A purpose based access control in XML databases system

Paper


Sun, Lili, Wang, Hua, Jururajin, Raj and Sriprakash, Sri. 2010. "A purpose based access control in XML databases system." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Los Alamitos, CA. USA. https://doi.org/10.1109/NSS.2010.28
Paper/Presentation Title

A purpose based access control in XML databases system

Presentation TypePaper
AuthorsSun, Lili (Author), Wang, Hua (Author), Jururajin, Raj (Author) and Sriprakash, Sri (Author)
EditorsXiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza
Journal or Proceedings TitleProceedings of the 4th International Conference on Network and System Security (NSS 2010)
ERA Conference ID43468
Number of Pages8
Year2010
Place of PublicationLos Alamitos, CA. USA
ISBN9781424484843
Digital Object Identifier (DOI)https://doi.org/10.1109/NSS.2010.28
Conference/EventNSS 2010: 4th International Conference on Network and System Security
International Conference on network and System Security
Event Details
International Conference on network and System Security
NSS
Rank
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
Event Details
NSS 2010: 4th International Conference on Network and System Security
Parent
International Conference on network and System Security
Delivery
In person
Event Date
01 to end of 03 Sep 2010
Event Location
Melbourne, Australia
Abstract

With the growing importance of privacy in data access, much research has been done on the privacy protecting technology in recent years. Developing an access control model and related mechanisms to support a selective access data become important. The extensible markup language (XML) is rapidly emerging as the new standard language for semi-structured data representation and exchange on the Internet. And now more and more information is distributed in XML format. In this article, we present a comprehensive approach for privacy preserving access control based on the notion of purpose. In our model, purpose information associated with a given data elements in an XML document specifies the intended use of the data elements. An important issue addressed in this article is the granularity of data labeling for data elements in XML documents and tree databases with which purposes can be associated. We address this issue in XML databases and propose different labeling schemes for XML documents. We also propose an approach to represent purpose information to support access control based on purpose information. Our proposed solution relies on usage access control (UAC) models as well as the components which based on the notions of the purpose information used in subjects and objects. Finally, comparisons with related works are analysed.

Keywordsaccess control models; authorization; data access; labeling scheme; privacy preserving; privacy protecting; semi structured data; tree database; usage access control; XML database; XML databases; XML format
ANZSRC Field of Research 2020460499. Cybersecurity and privacy not elsewhere classified
460908. Information systems organisation and management
469999. Other information and computing sciences not elsewhere classified
Public Notes

© 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Byline AffiliationsDepartment of Mathematics and Computing
School of Information Systems
Queensland Institute of Medical Research, Australia
Permalink -

https://research.usq.edu.au/item/9zzw5/a-purpose-based-access-control-in-xml-databases-system

Download files


Other Documentation
Binder1.pdf
File access level: Anyone

  • 1994
    total views
  • 911
    total downloads
  • 0
    views this month
  • 0
    downloads this month

Export as

Related outputs

Exploring Rhythms and Channels-Based EEG Biomarkers for Early Detection of Alzheimer's Disease
Siuly, Siuly, Alcin, Ömer Faruk, Wang, Hua, Li, Yan and Wen, Peng. 2024. "Exploring Rhythms and Channels-Based EEG Biomarkers for Early Detection of Alzheimer's Disease ." IEEE Transactions on Emerging Topics in Computational Intelligence. 8 (2), pp. 1609-1623. https://doi.org/10.1109/TETCI.2024.3353610
Clustered FedStack: Intermediate Global Models with Bayesian Information Criterion
Zhou, Xujuan, Shaik, Thanveer, Tao, Xiaohui, Li, Lin, Higgins, Niall, Gururajan, Raj and Yong, Jianming. 2024. "Clustered FedStack: Intermediate Global Models with Bayesian Information Criterion." Pattern Recognition Letters. 177. https://doi.org/10.1016/j.patrec.2023.12.004
A survey of autonomous monitoring systems in mental health
Gururajan, Raj, Gopalakrishnan, Abinaya, Zhou, Xujuan, Venkataraman, Revathi, Chan, Ka Ching and Higgins, Niall. 2024. "A survey of autonomous monitoring systems in mental health." WIREs Data Mining and Knowledge Discovery. 14 (3). https://doi.org/10.1002/widm.1527
Attribute Selection Hybrid Network Model for risk factors analysis of postpartum depression using Social media
Gopalakrishnan, Abinaya, Gururajan, Raj, Venkataraman, Revathi, Zhou, Xujuan, Chan, Ka Chan, Saravanan, Arul and Sen, Maitrayee. 2023. "Attribute Selection Hybrid Network Model for risk factors analysis of postpartum depression using Social media." Brain Informatics. 10. https://doi.org/10.1186/s40708-023-00206-7
When can cancer patient treatment nonadherence be considered intentional or unintentional? A scoping review
Wreyford, Leon, Gururajan, Raj and Zhou, Xujuan. 2023. "When can cancer patient treatment nonadherence be considered intentional or unintentional? A scoping review." PLoS One. 18 (5). https://doi.org/10.1371/journal.pone.0282180
Exploring deep residual network based features for automatic schizophrenia detection from EEG
Siuly, Siuly, Guo, Yanhui, Alcin, Omer Faruk, Li, Yan, Wen, Peng and Wang, Hua. 2023. "Exploring deep residual network based features for automatic schizophrenia detection from EEG." Physical and Engineering Sciences in Medicine. 46 (2), pp. 561-574. https://doi.org/10.1007/s13246-023-01225-8
Identifying predictive biomarkers for repetitive transcranial magnetic stimulation response in depression patients with explainability
Squires, Matthew, Tao, Xiaohui, Elangovan, Soman, Gururajan, Raj, Zhou, Xujuan, Li, Yuefeng and Acharya, U. Rajendra. 2023. "Identifying predictive biomarkers for repetitive transcranial magnetic stimulation response in depression patients with explainability." Computer Methods and Programs in Biomedicine. 242. https://doi.org/10.1016/j.cmpb.2023.107771
Deep learning and machine learning in psychiatry: a survey of current progress in depression detection, diagnosis and treatment
Squires, Matthew, Tao, Xiaohui, Elangovan, Soman, Gururajan, Raj, Zhou, Xujuan, Acharya, U. Rajendra and Li, Yuefeng. 2023. "Deep learning and machine learning in psychiatry: a survey of current progress in depression detection, diagnosis and treatment." Brain Informatics. 10 (1). https://doi.org/10.1186/s40708-023-00188-6
Gynecological cancer prognosis using machine learning techniques: A systematic review of the last three decades (1990–2022)
Sheehy, Joshua, Rutledge, Hamish, Acharya, U. Rajendra, Loh, Hui Wen, Gururajan, Raj, Tao, Xiaohui, Zhou, Xujuan, Li, Yuefeng, Gurney, Tiana and Kondalsamy-Chennakesavan, S.. 2023. "Gynecological cancer prognosis using machine learning techniques: A systematic review of the last three decades (1990–2022)." Artificial Intelligence in Medicine. 139. https://doi.org/10.1016/j.artmed.2023.102536
A systematic review of literature on credit card cyber fraud detection using machine and deep learning
Marazqah Btoush, Eyad Abdel Latif, Zhou, Xujuan, Gururajan, Raj, Chan, Ka Ching, Genrich, Rohan and Sankaran, Prema. 2023. "A systematic review of literature on credit card cyber fraud detection using machine and deep learning." PeerJ Computer Science. 9 (1). https://doi.org/10.7717/peerj-cs.1278
Research on agricultural product quality traceability system based on blockchain technology
Zheng, Fang, Huang, Siyuan, Zhou, Xiong, Ta, Shujun, Zhou, Xujuan, Chan, Ka Ching and Gururajan, Raj. 2023. "Research on agricultural product quality traceability system based on blockchain technology ." Web Intelligence. https://doi.org/10.3233/WEB-220088
Remote patient monitoring using artificial intelligence: Current state, applications, and challenges
Shaik, Thanveer, Tao, Xiaohui, Higgins, Niall, Li, Li, Gururajan, Raj, Zhou, Xujuan and Acharya, U. Rajendra. 2023. "Remote patient monitoring using artificial intelligence: Current state, applications, and challenges." WIREs Data Mining and Knowledge Discovery. 13 (2). https://doi.org/10.1002/widm.1485
Predicting Women with Postpartum Depression Symptoms Using Machine Learning Techniques
Gopalakrishnan, Abinaya, Venkataraman, Revathi, Gururajan, Raj, Zhou, Xujuan and Zhu, Guohun. 2022. "Predicting Women with Postpartum Depression Symptoms Using Machine Learning Techniques." Mathematics. 10 (23). https://doi.org/10.3390/math10234570
Detecting Depression Using Single-Channel EEG and Graph Methods
Zhu, Guohun, Qiu, Tong, Ding, Yi, Gao, Shang, Zhao, Nan, Liu, Feng, Zhou, Xujuan and Gururajan, Raj. 2022. "Detecting Depression Using Single-Channel EEG and Graph Methods." Mathematics. 10 (22), pp. 1-10. https://doi.org/10.3390/math10224177
AI enabled RPM for Mental Health Facility
Shaik, Thanveer, Tao, Xiaohui, Higgins, Niall, Xie, Haoran, Gururajan, Raj and Zhou, Xujuan. 2022. "AI enabled RPM for Mental Health Facility." 1st ACM Workshop on Mobile and Wireless Sensing for Smart Healthcare (WMSSH 2022). Sydney, Australia 21 Oct 2022 New York, United States. https://doi.org/10.1145/3556551.3561191
FedStack: Personalized Activity Monitoring using Stacked Federated Learning
Shaik, Thanveer, Tao, Xiaohui, Higgins, Niall, Gururajan, Raj, Li, Yuefeng, Zhou, Xujuan and Acharya, U Rajendra. 2022. "FedStack: Personalized Activity Monitoring using Stacked Federated Learning." Knowledge-Based Systems. 257, pp. 1-14. https://doi.org/10.1016/j.knosys.2022.109929
Adaptive Fault Resolution for Database Replication Systems
Wee, Chee Keong, Zhou, Xujuan, Gururajan, Raj, Tao, Xiaohui and Wee, Nathan. 2022. "Adaptive Fault Resolution for Database Replication Systems." Li, Bohan, Yue, Lin, Jiang, Jing, Chen, Weitong, Li, Xue, Long, Guodong, Fang, Fei and Yu, Han (ed.) 17th International Conference on Advanced Data Mining and Applications (ADMA 2021). Sydney, Australia 02 - 04 Feb 2022 Berlin. Springer. https://doi.org/10.1007/978-3-030-95405-5_26
Mobile phone enabled mental health monitoring to enhance diagnosis for severity assessment of behaviours: a review
Gopalakrishnan, Abinaya, Venkataraman, Revathi, Gururajan, Raj, Xujuan, Zhou and Genrich, Rohan. 2022. "Mobile phone enabled mental health monitoring to enhance diagnosis for severity assessment of behaviours: a review." PeerJ Computer Science. 8, pp. 1-34. https://doi.org/10.7717/peerj-cs.1042
Stacked LSTM Sequence-to-Sequence Autoencoder with Feature Selection for Daily Solar Radiation Prediction: A Review and New Modeling Results
Ghimire, Sujan, Deo, Ravinesh C., Wang, Hua, Al-Musaylh, Mohanad S., Casillas-Perez, David and Salcedo-sanz, Sancho. 2022. "Stacked LSTM Sequence-to-Sequence Autoencoder with Feature Selection for Daily Solar Radiation Prediction: A Review and New Modeling Results." Energies. 15 (3), pp. 1-39. https://doi.org/10.3390/en15031061
A Survey on Credit Card Fraud Detection Techniques in Banking Industry for Cyber Security
Btoush, Eyad, Zhou, Xujuan, Gururajan, Raj, Chan, KC and Tao, XiaoHui. 2021. "A Survey on Credit Card Fraud Detection Techniques in Banking Industry for Cyber Security." 8th IEEE International Conference on Behavioural and Social Computing (BESC 2021). Doha, Qatar 29 - 31 Oct 2021 Doha, Qatar. https://doi.org/10.1109/BESC53957.2021.9635559
Talent management as a core source of innovation and social development in higher education
Mohammed, Atheer Abdullah, Hafeez-Baig, Abdul and Gururajan, Raj. 2018. "Talent management as a core source of innovation and social development in higher education." Parrish, Dominique (ed.) Innovations in higher education: cases on transforming and advancing practice. London, United Kingdom. IntechOpen. pp. 1-31
A survey on detection of cybersecurity threats on Twitter using deep learning
Alsodi, Omar, Zhou, Xujuan, Gururajan, Raj and Shrestha, Anup. 2021. "A survey on detection of cybersecurity threats on Twitter using deep learning." Xu, Guandong, Ali, Raian, Zaghouani, Wajdi, Tao, Xiaohui and Li, Lin (ed.) 8th IEEE International Conference on Behavioural and Social Computing (BESC 2021). Doha, Qatar 29 - 31 Oct 2021 United States. https://doi.org/10.1109/BESC53957.2021.9635406
A novel genetic algorithm based system for the scheduling of medical treatments
Squires, Matthew, Tao, Xiaohui, Elangovan, Soman, Gururajan, Raj, Zhou, Xujuan and Acharya, Udyavara Rajendra. 2022. "A novel genetic algorithm based system for the scheduling of medical treatments." Expert Systems with Applications. 195, pp. 1-12. https://doi.org/10.1016/j.eswa.2021.116464
Application of CycleGAN and transfer learning techniques for automated detection of COVID-19 using X-ray images
Bargshady, Ghazal, Zhou, Xujuan, Barua, Prabal Datta, Gururajan, Raj, Li, Yuefeng and Acharya, U. Rajendra. 2022. "Application of CycleGAN and transfer learning techniques for automated detection of COVID-19 using X-ray images." Pattern Recognition Letters. 153, pp. 67-74. https://doi.org/10.1016/j.patrec.2021.11.020
Artificial Intelligence Enabled Personalised Assistive Tools to Enhance Education of Children with Neurodevelopmental Disorders—A Review
Barua, Prabal Datta, Jahmunah, Jahmunah, Gururajan, Raj, Oh, Shu Lih, Palmer, Elizabeth, Azizan, Muhammad Mokhzaini, Kadri, Nahrizul Adib and Acharya, U. Rajendra. 2022. "Artificial Intelligence Enabled Personalised Assistive Tools to Enhance Education of Children with Neurodevelopmental Disorders—A Review ." International Journal of Environmental Research and Public Health. 19 (3). https://doi.org/10.3390/ijerph19031192
Development and Validation of a Dynamic Tool to Predict Aggressive Patient Behaviours in Hospital Settings: Artificial Intelligence-Based Approaches
Gururajan, R, Kondalsamy-Chennakesavan, S, Zhou, X. and Boon, K. 2022. "Development and Validation of a Dynamic Tool to Predict Aggressive Patient Behaviours in Hospital Settings: Artificial Intelligence-Based Approaches." Royal Australian College of Physicians (RACP) Congress 2022. Sydney, Australia 15 - 19 May 2022 SAGE Publications Ltd.
Integration of blockchains with management information systems
Chan, Ka Ching, Zhou, Xujuan, Gururajan, Raj, Zhou, Xiong, Ally, Mustafa and Gardiner, Michael. 2020. "Integration of blockchains with management information systems." Tamba, Tua A. (ed.) 2019 International Conference on Mechatronics, Robotics and Systems Engineering (MoRSE 2019). Bali, Indonesia 04 - 06 Dec 2019 https://doi.org/10.1109/MoRSE48060.2019.8998694
Twitter analysis for depression on social networks based on sentiment and stress
Tao, Xiaohui, Dharmalingam, Ravi, Zhang, Ji, Zhou, Xujuan, Li, Lin and Gururajan, Raj. 2019. "Twitter analysis for depression on social networks based on sentiment and stress." 6th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2019). Beijing, China 28 - 30 Oct 2019 United States. https://doi.org/10.1109/BESC48373.2019.8963550
MeKG: building a medical knowledge graph by data mining from MEDLINE
Pham, Thuan, Tao, Xiaohui, Zhang, Ji, Yong, Jianming, Zhou, Xujuan and Gururajan, Raj. 2019. "MeKG: building a medical knowledge graph by data mining from MEDLINE." Liang, Peipeng, Goel, Vinod and Shan, Chunlei (ed.) 12th International Conference on Brain Informatics (BI 2019). Haikou, China 13 - 15 Dec 2019 Switzerland. Springer. https://doi.org/10.1007/978-3-030-37078-7_16
A Case Study of Predicting Banking Customers Behaviour by Using Data Mining
Zhou, Xujuan, Bargshady, Ghazal, Abdar, Moloud, Tao, Xiaohui, Gururajan, Raj and Chan, K. C.. 2019. "A Case Study of Predicting Banking Customers Behaviour by Using Data Mining." 6th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2019). Beijing, China 28 - 30 Oct 2019 United States. https://doi.org/10.1109/BESC48373.2019.8963436
Factors influencing the adoption of electronic health records in the Australian environment
Ouheda, Salem, Hafeez-Baig, Abdul, Chakraborty, Subrata and Gururajan, Raj. 2019. "Factors influencing the adoption of electronic health records in the Australian environment." Kerr, Don, Blake, Jacqueline, Wang, Mingzhong and Tham, Aaron (ed.) 24th Annual Conference of the Asia Pacific DecisionSciences Institute: Technology Supporting People and Decision Making. Brisbane, Australia 15 - 18 Jul 2019 Brisbane, QLD, Australia.
Towards effective knowledge application capability in ITSM through socialisation, externalisation, internalisation and combination
Fathi, Abdulazeez, Hafeez-Baig, Abdul and Gururajan, Raj. 2019. "Towards effective knowledge application capability in ITSM through socialisation, externalisation, internalisation and combination." Kerr, Don, Blake, Jacqueline, Wang, Mingzhong and Tham, Aaron (ed.) 24th Annual Conference of the Asia Pacific DecisionSciences Institute: Technology Supporting People and Decision Making. Brisbane, Australia 15 - 18 Jul 2019 Brisbane, QLD, Australia.
An investigation into usability of big data analytics in the management of Type 2 Diabetes Mellitus
Bhotta, Dinakar, Hafeez-Baig, Abdul, Gururajan, Raj, Chakraborty, Subrata, Kavuri, Srinivas P. and Krishnan, Dharini. 2019. "An investigation into usability of big data analytics in the management of Type 2 Diabetes Mellitus." Kerr, Don, Blake, Jacqueline, Wang, Mingzhong and Tham, Aaron (ed.) 24th Annual Conference of the Asia Pacific DecisionSciences Institute: Technology Supporting People and Decision Making. Brisbane, Australia 15 - 18 Jul 2019 Brisbane, QLD, Australia.
Business model experimentation through technology and management innovation using cloud computing
Heaton, John, Hafeez-Baig, Abdul and Gururajan, Raj. 2019. "Business model experimentation through technology and management innovation using cloud computing." Kerr, Don, Blake, Jacqueline, Wang, Mingzhong and Tham, Aaron (ed.) 24th Annual Conference of the Asia Pacific DecisionSciences Institute: Technology Supporting People and Decision Making. Brisbane, Australia 15 - 18 Jul 2019 Brisbane, QLD, Australia.
Understanding factors influencing adoption of mobile devices in telehealth: a quantitative study
Rani, Vasundhara, Hafeez-Baig, Abdul and Gururajan, Raj. 2019. "Understanding factors influencing adoption of mobile devices in telehealth: a quantitative study." 24th Asia Pacific DSI Conference Program (APDSI 2019). Brisbane, Australia 15 - 18 Jul 2019
Conceptual framework for telehealth adoption in Indian healthcare
Chowdhury, Avijit, Hafeez-Baig, Abdul, Gururajan, Raj and Chakraborty, Subrata. 2019. "Conceptual framework for telehealth adoption in Indian healthcare." 24th Asia Pacific DSI Conference Program (APDSI 2019). Brisbane, Australia 15 - 18 Jul 2019
A set of quality metrics for the evaluation of voice termination services
Chan, Ka C., Zhou, Xujuan, Gururajan, Raj and Barua, Prabal. 2018. "A set of quality metrics for the evaluation of voice termination services." 5th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2018). Kaohsiung, Taiwan 12 - 14 Nov 2018 Los Alamitos, CA, United States. https://doi.org/10.1109/BESC.2018.00036
Based on the internet plus the safety of agricultural products traceability research
Zhou, Xiong, Zheng, Fang, Chan, Ka C., Zhou, Xujuan, Gururajan, Raj, Wu, Zhangguang and Zhou, Enxing. 2018. "Based on the internet plus the safety of agricultural products traceability research." 5th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2018). Kaohsiung, Taiwan 12 - 14 Nov 2018 United States. https://doi.org/10.1109/BESC.2018.8697322
Emerging Topic Detection from Microblog Streams Based on Emerging Pattern Mining
Peng, Min, Ouyang, Shuang, Zhu, Jiahui, Huang, Jiajia, Wang, Hua and Yong, Jianming. 2018. "Emerging Topic Detection from Microblog Streams Based on Emerging Pattern Mining." 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design. Nanjing, China 09 - 11 May 2018 United States. https://doi.org/10.1109/CSCWD.2018.8465166
Block Bayesian Sparse Topical Coding
Peng, Min, Shi, Hongliang, Xie, Qianqian, Zhang, Yihan, Wang, Hua, Li, Zhaoyunfei and Yong, Jianming. 2018. "Block Bayesian Sparse Topical Coding." 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design. Nanjing, China 09 - 11 May 2018 United States. https://doi.org/10.1109/CSCWD.2018.8465366
Role of Accessory Right Inferior Hepatic Veins in evaluation of Liver Transplantation
Ahmed, Awais, Hafeez-Baig, Abdul, Sharif, Mirza Akmal, Ahmed, Umair, Ahmed, Shozab and Gururajan, Raj. 2017. "Role of Accessory Right Inferior Hepatic Veins in evaluation of Liver Transplantation." Annals of Clinical Gastroenterology and Hepatology. 1 (1), pp. 12-16. https://doi.org/10.29328/journal.acgh.1001004
Development of a survey instrument to explore telehealth adoption in the healthcare domain
Chowdhury, Avijit, Hafeez-Baig, Abdul and Gururajan, Raj. 2021. "Development of a survey instrument to explore telehealth adoption in the healthcare domain." Yamamoto, Sakae and Mori, Hirohiko (ed.) 23RD International Conference on Human-Computer Interaction (HCII 2021). Washington DC, United States 24 - 29 Jul 2021 Switzerland. https://doi.org/10.1007/978-3-030-78361-7_16
The hidden reasons of the Vietnamese parents for paying private tuition fees for public school teachers
Nguyen, The Cuong, Hafeez-Baig, Abdul, Gururajan, Raj and Nguyen, Nam C.. 2021. "The hidden reasons of the Vietnamese parents for paying private tuition fees for public school teachers." Social Sciences & Humanities Open. 3 (1), pp. 1-10. https://doi.org/10.1016/j.ssaho.2021.100105
The role of image quality in telehealth: adoption challenges in the subcontinent
Chowdhury, Avijit, Hafeez-Baig, Abdul, Gururajan, Raj, McCubbin, Amanda, Sharif, Mirza Akmal and Miah, Shah J.. 2021. "The role of image quality in telehealth: adoption challenges in the subcontinent." Pacific Asia Journal of the Association for Information Systems. 13 (3), pp. 131-145. https://doi.org/10.17705/1pais.13307
Remote Patient Monitoring Using Radio Frequency Identification (RFID) Technology and Machine Learning for Early Detection of Suicidal Behaviour in Mental Health Facilities
Tao, Xiaohui, Shaik, Thanveer Basha, Higgins, Niall, Gururajan, Raj and Zhou, Xujuan. 2021. "Remote Patient Monitoring Using Radio Frequency Identification (RFID) Technology and Machine Learning for Early Detection of Suicidal Behaviour in Mental Health Facilities." Sensors. 21 (3), pp. 1-20. https://doi.org/10.3390/s21030776
Automated major depressive disorder detection using melamine pattern with EEG signals
Aydemir, Emrah, Tuncer, Tucker, Dogan, Sengul, Gururajan, Raj and Acharya, U. Rajendra. 2021. "Automated major depressive disorder detection using melamine pattern with EEG signals." Applied Intelligence. 51, pp. 6449-6466. https://doi.org/10.1007/s10489-021-02426-y
Automated interpretation of biopsy images for the detection of celiac disease using a machine learning approach
Koh, Joel En Wei, de Michele, Simona, Sudarshan, Vidya K., Jahmunah, V., Ciaccio, Edward J., Ooi, Chui Ping, Gururajan, Raj, Gururajan, Rashmi, Oh, Shu Lih, Lewis, Suzanne K., Green, Peter H., Bhagat, Govind and Acharya, U. Rajendra. 2021. "Automated interpretation of biopsy images for the detection of celiac disease using a machine learning approach." Computer Methods and Programs in Biomedicine. 203. https://doi.org/10.1016/j.cmpb.2021.106010
Future IoT tools for COVID-19 contact tracing and prediction: A review of the state-of-the-science
Jahmunah, Vicnesh, Sudarshan, Vidya K., Oh, Shu Lih, Gururajan, Raj, Gururajan, Rashmi, Zhou, Xujuan, Tao, Xiaohui, Faust, Oliver, Ciaccio, Edward J., Ng, Kwan Hoong and Acharya, U. Rajendra. 2021. "Future IoT tools for COVID-19 contact tracing and prediction: A review of the state-of-the-science." International Journal of Imaging Systems and Technology. 31 (2), pp. 455-471. https://doi.org/10.1002/ima.22552
A New Deep Convolutional Neural Network Model for Automated Breast Cancer Detection
Zhou, Xujuan, Li, Yuefeng, Gururajan, Raj, Bargshady, Ghazal, Tao, Xiaohui, Venkataraman, Revathi, Barua, Prabal D. and Kondalsamy-Chennakesavan, Srinivas. 2020. "A New Deep Convolutional Neural Network Model for Automated Breast Cancer Detection." 7th International Conference on Behavioural and Social Computing (BESC 2020). Bournemouth, United Kingdom 05 - 07 Nov 2020 United Kingdom. https://doi.org/10.1109/BESC51023.2020.9348322
A novel automated autism spectrum disorder detection system
Oh, Shu Lih, Jahmunah, V., Arunkumar, N., Abdulhay, Enas W., Gururajan, Raj, Kadri, Nahrizul, Ciaccio, Edward J., Cheong, Kang Hao and Acharya, U. Rajendra. 2021. "A novel automated autism spectrum disorder detection system." Complex and Intelligent Systems. 7 (5), pp. 2399-2413. https://doi.org/10.1007/s40747-021-00408-8
An automated skin melanoma detection system with melanoma-index based on entropy features
Cheong, Kang Hao, Tang, Kenneth Jian Wei, Zhao, Xinxing, Koh, Joel En Wei, Faust, Oliver ., Gururajan, Raj, Ciaccio, Edward J., Rajinikanth, V. and Acharya, U. Rajendra. 2021. "An automated skin melanoma detection system with melanoma-index based on entropy features." Biocybernetics and Biomedical Engineering. 41 (3), pp. 997-1012. https://doi.org/10.1016/j.bbe.2021.05.010
Classification of alcoholic EEG signals using a deep learning method
Farsi, Leila, Siuly, Siuly, Kabir, Enamul and Wang, Hua. 2020. "Classification of alcoholic EEG signals using a deep learning method." IEEE Sensors Journal. 21 (3), pp. 3552 - 3560. https://doi.org/10.1109/JSEN.2020.3026830
The Adoption of Mobile Technologies in Healthcare: The Perceptions of Healthcare Professionals Regarding Knowledge Management Practices in Developing Countries
Chowdhury, Avijit, Hafeez-Baig, Abdul, Gururajan, Raj and Sharif, Mirza Akmal. 2020. "The Adoption of Mobile Technologies in Healthcare: The Perceptions of Healthcare Professionals Regarding Knowledge Management Practices in Developing Countries." Stephanidis, Constantine, Salvendy, Gavriel, Wei, June, Yamamoto, Sakae, Mori, Hirohiko, Meiselwitz, Gabriele, Nah, Fiona Fui-Hoon and Siau, Keng (ed.) 22nd Human-Computer Interaction International Conference (HCI International 2020). Copenhagen, Denmark 19 - 24 Jul 2020 Switzerland. https://doi.org/10.1007/978-3-030-60152-2_5
The modeling of human facial pain intensity based on Temporal Convolutional Networks trained with video frames in HSV color space
Bargshady, Ghazal, Zhou, Xujuan, Deo, Ravinesh C., Soar, Jeffrey, Whittaker, Frank and Wang, Hua. 2020. "The modeling of human facial pain intensity based on Temporal Convolutional Networks trained with video frames in HSV color space." Applied Soft Computing. 97 (Part A), pp. 1-14. https://doi.org/10.1016/j.asoc.2020.106805
Finding an optimum set of roles in a CPAC model
Kabir, Enamul, Wang, Hua and Sun, Lili. 2019. "Finding an optimum set of roles in a CPAC model." 2019 International Conference on Networking and Network Applications (NaNA 2019). Daegu City, Korea 10 - 13 Oct 2019 Piscataway, United States. https://doi.org/10.1109/NaNA.2019.00014
Ensemble neural network approach detecting pain intensity from facial expressions
Bargshady, Ghazal, Zhou, Xujuan, Deo, Ravinesh C., Soar, Jeffrey, Whittaker, Frank and Wang, Hua. 2020. "Ensemble neural network approach detecting pain intensity from facial expressions." Artificial Intelligence in Medicine. 109, pp. 1-12. https://doi.org/10.1016/j.artmed.2020.101954
Preserving Data Privacy and Security in Australian My Health Record System : A Quality Health Care Implication
Vimalachandran, Pasupathy, Zhang, Yanchun, Cao, Jinli, Sun, Lili and Yong, Jianming. 2018. "Preserving Data Privacy and Security in Australian My Health Record System : A Quality Health Care Implication." 19th International Conference on Web Information Systems Engineering (WISE 2018). Dubai, United Arab Emirates 12 - 15 Nov 2018 Germany. Springer. https://doi.org/10.1007/978-3-030-02925-8_8
A new framework for automatic detection of patients with mild cognitive impairment using resting-state EEG signals
Siuly, Siuly, Alcin, Omer Faruk, Kabir, Enamul, Sengur, Abdulkadir, Wang, Hua, Zhang, Yanchun and Whittaker, Frank. 2020. "A new framework for automatic detection of patients with mild cognitive impairment using resting-state EEG signals." IEEE Transactions on Neural Systems and Rehabilitation Engineering. 28 (9), pp. 1966-1976. https://doi.org/10.1109/TNSRE.2020.3013429
A survey on text classification and its applications
Zhou, Xujuan, Gururajan, Raj, Li, Yuefeng, Venkataraman, Revathi, Tao, Xiaohui, Bargshady, Ghazala, Barua, Prabal D. and Kondalsamy-Chennakesavan, Srinivas. 2020. "A survey on text classification and its applications." Web Intelligence. 18 (2), pp. 205-216. https://doi.org/10.3233/WEB-200442
From Traceability to Provenance of Agricultural Products through Blockchain
Zhou, Xiong, Zheng, Fang, Zhou, Xujuan, Chan, Ka Ching, Gururajan, Raj, Wu, Zhangguang and Zhou, Enxing. 2020. "From Traceability to Provenance of Agricultural Products through Blockchain." Web Intelligence. 18 (3), pp. 181-189. https://doi.org/10.3233/WEB-200440
Automated prediction of sepsis using temporal convolutional network
Kok, Christopher, Jahmunah, V., Oh, Shu Lih, Zhou, Xujuan, Gururajan, Raj, Tao, Xiaohui, Cheong, Kang Hao, Gururajan, Rashmi, Molinari, Filippo and Acharya, U. Rajendra. 2020. "Automated prediction of sepsis using temporal convolutional network." Computers in Biology and Medicine. 127, pp. 1-10. https://doi.org/10.1016/j.compbiomed.2020.103957
The effect of talent management processes on knowledge creation: a case of Australian higher education
Mohammed, Atheer Abdullah, Hafeez Baig, Abdul and Gururajan, Raj. 2019. "The effect of talent management processes on knowledge creation: a case of Australian higher education." Journal of Industry-University Collaboration. 1 (3), pp. 132-152. https://doi.org/10.1108/JIUC-05-2019-0010
Enhanced deep learning algorithm development to detect pain intensity from facial expression images
Bargshady, Ghazal, Zhou, Xujuan, Deo, Ravinesh C., Soar, Jeffery, Whittaker, Frank and Wang, Hua. 2020. "Enhanced deep learning algorithm development to detect pain intensity from facial expression images." Expert Systems with Applications. 149, pp. 1-10. https://doi.org/10.1016/j.eswa.2020.113305
A study on securing software defined networks
Ur Rasool, Raihan, Wang, Hua, Rafique, Wajid, Yong, Jianming and Cao, Jinli. 2017. "A study on securing software defined networks." 18th International Conference on Web Information Systems Engineering - WISE 2017. Puschino, Russia 07 - 11 Oct 2017 Switzerland. https://doi.org/10.1007/978-3-319-68786-5
Understanding the factors that influence brand-image of a business school brand: a recruiters prospective
Kavuri, Srinivas Phani, Hafeez-Baig, Abdul, Gururajan, Raj and Bhotta, Dinakar. 2019. "Understanding the factors that influence brand-image of a business school brand: a recruiters prospective." Kerr, Don, Blake, Jacqueline, Wang, Mingzhong and Tham, Aaron (ed.) 24th Annual Conference of the Asia Pacific DecisionSciences Institute: Technology Supporting People and Decision Making. Brisbane, Australia 15 - 18 Jul 2019 Brisbane, QLD, Australia.
An exploratory qualitative research to address processes that are utilised for managing knowledge: a case study in a Queensland regional University
Mohammed, Atheer Abdullah, Hafeez-Baig, Abdul and Gururajan, Raj. 2019. "An exploratory qualitative research to address processes that are utilised for managing knowledge: a case study in a Queensland regional University." International Journal of Higher Education and Sustainability. 2 (3), pp. 173-196. https://doi.org/10.1504/IJHES.2019.101954
A new design of mental state classification for subject independent BCI systems
Joadder, Md. A. M., Siuly, S., Kabir, E., Wang, H. and Zhang, Y.. 2019. "A new design of mental state classification for subject independent BCI systems." IRBM. 40 (5), pp. 297-305. https://doi.org/10.1016/j.irbm.2019.05.004
A novel framework for distress detection through an automated speech processing system
Rana, Rajib, Gururajan, Raj, Mackenzie, Geraldine, Dunn, Jeff, Gray, Anthony, Zhou, Xujuan, Barua, Prabal Datta, Epps, Julien and Humphris, Gerald Michael. 2018. "A novel framework for distress detection through an automated speech processing system." 2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2018). Santiago, Chile 03 - 06 Dec 2018 Los Alamitos, CA, United States. https://doi.org/10.1109/WI.2018.00-29
Determination of factors influencing student engagement using a learning management system in a tertiary setting
Barua, Prabal Datta, Zhou, Xujuan, Gururajan, Raj and Chan, Ka C.. 2018. "Determination of factors influencing student engagement using a learning management system in a tertiary setting." 2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2018). Santiago, Chile 03 - 06 Dec 2018 Los Alamitos, CA, United States. https://doi.org/10.1109/WI.2018.00-30
A qualitative research to explore practices that are utilised for managing talent development in the higher education environment: a case study in six Australian universities
Mohammed, Atheer Abdullah, Hafeez-Baig, Abdul and Gururajan, Raj. 2019. "A qualitative research to explore practices that are utilised for managing talent development in the higher education environment: a case study in six Australian universities." Journal of Industry-University Collaboration. 1 (1), pp. 24-37. https://doi.org/10.1108/JIUC-02-2019-003
Automated screening for distress: A perspective for the future
Rana, Rajib, Latif, Siddique, Gururajan, Raj, Gray, Anthony, Mackenzie, Geraldine, Humphris, Gerald and Dunn, Jeff. 2019. "Automated screening for distress: A perspective for the future." European Journal of Cancer Care. 28 (4). https://doi.org/10.1111/ecc.13033
A qualitative research to explore processes that are utilized for managing talent: a case study in a Queensland regional university University
Mohammed, Atheer Abdullah, Hafeez-Baig, Abdul and Gururajan, Raj. 2018. "A qualitative research to explore processes that are utilized for managing talent: a case study in a Queensland regional university University." Australian Academy of Business and Economics Review. 4 (3), pp. 188-200.
A novel statistical technique for intrusion detection systems
Kabir, Enamul, Hu, Jiankun, Wang, Hua and Zhou, Guangping. 2018. "A novel statistical technique for intrusion detection systems." Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 79, pp. 303-318. https://doi.org/10.1016/j.future.2017.01.029
A new nested ensemble technique for automated diagnosis of breast cancer
Abdar, Moloud, Zomorodi-Moghadam, Mariam, Zhou, Xujuan, Gururajan, Raj, Tao, Xiaohui, Barua, Prabal D. and Gururajan, Rashmi. 2020. "A new nested ensemble technique for automated diagnosis of breast cancer." Pattern Recognition Letters. https://doi.org/10.1016/j.patrec.2018.11.004
Cloud service description model: an extension of USDL for cloud services
Sun, Le, Ma, Jiangan, Wang, Hua, Zhang, Yanchun and Yong, Jianming. 2018. "Cloud service description model: an extension of USDL for cloud services." IEEE Transactions on Services Computing. 11 (2), pp. 354-368. https://doi.org/10.1109/TSC.2015.2474386
Exploring processes that are used for managing knowledge in the higher education environment: a case study in a Queensland regional university
Mohammed, Atheer Abdullah, Hafeez-Baig, Abdul and Gururajan, Raj. 2018. "Exploring processes that are used for managing knowledge in the higher education environment: a case study in a Queensland regional university." International Journal of Business and Economic Affairs. 3 (2), pp. 73-90. https://doi.org/10.24088/IJBEA-2018-32004
A joint deep neural network model for pain recognition from face
Bargshady, Ghazal, Soar, Jeffrey, Zhou, Xujuan, Deo, Ravinesh, Whittaker, Frank and Wang, Hua. 2019. "A joint deep neural network model for pain recognition from face." 4th IEEE International Conference on Computer and Communication Systems (ICCCS 2019). Singapore 23 - 25 Feb 2019 Singapore. pp. 52-56 https://doi.org/10.1109/CCOMS.2019.8821779
An analysis system detecting epileptic seizure from EEG
Kabir, Enamul and Wang, Hua. 2017. "An analysis system detecting epileptic seizure from EEG." 2017 Young Statisticians Conference: Modelling Our Future. Tweed Heads, Australia 26 - 27 Sep 2017 Australia.
Primarily investigating into the relationship between talent management and knowledge management in business environment
Mohammed, Atheer Abdullah, Gururajan, Raj and Hafeez-Baig, Abdul. 2017. "Primarily investigating into the relationship between talent management and knowledge management in business environment." 2017 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2017). Leipzig, Germany 23 - 26 Aug 2017 New York, United States. https://doi.org/10.1145/3106426.3109444
Factors impacting employee engagement on enterprise social media
Sankaran, Prema, Bheeman, Sankaran, Priya, K. Hari, Zhou, Xujuan and Gururajan, Raj. 2017. "Factors impacting employee engagement on enterprise social media." 2017 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2017). Leipzig, Germany 23 - 26 Aug 2017 New York, United States. https://doi.org/10.1145/3106426.3115865
A Cross - layer Optimization of Video Transmission Based on Packet Loss Rate in 802.11e Wireless Networks
Zhou, Xujuan, Soar, Jeffrey, Gururajan, Raj, Wu, Zhangguang and Wu, Weimin. 2017. "A Cross - layer Optimization of Video Transmission Based on Packet Loss Rate in 802.11e Wireless Networks." 2017 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2017). Leipzig, Germany 23 - 26 Aug 2017 United States. https://doi.org/10.1145/3106426.3109445
A computer aided analysis scheme for detecting epileptic seizure from EEG data
Kabir, Enamul, Siuly, Siuly, Cao, Jinli and Wang, Hua. 2018. "A computer aided analysis scheme for detecting epileptic seizure from EEG data." International Journal of Computational Intelligence Systems. 11, pp. 663-671. https://doi.org/10.2991/ijcis.11.1.51
An empirical study to determine factors that motivate and limit the implementation of ICT in healthcare environments
Hafeez-Baig, Abdul and Gururajan, Raj. 2013. "An empirical study to determine factors that motivate and limit the implementation of ICT in healthcare environments." Deng, Hepu and Standing, Craig (ed.) 24th Australasian Conference on Information Systems (ACIS 2013). Melbourne, Australia 04 - 06 Dec 2013 Melbourne, Australia.
Cluster-based scheduling algorithm for periodic XML data broadcast in wireless environments
Qin, Yongrui, Wang, Hua and Sun, Lili. 2011. "Cluster-based scheduling algorithm for periodic XML data broadcast in wireless environments ." Zhang, Yanchun (ed.) 25th IEEE International Conference on Advanced Information Networking and Applications (WAINA 2011). Biopolis, Singapore 22 - 25 Mar 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/WAINA.2011.60
The determinants for the use of wireless system in traditional Chinese hospital
Su, Ying and Gururajan, Raj. 2009. "The determinants for the use of wireless system in traditional Chinese hospital." Luo, Ql and Tan, Honghua (ed.) WNIS 2009: International Conference on Wireless Networks and Information Systems. Shanghai, China 28 - 29 Dec 2009 United States. https://doi.org/10.1109/WNIS.2009.102
On secure wireless communications for IoT under eavesdropper collusion
Zhang, Yuanyu, Shen, Yulong, Wang, Hua, Yong, Jianming and Jiang, Xiaohong. 2016. "On secure wireless communications for IoT under eavesdropper collusion." IEEE Transactions on Automation Science and Engineering. 13 (3), pp. 1281-1293. https://doi.org/10.1109/TASE.2015.2497663
Adoption of mobile devices in the Australian healthcare: a conceptual framework approach
Rani Sood, Vasundhara, Gururajan, Raj, Hafeez-Baig, Abdul and Wickramasinghe, Nilmini. 2017. "Adoption of mobile devices in the Australian healthcare: a conceptual framework approach." Wickramasinghe, Nilmini (ed.) Handbook of research on healthcare administration and management. Hershey, PA, United States. IGI Global. pp. 662-685
An experimental analysis of assessor specific bias in a programming assessment in multi-assessor scenarios utilizing an eye tracker
Debnath, Tanmoy, Paul, Manoranjan, Chakraborty, Subrata, Podder, Pallab Kanti, Gururajan, Raj and Hafeez-Baig, Abdul. 2016. "An experimental analysis of assessor specific bias in a programming assessment in multi-assessor scenarios utilizing an eye tracker." Shoniregun, Charles A. and Akmayeva, Galyna A. (ed.) London International Conference on Education (LICE-2016). London, United Kingdom 14 - 17 Nov 2016 London, United Kingdom.
Study to investigate factors influencing adoption of mobile devices in the health care environment
Rani Sood, Vasundhara, Hafeez-Baig, Abdul and Gururajan, Raj. 2016. "Study to investigate factors influencing adoption of mobile devices in the health care environment." European Conference on Information Systems (ECIS 2016). Istanbul, Turkey 12 - 15 Jun 2016
Exercise, Diet Counselling, and Management for the Adults with Diabetes Mellitus: An Indian Case Study
Pathy, Dharnini, Gururajan, Raj, Hafeez-Baig, Abdul, Wickramasinghe, Nilmini and Gururajan, Rashmi. 2016. "Exercise, Diet Counselling, and Management for the Adults with Diabetes Mellitus: An Indian Case Study ." Wickramasignhe, Nilmini, Troshani, Indrit and Tan, Joseph (ed.) Contemporary consumer health informatics. Switzerland. Springer. pp. 15-52
Reliability of qualitative data using text analysis: a Queensland Health case study
Gururajan, Raj, Clark, Kevin, Moller, Suan, Sankaran, Prema, Hafeez Baig, Abdul, Wickramasinghe, Nilmini and Gururajan, Rashmi. 2016. "Reliability of qualitative data using text analysis: a Queensland Health case study." Wickramasinghe, Nilmini, Troshani, I. and Tan, J. (ed.) Contemporary Consumer Health Informatics. Switzerland. Springer. pp. 1-13
Editorial
Wang, Hua and Jia, Xiaohua. 2012. "Editorial." Journal of Software. 7 (11), pp. 2387-2388.
Reliability of qualitative data using text analysis: a Queensland Health case study
Gururajan, Raj, Hafeez-Baig, Abdul, Clark, Kevin, Moller, Susan and Sankaran, Prema. 2014. "Reliability of qualitative data using text analysis: a Queensland Health case study." 3rd International Conference on Eco-friendly Computing and Communication Systems (ICECCS 2014): Computing and Communication for Sustainable Development. Mangalore, India 18 - 21 Dec 2014 Piscataway, NJ. United States.
Synthesis and photoluminescence of nano/ microstructured Y0.95Eu0.05PO4 via hydrothermal process
Bao, Jinrong, Lu, Yue, Li, Wenxian, Wang, Hua and Yu, Ranbo. 2014. "Synthesis and photoluminescence of nano/ microstructured Y0.95Eu0.05PO4 via hydrothermal process." Optoelectronics and Advanced Materials, Rapid Communications. 8 (1-2), pp. 18-22.
Positive Influence Dominating Set Games
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui, Zhang, Ji, Yi, Xun and Yong, Jianming. 2014. "Positive Influence Dominating Set Games." Hou, Jiang-Liang, Trappey, Amy J. C., Wu, Chien-Wei, Chang, Kuo-Hao, Liao, Chuing-Shou, Shen, Wei-Ming, Barthes, Jean-Paul and Luo, Jun-Zhou (ed.) 18th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2014). Hsinchu, Taiwan 21 - 23 May 2014 United States. https://doi.org/10.1109/CSCWD.2014.6846890
Access control management with provenance in healthcare environments
Ma, Taotao, Wang, Hua, Cao, Jinli, Yong, Jianming and Zhao, Yueai. 2016. "Access control management with provenance in healthcare environments." 20th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCDW 2016). Nanchang, China 04 - 06 May 2016 United States. https://doi.org/10.1109/CSCWD.2016.7566048
Assuring reliability in qualitative studies: a health informatics persective
Hafeez-Baig, Abdul, Gururajan, Raj and Chakraborty, Subrata. 2016. "Assuring reliability in qualitative studies: a health informatics persective." 20th Pacific Asia Conference on Information Systems (PACIS 2016). Chiayi, Taiwan 27 Jun - 01 Jul 2016 Chiayi, Taiwan.
The Paradoxes of Telehealth: a Review of the Literature 2000–2015
Standing, Craig, Standing, Susan, McDermott, Marie-Louise, Gururajan, Raj and Marvi, Reza Kiani. 2018. "The Paradoxes of Telehealth: a Review of the Literature 2000–2015." Systems Research and Behavioral Science. 35 (1), pp. 90-101. https://doi.org/10.1002/sres.2442
Coming to Terms with Knowledge Management in Telehealth
Standing, Craig, Standing, Susan, Gururajan, Raj, Fulford, Richard and Gengatharen, Denise. 2018. "Coming to Terms with Knowledge Management in Telehealth." Systems Research and Behavioral Science. 35 (1), pp. 102-113. https://doi.org/10.1002/sres.2443
Title of PhD project: study to investigate factors influencing adoption of mobile devices in the health care environment
Rani Sood, Vasundhara, Gururajan, Raj and Hafeez Baig, Abdul. 2015. "Title of PhD project: study to investigate factors influencing adoption of mobile devices in the health care environment." 26th Australasian Conference on Information Systems (ACIS 2015). Adelaide, Australia 30 Nov - 04 Dec 2015 Adelaide, South Australia.
Microaggregation sorting framework for k-anonymity statistical disclosure control in cloud computing
Kabir, Md Enamul, Mahmood, Abdun Naser, Mustafa, Abdul K. and Wang, Hua. 2020. "Microaggregation sorting framework for k-anonymity statistical disclosure control in cloud computing." IEEE Transactions on Cloud Computing. 8 (2), pp. 408-417. https://doi.org/10.1109/TCC.2015.2469649
Handheld wireless devices and opinions of physicians in healthcare environment: a case of Pakistan
Hafeez-Baig, Abdul and Gururajan, Raj. 2014. "Handheld wireless devices and opinions of physicians in healthcare environment: a case of Pakistan." 25th Australasian Conference on Information Systems (ACIS 2014). Auckland, New Zealand 08 - 10 Dec 2014 Palmerston North, New Zealand.
Software development for managing nutrition intake for Type II Diabetes Mellitus
Krishnan, Dharini, Zhou, Xujuan, Chakraborty, Subrata, Gururajan, Rashmi and Gururajan, Raj. 2016. "Software development for managing nutrition intake for Type II Diabetes Mellitus." 10th International Conference on Software, Knowledge, Information Management and Application (SKIMA 2016). Chengdu, China 15 - 17 Dec 2016 China.
Objective Analysis of Marker Bias in Higher Education
Chakraborty, Subrata, Zhou, Susan, Hafeez-Baig, Abdul, Gururajan, Raj, Paul, Manoranjan, Mandal, Anuradha, Chacko, Anila Elizabeth and Barua, Prabal D.. 2017. "Objective Analysis of Marker Bias in Higher Education." 5th IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE 2016). Bangkok, Thailand 07 - 09 Dec 2016 Piscataway, United States. https://doi.org/10.1109/TALE.2016.7851839
The impact of diet counselling on Type 2 Diabetes Mellitus: an Indian case study
Krishnan, Dharini, Gururajan, Raj, Hafeez-Baig, Abdul, Kondalasamy-Chennakesavan, Srinivas, Wickramasinghe, Nilmini and Gururajan, Rashmi. 2015. "The impact of diet counselling on Type 2 Diabetes Mellitus: an Indian case study." Journal of Diabetes and Metabolism. 6 (10). https://doi.org/10.4172/2155-6156.1000610
What factors determine healthcare professionals’ (HCPs) acceptance of mobile devices for telehealth: a qualitative study conducted in Queensland, Australia
Rani Sood, Vasundhara, Gururajan, Raj and Hafeez Baig, Abdul. 2016. "What factors determine healthcare professionals’ (HCPs) acceptance of mobile devices for telehealth: a qualitative study conducted in Queensland, Australia." 2nd National Rural & Remote Telehealth Conference: Rural and Remote Telehealth at Home. Toowoomba, Australia 05 - 06 Oct 2016 Toowoomba, Australia.
What factors determine healthcare professionals’ (HCPs) acceptance of mobile devices for telehealth: a qualitative study conducted in Queensland, Australia
Rani Sood, Vasundhara, Hafeez Baig, Abdul and Gururajan, Raj. 2016. "What factors determine healthcare professionals’ (HCPs) acceptance of mobile devices for telehealth: a qualitative study conducted in Queensland, Australia." 2nd National Rural & Remote Telehealth Conference: Rural and Remote Telehealth at Home. Toowoomba, Australia 05 - 06 Oct 2016 Toowoomba, Australia.
Wireless technology and job performance attributes in a healthcare environment
Hafeez-Baig, Abdul and Gururajan, Raj. 2012. "Wireless technology and job performance attributes in a healthcare environment." Su, Ying (ed.) 7th International Conference on Cooperation and Promotion of Information Resources in Science and Technology (COINFO 2012): Information Sharing in the Cloud. Nanjing, China 23 - 25 Nov 2012 Irvine, CA. United States.
Causal dependencies of provenance data in healthcare environment
Ma, Taotao, Yong, Jianming, Wang, Hua and Zhao, Yueai. 2015. "Causal dependencies of provenance data in healthcare environment." Fortino, Giancarlo, Shen, Weiming, Barthes, Jean-Paul, Luo, Junzhou, Li, Wenfeng, Ochoa, Sergio, Abel, Marie-Helene, Guerrieri, Antonio and Ramos, Milton (ed.) 19th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2015). Calabria, Italy 06 - 08 May 2015 https://doi.org/10.1109/CSCWD.2015.7231033
Knowledge management in healthcare organizations
Wickramasinghe, Nilmini and Gururajan, Raj. 2016. "Knowledge management in healthcare organizations." Ortendlad, Anders, Abrahamson Lofstrom, Carina and Sheaff, Rod (ed.) Management innovations for healthcare organizations: adopt, abandon or adapt?. New York. Routledge. pp. 195-208
Efficient Algorithms for Scheduling XML Data in a Mobile Wireless Broadcast Environment
Qin, Yongrui, Wang, Hua, Zhang, Ji, Tao, Xiaohui, Zhang, Wei Emma, Taylor, Kerry and Sheng, Quan Z.. 2015. "Efficient Algorithms for Scheduling XML Data in a Mobile Wireless Broadcast Environment." 21st IEEE International Conference on Parallel and Distributed Systems (ICPADS 2015). Melbourne, Australia 14 - 17 Dec 2015 Australia. https://doi.org/10.1109/ICPADS.2015.96
Exploring sampling in the detection of multicategory EEG signals
Siuly, Siuly, Kabir, Enamul, Wang, Hua and Zhang, Yanchun. 2015. "Exploring sampling in the detection of multicategory EEG signals." Computational and Mathematical Methods in Medicine. 2015. https://doi.org/10.1155/2015/576437
An exploratory qualitative study to identify factors that influence the use of electronic patient journey boards in Queensland health
Gururajan, Raj, Hafeez Baig, Abdul, Sturgess, Julie, Clark, Kevin and Gururajan, Vijaya. 2015. "An exploratory qualitative study to identify factors that influence the use of electronic patient journey boards in Queensland health." Electronic Journal of Health Informatics. 9 (1).
On efficient and robust anonymization for privacy protection on massive streaming categorical information
Zhang, Ji, Li, Hongzhou, Liu, Xuemei, Luo, Yonglong, Chen, Fulong, Wang, Hua and Chang, Liang. 2017. "On efficient and robust anonymization for privacy protection on massive streaming categorical information." IEEE Transactions on Dependable and Secure Computing. 14 (5), pp. 507-520. https://doi.org/10.1109/TDSC.2015.2483503
Mobile telehealth technology assessment: Queensland case study
Gururajan, Raj, Little, Alison, Hafeez Baig, Abdul, Chakraborty, Subrata and Wickramasignhe, Nilmini. 2015. "Mobile telehealth technology assessment: Queensland case study." 23rd Australian National Health Informatics Conference (HIC 2015). Brisbane, Australia 03 - 05 Aug 2015 Australia.
Category captain arrangements in grocery retail marketing
Chimhundu, Ranga, Kong, Eric and Gururajan, Raj. 2015. "Category captain arrangements in grocery retail marketing." Asia Pacific Journal of Marketing and Logistics. 27 (3), pp. 368-384. https://doi.org/10.1108/APJML-08-2014-0124
Finding weighted positive influence dominating set to make impact to negatives: a study on online social networks in the new millennium
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2014. "Finding weighted positive influence dominating set to make impact to negatives: a study on online social networks in the new millennium." Kaur, Harleen and Tao, Xiaohui (ed.) ICTs and the millennium development goals: a United Nations perspective. New York, NY. United States. Springer. pp. 67-81
Making the most of virtual expertise in telemedicine and telehealth environments
Standing, Craig, Gururajan, Raj, Standing, Susan and Cripps, Helen. 2014. "Making the most of virtual expertise in telemedicine and telehealth environments." Journal of Organizational Computing and Electronic Commerce. 24 (2-3), pp. 138-156. https://doi.org/10.1080/10919392.2014.896714
Health text analysis: a Queensland Health case study
Gururajan, Raj, Hafeez-Baig, Abdul, Clark, Kevin, Moller, Susan and Sankaran, Prema. 2014. "Health text analysis: a Queensland Health case study." Mathirajan, M. (ed.) 2nd International Conference on Business Analytics and Intelligence (ICBAI 2014). Bangalore, India 18 - 20 Dec 2014 Bangalore, India.
An exploratory case study on employee health and wellbeing: Indian railways case study
Gururajan, Raj, Hafeez-Baig, Abdul, Chennakesav, Srinivas, Thomas, Anil, Prakash, Ram, Krishnan, Dharini and Sankaran, Prema. 2014. "An exploratory case study on employee health and wellbeing: Indian railways case study." Journal of Information Technology & Software Engineering. 4 (1), p. 125. https://doi.org/10.4172/2165-7866.1000125
An empirical study to determine factors that motivate and limit the implementation of ICT in healthcare environment
Gururajan, Raj and Hafeez-Baig, Abdul. 2014. "An empirical study to determine factors that motivate and limit the implementation of ICT in healthcare environment." BMC Medical Informatics and Decision Making. 14 (98), pp. 1-8. https://doi.org/10.1186/1472-6947-14-98
A hybrid particle swarm evolutionary algorithm for constrained multi-objective optimization
Wei, Jingxuan, Wang, Yuping and Wang, Hua. 2010. "A hybrid particle swarm evolutionary algorithm for constrained multi-objective optimization." Computing and Informatics. 29 (5), pp. 701-708.
Otsu's threshold selection method applied in de-noising heart sound of the digital stethoscope record
Chen, Haoyu and Gururajan, Raj. 2012. "Otsu's threshold selection method applied in de-noising heart sound of the digital stethoscope record." Zeng, Dehuai (ed.) 2nd International Conference of Electrical and Electronics Engineering (ICEEE 2011). Macau, China 01 - 02 Dec 2011 Berlin, Germany. https://doi.org/10.1007/978-3-642-26001-8_31
Critical role of 'T-shaped skills & incentive rewards' as determinants for knowledge management enablers: a case of Indian study
Hafeez-Baig, Abdul and Gururajan, Raj. 2012. "Critical role of 'T-shaped skills & incentive rewards' as determinants for knowledge management enablers: a case of Indian study." Kalloniatis, Christos (ed.) Modern information systems. Rijeka, Croatia. InTech Europe. pp. 133-146
Security and privacy on low-cost radio frequency identification systems
Sun, L.. 2010. "Security and privacy on low-cost radio frequency identification systems ." International Journal of Security and Networks. 5 (2/3), pp. 128-134. https://doi.org/10.1504/IJSN.2010.032211
Access control management for e-healthcare in cloud environment
Sun, Lili, Yong, Jianming and Soar, Jeffrey. 2014. "Access control management for e-healthcare in cloud environment." EAI Endorsed Transactions on Scalable Information Systems. 1 (2), pp. 1-11. https://doi.org/10.4108/sis.1.2.e3
An exploratory study to identify factors that influence the use of electronic patient boards in Queensland Health
Gururajan, Raj, Hafeez-Baig, Abdul, Sturgess, Julie, Clark, Kevin, Gururajan, Vijaya and Moller, Susan. 2013. "An exploratory study to identify factors that influence the use of electronic patient boards in Queensland Health." International Journal of Management & Information Technology. 7 (2), pp. 1033-1041.
Telemedicine and Telemonitoring in Healthcare
Alsgaer, Salmah F. A., Tao, Xiaohui, Zhang, Ji, Wang, Hua and Guo, Zhi. 2013. "Telemedicine and Telemonitoring in Healthcare." Imamura, Kazayuki, Usui, Shiro and Shirao, Tomoaki (ed.) 2013 International Conference on Brain and Health Informatics (BHI 2013). Maebashi, Japan 29 - 31 Oct 2013 Germany. https://doi.org/10.1007/978-3-319-02753-1_20
SIMS: Self-adaptive Intelligent Monitoring System for supporting home-based heart failure patients
Wang, Hua, Zhang, Ji, Soar, Jeffrey, Tao, Xiaohui and Huang, Wei. 2013. "SIMS: Self-adaptive Intelligent Monitoring System for supporting home-based heart failure patients." Biswas, Jit, Kobayashi, Hisato, Wong, Lawrence, Abdulrazak, Bessam and Mokhtari, Mounir (ed.) 11th International Conference on Smart Homes and Health Telematics (ICOST 2013): Inclusive Society: Health and Wellbeing in Ageing-Friendly Community: eHealth, Telemedicine, Chronic Disease Management and Care at Home. Singapore 19 - 21 Jun 2013 Heidelberg, Germany. Springer. https://doi.org/10.1007/978-3-642-39470-6_43
Effectively delivering XML information in periodic broadcast environments
Qin, Yongrui, Sheng, Quan Z. and Wang, Hua. 2013. "Effectively delivering XML information in periodic broadcast environments ." Decker, Hendrik, Lhotska, Lenka, Link, Sebastian, Basl, Josef and Tjoa, A. Min (ed.) 24th International Conference on Database and Expert Systems Applications (DEXA 2013). Prague, Czech Republic 26 - 29 Aug 2013 Berlin, Germany. https://doi.org/10.1007/978-3-642-40285-2_16
Minimising k-dominating set in arbitrary network graphs
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui, Zhang, Ji and Zhang, Jinhua. 2013. "Minimising k-dominating set in arbitrary network graphs." Motoda, Hiroshi, Wu, Zhaohui, Cao, Longbing, Zaiane, Osmar, Yao, Min and Wang, Wei (ed.) 9th International Conference on Advanced Data Mining and Applications (ADMA 2013). Hangzhou, China 14 - 16 Dec 2013 Heidelberg, Germany. Springer. https://doi.org/10.1007/978-3-642-53917-6_11
SODIT: An innovative system for outlier detection using multiple localized thresholding and interactive feedback
Zhang, Ji, Wang, Hua, Tao, Xiaohui and Sun, Lili. 2013. "SODIT: An innovative system for outlier detection using multiple localized thresholding and interactive feedback." 29th IEEE International Conference on Data Engineering (ICDE 2013). Brisbane, Australia 08 - 11 Apr 2013 Piscataway, NJ. United States. https://doi.org/10.1109/ICDE.2013.6544945
Finding a weighted positive influence dominating set in e-learning social networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui, Zhang, Ji and Zhu, Guohun. 2013. "Finding a weighted positive influence dominating set in e-learning social networks." International Journal of Computers and Technology. 10 (10), pp. 2136-2145.
A self-stabilizing algorithm for finding a minimal positive influence dominating set in social networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2013. "A self-stabilizing algorithm for finding a minimal positive influence dominating set in social networks." Wang, Hua and Zhang, Rui (ed.) 24th Australasian Database Conference (ADC 2013). Adelaide, Australia 29 Jan - 01 Feb 2013 Sydney, Australia.
Outlier detection from large distributed databases
Zhang, Ji, Wang, Hua and Tao, Xiaohui. 2014. "Outlier detection from large distributed databases." World Wide Web. 17 (4), pp. 539-568. https://doi.org/10.1007/s11280-013-0218-4
A Self-Stabilizing Protocol for Minimal Weighted Dominating Sets in Arbitrary Networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2013. "A Self-Stabilizing Protocol for Minimal Weighted Dominating Sets in Arbitrary Networks." Shen, Weiming, Li, Weidong, Barthes, Jean-Paul, Luo, Junzhou, Zhu, Haibin, Yong, Jianming and Li, Xiaoping (ed.) IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2013). Whistler, Canada 27 - 29 Jun 2013 United States. https://doi.org/10.1109/CSCWD.2013.6581012
Enablers of implementing knowledge management systems for better organisational outcomes: an Indian study
Gururajan, Raj and Tsai, Heng-Sheng. 2013. "Enablers of implementing knowledge management systems for better organisational outcomes: an Indian study." Bali, Rajeev K., Troshani, Indrit, Goldberg, Steve and Wickramasinghe, Nilmini (ed.) Pervasive health knowledge management. New York, NY. United States. Springer. pp. 285-303
Expectations, usability, and job satisfaction as determinants for the perceived benefits for the use of wireless technology in healthcare
Hafeez-Baig, Abdul and Gururajan, Raj. 2013. "Expectations, usability, and job satisfaction as determinants for the perceived benefits for the use of wireless technology in healthcare." Bali, Rajeev K., Troshani, Indrit, Goldberg, Steve and Wickramasinghe, Nilmini (ed.) Pervasive health knowledge management. New York, NY. United States. Springer. pp. 305-316
Wireless technology and clinical influences in healthcare setting: an Indian case study
Hafeez-Baig, Abdul and Gururajan, Raj. 2011. "Wireless technology and clinical influences in healthcare setting: an Indian case study." Guah, Matthew (ed.) Healthcare delivery reform and new technologies: organizational initiatives. Hershey, PA. United States. IGI Global. pp. 55-74
Effectively delivering XML information in periodic broadcast environments
Qin, Yongrui, Sheng, Quan Z. and Wang, Hua. 2012. Effectively delivering XML information in periodic broadcast environments. Adelaide, Australia. University of Adelaide.
Acoustical design of digital stethoscope for improved performance
Thiagarajan, Raj C., Sankaran, Prema, Hafeez-Baig, Abdul, Elangovan, Kodeeswari and Gururajan, Raj. 2012. "Acoustical design of digital stethoscope for improved performance." Singh, Lakhvinder (ed.) COMSOL Conference India 2012. Bangalore, India 02 - 03 Nov 2012 Burlington, MA. United States.
Does information and communication technology (ICT) facilitate knowledge management activities in the 21st century?
Hafeez-Baig, Abdul and Gururajan, Raj. 2012. "Does information and communication technology (ICT) facilitate knowledge management activities in the 21st century?" Journal of Software. 7 (11), pp. 2437-2442. https://doi.org/10.4304/jsw.7.11.2437-2442
Role of wireless handheld technology by nurses in healthcare environment
Hafeez-Baig, Abdul and Gururajan, Raj. 2012. "Role of wireless handheld technology by nurses in healthcare environment." Computer Technology and Application. 3 (8), pp. 550-557.
Phenomena of adoption of wireless handheld devices: a case of healthcare setting
Hafeez-Baig, Abdul and Gururajan, Raj. 2013. "Phenomena of adoption of wireless handheld devices: a case of healthcare setting." Muga, Helen E. and Thomas, Ken D. (ed.) Cases on the diffusion and adoption of sustainable development practices. Hershey, PA. United States. IGI Global. pp. 20-43
A role-involved purpose-based access control model
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2012. "A role-involved purpose-based access control model." Information Systems Frontiers: a journal of research and innovation. 14 (3), pp. 809-822. https://doi.org/10.1007/s10796-011-9305-1
Principles and pressures in managing student attitudes to innovative mobile learning: a view from an Australian distance-education-intensive university
Hafeez-Baig, Abdul, Gururajan, Raj, Danaher, P. A. and De George-Walker, Linda. 2013. "Principles and pressures in managing student attitudes to innovative mobile learning: a view from an Australian distance-education-intensive university." International Journal of Management in Education. 7 (1/2), pp. 149-162. https://doi.org/10.1504/IJMIE.2013.050818
A purpose-based access control in native XML databases
Sun, Lili and Wang, Hua. 2012. "A purpose-based access control in native XML databases." Concurrency and Computation: Practice and Experience. 24 (10), pp. 1154-1166. https://doi.org/10.1002/cpe.1717
Microdata protection method through microaggregation: a systematic approach
Kabir, Md Enamul and Wang, Hua. 2012. "Microdata protection method through microaggregation: a systematic approach." Journal of Software. 7 (11), pp. 2415-2422. https://doi.org/10.4304/jsw.7.11.2415-2423
Unsupervised multi-label text classification using a world knowledge ontology
Tao, Xiaohui, Li, Yuefeng, Lau, Raymond Y. K. and Wang, Hua. 2012. "Unsupervised multi-label text classification using a world knowledge ontology." Tan, Pang-Ning, Chawla, Sanjay, Ho, Chin Kuan and Bailey, James (ed.) 16th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining (PAKDD 2012). Kuala Lumpur, Malaysia 29 May - 01 Jun 2012 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-30217-6_40
Feeding back and enhancing authentic learning in quality course assessment design: locating information systems education in rigorous educational research
Hafeez-Baig, Abdul, Gururajan, Raj, Jones, David and Danaher, P. A.. 2012. "Feeding back and enhancing authentic learning in quality course assessment design: locating information systems education in rigorous educational research." Lamp, John (ed.) 23rd Australasian Conference on Information Systems (ACIS 2012). Geelong, Australia 03 - 05 Dec 2012 Geelong, Australia.
A self-stabilizing algorithm for finding a minimal K-dominating set in general networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2012. "A self-stabilizing algorithm for finding a minimal K-dominating set in general networks." Xiang, Yang, Pathan, Mukaddim, Tao, Xiaohui and Wan g, Hua (ed.) 3rd International Conference on Data and Knowledge Engineering (ICDKE 2012). Fujian, China 21 - 23 Nov 2012 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-34679-8_8
Satisfying privacy requirements before data anonymization
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2012. "Satisfying privacy requirements before data anonymization ." The Computer Journal. 55 (4), pp. 422-437. https://doi.org/10.1093/comjnl/bxr028
An approximate microaggregation approach for microdata protection
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2012. "An approximate microaggregation approach for microdata protection." Expert Systems with Applications. 39 (2), pp. 2211-2219. https://doi.org/10.1016/j.eswa.2011.04.223
On the identity anonymization of high-dimensional rating data
Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2012. "On the identity anonymization of high-dimensional rating data." Concurrency and Computation: Practice and Experience. 24 (10), pp. 1108-1122. https://doi.org/10.1002/cpe.1724
Purpose based access control for privacy protection in e-healthcare services
Sun, Lili, Wang, Hua, Soar, Jeffrey and Rong, Chunming. 2012. "Purpose based access control for privacy protection in e-healthcare services." Journal of Software. 7 (11), pp. 2443-2449. https://doi.org/10.4304/jsw.7.11.2443-2449
Deploying mobile data services: an Australian case study
Tsai, Heng-Sheng, Gururajan, Raj, Kong, Eric, Hafeez-Baig, Abdul and Lin, Meng Kuan. 2012. "Deploying mobile data services: an Australian case study." IT Professional: technology solutions for the enterprise. 14 (5), pp. 22-27. https://doi.org/10.1109/MITP.2012.47
Data privacy against composition attack
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue, Ding, Xiaofeng and Wang, Hua. 2012. "Data privacy against composition attack." Lee, Sang-Goo, Peng, Zhiyong, Zhou, Xiaofang, Moon, Yang-Sae, Unland, Rainer and Yoo, Jaesoo (ed.) 17th International Conference on Database Systems for Advanced Applications (DASFAA 2012). Busan, South Korea 15 - 18 Apr 2012 Berlin, Germany. https://doi.org/10.1007/978-3-642-29038-1_24
Multi-level delegations with trust management in access control systems
Li, Min, Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2012. "Multi-level delegations with trust management in access control systems." Journal of Intelligent Information Systems. 39 (3), pp. 611-626. https://doi.org/10.1007/s10844-012-0205-8
Semantic access control for cloud computing based on e-healthcare
Sun, Lili, Wang, Hua, Yong, Jianming and Wu, Guoxin. 2012. "Semantic access control for cloud computing based on e-healthcare ." Gao, Liang, Shen, Weiming, Barthes, Jean-Paul and Luo, Junzhou (ed.) CSCWD 2012: 16th International Conference on Computer Supported Cooperative Work in Design. Wuhan, China 23 - 25 May 2012 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2012.6221866
Cloning for privacy protection in multiple independent data publications
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue and Wang, Hua. 2011. "Cloning for privacy protection in multiple independent data publications." Berendt, Bettina, de Vries, Arjen, Fan, Wenfei and Macdonald, Craig (ed.) CIKM 2011: 20th ACM Conference on Information and Knowledge Management . Glasgow, United Kingdom 24 - 28 Oct 2011 New York, NY, USA. https://doi.org/10.1145/2063576.2063705
An exploratory study to investigate the effectiveness of PDAs in healthcare: a case of Queensland nurses
Hafeez-Baig, Abdul and Gururajan, Raj. 2011. "An exploratory study to investigate the effectiveness of PDAs in healthcare: a case of Queensland nurses." 22nd Australasian Conference on Information Systems (ACIS 2011). Sydney, Australia 29 Nov - 02 Dec 2011 Atlanta, GA. United States.
Student perceptions and uses of wireless handheld devices: implications for implementing blended and mobile learning in an Australian university
Gururajan, Raj, Hafeez-Baig, Abdul, Danaher, P. A. and De George-Walker, Linda. 2011. "Student perceptions and uses of wireless handheld devices: implications for implementing blended and mobile learning in an Australian university." Kitchenham, Andrew (ed.) Models for interdisciplinary mobile learning: delivering information to students. Hershey, PA. United States. IGI Global. pp. 231-246
Effective scheduling algorithm for on-demand XML data broadcasts in wireless environments
Qin, Yongrui, Wang, Hua and Xiao, Jitian. 2011. "Effective scheduling algorithm for on-demand XML data broadcasts in wireless environments." 22nd Australasian Database Conference (ADC 2011). Perth, Australia 17 - 20 Jan 2011 Canberra, Australia.
Privacy preserving access control policy and algorithms for conflicting problems
Sun, Lili, Wang, Hua, Tao, Xiaohui, Zhang, Yanchun and Yang, Jing. 2011. "Privacy preserving access control policy and algorithms for conflicting problems." Kellenberger, Patrick (ed.) 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011). Changsha, China 16 - 18 Nov 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/TrustCom.2011.34
Positive influence dominating set in e-learning social networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2011. "Positive influence dominating set in e-learning social networks." Leung, H., Popescu, E., Cao, Y., Lau, R. W. H. and Nejdl, W. (ed.) 10th International Conference on Web-Based Learning (ICWL 2011): Advances in Web-Based Learning. Hong Kong, China 08 - 10 Dec 2011 Berlin, Germany. https://doi.org/10.1007/978-3-642-25813-8_9
Access control and authorization for protecting disseminative information in E-learning workflow
Sun, Lili and Wang, Hua. 2011. "Access control and authorization for protecting disseminative information in E-learning workflow." Concurrency and Computation: Practice and Experience. 23 (16), pp. 2034-2042. https://doi.org/10.1002/cpe.1748
Pakistani study on the determinants of wireless technology in healthcare
Hafeez-Baig, Abdul and Gururajan, Raj. 2012. "Pakistani study on the determinants of wireless technology in healthcare." Computer Technology and Application. 3 (2), pp. 194-200.
Publishing anonymous survey rating data
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Pei, Jian. 2011. "Publishing anonymous survey rating data." Data Mining and Knowledge Discovery. 23 (3), pp. 379-406. https://doi.org/10.1007/s10618-010-0208-4
A conditional purpose-based access control model with dynamic roles
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "A conditional purpose-based access control model with dynamic roles." Expert Systems with Applications. 38 (3), pp. 1482-1489. https://doi.org/10.1016/j.eswa.2010.07.057
Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2011. "Injecting purpose and trust into data anonymisation." Computers and Security. 30 (5), pp. 332-345. https://doi.org/10.1016/j.cose.2011.05.005
Extended k-anonymity models against sensitive attribute disclosure
Sun, Xiaoxun, Sun, Lili and Wang, Hua. 2011. "Extended k-anonymity models against sensitive attribute disclosure." Computer Communications. 34 (4), pp. 526-535. https://doi.org/10.1016/j.comcom.2010.03.020
Efficient systematic clustering method for k-anonymization
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "Efficient systematic clustering method for k-anonymization." Acta Informatica. 48 (1), pp. 51-66. https://doi.org/10.1007/s00236-010-0131-6
A family of enhanced (L,alpha) diversity models for privacy preserving data publishing
Sun, Xiaoxun, Li, Min and Wang, Hua. 2011. "A family of enhanced (L,alpha) diversity models for privacy preserving data publishing." Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 27 (3), pp. 348-356. https://doi.org/10.1016/j.future.2010.07.007
Making the most of virtual expertise in telemedicine and telehealth environments
Standing, Craig, Volpe, Izabela, Standing, Susan and Gururajan, Raj. 2011. "Making the most of virtual expertise in telemedicine and telehealth environments." Chen, Jinjun, Dou, Wanchun, Liu, Jianxun, Yang, Laurence T. and Ma, Jianhua (ed.) IEEE 9th International Conference on Dependable, Autonomic and Secure Computing (DASC 2011). Sydney, Australia 12 - 14 Dec 2011 Los Alamitos, CA. USA. https://doi.org/10.1109/DASC.2011.166
Challenges and opportunities for academics adopting an online peer review innovation
Hafeez-Baig, Abdul, De George-Walker, Linda, Gururajan, Raj and Danaher, P. A.. 2011. "Challenges and opportunities for academics adopting an online peer review innovation." Studies in Learning Evaluation Innovation and Development. 8 (1), pp. 26-37.
A confirmatory factor analysis on the views and constructs for knowledge management in India
Gururajan, Raj, Hafeez-Baig, Abdul and Tsai, Heng-Sheng. 2012. "A confirmatory factor analysis on the views and constructs for knowledge management in India." Computer Technology and Application. 3 (1), pp. 98-104.
A purpose based usage access control model for e-healthcare services
Sun, Lili and Wang, Hua. 2011. "A purpose based usage access control model for e-healthcare services." Zhang, Ji and Livraga, Giovanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053928
Development of a prototype multi-touch ECG diagnostic decision support system using mobile technology for monitoring cardiac patients at a distance
Lin, Meng Kuan, Mula, Joseph M., Gururajan, Raj and Leis, John W.. 2011. "Development of a prototype multi-touch ECG diagnostic decision support system using mobile technology for monitoring cardiac patients at a distance." Seddon, Peter and Gregor, Shirley (ed.) 15th Pacific Asia Conference on Information Systems (PACIS 2011): Quality Research in Pacific Asia. Brisbane, Australia 07 - 11 Jul 2011 Atlanta, GA. United States.
Using digital stethoscopes in remote patient assessment via wireless networks: the user’s perspective
Gururajan, Raj, Tsai, Heng-Sheng and Chen, Haoyu. 2011. "Using digital stethoscopes in remote patient assessment via wireless networks: the user’s perspective." International Journal of Advanced Networking and Applications. 3 (3), pp. 1140-1146.
A model for regional innovation and information sharing to reduce falls amongst the elderly through intelligent technologies
Soar, Jeffrey, Wang, Hua and Su, Ying. 2011. "A model for regional innovation and information sharing to reduce falls amongst the elderly through intelligent technologies." Su, Ying and Al-Hakim, Latif (ed.) COINFO 2011: 6th International Conference on Cooperation and Promotion of Information Resources in Science and Technology: Coordinative Innovation and Open Sharing. Hangzhou, China 12 - 14 Nov 2011 Irvine, CA, United States.
Preliminary study to investigation the determinants that effect IS/IT outsourcing
Hafeez-Baig, Abdul and Gururajan, Raj. 2011. "Preliminary study to investigation the determinants that effect IS/IT outsourcing." International Journal of Information and Communication Technology Research. 1 (2), pp. 48-54.
Privacy aware access control with trust management in web service
Li, Min, Sun, Xiaoxun, Wang, Hua, Zhang, Yanchun and Zhang, Ji. 2011. "Privacy aware access control with trust management in web service." World Wide Web. 14 (4), pp. 407-430. https://doi.org/10.1007/s11280-011-0114-8
Clinicians' perception of using digital stethoscopes in telehealth platform: Queensland telehealth preliminary study
Soroush, Layla, Hafeez-Baig, Abdul and Gururajan, Raj. 2010. "Clinicians' perception of using digital stethoscopes in telehealth platform: Queensland telehealth preliminary study." Rosemann, Michael (ed.) 21st Australasian Conference on Information Systems (ACIS 2010). Brisbane, Australia 01 - 03 Dec 2010 Brisbane, Australia.
XML documents and access control management
Sun, Lili. 2010. XML documents and access control management. PhD Thesis Doctor of Philosophy. University of Southern Queensland.
The determinants for adoption of wearable computer systems in traditional Chinese hospital
Su, Ying and Gururajan, Raj. 2010. "The determinants for adoption of wearable computer systems in traditional Chinese hospital." Luo, Qi (ed.) APWCS 2010: Wearable Systems for Tomorrow's Industry. Shenzhen, China 17 - 18 Apr 2010 Los Alamitos, CA. USA.
DISTRO: a system for detecting global outliers from distributed data streams with privacy protection
Zhang, Ji, Dekeyser, Stijn, Wang, Hua and Shu, Yanfeng. 2010. "DISTRO: a system for detecting global outliers from distributed data streams with privacy protection." Kitagawa, Hiroyuki, Ishikawa, Yoshiharu, Li, Qing and Watanabe, Chiemi (ed.) DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications. Tsukuba, Japan 01 - 04 Apr 2010 Germany. Springer. https://doi.org/10.1007/978-3-642-12098-5_54
Wireless applications: influences and risks of location identification technologies
Gururajan, Raj. 2001. "Wireless applications: influences and risks of location identification technologies." 12th Australasian Conference on Information Systems (ACIS 2001). Coffs Harbour, Australia 04 - 07 Dec 2001
On memory and I/O efficient duplication detection for multiple self-clean data sources
Zhang, Ji, Shu, Yanfeng and Wang, Hua. 2010. "On memory and I/O efficient duplication detection for multiple self-clean data sources." Yoshikawa, M. (ed.) DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications. Tsukuba, Japan 01 - 04 Apr 2010 Germany. Springer. https://doi.org/10.1007/978-3-642-14589-6_14
M-service and its framework
Sun, Lili, Li, Yan and Wang, Hua. 2005. "M-service and its framework." 11th Asia-Pacific Conference on Communications. Perth, Australia 03 - 05 Oct 2005 United States. https://doi.org/10.1109/APCC.2005.1554180
A flexible electronic payment scheme and its management
Wang, Hua, Cao, Jinli, Zhang, Yanchun and Huang, Xiaodi. 2004. "A flexible electronic payment scheme and its management ." Information. 7 (2), pp. 187-196.
Achieving p-sensitive k-anonymity via anatomy
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Ross, David. 2009. "Achieving p-sensitive k-anonymity via anatomy." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.34
Extended K-anonymity models against attribute disclosure
Sun, Xiaoxun, Wang, Hua and Sun, Lili. 2009. "Extended K-anonymity models against attribute disclosure." NSS 2009: 3rd International Conference on Network and System Security. Gold Coast, Australia 19 - 21 Oct 2009 United States. https://doi.org/10.1109/NSS.2009.23
Trust-based access control for privacy protection in collaborative environment
Li, Min, Wang, Hua and Ross, David. 2009. "Trust-based access control for privacy protection in collaborative environment." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.66
Privacy preserving on radio frequency identification systems
Wang, Hua, Sun, Lili, Yong, Jianming and Zhang, Yongbing. 2009. "Privacy preserving on radio frequency identification systems." CSCWD 2009: 13th International Conference on Computer Supported Cooperative Work in Design. Santiago, Chile 22 - 24 Apr 2009 United States. https://doi.org/10.1109/CSCWD.2009.4968136
Delegating revocations and authorizations in collaborative business environments
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2009. "Delegating revocations and authorizations in collaborative business environments." Information Systems Frontiers: a journal of research and innovation. 11 (3), pp. 293-305. https://doi.org/10.1007/s10796-008-9091-6
Effective collaboration with information sharing in virtual universities
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2009. "Effective collaboration with information sharing in virtual universities." IEEE Transactions on Knowledge and Data Engineering. 21 (6), pp. 840-853. https://doi.org/10.1109/TKDE.2008.132
Protecting disseminative information in e-learning
Sun, Lili, Wang, Hua and Li, Yan. 2008. "Protecting disseminative information in e-learning." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_49
Secure and Efficient Information Sharing in Multi-university E-Learning Environments
Wang, Hua and Li, Qing. 2008. "Secure and Efficient Information Sharing in Multi-university E-Learning Environments." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_48
L-diversity based dynamic update for large time-evolving microdata
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "L-diversity based dynamic update for large time-evolving microdata." Wobcke, Wayne and Zhang, Mengjie (ed.) AI 2008: 21st Australasian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence . Auckland, New Zealand 01 - 05 Dec 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-89378-3_47
Authorization approaches for advanced permission-role assignments
Wang, Hua, Yong, Jianming, Li, Jiuyong and Peng, Min. 2008. "Authorization approaches for advanced permission-role assignments." Shen, Weiming, Zheng, Qinghua, Luo, Junzhou, Yong, Jianming, Duan, Zhenhua and Tian, Feng (ed.) CSCWD 2008: 12th International Conference on Computer Supported Cooperative Work in Design . Xi'an, China 16 - 18 Apr 2008 United States. https://doi.org/10.1109/CSCWD.2008.4536994
Optimal privacy-aware path in hippocratic databases
Li, Min, Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2009. "Optimal privacy-aware path in hippocratic databases." Zhou, X. (ed.) DASFAA 2009: 14th International Conference on Database Systems for Advanced Applications. Brisbane, Australia 21 - 23 Apr 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-00887-0_39
Time management, improved patient expectations and added value contributing to the perceived acceptance of using wireless hand held devices in the Indian healthcare
Hafeez-Baig, Abdul and Gururajan, Raj. 2008. "Time management, improved patient expectations and added value contributing to the perceived acceptance of using wireless hand held devices in the Indian healthcare." Mills, Annette and Huff, Sid (ed.) 19th Australasian Conference on Information Systems (ACIS 2008). Christchurch, New Zealand 03 - 05 Dec 2008 Christchurch, New Zealand.
Drivers for wireless technology acceptance in Indian healthcare
Gururajan, Raj. 2009. "Drivers for wireless technology acceptance in Indian healthcare." International Journal of Healthcare Delivery Reform Initiatives. 1 (1), pp. 48-62.
Portable devices of security and privacy preservation for e-learning
Yong, Jianming, Li, Jiuyong and Wang, Hua. 2008. "Portable devices of security and privacy preservation for e-learning." Shen, Weiming, Zheng, Qinghua, Luo, Junzhou, Yong, Jianming, Duan, Zhenhua and Tian, Feng (ed.) CSCWD 2008: 12th International Conference on Computer Supported Cooperative Work in Design . Xi'an, China 16 - 18 Apr 2008 China. https://doi.org/10.1109/CSCWD.2008.4537121
Access control management for ubiquitous computing
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2008. "Access control management for ubiquitous computing." Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 24 (8), pp. 870-878. https://doi.org/10.1016/j.future.2007.07.011
Robustness analysis of diversified ensemble decision tree algorithms for microarray data classification
Hu, Hong, Li, Jiuyong, Wang, Hua, Daggard, Grant and Wang, Li-Zhen. 2008. "Robustness analysis of diversified ensemble decision tree algorithms for microarray data classification." ICMLC 2008: 7th International Conference on Machine Learning and Cybernetics. Kunming, China 12 - 15 Jul 2008 United States. https://doi.org/10.1109/ICMLC.2008.4620389
Clinical factors and technological barriers as determinants for the intention to use wireless handheld technology in healthcare environment: an Indian case study
Gururajan, Raj, Gururajan, Vijaya and Hafeez-Baig, Abdul. 2008. "Clinical factors and technological barriers as determinants for the intention to use wireless handheld technology in healthcare environment: an Indian case study." Willie, Golden, Thomas, Acton and Kieran, Conboy (ed.) 16th European Conference on Information Systems: Information Systems in an Innovative Knowledge-based Society (ECIS 2008). Galway, Ireland 09 - 11 Jun 2008 Galway, Ireland.
ABDM: an extended flexible delegation model in RBAC
Li, Min and Wang, Hua. 2008. "ABDM: an extended flexible delegation model in RBAC." Wu, Qiang and He, Xiangjian (ed.) 8th IEEE International Conference on Computer and Information Technology. Sydney, Australia 08 - 11 Jul 2008 United States. https://doi.org/10.1109/CIT.2008.4594707
(p+, α)-sensitive k-anonymity: a new enhanced privacy protection model
Sun, Xiaoxun, Wang, Hua, Truta, Traian Marius, Li, Jiuyong and Li, Ping. 2008. "(p+, α)-sensitive k-anonymity: a new enhanced privacy protection model." Wu, Qiang (ed.) 8th IEEE International Conference on Computer and Information Technology. Sydney, Australia 08 - 11 Jul 2008 United States. https://doi.org/10.1109/CIT.2008.4594650
Advanced permission-role relationship in role-based access control
Li, Min, Wang, Hua, Plank, Ashley and Yong, Jianming. 2008. "Advanced permission-role relationship in role-based access control." Mu, Yi, Susilo, Willy and Seberry, Jennifer (ed.) ACISP 2008: 13th Australasian Conference on Information Security and Privacy . Wollongong, Australia 07 - 09 Jul 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-70500-0-29
On the complexity of restricted k-anonymity problem
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "On the complexity of restricted k-anonymity problem." Yanchun, Zhang (ed.) 10th Asia-Pacific Web Conference (APWeb 2008). Shenyang, China 26 - 28 Apr 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-78849-2_30
Delegating revocations and authorizations
Wang, Hua and Cao, Jinli. 2008. "Delegating revocations and authorizations." ter Hofstede, A., Benatallah, B. and Paik, H. Y. (ed.) 5th International Conference on Business Process Management (BPM 2007) . Brisbane, Australia 24 - 28 Sep 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78238-4_29
Reactions and perceptions of healthcare professional towards wireless devices in healthcare environment in the developing world: a case of Pakistan
Gururajan, Raj, Hafeez-Baig, Abdul and Kerr, Don. 2007. "Reactions and perceptions of healthcare professional towards wireless devices in healthcare environment in the developing world: a case of Pakistan." Toleman, Mark, Cater-Steel, Aileen and Roberts, Dave (ed.) 18th Australasian Conference on Information Systems (ACIS 2007). Toowoomba, Australia 05 - 07 Dec 2007 Toowoomba, Australia.
Clinical usefulness is the key common determinant of adoption of wireless technology in healthcare for India and Australia
Grist, Shelly, Hafeez-Baig, Abdul, Gururajan, Raj and Khan, Shamim. 2007. "Clinical usefulness is the key common determinant of adoption of wireless technology in healthcare for India and Australia." Archer, Norm, Hassanein, Khaled and Yuan, Yufei (ed.) 6th International Conference on the Management of Mobile Business (ICMB 2007). Toronto, Canada 09 - 11 Jul 2007 Washington, United States.
A global ticket-based access scheme for mobile users
Wang, Hua, Cao, Jinli, Zhang, Yanchun and Kambayahsi, Yahiko. 2004. "A global ticket-based access scheme for mobile users." Information Systems Frontiers: a journal of research and innovation. 6 (1), pp. 35-46. https://doi.org/10.1023/B:ISFI.0000015873.35795.5e
Achieving secure and flexible M-services through tickets
Wang, Hua, Zhang, Yanchun, Cao, Jinli and Varadharajan, Vijay. 2003. "Achieving secure and flexible M-services through tickets." Systems, Man, and Cybernetics. Part A. 33 (6), pp. 697-708. https://doi.org/10.1109/TSMCA.2003.819917
A flexible payment scheme and its role-based access control
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2005. "A flexible payment scheme and its role-based access control." IEEE Transactions on Knowledge and Data Engineering. 17 (3), pp. 425-436. https://doi.org/10.1109/TKDE.2005.35
A study of the use of hand-held devices in an emergency department
Gururajan, Raj. 2004. "A study of the use of hand-held devices in an emergency department." Journal of Telemedicine and Telecare. 10 (1 (Supplement)), pp. 33-35. https://doi.org/10.1258/1357633042614438
New financial transaction security concerns in mobile commerce
Gururajan, Raj. 2002. "New financial transaction security concerns in mobile commerce." Information & Security: an International Journal. 8 (1), pp. 71-86.
Determining whether ICT improves social interactions
Gururajan, Raj. 2005. "Determining whether ICT improves social interactions." Marshall, Stewart, Taylor, Wal and Yu, Xinghuo (ed.) Encyclopedia of developing regional communities with information and communication technology. Hershey, PA, United States. IGI Global. pp. 159-163
A qualitative evaluation of the effectiveness of videoconferencing to support the training of orthopaedic registrars
Scott, Annette, Gururajan, Raj, Moloney, Clint and Gururajan, Vijaya. 2006. "A qualitative evaluation of the effectiveness of videoconferencing to support the training of orthopaedic registrars." Journal of Telemedicine and Telecare. 12 (3 (Supplement)), pp. 69-70. https://doi.org/10.1258/135763306779379969
Role-based delegation with negative authorization
Wang, Hua, Cao, Jinli and Ross, David. 2006. "Role-based delegation with negative authorization." Zhou, X., Li, Jianzhong, Shen, Heng Tao, Kitsuregawa, Masaru and Zhang, Yanchun (ed.) 8th Asia-Pacific Web Conference (APWeb 2006): Frontiers of WWW Research and Development. Harbin, China 16 - 18 Jan 2006 Germany. Springer. https://doi.org/10.1007/11610113_28
Combined gene selection methods for microarray data analysis
Hu, Hong, Li, Jiuyong, Wang, Hua and Daggard, Grant. 2006. "Combined gene selection methods for microarray data analysis." Gabrys, Bogdan, Howlett, Robert J. and Jain, Lakhmi C. (ed.) 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2006). Bournemouth, United Kingdom 09 - 11 Oct 2006 Germany. Springer. https://doi.org/10.1007/11892960_117
A framework for the adoption of wireless technology in healthcare: an Indian study
Howard, Angela, Hafeez-Baig, Abdul, Howard, Srecko and Gururajan, Raj. 2006. "A framework for the adoption of wireless technology in healthcare: an Indian study." Spencer, S. and Jenkins, A. (ed.) 17th Australasian Conference on Information Systems (ACIS 2006). Adelaide, Australia 06 - 08 Dec 2006 Australia.
‘Soft’ enablers of knowledge management in Malaysian companies – a qualitative study
Gan, Gerald Goh Guan, Ryan, Charmaine and Gururajan, Raj. 2006. "‘Soft’ enablers of knowledge management in Malaysian companies – a qualitative study." Spencer, S. and Jenkins, A. (ed.) 17th Australasian Conference on Information Systems (ACIS 2006). Adelaide, Australia 06 - 08 Dec 2006 Australia.
Towards secure XML document with usage control
Cao, Jinli, Sun, Lili and Wang, Hua. 2005. "Towards secure XML document with usage control." Zhang, Yanchun, Tanaka, Katsumi, Yu, Jeffrey Xu, Wang, Shan and Li, Minglu (ed.) 7th Asia-Pacific Web Conference: Web Technologies Research and Development (APWeb 2005). Shanghai, China 29 Mar - 01 Apr 2005 Germany. Springer. https://doi.org/10.1007/978-3-540-31849-1_30
A framework for role-based group delegation in distributed environments
Wang, Hua, Li, Jiuyong, Addie, Ron, Dekeyser, Stijn and Watson, Richard. 2006. "A framework for role-based group delegation in distributed environments." Estivill-Castro, Vladimir and Dobbie, Gillian (ed.) 29th Australasian Computer Science Conference (ACSC 2006). Hobart, Australia 16 - 19 Jan 2006 Australia.
Legal issues and risks impacting wireless workforce
Hafeez-Baig, Abdul and Gururajan, Raj. 2005. "Legal issues and risks impacting wireless workforce." Li, Eldon (ed.) APDSI 2005. Taipei, Taiwan 28 Jun - 02 Jul 2005 Taiwan.
An exploratory study to determine factors impacting outsourcing of information systems in healthcare
Hafeez-Baig, Abdul and Gururajan, Raj. 2005. "An exploratory study to determine factors impacting outsourcing of information systems in healthcare." Eldon, Li (ed.) APDSI 2005. Taipei, Taiwan 28 Jun - 02 Jul 2005 Taiwan.
Clinicians perceptions towards wireless handheld devices: an Australian case study
Hafeez-Baig, Abdul and Gururajan, Raj. 2011. "Clinicians perceptions towards wireless handheld devices: an Australian case study." Su, Ying and Al-Hakim, Latif (ed.) COINFO 2011: 6th International Conference on Cooperation and Promotion of Information Resources in Science and Technology: Coordinative Innovation and Open Sharing. Hangzhou, China 12 - 14 Nov 2011 Irvine, CA, United States.
Views and constructs for knowledge management in India: a confirmatory factor analysis
Hafeez-Baig, Abdul, Gururajan, Raj and Tsai, Heng-Sheng. 2010. "Views and constructs for knowledge management in India: a confirmatory factor analysis." Chen, Houn-Gee and Liang, Ting-Peng (ed.) 14th Pacific Asia Conference on Information Systems (PACIS 2010): Service Science in Information Systems Research. Taipei, Taiwan 09 - 12 Jul 2010 Kaohsiung, Taiwan.
Knowledge sharing and management for better organisational outcomes: an Indian study
Gururajan, Raj, Tsai, Heng-Sheng, Hafeez-Baig, Abdul and Lin, Meng-Kuan. 2010. "Knowledge sharing and management for better organisational outcomes: an Indian study." Chen, Hong-Mei and Lin, Fu-ren (ed.) 14th Pacific Asia Conference on Information Systems (PACIS 2010): Service Science in Information Systems Research. Taipei, Taiwan 09 - 12 Jul 2010 Kaohsiung, Taiwan.
Formal authorization approaches for permission-role assignments using relational algebra operations
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2003. "Formal authorization approaches for permission-role assignments using relational algebra operations." Schewe, Klaus-Dieter and Zhou, Xiaofang (ed.) 14th Australasian Database Conference 2003: Database Technologies (ADC2003). Adelaide, Australia 04 - 07 Feb 2003 Australia.
A flexible payment scheme and its permission-role assignment
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2003. "A flexible payment scheme and its permission-role assignment." Oudshoorn, Michael J. (ed.) 26th Australasian Computer Science Conference (ACSC2003). Adelaide, Australia 04 - 07 Feb 2003 Darlinghurst, Australia.
Specifying role-based access constraints with object constraint language
Wang, Hua, Zhang, Yanchun, Cao, Jinli and Yang, Jian. 2004. "Specifying role-based access constraints with object constraint language." Yu, Jeffrey Xu, Lin, Xuemin, Lu, Hongjun and Zhang, Yanchun (ed.) 6th Asia-Pacific Web Conference: Advanced Web Technologies and Applications (APWeb 2004). Hangzhou, China 14 - 17 Apr 2004 Berlin, Germany. Springer.
A new blind signature for electronic commerce
Wang, Hua and Addie, Ron. 2004. "A new blind signature for electronic commerce." 3rd International Conference on Information (INFO'2004). Tokyo, Japan 2004
Validating privacy requirements in large survey rating data
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2011. "Validating privacy requirements in large survey rating data." Bessis, Nik and Xhafa, Fatos (ed.) Next generation data technologies for collective computational intelligence. Berlin, Germany. Springer. pp. 445-469
Microdata protection method through microaggregation: a median-based approach
Kabir, Md Enamul and Wang, Hua. 2011. "Microdata protection method through microaggregation: a median-based approach." Information Security Journal: a Global Perspective. 20 (1), pp. 1-8. https://doi.org/10.1080/19393555.2010.515288
Purpose-based access control policies and conflicting analysis
Wang, Hua, Sun, Lili and Varadharajan, Vijay. 2010. "Purpose-based access control policies and conflicting analysis." Rannenberg, Kai, Varadharajan, Vijay and Weber, Christian (ed.) SEC 2010: Security and Privacy: Silver Linings in the Cloud. Brisbane, Australia 20 - 23 Sep 2010 Germany. https://doi.org/10.1007/978-3-642-15257-3_20
Specifying usage control model with object constraint language
Li, Min and Wang, Hua. 2010. "Specifying usage control model with object constraint language." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.10
Systematic clustering-based microaggregation for statistical disclosure control
Kabir, Md Enamul and Wang, Hua. 2010. "Systematic clustering-based microaggregation for statistical disclosure control." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Washington, DC, USA. https://doi.org/10.1109/NSS.2010.66
Detecting anomalies from high-dimensional wireless network data streams: a case study
Zhang, Ji, Gao, Qigang, Wang, Hai and Wang, Hua. 2011. "Detecting anomalies from high-dimensional wireless network data streams: a case study." Soft Computing. 15 (6), pp. 1195-1215. https://doi.org/10.1007/s00500-010-0575-1
Exploratory study to explore the role of ICT in the process of knowledge management in an Indian business environment
Hafeez-Baig, Abdul, Gururajan, Raj, Heng Sheng, Tasi and Sankaran, Prema. 2010. "Exploratory study to explore the role of ICT in the process of knowledge management in an Indian business environment." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Los Alamitos, CA. United States. https://doi.org/10.1109/NSS.2010.89
The enablers and implementation model for mobile KMS in Australian healthcare
Tsai, Heng-Sheng and Gururajan, Raj. 2010. "The enablers and implementation model for mobile KMS in Australian healthcare." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.22
Satisfying privacy requirements: one step before anonymization
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2010. "Satisfying privacy requirements: one step before anonymization." Zaki, Mohammed Javeed, Yu, Jeffrey Xu, Ravindran, B. and Pudi, Vikram (ed.) 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2010). Hyderabad, India 21 - 24 Jun 2010 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-13657-3_21
A pairwise systematic microaggregation for statistical disclosure control
Kabir, Md Enamul, Wang, Hua and Zhang, Yanchun. 2010. "A pairwise systematic microaggregation for statistical disclosure control." Webb, Geoffrey I., Liu, Bing, Zhang, Chengqi, Gunopulos, Dimitrios and Wu, Xindong (ed.) 10th IEEE International Conference on Data Mining (ICDM 2010). Sydney, Australia 14 - 17 Dec 2010 Los Alamitos, CA. United States. https://doi.org/10.1109/ICDM.2010.111
A conditional role-involved purpose-based access control model
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "A conditional role-involved purpose-based access control model." Journal of Organizational Computing and Electronic Commerce. 21 (1), pp. 71-91. https://doi.org/10.1080/10919392.2011.541007
Access control method with XML databases
Sun, Lili, Li, Yan and Wang, Hua. 2011. "Access control method with XML databases." Wang, John (ed.) Information systems and new applications in the service sector: models and methods. Hershey, PA, USA. IGI Global. pp. 227-239
Trust-involved access control in collaborative open social networks
Wang, Hua and Sun, Lili. 2010. "Trust-involved access control in collaborative open social networks." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.13
A purpose based usage access control model
Sun, Lili and Wang, Hua. 2010. "A purpose based usage access control model." International Journal of Computer and Information Engineering. 4 (1), pp. 44-51.
An Exploratory Study to Understand the Drivers and Inhibitors for the Successful Adoption of Wireless Technology in Australian Healthcare Systems
Hafeez-Baig, Abdul and Gururajan, Raj. 2010. "An Exploratory Study to Understand the Drivers and Inhibitors for the Successful Adoption of Wireless Technology in Australian Healthcare Systems." Pease, Wayne, Cooper, Malcolm and Gururajan, Raj (ed.) Biomedical Knowledge Management: Infrastructures and Processes for E-Health Systems. Hershey, PA, USA. Medical Information Science Reference (IGI Global). pp. 267-278
A web-based ECG decision support system using multi-touch function to support cardiac diagnosis
Lin, Meng-Kuan, Gururajan, Raj, Mula, Joseph M., Leis, John W. and Hafeez-Baig, Abdul. 2010. "A web-based ECG decision support system using multi-touch function to support cardiac diagnosis." 5th International Conference on Cooperation and Promotion of Information Resources in Science and Technology: Information Sharing in U-Era (COINFO'10). Beijing, China 27 - 29 Nov 2010
Wireless handheld device and LAN security issues: a case study
Gururajan, Raj and Hafeez-Baig, Abdul. 2011. "Wireless handheld device and LAN security issues: a case study." Kerr, Don, Gammack, John G. and Bryant, Kay (ed.) Digital business security development: management technologies. Hershey, PA, USA. IGI Global. pp. 129-151
Privacy protection for genomic data: current techniques and challenges
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue, Wang, Hua and Wang, Junhu. 2010. "Privacy protection for genomic data: current techniques and challenges." Ras, Zbigniew W. and Tsay, Li-Shang (ed.) Advances in intelligent information systems. Berlin, Germany. Springer. pp. 175-193
Key common determinants for adoption of wireless technology in healthcare for India and Pakistan: development of a conceptual model
Hafeez-Baig, Abdul and Gururajan, Raj. 2010. "Key common determinants for adoption of wireless technology in healthcare for India and Pakistan: development of a conceptual model." Safran, Charles, Marin, Heimer F. and Reti, Shane R. (ed.) 13th World Congress on Medical and Health Informatics (MEDINFO 2010). Cape Town, South Africa 12 - 15 Sep 2010 Amsterdam, Netherlands. https://doi.org/10.3233/978-1-60750-588-4-342
Experiences and perceptions of learner engagement in blended learning environments: the case of an Australian university
De George-Walker, Linda, Hafeez-Baig, Abdul, Gururajan, Raj and Danaher, Patrick Alan. 2010. "Experiences and perceptions of learner engagement in blended learning environments: the case of an Australian university." Inoue, Yukiko (ed.) Cases on online blended learning technologies in higher education: concepts and practices. Hershey, PA, USA. IGI Global. pp. 23-43
Towards identify anonymization in large survey rating data
Sun, Xiaoxun and Wang, Hua. 2010. "Towards identify anonymization in large survey rating data." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.11
Selected influences on students' uses of wireless handheld devices: an Iranian exploratory case study
Hafeez-Baig, Abdul, Gururajan, Raj, Nazemi, Shamsodin, De George-Walker, Linda and Danaher, P. A.. 2010. "Selected influences on students' uses of wireless handheld devices: an Iranian exploratory case study." Abas, Zoraini Wati, Jung, Insung and Luca, Joseph (ed.) Global Learn Asia Pacific 2010. Penang, Malaysia 17 - 20 May 2010 Chesapeake, VA, United States.
A discussion on the role of knowledge management in aged care
Gururajan, Vijaya, Gururajan, Raj and Hafeez-Baig, Abdul. 2004. "A discussion on the role of knowledge management in aged care." Conrick, Moya and Soar, Jeffrey (ed.) 1st Australian Aged and Community Care Informatics Conference (ACCIC'04). Brisbane, Australia 24 - 25 Aug 2004 Brunswick East, Australia.
A case study approach to investigate academic perspective on knowledge and knowledge transfer issues
Gururajan, Vijaya and Gardiner, Michael. 2004. "A case study approach to investigate academic perspective on knowledge and knowledge transfer issues." 1st International Conference on Qualitative Research in IT & IT in Qualitative Research (QualIT 2004). Queensland, Australia 24 - 26 Nov 2004 Australia.
Acceptance problems of ambient intelligence and mobile technologies in hospitals in India and Germany
Kummer, Tyge-F., Bick, Markus and Gururajan, Raj. 2009. "Acceptance problems of ambient intelligence and mobile technologies in hospitals in India and Germany." 17th European Conference on Information Systems (ECIS 2009). Verona, Italy 08 - 10 Jun 2009 Padova, Italy.
Efficacy and feasibility of a mobile ECG decision support system - a preliminary conceptual model
Lin, Meng-Kuan, Mula, Joseph M., Gururajan, Raj, Leis, John W. and Hafeez-Baig, Abdul. 2010. "Efficacy and feasibility of a mobile ECG decision support system - a preliminary conceptual model." Chen, Houn-Gee and Liang, Ting-Peng (ed.) 14th Pacific Asia Conference on Information Systems (PACIS 2010): Service Science in Information Systems Research. Taipei, Taiwan 09 - 12 Jul 2010 Kaohsiung, Taiwan.
Systematic clustering method for l-diversity model
Kabir, Md Enamul, Wang, Hua, Bertino, Elisa and Chi, Yunxiang. 2010. "Systematic clustering method for l-diversity model." Shen, Heng Tao and Bouguettaya, Athman (ed.) ADC 2010: 21st Australasian Conference on Database Technologies. Brisbane, Australia 18 - 22 Jan 2010 Sydney, Australia.
Microdata protection through approximate microaggregation
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2009. "Microdata protection through approximate microaggregation." Mans, Bernard (ed.) 32nd Australasian Computer Science Conference (ACSC 2009). Wellington, New Zealand 19 - 23 Jan 2009 Adelaide, Australia.
Privacy-aware access control with generalization boundaries
Li, Min, Wang, Hua and Plank, Ashley. 2009. "Privacy-aware access control with generalization boundaries." Mans, Bernard (ed.) 32nd Australasian Computer Science Conference (ACSC 2009). Wellington, New Zealand 19 - 23 Jan 2009 Sydney, Australia.
Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2009. "Injecting purpose and trust into data anonymisation." Cheung, David, Song, Il-Yeol, Chu, Wesley, Hu, Xiaohua and Lin, Jimmy (ed.) 18th ACM International Conference on Information and Knowledge Management (CIKM 2009) . Hong Kong, China 02 - 06 Nov 2009 New York, USA. https://doi.org/10.1145/1645953.1646166
Anonymous access scheme for electronic services
Wang, Hua, Sun, Lili, Zhang, Yanchun and Cao, Jinli. 2004. "Anonymous access scheme for electronic services." Estivill-Castro, Vladimir (ed.) 27th Australasian Computer Science Conference (ACSC2004). Dunedin, New Zealand 18 - 22 Jan 2004 Sydney, NSW, Australia.
Conditional purpose based access control model for privacy protection
Kabir, Md Enamul and Wang, Hua. 2009. "Conditional purpose based access control model for privacy protection." Bouguettaya, Athman and Lin, Xuemin (ed.) ADC 2009: 20th Australasian Conference on Australasian Database. Wellington, New Zealand 20 - 23 Jan 2009 Sydney, Australia.
Organizational, technical and perceived readiness as adoption factors for wireless technology in healthcare: an Australian case study
Hafeez-Baig, Abdul and Gururajan, Raj. 2009. "Organizational, technical and perceived readiness as adoption factors for wireless technology in healthcare: an Australian case study." Sintchenko, Vitali and Croll, Peter (ed.) Health Informatics Conference (HIC 2009): Frontiers of Health Informatics - Redefining Healthcare. Canberra, Australia 19 - 21 Aug 2009 Melbourne, Australia.
The practical issues in using existing digital stethoscopes for telehealth
Gurney, Tiana, Stenhouse, Shayne, Gururajan, Raj and Hafeez-Baig, Abdul. 2009. "The practical issues in using existing digital stethoscopes for telehealth." Annual International Conference on Successes and Failures in Telehealth 2009 (SFT-09). Brisbane, Australia 10 - 11 Dec 2009 Brisbane, Australia.
Confirmatory factor analysis to establish determinants of wireless technology in the Indian healthcare
Gururajan, Raj, Gurney, Tiana and Hafeez-Baig, Abdul. 2009. "Confirmatory factor analysis to establish determinants of wireless technology in the Indian healthcare." International Journal of Healthcare Delivery Reform Initiatives. 1 (3), pp. 19-37.
Authorization algorithms for the mobility of user-role relationship
Wang, Hua, Sun, Lili, Zhang, Yanchun and Cao, Jinli. 2005. "Authorization algorithms for the mobility of user-role relationship." Estivill-Castro, Vladimir (ed.) ACSC 2005: 28th Australasian Computer Science Conference. Newcastle, Australia 28 Jan - 03 Feb 2005 Sydney, Australia.
Authorization algorithms for permission-role assignments
Sun, Lili, Wang, Hua and Yong, Jianming. 2009. "Authorization algorithms for permission-role assignments." Journal of Universal Computer Science. 15 (9), pp. 1782-1796. https://doi.org/10.3217/jucs-015-09-1782
An integrated model for next page access prediction
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2009. "An integrated model for next page access prediction." International Journal of Knowledge and Web Intelligence. 1 (1/2), pp. 48-80. https://doi.org/10.1504/IJKWI.2009.027925
Using usage control to access XML databases
Sun, Lili and Li, Yan. 2009. "Using usage control to access XML databases." International Journal of Information Systems in the Service Sector. 1 (3), pp. 32-44.
Development of knowledge management support for the sleep disorder diagnosis process
Blake, Jacqueline, Kerr, Don and Gururajan, Raj. 2010. "Development of knowledge management support for the sleep disorder diagnosis process." 21st Australasian Conference on Information Systems (ACIS 2010). Brisbane, Australia 01 - 03 Dec 2010 Brisbane, Australia.
Emergence for the need of new legal and regulatory issues on mobile workforce
Gururajan, Raj. 2004. "Emergence for the need of new legal and regulatory issues on mobile workforce." International Journal of Applied Management and Technology. 2 (1), pp. 71-87.
Impact of copyright laws on flexible delivery of university education
Vuori, Timo and Gururajan, Raj. 2002. "Impact of copyright laws on flexible delivery of university education." 2002 International Conference on Information Technology and Universities in Asia (ITUA 2002). Thailand 03 - 05 Apr 2002
Experiences in wireless application development in a healthcare setting
Gururajan, Raj and Vuori, Timo. 2003. "Experiences in wireless application development in a healthcare setting." Knight, S., Croft, L. and Lachowicz, E. (ed.) 4th International We-B Conference 2003: Working With e-Business. Perth, Australia 24 - 25 Nov 2003 Joondalup, Western Australia.
Barriers to uptake of wireless healthcare applications - a review
Gururajan, Raj, Last, J. and Rai, S.. 2003. "Barriers to uptake of wireless healthcare applications - a review." 3rd International Conference on Electronic Business: Business Paradigms: Strategic Transformation and Partnership (ICEB 2003) . Singapore 09 - 13 Dec 2003 Singapore.
Legal and regulatory issues of implementation of electronic signatures
Gururajan, Raj and Hafeez-Baig, Abdul. 2004. "Legal and regulatory issues of implementation of electronic signatures." 2004 AusCERT: Computer Security: Are we there yet?. Gold Coast, Australia 23 - 27 May 2004 Brisbane, Australia.
Implementation difficulties of electronic signatures in the m-commerce environment
Gururajan, Raj and Hafeez-Baig, Abdul. 2004. "Implementation difficulties of electronic signatures in the m-commerce environment." 3rd International Conference on Information and Management Sciences (IMS2004). Dunhuang, China 05 - 10 Jun 2004 Beijing, China.
Emergence of new legal and regulatory mechanisms for the internet workforce
Gururajan, Raj. 2004. "Emergence of new legal and regulatory mechanisms for the internet workforce." Internet Business Review . 1, pp. 1-15.
A discussion on the legal barriers in addressing sleeping disorders in aged care using wireless technology
Moloney, Clint and Gururajan, Raj. 2004. "A discussion on the legal barriers in addressing sleeping disorders in aged care using wireless technology." Conrick, Moya and Soar, Jeffrey (ed.) 1st Australian Aged and Community Care Informatics Conference (ACCIC'04). Brisbane, Australia 24 - 25 Aug 2004 Brunswick East, Australia.
Lessons learned in developing a wireless system for a healthcare industry
Gururajan, Raj and Vuori, Timo. 2003. "Lessons learned in developing a wireless system for a healthcare industry." 2003 ITS Asia-Australasia Regional Conference. Perth, Australia 22 - 24 Jun 2003
Study to investigate the determinants for the use of wireless technology in healthcare setting: a case of Pakistan
Hafeez-Baig, Abdul, Gururajan, Raj, Mula, Joseph M. and Lin, Meng-Kuan. 2009. "Study to investigate the determinants for the use of wireless technology in healthcare setting: a case of Pakistan." Peng, Jie, Al-Hakim, Latif and Chen, Guoqing (ed.) COINFO 2009: Managing Virtual Organisations and Information in the Era of Globalisation. Beijing, China 21 - 23 Nov 2009 Los Alamitos, CA. United States. https://doi.org/10.1109/COINFO.2009.52
Emerging issues in enterprise mobility management
Gururajan, Raj and Vuori, Timo. 2003. "Emerging issues in enterprise mobility management." 2003 ITS Asia-Australasia Regional Conference. Perth, Australia 22 - 24 Jun 2003 Calgary, Alberta, Canada .
Mobile healthcare applications: global developments to facilitate secure wireless applications
Vuori, Timo and Gururajan, Raj. 2003. "Mobile healthcare applications: global developments to facilitate secure wireless applications." 2003 ITS Asia-Australasia Regional Conference. Perth, Australia 22 - 24 Jun 2003 Calgary, Alberta, Canada .
Lessons for SMEs in implementing wireless technology solutions
Gururajan, Raj. 2004. "Lessons for SMEs in implementing wireless technology solutions." 3rd International Conference on SMEs in a Global Economy. Kuala Lumpur, Malaysia 06 - 07 Jul 2004 Wollongong, Australia.
Exploratory study to investigate the applicability of existing digital stethoscopes in a telehealth setting
Gurney, T., Hafeez-Baig, A. and Gururajan, R.. 2009. "Exploratory study to investigate the applicability of existing digital stethoscopes in a telehealth setting." Neelakanta, P. S. (ed.) OCOBIAHC 2009: International Conference on Biomedical Instrumentation and Healthcare Engineering. Chennai, India 06 - 08 Aug 2009 Piscataway, NJ, USA.
Trialling wireless handheld devices in a clinical setting: a Queensland case study
Gurney, Tiana, Hafeez-Baig, Abdul and Gururajan, Raj. 2009. "Trialling wireless handheld devices in a clinical setting: a Queensland case study." Dhillon, Gurpreet (ed.) CISTM 2009: 7th Annual Conference on Information Science, Technology and Management. Gurgaon, India 13 - 15 Jul 2009 Finland.
Exploratory study to understand the phenomena of adoption of wireless handheld devices in the Australian healthcare system
Hafeez-Baig, Abdul and Gururajan, Raj. 2009. "Exploratory study to understand the phenomena of adoption of wireless handheld devices in the Australian healthcare system." Journal of Systems and Information Technology. 11 (1), pp. 43-56. https://doi.org/10.1108/13287260910932403
The problems of implementing electronic signatures in a wireless environment
Gururajan, Raj and Howard, Angela. 2004. "The problems of implementing electronic signatures in a wireless environment." 9th Annual Conference of Asia Pacific Decision Sciences Institute (APDSI 2004). Seoul, Korea 01 - 04 Jul 2004 Hong Kong, China.
Barriers to the inclusion of wireless technology in aged care applications - a review
Gururajan, Raj, Howard, Srecko, Genrich, Rohan and Low, Ee Kuan. 2004. "Barriers to the inclusion of wireless technology in aged care applications - a review." Conrick, Moya and Soar, Jeffrey (ed.) 1st Australian Aged and Community Care Informatics Conference (ACCIC'04). Brisbane, Australia 24 - 25 Aug 2004 Brunswick East, Australia.
Enhanced p-sensitive k-anonymity models for privacy preserving data publishing
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Truta, Traian Marius. 2008. "Enhanced p-sensitive k-anonymity models for privacy preserving data publishing." Transactions on Data Privacy. 1 (2), pp. 53-66.
Integrating recommendation models for improved web page prediction accuracy
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2008. "Integrating recommendation models for improved web page prediction accuracy." Dobbie, Gillian and Mans, Bernard (ed.) ACSC 2008: 31st Australasian Computer Science Conference. Wollongong, Australia 22 - 25 Jan 2008 Sydney, Australia.
Priority driven K-anonymisation for privacy protection
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "Priority driven K-anonymisation for privacy protection." Roddick, John F., Li, Jiuyong, Christen, Peter and Kennedy, Paul J. (ed.) 7th Australasian Data Mining Conference (AusDM 2008). Glenelg, Adelaide 27 - 28 Nov 2008 Gold Coast, Australia.
Towards an authentication protocol for service outsourcing over IP networks
Lai, David, Zhang, Zhongwei and Wang, Hua. 2005. "Towards an authentication protocol for service outsourcing over IP networks." Arabnia, Hamid R. (ed.) 2005 International Conference on Security and Management. Las Vegas, United States of America 20 - 23 Jun 2005 Las Vegas, Nevada, USA.
An exploratory qualitative study to determine factors influencing the adoption of mobile learning for tertiary education
Gururajan, Raj, McDonald, Jacquelin, Gururajan, Vijaya and Genrich, Rohan. 2007. "An exploratory qualitative study to determine factors influencing the adoption of mobile learning for tertiary education." International Journal of Technology, Knowledge and Society. 2 (6), pp. 33-40.
Online learning with peer-review: an initial study
Gururajan, Raj, Hafeez-Baig, Abdul and Khan, Shamim. 2008. "Online learning with peer-review: an initial study." 2008 World Conference on E-Learning in Corporate, Government, Healthcare & Higher Education (E-Learn 2008). Las Vegas, United States of America 17 - 21 Nov 2008 Chesapeake, VA, United States.
Pakastani healthcare professionals views and opinions about use of wireless handheld devices in healthcare environment
Gururajan, Raj, Hafeez-Baig, Abdul and Kerr, Don. 2008. "Pakastani healthcare professionals views and opinions about use of wireless handheld devices in healthcare environment." Electronic Journal of Health Informatics. 3 (2), pp. 1-10.
Use and useability of learning objects within the COLIS demonstrator framework (Interaction of IT systems & repositories project report)
Phillips, R. A., Rai, S., Sudweeks, F., Gururajan, R., Jones, M., Shiers, D. and O'Neil, R.. 2005. Use and useability of learning objects within the COLIS demonstrator framework (Interaction of IT systems & repositories project report). Sydney, Australia. Macquarie University.
Transforming the practice of mobile learning: promoting pedagogical innovation through educational principles and strategies that work
Danaher, Patrick, Gururajan, Raj and Hafeez-Baig, Abdul. 2009. "Transforming the practice of mobile learning: promoting pedagogical innovation through educational principles and strategies that work." Hokyoung, Ryu and Parsons, D. (ed.) Innovative mobile learning: techniques and technologies. Hershey PA, USA. IGI Global. pp. 21-46
Current developments of k-anonymous data releasing
Li, Jiuyong, Wang, Hua, Jin, Huidong and Yong, Jianming. 2008. "Current developments of k-anonymous data releasing." Electronic Journal of Health Informatics. 3 (1).
Clinical usefulness of handheld wireless technology in healthcare: a cross-national study of Australia and India
Gururajan, Raj, Quaddus, Mohammed and Xu, Jun. 2008. "Clinical usefulness of handheld wireless technology in healthcare: a cross-national study of Australia and India." Journal of Systems and Information Technology. 10 (1), pp. 72-85.
Protecting information sharing in distributed collaborative environment
Li, Min and Wang, Hua. 2008. "Protecting information sharing in distributed collaborative environment." 10th Asia-Pacific Web Conference (APWeb 2008). Shenyang, China 26 - 28 Apr 2008 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-540-89376-9-19
An efficient hash-based algorithm for minimal k-anonymity
Sun, Xiaoxun, Li, Min, Wang, Hua and Plank, Ashley. 2008. "An efficient hash-based algorithm for minimal k-anonymity." Dobbie, Gillian and Mans, Bernard (ed.) ACSC 2008: 31st Australasian Computer Science Conference. Wollongong, Australia 22 - 25 Jan 2008 Sydney, Australia.
XML and web services security
Sun, Lili and Li, Yan. 2008. "XML and web services security." CSCWD 2008: 12th International Conference on Computer Supported Cooporative Work in Design. Xi'an, China 16 - 18 Apr 2008 Piscataway, NJ, USA. https://doi.org/10.1109/CSCWD.2008.4537075
Wireless emails: issues, challenges and guidelines for implementation
Howard, Angela, Low, Ee Kuan, Byrnes, Peter and Gururajan, Raj. 2004. "Wireless emails: issues, challenges and guidelines for implementation." Conrick, Moya and Soar, Jeffrey (ed.) 1st Australian Aged and Community Care Informatics Conference (ACCIC'04). Brisbane, Australia 24 - 25 Aug 2004 Brunswick East, Vic, Australia.
Integrating Markov Model with clustering for predicting web page accesses
Khalil, Faten, Wang, Hua and Li, Jiuyong. 2007. "Integrating Markov Model with clustering for predicting web page accesses." 13th Australasian World Wide Web Conference (AusWeb 2007). Coffs Harbour, Australia 30 Jun - 04 Jul 2007 Australia.
Factors influencing the intention to use wireless technology in healthcare: an Indian study
Gururajan, Raj. 2007. "Factors influencing the intention to use wireless technology in healthcare: an Indian study." Wootton, Richard (ed.) 7th International Conference on Successes and Failures in Telehealth. Brisbane, Australia 27 - 28 Aug 2007 Brisbane, Australia.
Integrating recommendation models for improved web page prediction accuracy
Khalil, Faten, Wang, Hua and Li, Jiuyong. 2007. "Integrating recommendation models for improved web page prediction accuracy." 13th Australasian World Wide Web Conference (AusWeb 2007). Coffs Harbour, Australia 30 Jun - 04 Jul 2007 Australia.
An exploratory study to determine students' perceptions of the value of interaction in an Australian classroom context and the perceived impact on learning outcomes
McDonald, Jacquelin, Birch, Dawn, Gray, Anthony, Gururajan, Raj, Hingst, Raymond D. and Maguire, Michael. 2005. "An exploratory study to determine students' perceptions of the value of interaction in an Australian classroom context and the perceived impact on learning outcomes." CRLL 2005: What a Difference a Pedagogy Makes: Researching Lifelong Learning and Teaching. Glasgow, Scotland 24 - 26 Jun 2005 London, United Kingdom.
Motivations and challenges for m-business transformation: a multiple-case study
Tsai, Heng-Sheng and Gururajan, Raj. 2007. "Motivations and challenges for m-business transformation: a multiple-case study." Journal of Theoretical and Applied Electronic Commerce Research. 2 (2), pp. 19-33.
Global implementation of digital stethoscope for telehealth or telemedicine: an Australian case study
Hafeez-Baig, Abdul, Scott, Annette, Sarquis, Colleen, Cockfield, Glenys and Gururajan, Raj. 2007. "Global implementation of digital stethoscope for telehealth or telemedicine: an Australian case study." 5th International Symposium on Management of Technology (ISMOT 2007). Hangzhou, China 01 - 03 Jun 2007 China.
Factors influencing the intention to use wireless technology in health care: a study in India
Gururajan, Raj. 2007. "Factors influencing the intention to use wireless technology in health care: a study in India." Journal of Telemedicine and Telecare. 13 (3 (Supplement)), pp. 40-41. https://doi.org/10.1258/135763307783247167
Technology management, data management, improved outcomes, efficiency and software limitation influencing the use of wireless technology for healthcare in Pakistan
Hafeez-Baig, Abdul, Grist, Shelly and Gururajan, Raj. 2007. "Technology management, data management, improved outcomes, efficiency and software limitation influencing the use of wireless technology for healthcare in Pakistan." Lee, Roger, Chowdhury, Morshed U., Ray, Sid and Lee, Thuy (ed.) ICIS 2007: 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007). Melbourne, Australia 11 - 13 Jul 2007 Los Alamitos, CA. United States. https://doi.org/10.1109/ICIS.2007.177
Building a consumer anonymity scalable payment protocol for [the] Internet purchases
Wang, Hua, Cao, Jinli and Kambayahsi, Yahiko. 2002. "Building a consumer anonymity scalable payment protocol for [the] Internet purchases." 12th International Workshop on Research Issues in Data Engineering: Engineering E-Commerce/E-Business Systems (RIDE'02). San Jose, USA 24 - 25 Feb 2002 US.
XML schema in XML documents with usage control
Sun, Lili and Li, Yan. 2007. "XML schema in XML documents with usage control." International Journal of Computer Science and Network Security. 7 (10), pp. 170-177.
The effects of culture on knowledge management practice: A qualitative case study of MSC status companies
Gan, Gerald Goh Guan, Ryan, Charmaine and Gururajan, Raj. 2006. "The effects of culture on knowledge management practice: A qualitative case study of MSC status companies." Kajian Malaysia. 24 (1/2), pp. 97-128.
XML undeniable signatures
Sun, Lili and Li, Yan. 2005. "XML undeniable signatures." Mohammadian, M. (ed.) International Conference on Intelligent Agents, Web Technologies & Internet Commerce (2005). Vienna, Austria 28 - 30 Nov 2005 USA.
A flexible payment scheme and its user-role assignment
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2002. "A flexible payment scheme and its user-role assignment." Chan, A., Chan, S., Leong, H. and Ng, V. (ed.) 2nd International Workshop on Cooperative Internet Computing. Hong Kong, China 18 - 19 Aug 2002 Hong Kong.
A protocol for untraceable electronic cash
Wang, Hua and Zhang, Yanchun. 2000. "A protocol for untraceable electronic cash." Lu, Hongjun and Zhou, Aoying (ed.) 1st Web-Age Information Management International Conference (WAIM 2000). Shanghai, China 21 - 23 Jun 2000 Berlin, Germany. https://doi.org/10.1007/3-540-45151-X_18
A consumer anonymity scalable payment scheme with role based access control
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2001. "A consumer anonymity scalable payment scheme with role based access control." 2nd International Conference on Web Information Systems Engineering (WISE 2001). Kyoto, Japan 03 - 06 Dec 2007
Formal authorization allocation approaches for role-based access control based on relational algebra operations
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2002. "Formal authorization allocation approaches for role-based access control based on relational algebra operations." 3rd International Conference on Web Information Systems Engineering, 2002 (WISE 2002). Singapore 12 - 14 Dec 2002
An electronic cash scheme and its management
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2004. "An electronic cash scheme and its management." Concurrent Engineering: Research and Application Journal. 12 (3), pp. 247-257. https://doi.org/10.1177/1063293X04046194
Drivers of wireless technology in healthcare: an Indian study
Gururajan, Raj. 2007. "Drivers of wireless technology in healthcare: an Indian study." Osterle, H., Schelp, J. and Winter, Robert (ed.) 15th European Conference on Information Systems: Relevant rigour - Rigorous relevance (ECIS 2007). St Gallen, Switzerland 07 - 09 Jun 2007 Switzerland.
A discussion on security risks in mobile commerce
Gururajan, Raj. 2006. "A discussion on security risks in mobile commerce." E-Business Review. 7 (2), pp. 9-39.
An exploratory study of mobile learning for tertiary education: a discussion with students
Hafeez-Baig, Abdul, Gururajan, Raj and Gururajan, Vijaya. 2006. "An exploratory study of mobile learning for tertiary education: a discussion with students." International Journal of Pedagogies and Learning. 2 (1), pp. 76-88.
Ubiquitous computing environments and its usage access control
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2006. "Ubiquitous computing environments and its usage access control." 1st International Conference on Scalable Information Systems. Hong Kong, China 29 May - 01 Jun 2006 New York, USA.
Ticket-based mobile commerce scheme and its implementation
Wang, Hua, Huang, Xiaodi and Dodda, Goutham Reddy. 2006. "Ticket-based mobile commerce scheme and its implementation ." 9th ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems. Terromolinos, Spain 02 - 06 Oct 2006 New York, NY, USA.
A maximally diversified multiple decision tree algorithm for microarray data classification
Hu, Hong, Li, Jiuyong, Wang, Hua, Daggard, Grant and Shi, Mingren. 2006. "A maximally diversified multiple decision tree algorithm for microarray data classification." Boden, Mikael and Bailey, Timothy (ed.) Workshop on Intelligent Systems for Bioinformatics (2006). Hobart, Australia 04 Dec 2006 Sydney, Australia.
A framework of combining Markov model with association rules for predicting web page accesses
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2006. "A framework of combining Markov model with association rules for predicting web page accesses." Christen, Peter, Kennedy, Paul J., Li, Jiuyong, Simoff, Simeon J. and Williams, Graham J. (ed.) 5th Australasian Conference on Data Mining and Analystics (AusDM 2006). Sydney, Australia 29 - 30 Nov 2006 Canberra, Australia.
A comparative study of classification methods for microarray data analysis
Hu, Hong, Li, Jiuyong, Plank, Ashley, Wang, Hua and Daggard, Grant. 2006. "A comparative study of classification methods for microarray data analysis." Christen, Peter, Kennedy, Paul J., Li, Jiuyong, Simoff, Simeon J. and Williams, Graham J. (ed.) 5th Australasian Conference on Data Mining and Analystics (AusDM 2006). Sydney, Australia 29 - 30 Nov 2006 Canberra, Australia.
Preliminary investigation to explore perceptions of security issues associated with wireless technology in healthcare in Australia
Tiong, I. C., Hafeez-Baig, Abdul, Gururajan, Raj and Soar, Jeffrey. 2006. "Preliminary investigation to explore perceptions of security issues associated with wireless technology in healthcare in Australia." Westbrook, J. and Callen, J. (ed.) Health Infomatics Conference 2006: Bridging the Digital Divide: Clinician, Consumer and Computer (HIC 2006). Sydney, Australia 20 - 22 Aug 2006 Melbourne, Australia.
DTD level authorization in XML documents with usage control
Sun, Lili and Li, Yan. 2006. "DTD level authorization in XML documents with usage control." International Journal of Computer Science and Network Security. 6 (11), pp. 244-250.
Access management in electronic commerce system
Wang, Hua. 2004. Access management in electronic commerce system. PhD Thesis Doctor of Philosophy. University of Southern Queensland.
Current developments of k-anonymous data releasing
Li, Jiuyong, Wang, Hua, Jin, Huidong and Yong, Jianming. 2006. "Current developments of k-anonymous data releasing." Croll, Peter, Morarji, Hasmukh and Au, Richard (ed.) National e-Health Privacy and Security Symposium 2006. Brisbane, Australia 24 - 26 Oct 2006 Brisbane.
Determinants for a generic mobile commerce transformation framework
Tsai, Heng-Sheng and Gururajan, Raj. 2005. "Determinants for a generic mobile commerce transformation framework." Swatman, Paul and Swatman, Paula (ed.) 2005 CollECTeR Conference on eCommerce. Sydney, Australia 13 Jul 2005 South Australia.
A program for collaborative research in ageing and aged care
Gururajan, Raj, Gururajan, Vijaya and Soar, Jeffrey. 2005. "A program for collaborative research in ageing and aged care." Soar, Jeffrey and Edgecumbe, Joan (ed.) 2nd Australian Aged and Community Care Informatics Conference (ACCIC'05). Hobart, Tasmania 04 - 06 May 2005 Brunswick East, Australia.
Mobile solutions for aged care: a transformational framework
Soar, Jeffrey, Tsai, Heng-Sheng, Yong, Jianming and Gururajan, Raj. 2005. "Mobile solutions for aged care: a transformational framework." Soar, Jeffrey and Edgecumbe, Joan (ed.) 2nd Australian Aged and Community Care Informatics Conference (ACCIC'05). Hobart, Tasmania 04 - 06 May 2005 Brunswick East, Australia.
An exploratory model of drivers for wireless handheld technology adoption derived from qualitative data: views from the Australian healthcare professionals
Gururajan, Raj. 2005. "An exploratory model of drivers for wireless handheld technology adoption derived from qualitative data: views from the Australian healthcare professionals." Ramayah, T., Sulaiman, Mohamed, Harun, Hasnah, Ali, Ruhani, Nasurdin, Aizzat Mohd., Wahid, Nabsiah Abdul and Osman, Intan (ed.) 6th Asian Academy of Management Conference: Emerging Asian Economy: Local Strategies, Global Impact. Perak, Malaysia 09 - 11 Dec 2005 Malaysia.
Developing mobile technologies for healthcare: challenge to be addressed in a globally distributed work (GDW) environment
Gururajan, Raj. 2005. "Developing mobile technologies for healthcare: challenge to be addressed in a globally distributed work (GDW) environment." Kumar, Kuldeep and Krishna, S. (ed.) 1st International Conference on Management of Globally Distributed Work. Bangalore, India 28 - 30 Dec 2005 India.
Management challenges in implementing electronic signatures
Gururajan, Raj. 2005. "Management challenges in implementing electronic signatures." Chandrasekaran, Kesavan (ed.) International Conference - Innovative New Product Development: Engineering Meets Marketing (2005). Madras, India 21 - 23 Dec 2005 India.
Necessity for the management of innovative wireless solutions in the Australian healthcare market
Gururajan, Raj. 2005. "Necessity for the management of innovative wireless solutions in the Australian healthcare market." Chandrasekaran, Kesavan (ed.) International Conference - Innovative New Product Development: Engineering Meets Marketing (2005). Madras, India 21 - 23 Dec 2005 India.
Challenges for implementing wireless hand-held technology in health care: views from selected Queensland nurses
Gururajan, Raj, Moloney, Clint and Soar, Jeffrey. 2005. "Challenges for implementing wireless hand-held technology in health care: views from selected Queensland nurses." Journal of Telemedicine and Telecare. 11 (2 (Supplement)), pp. 37-38. https://doi.org/10.1258/135763305775124849
Wireless ehealth applications: are we on the right track?
Gururajan, Raj and Hafeez-Baig, Abdul. 2005. "Wireless ehealth applications: are we on the right track?" Isaias, Pedro, Nunes, Miguel Baptista and Reis, Antonio Palma dos (ed.) IADIS Virtual Multi Conference on Computer Science and Information Systems 2005 (IADIS 2005). Virtual 11 - 29 Apr 2005 United States.
Case study: wireless handheld application for an emergency department
Gururajan, Raj. 2005. "Case study: wireless handheld application for an emergency department." Isaias, Pedro, Nunes, Miguel Baptista and Reis, Antonio Palma dos (ed.) IADIS Virtual Multi Conference on Computer Science and Information Systems 2005 (IADIS 2005). Virtual 11 - 29 Apr 2005 United States.
Attitude towards plagiarism in information systems in Australian universities
Gururajan, Raj and Roberts, Dave. 2005. "Attitude towards plagiarism in information systems in Australian universities." Wei, Chih-Ping and Yen, Benjamin (ed.) 9th Pacific Asia Conference on Information Systems (PACIS 2005). Bangkok, Thailand 07 - 10 Jul 2005 Hong Kong.
Innovation in ageing for regional communities: planning for productive ageing in the Wide Bay/Burnett region of Queensland
Soar, Jeffrey, Garlick, Steve, Waterman, P. and Gururajan, Raj. 2005. "Innovation in ageing for regional communities: planning for productive ageing in the Wide Bay/Burnett region of Queensland." Abbey, Jennifer (ed.) 38th National Conference of the Australian Association of Gerontology. Gold Coast, Australia 09 - 11 Nov 2005 Sydney, Australia.
Out patient orthopaedic consultations via telehealth: a qualitative study
Gururajan, Raj, Gururajan, Vijaya, Moloney, Clint and Scott, Annette. 2005. "Out patient orthopaedic consultations via telehealth: a qualitative study." Beekhuyzen, Jenine, Von Hellens, Lisa, Guest, Karen, Morley, Morley and Collier, Toni (ed.) 2005 QualIT Challenges for Qualitative Research. Brisbane, Australia 23 - 25 Nov 2005 Brisbane, Australia.
Facilitators and inhibitors for wireless handheld technology: views from Queensland nurses
Gururajan, Raj and Moloney, Clint. 2005. "Facilitators and inhibitors for wireless handheld technology: views from Queensland nurses." Beekhuyzen, Jenine, Von Hellens, Lisa, Guest, Karen, Morley, Morley and Collier, Toni (ed.) 2005 QualIT Challenges for Qualitative Research. Brisbane, Australia 23 - 25 Nov 2005 Brisbane, Australia.
Adoption of wireless handheld technology: a case of Queensland healthcare
Gururajan, Raj, Hafeez-Baig, Abdul and Moloney, Clint. 2005. "Adoption of wireless handheld technology: a case of Queensland healthcare." Yeung, Jeff (ed.) 5th International Conference on Electronic Business: Enhancing Logistics & Supply Chain Competence Through E-Business (ICEB 2005). Hong Kong, China 05 - 09 Dec 2005 Hong Kong, China.
Necessity for a new technology acceptance model to predict adoption of wireless technology in healthcare
Gururajan, Raj, Toleman, Mark and Soar, Jeffrey. 2004. "Necessity for a new technology acceptance model to predict adoption of wireless technology in healthcare." Health Informatics Conference 2004 (HIC 2004). Brisbane, Australia 2004 Melbourne, Australia.
Opinions expressed by healthcare professionals on the impact of telecommunication services in implementing wireless technology
Gururajan, Raj and Vuori, Timo. 2005. "Opinions expressed by healthcare professionals on the impact of telecommunication services in implementing wireless technology." Cooper, Russel, Madden, Gary and Lloyd, Ashley (ed.) ITS Africa-Asia-Australasia Regional Conference - ICT Networks - Building Blocks for Economic Development (2005). Perth, Australia 28 - 30 Aug 2005 Perth, Australia.
Introducing mobile technologies in support of healthcare
Gururajan, Raj, Murugesan, San and Soar, Jeffrey. 2005. "Introducing mobile technologies in support of healthcare." Cutter IT Journal. 18 (8), pp. 12-18.
An examination into the role of knowledge management and computer security in organizations
Gururajan, Raj and Gururajan, Vijaya. 2005. "An examination into the role of knowledge management and computer security in organizations." Sohal, Amrik and Cooney, Richard (ed.) 7th International Research Conference on Quality, Innovation & Knowledge Management: Applications and Synthesis in the Global Economy. Kuala Lumpur, Malaysia 16 - 18 Feb 2005 Kuala Lumpur, Malaysia.
Drivers for wireless handheld technology: views from Queensland nurses
Gururajan, Raj, Moloney, Clint and Kerr, Don. 2005. "Drivers for wireless handheld technology: views from Queensland nurses." Shehadie, Elias (ed.) Australasian Business and Behavioural Sciences Association Conference 2005 (ABBSA 2005). Cairns, Australia 05 - 07 Aug 2005 Australia.
Wireless solutions developed for the Australian healthcare: a review
Gururajan, Raj and Murugesan, San. 2005. "Wireless solutions developed for the Australian healthcare: a review." Brookes, Wayne, Lawrence, Elaine, Steele, Robert and Chang, Elizabeth (ed.) International Conference on Mobile Business (ICMB 2005). Sydney, Australia 11 - 13 Jul 2005 Los Alamitos, CA. United States. https://doi.org/10.1109/ICMB.2005.116
Drivers and inhibitors of the adoption of wireless handheld technology in the healthcare industry: views from selected WA stakeholders
Quaddus, Mohammed, Fink, Dieter, Gururajan, Raj and Vuori, Timo. 2005. "Drivers and inhibitors of the adoption of wireless handheld technology in the healthcare industry: views from selected WA stakeholders." Grain, Heather, Wise, Marcus and Chu, Stephen (ed.) Health Informatics Conference 2005: Improving Healthcare Through Informatics (HIC 2005). Melbourne, Australia 31 Jul - 02 Aug 2005 Australia.
Mobile business: an exploratory study to define a framework for the transformation process
Tsai, Heng-Sheng and Gururajan, Raj. 2005. "Mobile business: an exploratory study to define a framework for the transformation process." Eldon, Li (ed.) APDSI 2005. Taipei, Taiwan 28 Jun - 02 Jul 2005 Taiwan.
An investigation into the factors of adoption of wireless applications for data management by nurses
Gururajan, Raj, Kerr, Don, Moloney, Clint and Houghton, Luke. 2005. "An investigation into the factors of adoption of wireless applications for data management by nurses." Eldon, Li (ed.) APDSI 2005. Taipei, Taiwan 28 Jun - 02 Jul 2005 Taipei, Taiwan.
Wireless workforce: legal issues and risks
Gururajan, Raj. 2005. "Wireless workforce: legal issues and risks." Dhillon, Gurpreet and Jaiswal, Mahadeo (ed.) 3rd Annual Conference on Information Science, Technology & Management (CISTM 2005). India 24 - 26 Jul 2005 Finland.
Implementation of electronic signatures: a discussion on regulatory issues
Gururajan, Raj. 2005. "Implementation of electronic signatures: a discussion on regulatory issues." Dhillon, Gurpreet and Jaiswal, Mahadeo (ed.) 3rd Annual Conference on Information Science, Technology & Management (CISTM 2005). India 24 - 26 Jul 2005 Finland.
A preliminary study to determine attitudes towards plagiarism in information systems
Roberts, Dave and Gururajan, Raj. 2004. "A preliminary study to determine attitudes towards plagiarism in information systems." Elliot, Steve, Williams, Mary-Anne, Williams, Sue and Pollard, Carol (ed.) 15th Australasian Conference on Information Systems (ACIS 2004). Hobart, Australia 01 - 03 Dec 2004 Hobart, Australia.
A preliminary study to determine the role of organizational knowledge in computer security
Gururajan, Raj and Thompson, Alan. 2004. "A preliminary study to determine the role of organizational knowledge in computer security." Elliott, Steve, Williams, Mary-Anne, Williams, Sue and Pollard, Carol (ed.) 15th Australasian Conference on Information Systems (ACIS 2004). Hobart, Australia 01 - 03 Dec 2004 Hobart, Australia.