- Information and Cyber Security
- Privacy, Security, and Data Protection
- Cybersecurity and Cyber Warfare Studies
- Network Security and Intrusion Detection
- Cybercrime and Law Enforcement Studies
- Media Influence and Health
- Cloud Data Security Solutions
- Information Technology Governance and Strategy
- Digital Transformation in Law
- Death Anxiety and Social Exclusion
- Scientific Research and Philosophical Inquiry
- Economic and Technological Systems Analysis
- IoT and Edge/Fog Computing
- Technology and Data Analysis
- Risk and Safety Analysis
- Legal and Policy Issues
- User Authentication and Security Systems
- Context-Aware Activity Recognition Systems
- Access Control and Trust
- Innovation in Digital Healthcare Systems
- Big Data Technologies and Applications
- Ethics and Social Impacts of AI
- Virtual Reality Applications and Impacts
- Digital and Cyber Forensics
- Arctic and Russian Policy Studies
Deakin University
2023-2024
The University of Melbourne
2014-2019
West Texas A&M University
2018
West Texas A&M University established a strategic initiative to develop the Internet of Things across its 176-acre campus that connects more than 42 different buildings, including 11 residence halls and 2,393-acre working ranch is dedicated faculty student research in agriculture, livestock, crop land management, development wind energy. The has recently adopted NIST Cybersecurity Framework, which now used by 30 percent U.S. organizations projected reach 50 2020 [1]. This security policy...
The Internet of Things (IoT) is considered to be one the most significant disruptive technologies modern times, and promises impact our lives in many positive ways.At same time, its interactivity interconnectivity poses challenges privacy data protection.Following an exploratory interpretive qualitative case study approach, we interviewed 14 active IoT users plus ten designers/developers Melbourne, Australia explore their experiences concerns about protection a more networked world enabled...
Three deficiencies exist in the organisational practice of information security risk management: assessments are commonly perfunctory, risks estimated without investigation; is assessed on an occasional (as opposed to continuous) basis.These tendencies indicate that important data being missed and situation awareness decision-makers many organisations currently inadequate.This research-in-progress paper uses Endsley's theory, examines how structure functions US national intelligence...
Identity proofing is often a prerequisite for accessing important services (e.g., opening bank account). The current pandemic has highlighted the need Remote Proofing (RIDP) that can enable applicants to prove their identity from anywhere, without special facility. However, requirements set out by National Institute of Standards and Technology (NIST) highest level assurance in RIDP systems currently rule fully automated remote solutions, as they are not yet foolproof. This article aims...
Advanced persistent threat (APT) is widely acknowledged to be the most sophisticated and potent class of security threat. APT refers knowledgeable human attackers that are organized, highly motivated achieve their objectives against a targeted organization(s) over prolonged period. Strategically-motivated APTs or S-APTs distinct in they draw from broader strategic agenda third parties such as criminal syndicates, nation-states, rival corporations. In this paper we review use term -...
In collaboration with the International Telecommunication Union (ITU), Global Cyber Security Capacity Centre (GCSCC, or ‘the Centre’) together its regional partner, Oceania (OCSC) undertook a review of maturity cybersecurity capacity in Independent State Samoa at invitation Ministry Communications and Information Technology (MCIT). The objective this was to enable government benchmark national set priorities for strategic investment development.Over period 18-20 April 2018, following...