    Provided By Griffith University

  • White Papers // Oct 2013

    Compliant Business Process Design by Declarative Specifications

    The authors propose algorithms to synthesize the specifications modeling the capabilities of an agent, the environment they acts in, and the governing norms, into a process graph. This process graph corresponds to a collection of courses of action and represents all the licit alternatives the agent may choose to meet...

    Provided By Griffith University

  • White Papers // Oct 2008

    Trust, Social Network and Electronic Commerce Adoption

    This paper uses an empirical case study methodology to examine the impact of trust within social networks on Thai SMEs' adoption of Electronic Commerce (EC). In particular, the paper examines the significance of dispositional and experiential trust between social network members on EC adoption. The findings suggest that dispositional trust...

    Provided By Griffith University

  • White Papers // Jan 2010

    Routine Activity Theory and Phishing Victimisation: Who Gets Caught in the 'Net'?

    Phishing is the use of fraudulent emails to obtain personal financial information from victims by posing as legitimate financial institutions or commerce sites. This exploratory paper involved interviewing 104 participants, 50 of whom reported having received a phishing email. The theoretical foundation for this research is routine activity theory, whereby...

    Provided By Griffith University

  • White Papers // Jun 2008

    Analysis of Proposed Key Establishment Protocols in Multi-Tiered Sensor Networks

    Wireless sensor networks provide solutions to a range of monitoring problems. However, they introduce a new set of problems mainly due to small memories, weak processors, limited energy and small packet size. Thus only a very few conventional protocols can readily be used in sensor networks. This paper closely examines...

    Provided By Griffith University