4605. Data management and data science


Title4605. Data management and data science
Parent46. Information and Computing Sciences

Latest research outputs

Sort by Date Title
The role of trust and dependency on e-procurement adoption: an empirical analysis
Abdullah, Nik Ab Halim Nik and Al-Hakim, Latif. 2008. "The role of trust and dependency on e-procurement adoption: an empirical analysis." Hoque, Mohammad Ziaul (ed.) 9th International Business Research Conference. Melbourne, Australia 24 - 26 Nov 2008 Melbourne, Australia.

Paper

ABDM: an extended flexible delegation model in RBAC
Li, Min and Wang, Hua. 2008. "ABDM: an extended flexible delegation model in RBAC." Wu, Qiang and He, Xiangjian (ed.) 8th IEEE International Conference on Computer and Information Technology. Sydney, Australia 08 - 11 Jul 2008 United States. https://doi.org/10.1109/CIT.2008.4594707

Paper

(p+, α)-sensitive k-anonymity: a new enhanced privacy protection model
Sun, Xiaoxun, Wang, Hua, Truta, Traian Marius, Li, Jiuyong and Li, Ping. 2008. "(p+, α)-sensitive k-anonymity: a new enhanced privacy protection model." Wu, Qiang (ed.) 8th IEEE International Conference on Computer and Information Technology. Sydney, Australia 08 - 11 Jul 2008 United States. https://doi.org/10.1109/CIT.2008.4594650

Paper

Advanced permission-role relationship in role-based access control
Li, Min, Wang, Hua, Plank, Ashley and Yong, Jianming. 2008. "Advanced permission-role relationship in role-based access control." Mu, Yi, Susilo, Willy and Seberry, Jennifer (ed.) ACISP 2008: 13th Australasian Conference on Information Security and Privacy . Wollongong, Australia 07 - 09 Jul 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-70500-0-29

Paper

OpenCourseWare, global access and the right to education: real access or marketing ploy?
Huijser, Henk, Bedford, Tas and Bull, David. 2008. "OpenCourseWare, global access and the right to education: real access or marketing ploy?" International Review of Research in Open and Distance Learning. 9 (1), pp. 1-13. https://doi.org/10.19173/irrodl.v9i1.446

Article

Delegating revocations and authorizations
Wang, Hua and Cao, Jinli. 2008. "Delegating revocations and authorizations." ter Hofstede, A., Benatallah, B. and Paik, H. Y. (ed.) 5th International Conference on Business Process Management (BPM 2007) . Brisbane, Australia 24 - 28 Sep 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78238-4_29

Paper

New data integration workflow design for e-learning
Xi, Shengtian and Yong, Jianming. 2007. "New data integration workflow design for e-learning." Lecture Notes in Computer Science (Book series). 4402, pp. 699-707. https://doi.org/10.1007/978-3-540-72863-4_71

Article

A fast algorithm for finding correlation clusters in noise data
Li, Jiuyong, Huang, Xiaodi, Selke, Clinton and Yong, Jianming. 2007. "A fast algorithm for finding correlation clusters in noise data." Zhou, Zhi-Hua, Li, Hang and Yang, Qiang (ed.) 11th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2007). Nanjing, China 22 - 25 May 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-71701-0_68

Paper

The web portal as a collaborative tool
Rowe, Michelle and Pease, Wayne. 2007. "The web portal as a collaborative tool." Tatnall, Arthur (ed.) Encyclopedia of portal technologies and applications. Hershey, PA. United States. IGI Global. pp. 1138-1143

Edited book (chapter)

A system employing peer review and enhanced computer assisted assessment of querying skills
de Raadt, Michael, Dekeyser, Stijn and Lee, Tien Y.. 2007. "A system employing peer review and enhanced computer assisted assessment of querying skills." Informatics in Education. 6 (1), pp. 163-178.

Article

Y-generation students fail with Google
Genrich, Rohan, Roberts, Dave and Grist, Shelly. 2006. "Y-generation students fail with Google." Spencer, S. and Jenkins, A. (ed.) 17th Australasian Conference on Information Systems (ACIS 2006). Adelaide, Australia 06 - 08 Dec 2006 Adelaide, Australia.

Paper

Stakeholder power in e-business adoption with games theory perspective
Roberts, Barbara. 2006. "Stakeholder power in e-business adoption with games theory perspective." Spencer, S. and Jenkins, A. (ed.) 17th Australasian Conference on Information Systems (ACIS 2006). Adelaide, Australia 06 - 08 Dec 2006 Australia.

Paper

Is the internet good for our environment?
Parsons, David. 2006. "Is the internet good for our environment? " Electroline.

Article

e-Commerce and small business in regional Australia
Pease, Wayne and Rowe, Michelle. 2006. "e-Commerce and small business in regional Australia." Marshall, Stewart, Taylor, Wal and Yu, Xinghuo (ed.) Encyclopedia of developing regional communities with information and communication technology. Hershey, PA, United States. IGI Global. pp. 227-232

Edited book (chapter)

ICT and regional development in Australia
Pease, Wayne, Rowe, Michelle and Wright, Lauretta. 2006. "ICT and regional development in Australia." Marshall, Stewart, Taylor, Wal and Yu, Xinghuo (ed.) Encyclopedia of developing regional communities with information and communication technology. United States. IGI Global. pp. 348-352

Edited book (chapter)

E-business processes and factors of influence: one model does not fit all
Roberts, Barbara and Toleman, Mark. 2006. "E-business processes and factors of influence: one model does not fit all." 10th Pacific Asia Conference on Information Systems (PACIS 2006). Kuala Lumpur, Malaysia 06 - 09 Jul 2006 China.

Paper

An analysis of the major issues for successful information technology transfer in Arab countries
Al-Mabrouk, Khalid and Soar, Jeffrey. 2009. "An analysis of the major issues for successful information technology transfer in Arab countries." Journal of Enterprise Information Management. 22 (5), pp. 504-522. https://doi.org/10.1108/17410390910993518

Article

Critical factors impacting knowledge sharing among R&D organisations
Al-Hakim, Latif. 2011. "Critical factors impacting knowledge sharing among R&D organisations." 2011 ICSTI Public Conference. Beijing, China 07 - 08 Jun 2011 Irvine, CA, USA.

Paper

Specifying role-based access constraints with object constraint language
Wang, Hua, Zhang, Yanchun, Cao, Jinli and Yang, Jian. 2004. "Specifying role-based access constraints with object constraint language." Yu, Jeffrey Xu, Lin, Xuemin, Lu, Hongjun and Zhang, Yanchun (ed.) 6th Asia-Pacific Web Conference: Advanced Web Technologies and Applications (APWeb 2004). Hangzhou, China 14 - 17 Apr 2004 Berlin, Germany. Springer.

Paper

Validating privacy requirements in large survey rating data
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2011. "Validating privacy requirements in large survey rating data." Bessis, Nik and Xhafa, Fatos (ed.) Next generation data technologies for collective computational intelligence. Berlin, Germany. Springer. pp. 445-469

Edited book (chapter)

Piecemeal: a formal collaborative editing technique guaranteeing correctness
Dekeyser, Stijn and Hidders, Jan. 2010. "Piecemeal: a formal collaborative editing technique guaranteeing correctness." Bessis, Nik, Kommers, Piet and Isaias, Pedro (ed.) IADIS International Conference on Collaborative Technologies 2010 (IADIS 2010). Freiburg, Germany 26 - 31 Jul 2010 Germany.

Paper

Connecting users and items with weighted tags for personalized item recommendations
Liang, Huizhi, Xu, Yue, Li, Yuefeng, Nayak, Richi and Tao, Xiaohui. 2010. "Connecting users and items with weighted tags for personalized item recommendations." Chignell, Mark and Toms, Elaine (ed.) HT 2010: 21st ACM Conference on Hypertext and Hypermedia. Toronto, Canada 13 - 16 Jun 2010 New York, USA. https://doi.org/10.1145/1810617.1810628

Paper

Ontology-based specific and exhaustive user profiles for constraint information fusion for multi-agents
Tao, Xiaohui, Li, Yuefeng, Lau, Raymond Y. K. and Geva, Shlomo. 2010. "Ontology-based specific and exhaustive user profiles for constraint information fusion for multi-agents." Huang, Xiangji Jimmy, King, Irwin, Raghavan, Vijay and Rueger, Stefan (ed.) 2010 IEEE/WIC/ACM International Conference on Web Intelligence. Toronto, Canada 31 Aug - 03 Sep 2010 Los Alamitos, CA. United States. https://doi.org/10.1109/WI-IAT.2010.76

Paper

A knowledge-based model using ontologies for personalized web information gathering
Tao, Xiaohui, Li, Yuefeng and Zhong, Ning. 2010. "A knowledge-based model using ontologies for personalized web information gathering." Web Intelligence. 8 (3), pp. 235-254. https://doi.org/10.3233/WIA-2010-0189

Article

The enablers and implementation model for mobile KMS in Australian healthcare
Tsai, Heng-Sheng and Gururajan, Raj. 2010. "The enablers and implementation model for mobile KMS in Australian healthcare." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.22

Paper

Building a mobile website
MacAlpine, Ken. 2011. "Building a mobile website." 3rd International m-libraries Conference 2011: Mobile Technologies: Information on the Move. Brisbane, Australia 11 - 13 May 2011 Brisbane, Australia.

Presentation

Mapping a library
MacAlpine, Ken. 2011. "Mapping a library." 3rd International m-libraries Conference 2011: Mobile Technologies: Information on the Move. Brisbane, Australia 11 - 13 May 2011 Brisbane, Australia.

Poster

Integrating mobile into existing applications
Moffatt, Sam. 2011. "Integrating mobile into existing applications." 3rd International m-libraries Conference 2011: Mobile Technologies: Information on the Move. Brisbane, Australia 11 - 13 May 2011 Brisbane, Australia.

Presentation

A conditional role-involved purpose-based access control model
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "A conditional role-involved purpose-based access control model." Journal of Organizational Computing and Electronic Commerce. 21 (1), pp. 71-91. https://doi.org/10.1080/10919392.2011.541007

Article

Trust-involved access control in collaborative open social networks
Wang, Hua and Sun, Lili. 2010. "Trust-involved access control in collaborative open social networks." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.13

Paper

Modelling of staged routing for reduced carbon footprints of large server clusters
Kist, Alexander A.. 2011. "Modelling of staged routing for reduced carbon footprints of large server clusters." International Journal of Communication Networks and Distributed Systems. 6 (1), pp. 28-44. https://doi.org/10.1504/IJCNDS.2011.037326

Article

Repositories post 2010: embracing heterogeneity in AWE, the Academic Working Environment
Sefton, Peter and Dickinson, Duncan. 2010. "Repositories post 2010: embracing heterogeneity in AWE, the Academic Working Environment." 5th International Conference on Open Repositories. Madrid, Spain 06 - 09 Jul 2010

Paper

A proposal for a LCA community knowledge management system
Grist, Shelly and Toleman, Mark. 2010. "A proposal for a LCA community knowledge management system." Notarnicola, Bruno, Settanni, Ettore, Tassielli, Giuseppe and Giungato, Pasquale (ed.) 7th International Conference on Life Cycle Assessment in the Agri-Food Sector (LCA Food 2010). Bari, Italy 22 - 24 Sep 2010 Bari, Italy.

Poster

Adoption of e-commerce by Canadian SMEs: defining organizational, environmental and innovation characteristics
Sparling, Lynn, Cater-Steel, Aileen and Toleman, Mark. 2010. "Adoption of e-commerce by Canadian SMEs: defining organizational, environmental and innovation characteristics." Encyclopedia of e-business development and management in the global economy. Hershey, PA, United States. IGI Global. pp. 305-315

Edited book (chapter)

The influence of B2B e-commerce on SMEs' performance and efficiency: a review of the literature
Al-Bakri, Anas, Cater-Steel, Aileen and Soar, Jeffrey. 2010. "The influence of B2B e-commerce on SMEs' performance and efficiency: a review of the literature." International Journal of Liability and Scientific Enquiry. 3 (3), pp. 213-224. https://doi.org/10.1504/IJLSE.2010.033356

Article

Systematic clustering method for l-diversity model
Kabir, Md Enamul, Wang, Hua, Bertino, Elisa and Chi, Yunxiang. 2010. "Systematic clustering method for l-diversity model." Shen, Heng Tao and Bouguettaya, Athman (ed.) ADC 2010: 21st Australasian Conference on Database Technologies. Brisbane, Australia 18 - 22 Jan 2010 Sydney, Australia.

Paper

Privacy-aware access control with generalization boundaries
Li, Min, Wang, Hua and Plank, Ashley. 2009. "Privacy-aware access control with generalization boundaries." Mans, Bernard (ed.) 32nd Australasian Computer Science Conference (ACSC 2009). Wellington, New Zealand 19 - 23 Jan 2009 Sydney, Australia.

Paper

Using clickers to support information literacy skills development and instruction in first-year business students
Stagg, Adrian and Lane, Michael. 2010. "Using clickers to support information literacy skills development and instruction in first-year business students." Journal of Information Technology Education: Research. 9, pp. 197-215.

Article

Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2009. "Injecting purpose and trust into data anonymisation." Cheung, David, Song, Il-Yeol, Chu, Wesley, Hu, Xiaohua and Lin, Jimmy (ed.) 18th ACM International Conference on Information and Knowledge Management (CIKM 2009) . Hong Kong, China 02 - 06 Nov 2009 New York, USA. https://doi.org/10.1145/1645953.1646166

Poster

Internet and self-regulation in China: the cultural logic of controlled commodification
Weber, Ian and Lu, Jia. 2007. "Internet and self-regulation in China: the cultural logic of controlled commodification." Media Culture and Society. 29 (5), pp. 772-789. https://doi.org/10.1177/0163443707080536

Article