- Privacy, Security, and Data Protection
- Information and Cyber Security
- Outsourcing and Supply Chain Management
- User Authentication and Security Systems
- Customer Service Quality and Loyalty
- Service-Oriented Architecture and Web Services
- Privacy-Preserving Technologies in Data
- Innovative Human-Technology Interaction
- Network Security and Intrusion Detection
- Cybersecurity and Cyber Warfare Studies
- Advanced Malware Detection Techniques
- Collaboration in agile enterprises
- Advanced Software Engineering Methodologies
- Evolutionary Algorithms and Applications
- Innovation in Digital Healthcare Systems
- Security and Verification in Computing
- Personal Information Management and User Behavior
- Emotional Labor in Professions
- Blockchain Technology Applications and Security
- Cybercrime and Law Enforcement Studies
- Internet Traffic Analysis and Secure E-voting
- Cryptography and Data Security
- Open Source Software Innovations
- Access Control and Trust
- Quality and Supply Management
Deakin University
2021-2024
Monash University
2019
Australian Regenerative Medicine Institute
2019
The University of Melbourne
2017-2018
Cybersecurity cannot be addressed by technology alone; the most intractable aspects are in fact sociotechnical. As a result, 'human factor' has been recognised as being weakest and obscure link creating safe secure digital environments. This study examines subjective often complex nature of human factors cybersecurity context through systematic literature review 27 articles which span across technical, behavior social sciences perspectives. Results from our suggest that there is still...
Abstract The evolution of quantum computers is considered a serious threat to public‐key cryptosystems (e.g. RSA, ECDSA, ECDH, etc.). This indeed big concern for security the Internet and other data communication storage systems. reason that schemes are basis in generation shared symmetric keys used perform encryption/decryption transfer protocols. One possible approach address this issue use Quantum Key Distribution (QKD) (instead schemes) ultra‐secure keys. QKD physical layer technology...
Despite the enhanced security benefits offered by Physical Authentication Devices (PADs) compared to other forms of Multi-Factor (MFA), adoption and retention PADs remain relatively low in comparison MFA methods. Evidence indicates that limited widespread usage are primarily due negative user perceptions concerning their usability features. Moreover, there's a understanding how users from diverse backgrounds perceive with varying standards To bridge this knowledge gap, we undertook multiple...
Recent IT Outsourcing (ITO) studies have highlighted the importance of a construct known as Psychological Contract (PC) and its impact over outcome ITO agreements. However, there is still lack consolidated view on subject matter. To address this matter, we conducted systematic review analysis PC within by examining main themes, topics methodologies that been used in research to date. Our findings suggest despite being well recognised, it an under explored concept with only 12 identified...
National culture and cybersecurity maturity (CM) both play defining roles in the identity security of a nation. This study examines relationship that these two constructs determining whether certain cultural dimensions nation leads to riskier behaviours. Based on confirmed affirmation between national CM, we develop research model based fuzzy logic predict level influence has country's Cybersecurity Maturity Level (CML). The was generated three semantic steps: (1) conducting statistical...
This article first formalizes the problem of unlinkable attribute-based authentication in system where each user possesses multiple assertions and uses them interchangeably. Currently, there are no recommendations for optimal usage such systems. To mitigate this issue, we use conditional entropy to measure uncertainty a Relying Party who attempts link observed with labels. Conditional is function statistics all system. Personal decisions made by users about contribute these statistics....
Identity proofing is often a prerequisite for accessing important services (e.g., opening bank account). The current pandemic has highlighted the need Remote Proofing (RIDP) that can enable applicants to prove their identity from anywhere, without special facility. However, requirements set out by National Institute of Standards and Technology (NIST) highest level assurance in RIDP systems currently rule fully automated remote solutions, as they are not yet foolproof. This article aims...
One of the challenges to adoption decentralised approach digital ID is a lack consensus and standardisation how different stakeholders within ecosystem can inter-operate. As means address this issue, we examine use standard application programming interfaces (API) integrate identification systems preexisting ones. We first current literature solutions (a) assess attributes necessary compare contrast APIs, (b) create list API providers marketplace, (c) against established. Based on an...
Different assessment models exist to measure a country's cyber security maturity levels.These levels serve as benchmark for indicating how well prepared nation is against attack and resilient it would be in recovering from such an attack.However, results these assessments are either too general, overly complex, or resource intensive apply guide important national strategies frameworks.To address this we propose model link culture with through fuzzy logic mapping ensure that more uniform...
Many companies are now looking towards offshore vendors to fulfill their outsourcing requirements. With this growth, we have seen particular countries such as India dominate the offshoring market, and paper will examine what type of role reputation a country has on decision making process firms offshore.
Attribute-Based Authentication (ABA) is becoming more prevalent in everyday interactions. In this paper, we propose the Decision-Making Method for (DMMA) to address privacy concerns ABA. The need DMMA supported through multiple observations. First, practice, indistinguishability of crypto-proof-based assertions (that are posessed by different users) fails with non-zero probability. This explains why cryptographic means alone insufficient provide a substantial level unlinkability ABA systems...
The purpose of this study is to find whether the choice correct analytic process effective derive a meaningful and conclusion from vast amount information. For purpose, I designed an framework investigate importance communication on success IT business. Through detailed analysis chat conversations between outsource service provider client, found evidence suggest that language used in instant messaging environments clients & offshore providers was highly fragmented broken, but both client did...