Purpose based access control for privacy protection in e-healthcare services

Article


Sun, Lili, Wang, Hua, Soar, Jeffrey and Rong, Chunming. 2012. "Purpose based access control for privacy protection in e-healthcare services." Journal of Software. 7 (11), pp. 2443-2449. https://doi.org/10.4304/jsw.7.11.2443-2449
Article Title

Purpose based access control for privacy protection in e-healthcare services

ERA Journal ID32139
Article CategoryArticle
AuthorsSun, Lili (Author), Wang, Hua (Author), Soar, Jeffrey (Author) and Rong, Chunming (Author)
Journal TitleJournal of Software
Journal Citation7 (11), pp. 2443-2449
Number of Pages7
Year2012
Place of PublicationFinland
ISSN1796-217X
Digital Object Identifier (DOI)https://doi.org/10.4304/jsw.7.11.2443-2449
Web Address (URL)http://ojs.academypublisher.com/index.php/jsw/article/view/jsw071124432449
Abstract

Information privacy is a major concern in many areas and none more so than in healthcare. E-healthcare is the use of web-based systems to share and deliver information across the internet. The design of proper models for authorization and access control for e-Health system services is necessary in a large health service. Usage control has been considered as the next generation access control model with distinguishing properties of decision continuity. It has been proven to be efficient to improve security administration with flexible authorization management. Usage control enables finer-grained control over usage of digital objects than that of traditional access control policies and models. In this paper, we have enriched the research for usage access control with purpose extension that is able to be applied in the field of medical information system or e-Healthcare system. This work provides a foundation for developing appropriate security solutions for organizations' secure digital information and will contribute to higher security in the medical information systems.

Keywordsprivacy; access control; purpose; e-healthcare services
ANZSRC Field of Research 2020420399. Health services and systems not elsewhere classified
460499. Cybersecurity and privacy not elsewhere classified
460905. Information systems development methodologies and practice
Public Notes

© 2012 ACADEMY PUBLISHER. Users are free to read, download, copy, distribute, print, search, or link to the full texts of these articles.

Byline AffiliationsDepartment of Mathematics and Computing
School of Information Systems
University of Stavanger, Norway
Institution of OriginUniversity of Southern Queensland
Permalink -

https://research.usq.edu.au/item/q1w76/purpose-based-access-control-for-privacy-protection-in-e-healthcare-services

Download files


Published Version
Sun_Wang_Soar_Rong_JS_2012_PV.pdf
File access level: Anyone

  • 2067
    total views
  • 359
    total downloads
  • 3
    views this month
  • 2
    downloads this month

Export as

Related outputs

Exploring Rhythms and Channels-Based EEG Biomarkers for Early Detection of Alzheimer's Disease
Siuly, Siuly, Alcin, Ömer Faruk, Wang, Hua, Li, Yan and Wen, Peng. 2024. "Exploring Rhythms and Channels-Based EEG Biomarkers for Early Detection of Alzheimer's Disease ." IEEE Transactions on Emerging Topics in Computational Intelligence. 8 (2), pp. 1609-1623. https://doi.org/10.1109/TETCI.2024.3353610
Revolutionizing procurement: Unveiling next-gen supplier strategies in UAE's oil & gas sector
Alhammadi, Ali, Yusaf, Talal, Soar, Jeffrey, Ali, Bashar Mahmood, Kadirgama, Kumaran and Yousif, Belal F. 2024. "Revolutionizing procurement: Unveiling next-gen supplier strategies in UAE's oil & gas sector." The Extractive Industries and Society. 17. https://doi.org/10.1016/j.exis.2024.101428
Predicting Co-Occurring Mental Health and Substance Use Disorders in Women: An Automated Machine Learning Approach
Acharya, Nirmal, Kar, Padmaja, Ally, Mustafa and Soar, Jeffrey. 2024. "Predicting Co-Occurring Mental Health and Substance Use Disorders in Women: An Automated Machine Learning Approach." Applied Sciences. 14 (4). https://doi.org/10.3390/app14041630
Improving primary care referral to specialist services: a protocol for a 10-year global systematic review in the Australian context
Ward, Aletha E, Ekanayake, Siyaguna Kosgamage Dilum Manthinda, Heart, Diane, Valery, Patricia and Soar, Jeffrey. 2023. "Improving primary care referral to specialist services: a protocol for a 10-year global systematic review in the Australian context." BMJ Open. 13 (8). https://doi.org/10.1136/bmjopen-2022-068927
Near real-time wind speed forecast model with bidirectional LSTM networks
Joseph, Lionel P., Deo, Ravinesh C., Prasad, Ramendra, Salcedo-Sanz, Sancho, Raj, Nawin and Soar, Jeffrey. 2023. "Near real-time wind speed forecast model with bidirectional LSTM networks." Renewable Energy. 204, pp. 39-58. https://doi.org/10.1016/j.renene.2022.12.123
The Association Between Selfishness, Animal-Oriented Empathy, Three Meat Reduction Motivations (Animal, Health, and Environment), Gender, and Meat Consumption
Dillon-Murray, Angela, Ward, Aletha and Soar, Jeffrey. 2023. "The Association Between Selfishness, Animal-Oriented Empathy, Three Meat Reduction Motivations (Animal, Health, and Environment), Gender, and Meat Consumption." Food Ethics. 9 (1). https://doi.org/10.1007/s41055-023-00135-5
Using multi-focus group method as an effective tool for eliciting business system requirements: Verified by a case study
Wu, Robert M. X., Wang, Yongwen, Shafiabady, Niusha, Zhang, Huan, Yan, Wanjun, Gou, Jinwen, Shi, Yong, Liu, Bao, Gide, Ergun, Kang, Changlong, Zhang, Zhongwu, Shen, Bo, Li, Xiaoquan, Fan, Jianfeng, He, Xiangqian, Soar, Jeffrey, Zhao, Haijun, Sun, Lei, Huo, Wenying and Wang, Ya. 2023. "Using multi-focus group method as an effective tool for eliciting business system requirements: Verified by a case study." PLoS ONE. 18 (3). https://doi.org/10.1371/journal.pone.0281603
Exploring deep residual network based features for automatic schizophrenia detection from EEG
Siuly, Siuly, Guo, Yanhui, Alcin, Omer Faruk, Li, Yan, Wen, Peng and Wang, Hua. 2023. "Exploring deep residual network based features for automatic schizophrenia detection from EEG." Physical and Engineering Sciences in Medicine. 46 (2), pp. 561-574. https://doi.org/10.1007/s13246-023-01225-8
Food hygiene knowledge and behaviour among domestic food handlers during COVID 19 pandemic in Bangladesh
Ishra, Rakia, Khanam, Rasheda, Soar, Jeffrey and Sharif, Saif. 2023. "Food hygiene knowledge and behaviour among domestic food handlers during COVID 19 pandemic in Bangladesh." Food Control. 153. https://doi.org/10.1016/j.foodcont.2023.109945
Natural Language Processing in Electronic Health Records in relation to healthcare decision-making: A systematic review
Hossain, Elias, Rana, Rajib, Higgins, Niall, Soar, Jeffrey, Barua, Prabal Datta, Pisani, Anthony R. and Turner, Kathryn. 2023. "Natural Language Processing in Electronic Health Records in relation to healthcare decision-making: A systematic review." Computers in Biology and Medicine. 155. https://doi.org/10.1016/j.compbiomed.2023.106649
Redefining procurement paradigms: A critical review of buyer-supplier dynamics in the global petroleum and natural gas industry
Alhammadi, Ali, Soar, Jeffrey, Yusaf, Talal, Ali, Bashar Mahmood and Kadirgama, Kumaran. 2023. "Redefining procurement paradigms: A critical review of buyer-supplier dynamics in the global petroleum and natural gas industry." The Extractive Industries and Society. 16. https://doi.org/10.1016/j.exis.2023.101351
Automated detection of airflow obstructive diseases: A systematic review of the last decade (2013-2022)
Xu, Shuting, Deo, Ravinesh C, Soar, Jeffrey, Barua, Prabal Datta, Faust, Oliver, Homaira, Nusrat, Jaffe, Adam, Kabir, Arm Luthful and Acharya, U. Rajendra. 2023. "Automated detection of airflow obstructive diseases: A systematic review of the last decade (2013-2022)." Computer Methods and Programs in Biomedicine. 241. https://doi.org/10.1016/j.cmpb.2023.107746
Application of Entropy for Automated Detection of Neurological Disorders With Electroencephalogram Signals: A Review of the Last Decade (2012-2022)
Jui, S. Janifer Jabin, Deo, Ravinesh C. Deo, Barua, Prabal Datta, Devi, Aruna, Soar, Jeffrey and Acharya, U. Rajendra. 2023. "Application of Entropy for Automated Detection of Neurological Disorders With Electroencephalogram Signals: A Review of the Last Decade (2012-2022)." IEEE Access. 11, pp. 71905-71924. https://doi.org/10.1109/ACCESS.2023.3294473
Consumers’ Behavioural Intentions to Reuse Recommender Systems: Assessing the Effects of Trust Propensity, Trusting Beliefs and Perceived Usefulness.
Acharya, Nirmal, Sassenberg, Anne-Marie and Soar, Jeffrey. 2023. "Consumers’ Behavioural Intentions to Reuse Recommender Systems: Assessing the Effects of Trust Propensity, Trusting Beliefs and Perceived Usefulness." Journal of Theoretical and Applied Electronic Commerce Research. 18 (1), pp. 55-78. https://doi.org/10.3390/jtaer18010004
Identifying an Optimal Model for Blockchain Technology Adoption in the Agricultural Sector
Gandhi Maniam, Peter Sasitharan, Prentice, Catherine, Sassenberg, Anne-Marie and Soar, Jeffrey. 2023. "Identifying an Optimal Model for Blockchain Technology Adoption in the Agricultural Sector." Logistics (MDPI AG). 7 (3), pp. 1-19. https://doi.org/10.3390/logistics7030059
Design Principles for Platform Enabled Knowledge Commons with an Expository Instantiation
Ramakrishnan, Muralidharan, Gregor, Shirley, Shrestha, Anup and Soar, Jeffrey. 2023. "Design Principles for Platform Enabled Knowledge Commons with an Expository Instantiation." Journal of the Association of Information Systems. 24 (5), pp. 1413-1438.
The Role of Cognitive Absorption in Recommender System Reuse
Acharya, Nirmal, Sassenberg, Anne-Marie and Soar, Jeffrey. 2023. "The Role of Cognitive Absorption in Recommender System Reuse." Sustainability. 15 (5), pp. 1-23. https://doi.org/10.3390/su15053896
Innovation Centric Knowledge Commons—A Systematic Literature Review and Conceptual Model
Ramakrishnan, Muralidharan, Shrestha, Anup and Soar, Jeffrey. 2021. "Innovation Centric Knowledge Commons—A Systematic Literature Review and Conceptual Model." Journal of Open Innovation: Technology, Market, and Complexity. 7 (1), pp. 1-19. https://doi.org/10.3390/joitmc7010035
Using Sequence-to-Sequence Models for Carrier Frequency Offset Estimation of Short Messages and Chaotic Maps
Davey, Christopher P., Shakeel, Ismail, Deo, Ravinesh C., Salcedo-sanz, Sancho and Soar, Jeffrey. 2022. "Using Sequence-to-Sequence Models for Carrier Frequency Offset Estimation of Short Messages and Chaotic Maps." IEEE Access. 10, pp. 119814 - 119825. https://doi.org/10.1109/ACCESS.2022.3221762
Forecasting solar photosynthetic photon flux density under cloud cover effects: novel predictive model using convolutional neural network integrated with long short-term memory network
Deo, Ravinesh C., Grant, Richard H., Webb, Ann, Ghimire, Sujan, Igoe, Damien P., Downs, Nathan J., Al-Musaylh, Mohanad S., Parisi, Alfio V. and Soar, Jeffrey. 2022. "Forecasting solar photosynthetic photon flux density under cloud cover effects: novel predictive model using convolutional neural network integrated with long short-term memory network." Stochastic Environmental Research and Risk Assessment. 36, p. 3183–3220. https://doi.org/10.1007/s00477-022-02188-0
Effects of cognitive absorption on continuous use intention of AI-driven recommender systems in e-commerce
Acharya, Nirmal, Sassenberg, Anne-Marie and Soar, Jeffrey. 2023. "Effects of cognitive absorption on continuous use intention of AI-driven recommender systems in e-commerce." Foresight (Cambridge): the journal for future studies, strategic thinking and policy. 25 (2), pp. 194-208. https://doi.org/10.1108/FS-10-2021-0200
Influence of food safety concerns on safe food purchasing at rural and urban consumers in Bangladesh
Ishra, Rakia, Khanam, Rasheda and Soar, Jeffrey. 2022. "Influence of food safety concerns on safe food purchasing at rural and urban consumers in Bangladesh." Appetite. 179, pp. 1-10. https://doi.org/10.1016/j.appet.2022.106306
Novel nested patch-based feature extraction model for automated Parkinson’s Disease symptom classification using MRI images
Kaplan, Ela, Altunisik, Erman, Firat, Yasemin Ekmekyapar, Barua, Prabal Datta, Dogan, Sengul, Baygin, Mehmet, Demir, Fahrettin Burak, Tuncer, Turker, Palmer, Elizabeth, Tan, Ru-San, Yu, Ping, Soar, Jeffrey, Fujita, Hamido and Acharya, U. Rajendra. 2022. "Novel nested patch-based feature extraction model for automated Parkinson’s Disease symptom classification using MRI images." Computer Methods and Programs in Biomedicine. 224, pp. 1-11. https://doi.org/10.1016/j.cmpb.2022.107030
Achieving Industry-aligned Education through Digital-Commons: A Case Study
Ramakrishnan, Muralidharan, Gregor, Shirley, Shrestha, Anup and Soar, Jeffrey. 2022. "Achieving Industry-aligned Education through Digital-Commons: A Case Study." Journal of Computer Information Systems. 63 (4), pp. 950-964. https://doi.org/10.1080/08874417.2022.2115955
Cloud Affected Solar UV Predictions with Three-Phase Wavelet Hybrid Convolutional Long Short-Term Memory Network Multi-Step Forecast System
Prasad, Salvin S., Deo, Ravinesh C., Downs, Nathan, Igoe, Damien, Parisi, Alfio V. and Soar, Jeffrey. 2022. "Cloud Affected Solar UV Predictions with Three-Phase Wavelet Hybrid Convolutional Long Short-Term Memory Network Multi-Step Forecast System." IEEE Access. 10, pp. 24704-24720. https://doi.org/10.1109/ACCESS.2022.3153475
Stacked LSTM Sequence-to-Sequence Autoencoder with Feature Selection for Daily Solar Radiation Prediction: A Review and New Modeling Results
Ghimire, Sujan, Deo, Ravinesh C., Wang, Hua, Al-Musaylh, Mohanad S., Casillas-Perez, David and Salcedo-sanz, Sancho. 2022. "Stacked LSTM Sequence-to-Sequence Autoencoder with Feature Selection for Daily Solar Radiation Prediction: A Review and New Modeling Results." Energies. 15 (3), pp. 1-39. https://doi.org/10.3390/en15031061
Novel hybrid deep learning model for satellite based PM10 forecasting in the most polluted Australian hotspots
Sharma, Ekta, Deo, Ravinesh C., Soar, Jeffrey, Prasad, Ramendra, Parisi, Alfio V. and Raj, Nawin. 2022. "Novel hybrid deep learning model for satellite based PM10 forecasting in the most polluted Australian hotspots." Atmospheric Environment. 279, pp. 1-13. https://doi.org/10.1016/j.atmosenv.2022.119111
Study of Parameters and Theory of Sucrose Dust Explosion
Jiang, Juju, Li, Xiaoquan, Liang, Siting, Zhong, Yuankun, Yang, Lei, Hao, Peng and Soar, Jeffrey. 2022. "Study of Parameters and Theory of Sucrose Dust Explosion." Energies. 15 (4), pp. 1-13. https://doi.org/10.3390/en15041439
Inhibition of Four Inert Powders on the Minimum Ignition Energy of Sucrose Dust
Zhong, Yuankun, Li, Xiaoquan, Jiang, Juju, Liang, Siting, Yang, Zhiwen and Soar, Jeffrey. 2022. "Inhibition of Four Inert Powders on the Minimum Ignition Energy of Sucrose Dust." Processes. 10 (2), pp. 1-12. https://doi.org/10.3390/pr10020405
A comparative analysis of the principal component analysis and entropy weight methods to establish the indexing measurement
Wu, Robert M. X., Zhang, Zhongwu, Yan, Wanjun, Fan, Jianfeng, Gou, Jinwen, Liu, Bao, Gide, Ergun, Soar, Jeffrey, Shen, Bo, Fazal-e-Hasan, Syed, Liu, Zengquan, Zhang, Peng, Wang, Peilin, Cui, Xinxin, Peng, Zhanfei and Wang, Ya. 2022. "A comparative analysis of the principal component analysis and entropy weight methods to establish the indexing measurement." PLoS One. 17 (1), pp. 1-26. https://doi.org/10.1371/journal.pone.0262261
Spatiotemporal Hybrid Random Forest Model for Tea Yield Prediction Using Satellite-Derived Variables
Jui, S. Janifer Jabin, Ahmed, A. A. Masrur, Bose, Aditi, Raj, Nawin, Sharma, Ekta, Soar, Jeffrey and Chowdhury, Md Wasique Islam. 2022. "Spatiotemporal Hybrid Random Forest Model for Tea Yield Prediction Using Satellite-Derived Variables." Remote Sensing. 14 (3), pp. 1-18. https://doi.org/10.3390/rs14030805
An Overview of Ontologies and Tool Support for COVID-19 Analytics
Ahmad, Aakash, Bandara, Madhushi, Fahmideh, Mahdi, Proper, Henderik A., Guizzardi, Giancarlo and Soar, Jeffrey. 2021. "An Overview of Ontologies and Tool Support for COVID-19 Analytics." 2021 IEEE 25th International Enterprise Distributed Object Computing Workshop (EDOCW). Gold Coast, Australia 25 Oct 2021 United States. https://doi.org/10.1109/EDOCW52865.2021.00026
Emerging Topic Detection from Microblog Streams Based on Emerging Pattern Mining
Peng, Min, Ouyang, Shuang, Zhu, Jiahui, Huang, Jiajia, Wang, Hua and Yong, Jianming. 2018. "Emerging Topic Detection from Microblog Streams Based on Emerging Pattern Mining." 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design. Nanjing, China 09 - 11 May 2018 United States. https://doi.org/10.1109/CSCWD.2018.8465166
Block Bayesian Sparse Topical Coding
Peng, Min, Shi, Hongliang, Xie, Qianqian, Zhang, Yihan, Wang, Hua, Li, Zhaoyunfei and Yong, Jianming. 2018. "Block Bayesian Sparse Topical Coding." 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design. Nanjing, China 09 - 11 May 2018 United States. https://doi.org/10.1109/CSCWD.2018.8465366
Challenges and issues that are perceived to influence cloud computing adoption in local government councils
Ali, Omar, Soar, Jeffrey and Yong, Jianming. 2017. "Challenges and issues that are perceived to influence cloud computing adoption in local government councils." 21st International Conference on Computer Supported Cooperative Work in Design (CSCWD 2017). Wellington, New Zealand 26 - 28 Apr 2017 https://doi.org/10.1109/CSCWD.2017.8066659
A correlational research on developing an innovative integrated gas warning system: a case study in ZhongXing, China
Wu, Robert M. X., Yan, Wanjun, Zhang, Zhongwu, Gou, Jinmen, Fan, Jianfen, Liu, Bao, Shi, Yong, Shen, Bo, Zhao, Haijun, Ma, Yanyun, Soar, Jeffrey, Sun, Xiangyu, Gide, Ergun, Sun, Zhigang, Wang, Peilin, Cui, Xinxin and Wang, Ya. 2021. "A correlational research on developing an innovative integrated gas warning system: a case study in ZhongXing, China." Geomatics, Natural Hazards and Risk. 12 (1), pp. 3175-3204. https://doi.org/10.1080/19475705.2021.2002953
Application of deep learning models for automated identification of Parkinson’s disease: a review (2011–2021)
Loh, Hui Wen, Hong, Wanrong, Ooi, Chui Ping, Chakraborty, Subrata, Barua, Prabal Datta, Deo, Ravinesh C., Soar, Jeffrey, Palmer, Elizabeth E. and Acharya, U. Rajendra. 2021. "Application of deep learning models for automated identification of Parkinson’s disease: a review (2011–2021)." Sensors. 21, pp. 1-27. https://doi.org/10.3390/s21217034
An Exploratory Study of the Readiness of Public Healthcare Facilities in Developing Countries to Adopt Health Information Technology (HIT)/e-Health: the Case of Ghana
Yusif, Salifu, Hafeez-Baig, Abdul and Soar, Jeffrey. 2020. "An Exploratory Study of the Readiness of Public Healthcare Facilities in Developing Countries to Adopt Health Information Technology (HIT)/e-Health: the Case of Ghana." Journal of Healthcare Informatics Research. 4 (2), pp. 189-214. https://doi.org/10.1007/s41666-020-00070-8
A model for evaluating eHealth preparedness – a case study approach
Yusif, Salifu, Hafeez-Baig, Abdul and Soar, Jeffrey. 2020. "A model for evaluating eHealth preparedness – a case study approach." Transforming Government: People, Process and Policy. 14 (3), pp. 561-587. https://doi.org/10.1108/TG-07-2019-0069
Classification of alcoholic EEG signals using a deep learning method
Farsi, Leila, Siuly, Siuly, Kabir, Enamul and Wang, Hua. 2020. "Classification of alcoholic EEG signals using a deep learning method." IEEE Sensors Journal. 21 (3), pp. 3552 - 3560. https://doi.org/10.1109/JSEN.2020.3026830
PLS-SEM path analysis to determine the predictive relevance of e-Health readiness assessment model
Yusif, Salifu, Hafeez-Baig, Abdul, Soar, Jeffrey and Ong Lai Teik, Derek. 2020. "PLS-SEM path analysis to determine the predictive relevance of e-Health readiness assessment model." Health And Technology. 10 (6), pp. 1497-1513. https://doi.org/10.1007/s12553-020-00484-9
The modeling of human facial pain intensity based on Temporal Convolutional Networks trained with video frames in HSV color space
Bargshady, Ghazal, Zhou, Xujuan, Deo, Ravinesh C., Soar, Jeffrey, Whittaker, Frank and Wang, Hua. 2020. "The modeling of human facial pain intensity based on Temporal Convolutional Networks trained with video frames in HSV color space." Applied Soft Computing. 97 (Part A), pp. 1-14. https://doi.org/10.1016/j.asoc.2020.106805
Older People’s Needs and Opportunities for Assistive Technologies
Soar, Jeffrey, Yu, Lei and Al-Hakim, Latif. 2020. "Older People’s Needs and Opportunities for Assistive Technologies." Jmaiel, Mohamed, Mokhtari, Mounir, Abdulrazak, Bessam, Aloulou, Hamdi and Kallel, Slim (ed.) 18th International Conference on Smart Homes and Health Telematics (ICOST 2020). Hammamet, Tunisia 24 - 26 Jun 2020 Cham, Switzerland. https://doi.org/10.1007/978-3-030-51517-1_37
Inclusion of Complementary Industry Knowledge in IT Service Management Curriculum – A Case Study
Ramakrishnan, Muralidharan, Shrestha, Anup and Soar, Jeffrey. 2020. "Inclusion of Complementary Industry Knowledge in IT Service Management Curriculum – A Case Study." 24th Pacific Asia Conference on Information Systems (PACIS 2020). Dubai, United Arab Emirates 20 - 24 Jun 2020 Atlanta, United States.
Finding an optimum set of roles in a CPAC model
Kabir, Enamul, Wang, Hua and Sun, Lili. 2019. "Finding an optimum set of roles in a CPAC model." 2019 International Conference on Networking and Network Applications (NaNA 2019). Daegu City, Korea 10 - 13 Oct 2019 Piscataway, United States. https://doi.org/10.1109/NaNA.2019.00014
Ensemble neural network approach detecting pain intensity from facial expressions
Bargshady, Ghazal, Zhou, Xujuan, Deo, Ravinesh C., Soar, Jeffrey, Whittaker, Frank and Wang, Hua. 2020. "Ensemble neural network approach detecting pain intensity from facial expressions." Artificial Intelligence in Medicine. 109, pp. 1-12. https://doi.org/10.1016/j.artmed.2020.101954
Preserving Data Privacy and Security in Australian My Health Record System : A Quality Health Care Implication
Vimalachandran, Pasupathy, Zhang, Yanchun, Cao, Jinli, Sun, Lili and Yong, Jianming. 2018. "Preserving Data Privacy and Security in Australian My Health Record System : A Quality Health Care Implication." 19th International Conference on Web Information Systems Engineering (WISE 2018). Dubai, United Arab Emirates 12 - 15 Nov 2018 Germany. Springer. https://doi.org/10.1007/978-3-030-02925-8_8
A new framework for automatic detection of patients with mild cognitive impairment using resting-state EEG signals
Siuly, Siuly, Alcin, Omer Faruk, Kabir, Enamul, Sengur, Abdulkadir, Wang, Hua, Zhang, Yanchun and Whittaker, Frank. 2020. "A new framework for automatic detection of patients with mild cognitive impairment using resting-state EEG signals." IEEE Transactions on Neural Systems and Rehabilitation Engineering. 28 (9), pp. 1966-1976. https://doi.org/10.1109/TNSRE.2020.3013429
Application of zeolitic imidazolate frameworks (ZIF-8)/ionic liquid composites modified nano-carbon paste electrode as sensor for electroanalytical sensing of 1-hydroxypyrene
Li, Yuan, Li, Yutong, Wang, Yan, Ma, Guodong, Liu, Xinsheng, Li, Yonghong and Soar, Jeffrey. 2020. "Application of zeolitic imidazolate frameworks (ZIF-8)/ionic liquid composites modified nano-carbon paste electrode as sensor for electroanalytical sensing of 1-hydroxypyrene." Microchemical Journal. 159, pp. 1-7. https://doi.org/10.1016/j.microc.2020.105433
Nitrogen-doped graphene-ionic liquid-glassy carbon microsphere paste electrode for ultra-sensitive determination of quercetin
Ji, Ying, Li, Yuan, Ren, Binbin, Liu, Xinsheng, Li, Yonghong and Soar, Jeffrey. 2020. "Nitrogen-doped graphene-ionic liquid-glassy carbon microsphere paste electrode for ultra-sensitive determination of quercetin." Microchemical Journal. 155, pp. 1-7. https://doi.org/10.1016/j.microc.2020.104689
Enhanced deep learning algorithm development to detect pain intensity from facial expression images
Bargshady, Ghazal, Zhou, Xujuan, Deo, Ravinesh C., Soar, Jeffery, Whittaker, Frank and Wang, Hua. 2020. "Enhanced deep learning algorithm development to detect pain intensity from facial expression images." Expert Systems with Applications. 149, pp. 1-10. https://doi.org/10.1016/j.eswa.2020.113305
Editorial - special issue on informatics for ageing and aged-care
Soar, Jeffrey, Hume, Margee and Georgiou, Andrew. 2015. "Editorial - special issue on informatics for ageing and aged-care." Electronic Journal of Health Informatics. 9 (1), pp. 2-3.
A study on securing software defined networks
Ur Rasool, Raihan, Wang, Hua, Rafique, Wajid, Yong, Jianming and Cao, Jinli. 2017. "A study on securing software defined networks." 18th International Conference on Web Information Systems Engineering - WISE 2017. Puschino, Russia 07 - 11 Oct 2017 Switzerland. https://doi.org/10.1007/978-3-319-68786-5
IT service management knowledge ecosystem – literature review and a conceptual model
Ramakrishnan, Muralidharan, Shrestha, Anup, Cater-Steel, Aileen and Soar, Jeffrey. 2018. "IT service management knowledge ecosystem – literature review and a conceptual model." 29th Australasian Conference on Information Systems (ACIS 2018). Sydney, Australia 03 - 05 Dec 2018 Australia.
Optimizing Urban Distribution Routes for Perishable Foods Considering Carbon Emission Reduction
Lin, Diansheng, Zhang, Zhiyong, Wang, Jiaxin, Yang, Liu, Shi, Yongqiang and Soar, Jeffrey. 2019. "Optimizing Urban Distribution Routes for Perishable Foods Considering Carbon Emission Reduction." Sustainability. 11 (16), pp. 1-22. https://doi.org/10.3390/su11164387
Change management and adoption of health information technology (HIT)/eHealth in public hospitals in Ghana: A qualitative study
Yusif, Salifu, Hafeez-Baig, Abdul and Soar, Jeffrey. 2022. "Change management and adoption of health information technology (HIT)/eHealth in public hospitals in Ghana: A qualitative study." Applied Computing and Informatics. 18 (3-4), pp. 279-289. https://doi.org/10.1016/j.aci.2019.11.007
Comparison of subsidy schemes for reducing waiting time: special focus on smart home care for elderly people
Tao, Zhiwen, Zhang, Zhiyong, Wang, Xiaoli, Shi, Yongqiang and Soar, Jeffrey. 2019. "Comparison of subsidy schemes for reducing waiting time: special focus on smart home care for elderly people." Procedia CIRP. 83, pp. 716-721. https://doi.org/10.1016/j.procir.2019.04.102
A new design of mental state classification for subject independent BCI systems
Joadder, Md. A. M., Siuly, S., Kabir, E., Wang, H. and Zhang, Y.. 2019. "A new design of mental state classification for subject independent BCI systems." IRBM. 40 (5), pp. 297-305. https://doi.org/10.1016/j.irbm.2019.05.004
Effective organisational change to achieve successful ITIL implementation: lessons learned from a multiple case study of large Australian firms
Blumberg, Malcolm, Cater-Steel, Aileen, Rajaeian, Mohammad Mehdi and Soar, Jeffrey. 2019. "Effective organisational change to achieve successful ITIL implementation: lessons learned from a multiple case study of large Australian firms." Journal of Enterprise Information Management. 32 (3), pp. 496-516. https://doi.org/10.1108/JEIM-06-2018-0117
Deep learning model for detection of pain intensity from facial expression
Soar, Jeffrey, Bargshady, Ghazal, Zhou, Xujuan and Whittaker, Frank. 2018. "Deep learning model for detection of pain intensity from facial expression." Mokhtari, Mounir, Abdulrazak, Bessam and Aloulou, Hamdi (ed.) 16th International Conference on Smart Homes and Health Telematics: Designing a Better Future: Urban Assisted Living (ICOST 2018). Singapore 10 - 12 Jul 2018 Cham, Switzerland. https://doi.org/10.1007/978-3-319-94523-1_22
A novel statistical technique for intrusion detection systems
Kabir, Enamul, Hu, Jiankun, Wang, Hua and Zhou, Guangping. 2018. "A novel statistical technique for intrusion detection systems." Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 79, pp. 303-318. https://doi.org/10.1016/j.future.2017.01.029
Cloud service description model: an extension of USDL for cloud services
Sun, Le, Ma, Jiangan, Wang, Hua, Zhang, Yanchun and Yong, Jianming. 2018. "Cloud service description model: an extension of USDL for cloud services." IEEE Transactions on Services Computing. 11 (2), pp. 354-368. https://doi.org/10.1109/TSC.2015.2474386
A joint deep neural network model for pain recognition from face
Bargshady, Ghazal, Soar, Jeffrey, Zhou, Xujuan, Deo, Ravinesh, Whittaker, Frank and Wang, Hua. 2019. "A joint deep neural network model for pain recognition from face." 4th IEEE International Conference on Computer and Communication Systems (ICCCS 2019). Singapore 23 - 25 Feb 2019 Singapore. pp. 52-56 https://doi.org/10.1109/CCOMS.2019.8821779
Interpretation and reporting of process capability results: focus on improvement
Behari, Suren, Cater-Steel, Aileen, Shrestha, Anup and Soar, Jeffrey. 2018. "Interpretation and reporting of process capability results: focus on improvement." Stamelos, Ioannis, O’Connor, Rory v., Rout, Terry and Dorling, Alec (ed.) 18th International Conference on Software Process Improvement and Capability Determination (SPICE 2018). Thessaloniki, Greece 09 - 10 Oct 2018 Cham, Switzerland. https://doi.org/10.1007/978-3-030-00623-5_12
Cloud computing-enabled healthcare opportunities, issues, and applications: a systematic review
Ali, Omar, Shrestha, Anup, Soar, Jeffrey and Wamba, Samuel Fosso. 2018. "Cloud computing-enabled healthcare opportunities, issues, and applications: a systematic review." International Journal of Information Management. 43, pp. 146-158. https://doi.org/10.1016/j.ijinfomgt.2018.07.009
Perceived potential for value creation from cloud computing: a study of the Australian regional government sector
Ali, Omar, Soar, Jeffrey and Shrestha, Anup. 2018. "Perceived potential for value creation from cloud computing: a study of the Australian regional government sector." Behaviour and Information Technology. 37 (12), pp. 1157-1176. https://doi.org/10.1080/0144929X.2018.1488991
The perceived public value of social media in Queensland local Councils
Attiya, Ahmed Muyed, Cater-Steel, Aileen, Soar, Jeffrey and Abdulla, Shahab. 2017. "The perceived public value of social media in Queensland local Councils." Riemer, Kai, Indulska, Marta and Tuunainen, Virpi Kristiina (ed.) 28th Australasian Conference on Information Systems (ACIS 2017). Hobart, Australia 04 - 06 Dec 2017 Hobart, Australia.
An analysis system detecting epileptic seizure from EEG
Kabir, Enamul and Wang, Hua. 2017. "An analysis system detecting epileptic seizure from EEG." 2017 Young Statisticians Conference: Modelling Our Future. Tweed Heads, Australia 26 - 27 Sep 2017 Australia.
Data mining in IoT: data analysis for a new paradigm on the Internet
Wlodarczak, Peter, Ally, Mustafa and Soar, Jeffrey. 2017. "Data mining in IoT: data analysis for a new paradigm on the Internet." 2017 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2017). Leipzig, Germany 23 - 26 Aug 2017 New York, United States. https://doi.org/10.1145/3106426.3115866
A Cross - layer Optimization of Video Transmission Based on Packet Loss Rate in 802.11e Wireless Networks
Zhou, Xujuan, Soar, Jeffrey, Gururajan, Raj, Wu, Zhangguang and Wu, Weimin. 2017. "A Cross - layer Optimization of Video Transmission Based on Packet Loss Rate in 802.11e Wireless Networks." 2017 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2017). Leipzig, Germany 23 - 26 Aug 2017 United States. https://doi.org/10.1145/3106426.3109445
A computer aided analysis scheme for detecting epileptic seizure from EEG data
Kabir, Enamul, Siuly, Siuly, Cao, Jinli and Wang, Hua. 2018. "A computer aided analysis scheme for detecting epileptic seizure from EEG data." International Journal of Computational Intelligence Systems. 11, pp. 663-671. https://doi.org/10.2991/ijcis.11.1.51
Cluster-based scheduling algorithm for periodic XML data broadcast in wireless environments
Qin, Yongrui, Wang, Hua and Sun, Lili. 2011. "Cluster-based scheduling algorithm for periodic XML data broadcast in wireless environments ." Zhang, Yanchun (ed.) 25th IEEE International Conference on Advanced Information Networking and Applications (WAINA 2011). Biopolis, Singapore 22 - 25 Mar 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/WAINA.2011.60
Level of policy for cloud computing adoption in Australian regional municipal governments: an exploratory study
Ali, Omar, Yong, Jianming, Soar, Jeffrey and McClymont, Hoda. 2015. "Level of policy for cloud computing adoption in Australian regional municipal governments: an exploratory study." Arabnia, Hamid R., Gravvanis, George A., Solo, Ashu M. G. and Tinetti, Fernando G. (ed.) 2015 International Conference on Grid & Cloud Computing and Applications (GCA'15). Las Vegas, United States 27 - 30 Jul 2015 United States.
Reinventing health, ageing and aged care through smart homes and intelligent technologies
Soar, Jeffrey. 2009. "Reinventing health, ageing and aged care through smart homes and intelligent technologies." COINFO 2009: 4th International Conference on Cooperation and Promotion of Information Resources in Science and Technology. Beijing, China 21 - 23 Nov 2009 United States. https://doi.org/10.1109/COINFO.2009.55
e-Health readiness assessment factors and measuring tools: a systematic review
Yusif, Salifu, Hafeez-Baig, Abdul and Soar, Jeffrey. 2017. "e-Health readiness assessment factors and measuring tools: a systematic review." International Journal of Medical Informatics. 107, pp. 56-64. https://doi.org/10.1016/j.ijmedinf.2017.08.006
On secure wireless communications for IoT under eavesdropper collusion
Zhang, Yuanyu, Shen, Yulong, Wang, Hua, Yong, Jianming and Jiang, Xiaohong. 2016. "On secure wireless communications for IoT under eavesdropper collusion." IEEE Transactions on Automation Science and Engineering. 13 (3), pp. 1281-1293. https://doi.org/10.1109/TASE.2015.2497663
Care provision expectations of remote adult children of ageing parents
Veil, Klaus D., Soar, Jeffrey and Su, Ying. 2013. "Care provision expectations of remote adult children of ageing parents." Schaper, Louise K. and Grain, Heather (ed.) Health Informatics Conference (HIC 2013): Digital Health Service Delivery: the Future is Now!. Adelaide, Australia 15 - 18 Jul 2013 Amsterdam, Netherlands. https://doi.org/10.3233/978-1-61499-266-0-121
Development of a culturally appropriate interactive multimedia self-paced educational health program for aboriginal health workers
El Sayed, Faeka, Soar, Jeffrey and Wang, Zoe. 2011. "Development of a culturally appropriate interactive multimedia self-paced educational health program for aboriginal health workers." Tsang, P., Wong, J., Tong, C., Yip, I., Tsang, J. and Wang, F. (ed.) 2011 Enhancing Healthcare Education, Research and Practice Symposium. Hong Kong, China 11 - 13 Jul 2011 Hong Kong.
Editorial
Wang, Hua and Jia, Xiaohua. 2012. "Editorial." Journal of Software. 7 (11), pp. 2387-2388.
Consumer managed home e-health for the next decade
Soar, Jeffrey, Ally, Mustafa and Su, Ying. 2011. "Consumer managed home e-health for the next decade." Rotchanakitumnuai, Siriluck and Kaewkitipong, Laddawan (ed.) 11th International Conference on Electronic Business: Borderless e-Business for the Next Decade (ICEB 2011). Bangkok, Thailand 28 Nov - 02 Dec 2011 Bangkok, China.
Enhancing healthcare in home and community settings through telecare and telehealth
Soar, Jeffrey. 2011. "Enhancing healthcare in home and community settings through telecare and telehealth." Tsang, P., Wong, J., Tong, C., Yip, I., Tsang, J. and Wang, F. (ed.) 2011 Enhancing Healthcare Education, Research and Practice Symposium. Hong Kong, China 11 - 13 Jul 2011 Hong Kong.
A high mobility multipurpose patient monitoring system for inter-building communication
Tsang, K. F., Tung, H. Y., Tsang, Philip and Soar, Jeffrey. 2011. "A high mobility multipurpose patient monitoring system for inter-building communication." Tsang, P., Wong, J., Tong, C., Yip, I., Tsang, J. and Wang, F. (ed.) 2011 Enhancing Healthcare Education, Research and Practice Symposium. Hong Kong, China 11 - 13 Jul 2011 Hong Kong.
Investigating leadership capability development of faith-based not-for-profit organisations providing aged and community care in Australia
Soar, Jeffrey, Sankaran, Shankar, Shaw, Kelly and Dick, Bob. 2012. "Investigating leadership capability development of faith-based not-for-profit organisations providing aged and community care in Australia." Volberda, Henk W. (ed.) 12th Annual Conference of the European Academy of Management (EURAM 2012). Rotterdam, Netherlands 06 - 08 Jun 2012 Rotterdam, Netherlands.
Measuring e-learning system success (Research in progress)
Alsabawy, Ahmed Younis, Cater-Steel, Aileen and Soar, Jeffrey. 2011. "Measuring e-learning system success (Research in progress)." Seddon, Peter and Gregor, Shirley (ed.) 15th Pacific Asia Conference on Information Systems (PACIS 2011): Quality Research in Pacific Asia. Brisbane, Australia 07 - 11 Jul 2011 Brisbane, Australia.
Synthesis and photoluminescence of nano/ microstructured Y0.95Eu0.05PO4 via hydrothermal process
Bao, Jinrong, Lu, Yue, Li, Wenxian, Wang, Hua and Yu, Ranbo. 2014. "Synthesis and photoluminescence of nano/ microstructured Y0.95Eu0.05PO4 via hydrothermal process." Optoelectronics and Advanced Materials, Rapid Communications. 8 (1-2), pp. 18-22.
A measurement model to link process operational measures to risks associated with attainment of business critical success factors
Behari, Suren, Cater-Steel, Aileen, Shrestha, Anup and Soar, Jeffrey. 2016. "A measurement model to link process operational measures to risks associated with attainment of business critical success factors." 6th International Engaged Management Scholarship Conference (EMS 2016). Paris, France 08 - 11 Sep 2016
An organisational change approach to implementing IT service management
Blumberg, Malcolm, Cater-Steel, Aileen and Soar, Jeffrey. 2014. "An organisational change approach to implementing IT service management." Tan, Felix and Bunker, Deborah (ed.) 25th Australasian Conference on Information Systems (ACIS 2014). Auckland, New Zealand 08 - 10 Dec 2014 Auckland, New Zealand.
Positive Influence Dominating Set Games
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui, Zhang, Ji, Yi, Xun and Yong, Jianming. 2014. "Positive Influence Dominating Set Games." Hou, Jiang-Liang, Trappey, Amy J. C., Wu, Chien-Wei, Chang, Kuo-Hao, Liao, Chuing-Shou, Shen, Wei-Ming, Barthes, Jean-Paul and Luo, Jun-Zhou (ed.) 18th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2014). Hsinchu, Taiwan 21 - 23 May 2014 United States. https://doi.org/10.1109/CSCWD.2014.6846890
Access control management with provenance in healthcare environments
Ma, Taotao, Wang, Hua, Cao, Jinli, Yong, Jianming and Zhao, Yueai. 2016. "Access control management with provenance in healthcare environments." 20th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCDW 2016). Nanchang, China 04 - 06 May 2016 United States. https://doi.org/10.1109/CSCWD.2016.7566048
Improved media management through cloud computing technology
Ali, Omar, Soar, Jeffrey and Yong, Jianming. 2016. "Improved media management through cloud computing technology." 20th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2016). Nanchang, China 04 - 06 May 2016 United States. https://doi.org/10.1109/CSCWD.2016.7566004
Action research as metamethodology: managing the complexity of an applied research project
Dick, Bob, Sankaran, Shankar, Shaw, Kelly, Kelly, Jacqueline, Soar, Jeffrey, Davies, Alan and Banbury, Annie. 2014. "Action research as metamethodology: managing the complexity of an applied research project." Escriba-Esteve, A. (ed.) 14th Annual Conference of the European Academy of Management (EURAM 2014). Valencia, Spain 04 - 07 Jun 2014 Brussels, Belgium.
Data process and analysis technologies of big data
Wlodarczak, Peter, Ally, Mustafa and Soar, Jeffrey. 2016. "Data process and analysis technologies of big data." Yu, Shui, Lin, Xiaodong, Misic, Jelena and Shen, Xuemin (Sherman) (ed.) Networking for big data. Boca Raton, FL, United States. CRC Press. pp. 103-119
Cloud computing adoption in regional councils
Ali, Omar, Soar, Jeffrey and Yong, Jianming. 2016. Cloud computing adoption in regional councils. University of Southern Queensland.
Data science and big data analytics in financial services: a case study
Behari, Suren, Cater-Steel, Aileen and Soar, Jeffrey. 2016. "Data science and big data analytics in financial services: a case study." Al-Hakim, Latif, Wu, Xiaobo, Koronios, Andy and Shou, Yongyi (ed.) Handbook of research on driving competitive advantage through sustainable, lean, and disruptive innovation. Hershey, PA, united States. IGI Global. pp. 396-423
An investigation of anticipated benefits of cloud computing adoption in Australian regional municipal governments
Ali, Omar, Soar, Jeffrey and Yong, Jianming. 2015. "An investigation of anticipated benefits of cloud computing adoption in Australian regional municipal governments." The Services Transactions on Cloud Computing. 3 (3), pp. 13-24.
Microaggregation sorting framework for k-anonymity statistical disclosure control in cloud computing
Kabir, Md Enamul, Mahmood, Abdun Naser, Mustafa, Abdul K. and Wang, Hua. 2020. "Microaggregation sorting framework for k-anonymity statistical disclosure control in cloud computing." IEEE Transactions on Cloud Computing. 8 (2), pp. 408-417. https://doi.org/10.1109/TCC.2015.2469649
Factors to be considered in Cloud computing adoption
Ali, Omar, Soar, Jeffrey, Yong, Jianming and Tao, Xiaohui. 2016. "Factors to be considered in Cloud computing adoption." Web Intelligence. 14 (4), pp. 309-323. https://doi.org/10.3233/WEB-160347
wHealth - transforming telehealth services
Rana, Rajib, Hume, Margee, Reilly, John and Soar, Jeffrey. 2016. "wHealth - transforming telehealth services." EAI Endorsed Transactions on Scalable Information Systems. 3 (8). https://doi.org/10.4108/eai.9-8-2016.151635
China’s e-commerce higher education: a 15 years review from international viewpoint
Wu, Mingxuan, Wang, Mingming, Soar, Jeffrey and Gide, Ergun. 2016. "China’s e-commerce higher education: a 15 years review from international viewpoint." Open Journal of Social Sciences. 4, pp. 155-164. https://doi.org/10.4236/jss.2016.410012.
Genome mining using machine learning techniques
Wlodarczak, Peter, Soar, Jeffrey and Ally, Mustafa. 2015. "Genome mining using machine learning techniques." Geissbuhler, Antoine, Demongeot, Jacques, Mokhtari, Mounir and Abdulrazak, Bessam (ed.) 13th International Conference on Smart Homes and Health Telematics: Inclusive Smart Cities and e-Health (ICOST 2015). Geneva, Switzerland 10 - 12 Jun 2015 Switzerland. https://doi.org/10.1007/978-3-319-19312-0_39
Application of e-government principles in anti-corruption framework
Neupane, Arjun, Soar, Jeffrey, Vaidya, Kishor and Aryal, Sunil. 2017. "Application of e-government principles in anti-corruption framework." Shakya, Rajesh Kumar (ed.) Digital governance and e-government principles applied to public procurement. Hershey, PA 17033, USA. IGI Global. pp. 58-76
Determinants of perceived usefulness of e-learning systems
Alsabawy, Ahmed Younis, Cater-Steel, Aileen and Soar, Jeffrey. 2016. "Determinants of perceived usefulness of e-learning systems." Computers in Human Behavior. 64, pp. 843-858. https://doi.org/10.1016/j.chb.2016.07.065
Older people, assistive technologies, and the barriers to adoption: a systematic review
Yusif, Salifu, Soar, Jeffrey and Hafeez-Baig, Abdul. 2016. "Older people, assistive technologies, and the barriers to adoption: a systematic review." International Journal of Medical Informatics. 94, pp. 112-116. https://doi.org/10.1016/j.ijmedinf.2016.07.004
Causal dependencies of provenance data in healthcare environment
Ma, Taotao, Yong, Jianming, Wang, Hua and Zhao, Yueai. 2015. "Causal dependencies of provenance data in healthcare environment." Fortino, Giancarlo, Shen, Weiming, Barthes, Jean-Paul, Luo, Junzhou, Li, Wenfeng, Ochoa, Sergio, Abel, Marie-Helene, Guerrieri, Antonio and Ramos, Milton (ed.) 19th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2015). Calabria, Italy 06 - 08 May 2015 https://doi.org/10.1109/CSCWD.2015.7231033
Efficient Algorithms for Scheduling XML Data in a Mobile Wireless Broadcast Environment
Qin, Yongrui, Wang, Hua, Zhang, Ji, Tao, Xiaohui, Zhang, Wei Emma, Taylor, Kerry and Sheng, Quan Z.. 2015. "Efficient Algorithms for Scheduling XML Data in a Mobile Wireless Broadcast Environment." 21st IEEE International Conference on Parallel and Distributed Systems (ICPADS 2015). Melbourne, Australia 14 - 17 Dec 2015 Australia. https://doi.org/10.1109/ICPADS.2015.96
Collaborative cloud computing adoption in Australian regional municipal government: an exploratory study
Ali, Omar, Soar, Jeffrey, Yong, Jianming, McClymont, Hoda and Angus, Daniel. 2015. "Collaborative cloud computing adoption in Australian regional municipal government: an exploratory study." Fortino, Giancarlo, Shen, Weiming, Barthès, Jean-Paul A., Luo, Junzhou, Li, Wenfeng, Ochoa, Sergio F., Abel, Marie-Hélène, Guerrieri, Antonio and Ramos, Milton Pires (ed.) 19th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2015). Calabria, Italy 06 - 08 May 2015 United States. https://doi.org/10.1109/CSCWD.2015.7231017
Reality mining in eHealth
Wlodarczak, Peter, Soar, Jeffrey and Ally, Mustafa. 2015. "Reality mining in eHealth." Yin, Xiaoxia, Ho, Kendall, Zeng, Daniel, Aickelin, Uwe, Zhou, Rui and Wang, Hua (ed.) 4th International Health Information Science Conference (HIS 2015). Melbourne, Australia 28 - 30 May 2015 Switzerland. https://doi.org/10.1007/978-3-319-19156-0_1
Opportunistic and context-aware affect sensing on smartphones: the concept, challenges and opportunities
Rana, Rajib, Hume, Margee, Reilly, John, Jurdak, Raja and Soar, Jeffrey. 2016. "Opportunistic and context-aware affect sensing on smartphones: the concept, challenges and opportunities." IEEE Pervasive Computing. 15 (2), pp. 60-69. https://doi.org/10.1109/MPRV.2016.36
An investigation of the challenges and issues influencing the adoption of cloud computing in Australian regional municipal governments
Ali, Omar, Soar, Jeffrey and Yong, Jianming. 2016. "An investigation of the challenges and issues influencing the adoption of cloud computing in Australian regional municipal governments." Journal of Information Security and Applications. 27-28, pp. 19-34. https://doi.org/10.1016/j.jisa.2015.11.006
Anticipated benefits of cloud computing adoption in Australian regional municipal governments: an exploratory study
Ali, Omar, Soar, Jeffrey, McClymont, Hoda, Yong, Jianming and Biswas, Jit. 2015. "Anticipated benefits of cloud computing adoption in Australian regional municipal governments: an exploratory study." 19th Pacific Asia Conference on Information Systems (PACIS 2015). Singapore 05 - 09 Jul 2015
A survey of Chinese SMEs on plans, experiences and perceptions of global e-business
Soar, Jeffrey, Suder, Gabriele and Wu, Robert. 2015. "A survey of Chinese SMEs on plans, experiences and perceptions of global e-business." Journal of Art Media and Technology. 1 (1), pp. 32-46.
The value of business strategy to the minerals mining sector of Australia – review and discussion of the literature
Chitate, H. and Soar, J.. 2015. "The value of business strategy to the minerals mining sector of Australia – review and discussion of the literature." Journal of Art Media and Technology. 1 (1), pp. 14-19.
Exploratory study to investigate the factors influencing the adoption of cloud computing in Australian regional municipal governments
Ali, Omar, Soar, Jeffrey, Yong, Jianming and McClymont, Hoda. 2015. "Exploratory study to investigate the factors influencing the adoption of cloud computing in Australian regional municipal governments." Journal of Art Media and Technology. 1 (1), pp. 1-13.
An investigation of the main factors to be considered in cloud computing adoption in Australian regional local councils
Ali, Omar, Soar, Jeffrey and Yong, Jianming. 2015. "An investigation of the main factors to be considered in cloud computing adoption in Australian regional local councils." Journal of Contemporary Issues in Business and Government. 21 (1), pp. 72-93. https://doi.org/10.7790/cibg.v21i1.23
Exploring sampling in the detection of multicategory EEG signals
Siuly, Siuly, Kabir, Enamul, Wang, Hua and Zhang, Yanchun. 2015. "Exploring sampling in the detection of multicategory EEG signals." Computational and Mathematical Methods in Medicine. 2015. https://doi.org/10.1155/2015/576437
On efficient and robust anonymization for privacy protection on massive streaming categorical information
Zhang, Ji, Li, Hongzhou, Liu, Xuemei, Luo, Yonglong, Chen, Fulong, Wang, Hua and Chang, Liang. 2017. "On efficient and robust anonymization for privacy protection on massive streaming categorical information." IEEE Transactions on Dependable and Secure Computing. 14 (5), pp. 507-520. https://doi.org/10.1109/TDSC.2015.2483503
Finding weighted positive influence dominating set to make impact to negatives: a study on online social networks in the new millennium
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2014. "Finding weighted positive influence dominating set to make impact to negatives: a study on online social networks in the new millennium." Kaur, Harleen and Tao, Xiaohui (ed.) ICTs and the millennium development goals: a United Nations perspective. New York, NY. United States. Springer. pp. 67-81
Value co-creation with stakeholders using action research as a meta-methodology in a funded research project
Dick, Bob, Sankaran, Shankar, Shaw, Kelly, Kelly, Jacqueline, Soar, Jeffrey, Davies, Alan and Banbury, Annie. 2015. "Value co-creation with stakeholders using action research as a meta-methodology in a funded research project." Project Management Journal. 46 (2), pp. 36-46. https://doi.org/10.1002/pmj.21483
Reducing corruption through e-procurement
Neupane, Arjun, Soar, Jeffrey, Vaidya, Krishor and Yong, Jianming. 2014. "Reducing corruption through e-procurement." 2013 Annual Statistical Report on United Nations Procurement - Supplement.
Human-centred ehealth: current opportunities, challenges and the way forward for China
Su, Ying, Talburt, John and Soar, Jeffrey. 2011. "Human-centred ehealth: current opportunities, challenges and the way forward for China." Novillo-Ortiz, David and Jadad, Alejandro R. (ed.) 8th eHealth High Level Conference: eHealth for Sustainable Healthcare: Global Changes Through Local Actions Global People-centred eHealth Innovation Forum. Barcelona, Spain 15 - 18 Mar 2010 London, United Kingdom.
What the future holds for social media data analysis
Wlodarczak, P., Soar, J. and Ally, M.. 2015. "What the future holds for social media data analysis." International Journal of Computer, Information, Systems and Control Engineering. 9 (1), pp. 16-19.
Impact of Cloud computing technology on e-government
Ali, Omar, Soar, Jeffrey and Yong, Jianming. 2014. "Impact of Cloud computing technology on e-government." Dregvaite, Giedre and Damasevicius, Robertas (ed.) 20th International Conference on Information and Software Technologies (ICIST 2014). Druskininkai, Lithuania 09 - 10 Oct 2014 Heidelberg, Germany. https://doi.org/10.1007/978-3-319-11958-8_22
Challenges and issues within Cloud computing technology
Ali, Omar and Soar, Jeffrey. 2014. "Challenges and issues within Cloud computing technology." Zimmermann, Wolf, Lee, Yong Woo and Reich, Christoph (ed.) 5th International Conference on Cloud Computing, GRIDs, and Virtualization (IARIA 2014). Venice, Italy 25 - 29 May 2014 Wilmington, DE. United States. https://doi.org/10.13140/2.1.3210.3369
Preparedness for e-health in developing countries: the case of Ghana
Yusif, Salifu and Soar, Jeffrey. 2014. "Preparedness for e-health in developing countries: the case of Ghana." Journal of Health Informatics in Developing Countries. 8 (2), pp. 18-36.
Concerns of ageing and interest in assistive technologies: convenience sampling of attendees at an aged care technology exhibition in China
Soar, Jeffrey and Su, Ying. 2014. "Concerns of ageing and interest in assistive technologies: convenience sampling of attendees at an aged care technology exhibition in China." Liu, Kecheng, Gulliver, Stephen R., Li, Weizi and Yu, Changrui (ed.) 15th IFIP WG 8.1 International Conference on Informatics and Semiotics in Organisations (ICISO 2014): Service Science and Knowledge Innovation. Shanghai, China 23 - 24 May 2014 New York, NY. United States. https://doi.org/10.1007/978-3-642-55355-4_43
Uptake of telehealth services funded by Medicare in Australia
Wade, Victoria, Soar, Jeffrey and Gray, Len. 2014. "Uptake of telehealth services funded by Medicare in Australia." Australian Health Review. 38 (5), pp. 528-532. https://doi.org/10.1071/AH14090
A hybrid particle swarm evolutionary algorithm for constrained multi-objective optimization
Wei, Jingxuan, Wang, Yuping and Wang, Hua. 2010. "A hybrid particle swarm evolutionary algorithm for constrained multi-objective optimization." Computing and Informatics. 29 (5), pp. 701-708.
Willingness to adopt e-procurement to reduce corruption: results of the PLS path modeling
Neupane, Arjun, Soar, Jeffrey, Vaidya, Kishor and Yong, Jianming. 2014. "Willingness to adopt e-procurement to reduce corruption: results of the PLS path modeling." Transforming Government: People, Process and Policy. 8 (4), pp. 500-520. https://doi.org/10.1108/TG-03-2014-0007
The potential for ICT tools to promote public participation in fighting corruption
Neupane, Arjun, Soar, Jeffrey, Vaidya, Kishor and Aryal, Sunil. 2014. "The potential for ICT tools to promote public participation in fighting corruption." Akrivopoulou, Christina M. and Garipidis, N. (ed.) Human rights and the impact of ICT in the public sphere: participation, democracy, and political autonomy. Hershey, PA. United States. IGI Global. pp. 175-191
Security and privacy on low-cost radio frequency identification systems
Sun, L.. 2010. "Security and privacy on low-cost radio frequency identification systems ." International Journal of Security and Networks. 5 (2/3), pp. 128-134. https://doi.org/10.1504/IJSN.2010.032211
Aged care informatics: exploring the role of information, knowledge and aged care management
Hume, Margee, Soar, Jeffrey, Whitty, S. Jonathan, Hume, Craig, El Sayed, Faeka and Johnston, Paul. 2014. "Aged care informatics: exploring the role of information, knowledge and aged care management." International Journal of Enterprise Information Systems. 10 (2), pp. 1-20. https://doi.org/10.4018/ijeis.2014040101
Access control management for e-healthcare in cloud environment
Sun, Lili, Yong, Jianming and Soar, Jeffrey. 2014. "Access control management for e-healthcare in cloud environment." EAI Endorsed Transactions on Scalable Information Systems. 1 (2), pp. 1-11. https://doi.org/10.4108/sis.1.2.e3
An empirical evaluation of the potential of public e-procurement to reduce corruption
Neupane, Arjun, Soar, Jeffrey and Vaidya, Kishor. 2014. "An empirical evaluation of the potential of public e-procurement to reduce corruption." Australasian Journal of Information Systems. 18 (2), pp. 21-44.
Telemedicine and Telemonitoring in Healthcare
Alsgaer, Salmah F. A., Tao, Xiaohui, Zhang, Ji, Wang, Hua and Guo, Zhi. 2013. "Telemedicine and Telemonitoring in Healthcare." Imamura, Kazayuki, Usui, Shiro and Shirao, Tomoaki (ed.) 2013 International Conference on Brain and Health Informatics (BHI 2013). Maebashi, Japan 29 - 31 Oct 2013 Germany. https://doi.org/10.1007/978-3-319-02753-1_20
SIMS: Self-adaptive Intelligent Monitoring System for supporting home-based heart failure patients
Wang, Hua, Zhang, Ji, Soar, Jeffrey, Tao, Xiaohui and Huang, Wei. 2013. "SIMS: Self-adaptive Intelligent Monitoring System for supporting home-based heart failure patients." Biswas, Jit, Kobayashi, Hisato, Wong, Lawrence, Abdulrazak, Bessam and Mokhtari, Mounir (ed.) 11th International Conference on Smart Homes and Health Telematics (ICOST 2013): Inclusive Society: Health and Wellbeing in Ageing-Friendly Community: eHealth, Telemedicine, Chronic Disease Management and Care at Home. Singapore 19 - 21 Jun 2013 Heidelberg, Germany. Springer. https://doi.org/10.1007/978-3-642-39470-6_43
Effectively delivering XML information in periodic broadcast environments
Qin, Yongrui, Sheng, Quan Z. and Wang, Hua. 2013. "Effectively delivering XML information in periodic broadcast environments ." Decker, Hendrik, Lhotska, Lenka, Link, Sebastian, Basl, Josef and Tjoa, A. Min (ed.) 24th International Conference on Database and Expert Systems Applications (DEXA 2013). Prague, Czech Republic 26 - 29 Aug 2013 Berlin, Germany. https://doi.org/10.1007/978-3-642-40285-2_16
Minimising k-dominating set in arbitrary network graphs
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui, Zhang, Ji and Zhang, Jinhua. 2013. "Minimising k-dominating set in arbitrary network graphs." Motoda, Hiroshi, Wu, Zhaohui, Cao, Longbing, Zaiane, Osmar, Yao, Min and Wang, Wei (ed.) 9th International Conference on Advanced Data Mining and Applications (ADMA 2013). Hangzhou, China 14 - 16 Dec 2013 Heidelberg, Germany. Springer. https://doi.org/10.1007/978-3-642-53917-6_11
SODIT: An innovative system for outlier detection using multiple localized thresholding and interactive feedback
Zhang, Ji, Wang, Hua, Tao, Xiaohui and Sun, Lili. 2013. "SODIT: An innovative system for outlier detection using multiple localized thresholding and interactive feedback." 29th IEEE International Conference on Data Engineering (ICDE 2013). Brisbane, Australia 08 - 11 Apr 2013 Piscataway, NJ. United States. https://doi.org/10.1109/ICDE.2013.6544945
Finding a weighted positive influence dominating set in e-learning social networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui, Zhang, Ji and Zhu, Guohun. 2013. "Finding a weighted positive influence dominating set in e-learning social networks." International Journal of Computers and Technology. 10 (10), pp. 2136-2145.
A self-stabilizing algorithm for finding a minimal positive influence dominating set in social networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2013. "A self-stabilizing algorithm for finding a minimal positive influence dominating set in social networks." Wang, Hua and Zhang, Rui (ed.) 24th Australasian Database Conference (ADC 2013). Adelaide, Australia 29 Jan - 01 Feb 2013 Sydney, Australia.
Outlier detection from large distributed databases
Zhang, Ji, Wang, Hua and Tao, Xiaohui. 2014. "Outlier detection from large distributed databases." World Wide Web. 17 (4), pp. 539-568. https://doi.org/10.1007/s11280-013-0218-4
A Self-Stabilizing Protocol for Minimal Weighted Dominating Sets in Arbitrary Networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2013. "A Self-Stabilizing Protocol for Minimal Weighted Dominating Sets in Arbitrary Networks." Shen, Weiming, Li, Weidong, Barthes, Jean-Paul, Luo, Junzhou, Zhu, Haibin, Yong, Jianming and Li, Xiaoping (ed.) IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2013). Whistler, Canada 27 - 29 Jun 2013 United States. https://doi.org/10.1109/CSCWD.2013.6581012
Lean thinking in dementia care through smart assistive technology: an evaluation
Yuginovich, Trudy and Soar, Jeffrey. 2014. "Lean thinking in dementia care through smart assistive technology: an evaluation." Wickramasinghe, N., Al-Hakim, L., Gonzalez, C. and Tan, J. (ed.) Lean thinking for healthcare. New York, NY. United States. Springer. pp. 143-167
Adapted lean thinking for healthcare services: an empirical study in the traditional Chinese hospital
Su, Ying, Soar, Jeffrey, Shen, Ningqiao and Al-Hakim, Latif. 2014. "Adapted lean thinking for healthcare services: an empirical study in the traditional Chinese hospital." Wickramasinghe, N., Al-Hakim, L., Gonzalez, C. and Tan, J. (ed.) Lean thinking for healthcare. New York, NY. United States. Springer. pp. 115-142
Effectively delivering XML information in periodic broadcast environments
Qin, Yongrui, Sheng, Quan Z. and Wang, Hua. 2012. Effectively delivering XML information in periodic broadcast environments. Adelaide, Australia. University of Adelaide.
Anti-corruption capabilities of public e-procurement technologies: principal-agent theory
Neupane, Arjun, Soar, Jeffrey and Vaidya, Kishor. 2014. "Anti-corruption capabilities of public e-procurement technologies: principal-agent theory." Bwalya, Kelvin Joseph (ed.) Technology development and platform enhancements for successful global e-government design. Hershey, PA. United States. IGI Global. pp. 185-203
Aging issues and policies in Australia
Soar, Jeffrey. 2013. "Aging issues and policies in Australia." Li, Yushi (ed.) Global aging issues and policies: understanding the importance of comprehending and studying the aging process. Springfield, IL. United States. Charles C. Thomas Publisher Ltd. pp. 295-311
A technology acceptance model for e-health services for the elderly population in China
Peng, Qiao, Hong, Su and Soar, Jeffrey. 2013. "A technology acceptance model for e-health services for the elderly population in China." Zhang, Zhenji, Zhang, Runtong and Zhang, Juliang (ed.) 2nd International Conference on Logistics, Informatics and Service Science (LISS 2012): New Challenges of Management Sciences under Low-Carbon Economy. Beijing, China 12 - 15 Jul 2012 Berlin, Germany. https://doi.org/10.1007/978-3-642-32054-5
E-learning service delivery quality: a determinant of user satisfaction
Alsabawy, Ahmed Younis, Cater-Steel, Aileen and Soar, Jeffrey. 2013. "E-learning service delivery quality: a determinant of user satisfaction." Kats, Yefim (ed.) Learning management systems and instructional design: best practices in online education. Hershey, PA. United States. IGI Global. pp. 89-127
A role-involved purpose-based access control model
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2012. "A role-involved purpose-based access control model." Information Systems Frontiers: a journal of research and innovation. 14 (3), pp. 809-822. https://doi.org/10.1007/s10796-011-9305-1
Assistive technology: ready, steady, go
Soar, Jeffrey. 2013. "Assistive technology: ready, steady, go." Australian Journal of Dementia Care. 2 (1), pp. 22-23.
Sustainability of health information systems in developing countries: the case of Fiji
Soar, Jeffrey, Gow, Jeff and Caniogo, Vili. 2012. "Sustainability of health information systems in developing countries: the case of Fiji." Health Information Management Journal. 41 (3), pp. 13-19. https://doi.org/10.1177/183335831204100302
A purpose-based access control in native XML databases
Sun, Lili and Wang, Hua. 2012. "A purpose-based access control in native XML databases." Concurrency and Computation: Practice and Experience. 24 (10), pp. 1154-1166. https://doi.org/10.1002/cpe.1717
Utilizing interactive multimedia for the empowerment of aboriginal health workers
El Sayed, Faeka, Soar, Jeffrey and Wang, Zoe. 2012. "Utilizing interactive multimedia for the empowerment of aboriginal health workers." Su, Ying (ed.) 7th International Conference on Cooperation and Promotion of Information Resources in Science and Technology (COINFO 2012): Information Sharing in the Cloud. Nanjing, China 23 - 25 Nov 2012 Beijing, China.
Impact analysis of smart assistive technologies for people with dementia
Yuginovich, Trudy, Soar, Jeffrey and Su, Ying. 2012. "Impact analysis of smart assistive technologies for people with dementia." Su, Ying (ed.) 7th International Conference on Cooperation and Promotion of Information Resources in Science and Technology (COINFO 2012): Information Sharing in the Cloud. Nanjing, China 23 - 25 Nov 2012 Beijing, China.
A model for security and privacy in e-health
Wang, Peishun and Soar, Jeffrey. 2012. "A model for security and privacy in e-health." Su, Ying (ed.) 7th International Conference on Cooperation and Promotion of Information Resources in Science and Technology (COINFO 2012): Information Sharing in the Cloud. Nanjing, China 23 - 25 Nov 2012 Irvine, CA. United States.
Microdata protection method through microaggregation: a systematic approach
Kabir, Md Enamul and Wang, Hua. 2012. "Microdata protection method through microaggregation: a systematic approach." Journal of Software. 7 (11), pp. 2415-2422. https://doi.org/10.4304/jsw.7.11.2415-2423
Unsupervised multi-label text classification using a world knowledge ontology
Tao, Xiaohui, Li, Yuefeng, Lau, Raymond Y. K. and Wang, Hua. 2012. "Unsupervised multi-label text classification using a world knowledge ontology." Tan, Pang-Ning, Chawla, Sanjay, Ho, Chin Kuan and Bailey, James (ed.) 16th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining (PAKDD 2012). Kuala Lumpur, Malaysia 29 May - 01 Jun 2012 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-30217-6_40
Key factors for the development of a culturally appropriate interactive multimedia informative program for aboriginal health workers
El Sayed, Faeka, Soar, Jeffrey and Wang, Zoe. 2012. "Key factors for the development of a culturally appropriate interactive multimedia informative program for aboriginal health workers." The Australian Journal of Indigenous Education. 41 (2), pp. 162-172. https://doi.org/10.1017/jie.2012.19
A self-stabilizing algorithm for finding a minimal K-dominating set in general networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2012. "A self-stabilizing algorithm for finding a minimal K-dominating set in general networks." Xiang, Yang, Pathan, Mukaddim, Tao, Xiaohui and Wan g, Hua (ed.) 3rd International Conference on Data and Knowledge Engineering (ICDKE 2012). Fujian, China 21 - 23 Nov 2012 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-34679-8_8
IT infrastructure and its role in the success of e-learning systems: measurement and causal models
Alsabawy, Ahmed Younis, Cater-Steel, Aileen and Soar, Jeffrey. 2012. "IT infrastructure and its role in the success of e-learning systems: measurement and causal models." Fonseca, Benjamin (ed.) 18th Conference of the European University Information Systems: A 360 Degree Perspective on IT/IS in Higher Education (EUNIS 2012). Vila Real, Portugal 20 - 22 Jun 2012 Vila Real, Portugal.
IT infrastructure services as a requirement for e-learning system success
Alsabawy, Ahmed Younis, Cater-Steel, Aileen and Soar, Jeffrey. 2013. "IT infrastructure services as a requirement for e-learning system success." Computers and Education. 69, pp. 431-451. https://doi.org/10.1016/j.compedu.2013.07.035
The effect of service delivery quality on customer value of e-learning systems
Alsabawy, Ahmed Younis, Cater-Steel, Aileen and Soar, Jeffrey. 2012. "The effect of service delivery quality on customer value of e-learning systems." Rocha, Alvaro, Calvo-Manzano, Jose, Reis, Luis Paulo and Cota, Manuel Perez (ed.) 7th Iberian Conference on Information Systems and Technologies (CISTI 2012). Madrid, Spain 20 - 23 Jun 2012 Portugal.
Satisfying privacy requirements before data anonymization
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2012. "Satisfying privacy requirements before data anonymization ." The Computer Journal. 55 (4), pp. 422-437. https://doi.org/10.1093/comjnl/bxr028
An approximate microaggregation approach for microdata protection
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2012. "An approximate microaggregation approach for microdata protection." Expert Systems with Applications. 39 (2), pp. 2211-2219. https://doi.org/10.1016/j.eswa.2011.04.223
On the identity anonymization of high-dimensional rating data
Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2012. "On the identity anonymization of high-dimensional rating data." Concurrency and Computation: Practice and Experience. 24 (10), pp. 1108-1122. https://doi.org/10.1002/cpe.1724
Consumer-centred ehealth: challenges and opportunities for China
Su, Ying, Soar, Jeffrey, Talburt, John and Jadad, Alejandro R.. 2012. "Consumer-centred ehealth: challenges and opportunities for China." Advanced Science Letters. 7, pp. 257-260. https://doi.org/10.1166/asl.2012.2073
Identifying the determinants of e-learning service delivery quality
Alsabawy, Ahmed Younis, Cater-Steel, Aileen and Soar, Jeffrey. 2012. "Identifying the determinants of e-learning service delivery quality." Lamp, John (ed.) 23rd Australasian Conference on Information Systems (ACIS 2012). Geelong, Australia 03 - 05 Dec 2012 Geelong, Australia.
Impact analysis of assessment, consultation and education services to support the adoption of smart home technologies, innovations for chronic disease prevention and solutions for independent living
Barrientos, James, Soar, Jeffrey and Su, Ying. 2012. "Impact analysis of assessment, consultation and education services to support the adoption of smart home technologies, innovations for chronic disease prevention and solutions for independent living." Donnelly, Mark, Nugent, Chris, Paggetti, Cristiano and Mokhtari, Mounir (ed.) 10th International Conference on Smart Homes and Health Telematics: Impact Analysis of Solutions for Chronic Disease Prevention and Management (ICOST 2012). Artimino, Italy 12 - 15 Jun 2012 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-30779-9_3
Evaluating the anti-corruption capabilities of public e-procurement in a developing country
Neupane, Arjun, Soar, Jeffrey and Vaidya, Kishor. 2012. "Evaluating the anti-corruption capabilities of public e-procurement in a developing country." The Electronic Journal of Information Systems in Developing Countries. 55 (2), pp. 1-17.
The potential of e-procurement technology for reducing corruption
Neupane, Arjun, Soar, Jeffrey and Vaidya, Kishor. 2012. "The potential of e-procurement technology for reducing corruption." International Journal of Information Technology and Management. 11 (4), pp. 273-287. https://doi.org/10.1504/IJITM.2012.049997
Data privacy against composition attack
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue, Ding, Xiaofeng and Wang, Hua. 2012. "Data privacy against composition attack." Lee, Sang-Goo, Peng, Zhiyong, Zhou, Xiaofang, Moon, Yang-Sae, Unland, Rainer and Yoo, Jaesoo (ed.) 17th International Conference on Database Systems for Advanced Applications (DASFAA 2012). Busan, South Korea 15 - 18 Apr 2012 Berlin, Germany. https://doi.org/10.1007/978-3-642-29038-1_24
Multi-level delegations with trust management in access control systems
Li, Min, Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2012. "Multi-level delegations with trust management in access control systems." Journal of Intelligent Information Systems. 39 (3), pp. 611-626. https://doi.org/10.1007/s10844-012-0205-8
Role of public e-procurement technology to reduce corruption in government procurement
Neupane, Arjun, Soar, Jeffrey, Vaidya, Kishor and Yong, Jianming. 2012. "Role of public e-procurement technology to reduce corruption in government procurement." 5th International Public Procurement Conference (IPPC5). Seattle, United States 17 - 19 Aug 2012 United States.
Perceived benefits related to anti-corruption from e-tendering system in Nepal
Neupane, Arjun, Soar, Jeffrey and Vaidya, Kishor. 2012. "Perceived benefits related to anti-corruption from e-tendering system in Nepal." Asian Journal of Information Technology. 11 (1), pp. 22-29. https://doi.org/10.3923/ajit.2012.22.29
Semantic access control for cloud computing based on e-healthcare
Sun, Lili, Wang, Hua, Yong, Jianming and Wu, Guoxin. 2012. "Semantic access control for cloud computing based on e-healthcare ." Gao, Liang, Shen, Weiming, Barthes, Jean-Paul and Luo, Junzhou (ed.) CSCWD 2012: 16th International Conference on Computer Supported Cooperative Work in Design. Wuhan, China 23 - 25 May 2012 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2012.6221866
Cloning for privacy protection in multiple independent data publications
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue and Wang, Hua. 2011. "Cloning for privacy protection in multiple independent data publications." Berendt, Bettina, de Vries, Arjen, Fan, Wenfei and Macdonald, Craig (ed.) CIKM 2011: 20th ACM Conference on Information and Knowledge Management . Glasgow, United Kingdom 24 - 28 Oct 2011 New York, NY, USA. https://doi.org/10.1145/2063576.2063705
Effective scheduling algorithm for on-demand XML data broadcasts in wireless environments
Qin, Yongrui, Wang, Hua and Xiao, Jitian. 2011. "Effective scheduling algorithm for on-demand XML data broadcasts in wireless environments." 22nd Australasian Database Conference (ADC 2011). Perth, Australia 17 - 20 Jan 2011 Canberra, Australia.
Privacy preserving access control policy and algorithms for conflicting problems
Sun, Lili, Wang, Hua, Tao, Xiaohui, Zhang, Yanchun and Yang, Jing. 2011. "Privacy preserving access control policy and algorithms for conflicting problems." Kellenberger, Patrick (ed.) 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011). Changsha, China 16 - 18 Nov 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/TrustCom.2011.34
Positive influence dominating set in e-learning social networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2011. "Positive influence dominating set in e-learning social networks." Leung, H., Popescu, E., Cao, Y., Lau, R. W. H. and Nejdl, W. (ed.) 10th International Conference on Web-Based Learning (ICWL 2011): Advances in Web-Based Learning. Hong Kong, China 08 - 10 Dec 2011 Berlin, Germany. https://doi.org/10.1007/978-3-642-25813-8_9
Access control and authorization for protecting disseminative information in E-learning workflow
Sun, Lili and Wang, Hua. 2011. "Access control and authorization for protecting disseminative information in E-learning workflow." Concurrency and Computation: Practice and Experience. 23 (16), pp. 2034-2042. https://doi.org/10.1002/cpe.1748
Publishing anonymous survey rating data
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Pei, Jian. 2011. "Publishing anonymous survey rating data." Data Mining and Knowledge Discovery. 23 (3), pp. 379-406. https://doi.org/10.1007/s10618-010-0208-4
A conditional purpose-based access control model with dynamic roles
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "A conditional purpose-based access control model with dynamic roles." Expert Systems with Applications. 38 (3), pp. 1482-1489. https://doi.org/10.1016/j.eswa.2010.07.057
Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2011. "Injecting purpose and trust into data anonymisation." Computers and Security. 30 (5), pp. 332-345. https://doi.org/10.1016/j.cose.2011.05.005
Queensland Smart Home initiatives homecare telemedicine
Croll, Peter and Soar, Jeffrey. 2007. "Queensland Smart Home initiatives homecare telemedicine." 3rd National Conference of the Telemedicine Society of India. Chennai, India 02 - 03 Nov 2007
Extended k-anonymity models against sensitive attribute disclosure
Sun, Xiaoxun, Sun, Lili and Wang, Hua. 2011. "Extended k-anonymity models against sensitive attribute disclosure." Computer Communications. 34 (4), pp. 526-535. https://doi.org/10.1016/j.comcom.2010.03.020
Efficient systematic clustering method for k-anonymization
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "Efficient systematic clustering method for k-anonymization." Acta Informatica. 48 (1), pp. 51-66. https://doi.org/10.1007/s00236-010-0131-6
A family of enhanced (L,alpha) diversity models for privacy preserving data publishing
Sun, Xiaoxun, Li, Min and Wang, Hua. 2011. "A family of enhanced (L,alpha) diversity models for privacy preserving data publishing." Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 27 (3), pp. 348-356. https://doi.org/10.1016/j.future.2010.07.007
Ageing, chronic disease, technology and smart homes: an Australian perspective
Soar, Jeffrey. 2011. "Ageing, chronic disease, technology and smart homes: an Australian perspective." Clinical technologies: concepts, methodologies, tools and applications. Hershey, PA. United States. IGI Global. pp. 1539-1553
Development of an interactive multimedia health informatics CD-ROM for aboriginal health workers. Case study: tuberculosis (TB)
El Sayed, Faeka, Soar, Jeffrey and Wang, Zoe. 2011. "Development of an interactive multimedia health informatics CD-ROM for aboriginal health workers. Case study: tuberculosis (TB)." Aboriginal and Islander Health Worker Journal. 35 (6), pp. 17-26.
A purpose based usage access control model for e-healthcare services
Sun, Lili and Wang, Hua. 2011. "A purpose based usage access control model for e-healthcare services." Zhang, Ji and Livraga, Giovanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053928
Assimilation of inter-organizational information systems: insights from change resistance theory in context of public electronic procurement
Vaidya, Kishor, Campbell, John, Soar, Jeffrey and Gardner, Scott. 2011. "Assimilation of inter-organizational information systems: insights from change resistance theory in context of public electronic procurement." Vaidya, Kishor (ed.) Inter-organizational information systems and business management: theories for researchers. Hershey, PA. United States. IGI Global. pp. 18-32
A novel image compressive sensing method based on complex measurements
Ramesh Kumar, Nandini, Xiang, Wei and Soar, Jeffrey. 2011. "A novel image compressive sensing method based on complex measurements." 2011 International Conference on Digital Image Computing: Techniques and Application (DICTA 2011). Noosa, Australia 06 - 08 Dec 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/DICTA.2011.36
A model to measure e-learning systems success
Alsabawy, Ahmed Younis, Cater-Steel, Aileen and Soar, Jeffrey. 2012. "A model to measure e-learning systems success." Belkhamza, Zakariya and Wafa, Syed Azizi (ed.) Measuring organizational information systems success: new technologies and practices. Hershey, PA, USA. IGI Global. pp. 293-317
Leadership of not-for-profit organizations in the aged and community care sector in Australia
Sankaran, Shankar, Cartwright, Colleen, Kelly, Jacqueline, Shaw, Kelly and Soar, Jeffrey. 2010. "Leadership of not-for-profit organizations in the aged and community care sector in Australia." 54th Annual Meeting of the ISSS. Waterloo, Canada 18 - 23 Jul 2010 Hull, UK.
Insights into intelligent parking technology adoption
Bilodeau, Victor, Cater-Steel, Aileen and Soar, Jeffrey. 2011. "Insights into intelligent parking technology adoption." Su, Ying and Al-Hakim, Latif (ed.) COINFO 2011: 6th International Conference on Cooperation and Promotion of Information Resources in Science and Technology: Coordinative Innovation and Open Sharing. Hangzhou, China 12 - 14 Nov 2011 Irvine, CA, United States.
A model for regional innovation and information sharing to reduce falls amongst the elderly through intelligent technologies
Soar, Jeffrey, Wang, Hua and Su, Ying. 2011. "A model for regional innovation and information sharing to reduce falls amongst the elderly through intelligent technologies." Su, Ying and Al-Hakim, Latif (ed.) COINFO 2011: 6th International Conference on Cooperation and Promotion of Information Resources in Science and Technology: Coordinative Innovation and Open Sharing. Hangzhou, China 12 - 14 Nov 2011 Irvine, CA, United States.
Methods to evaluate health information systems
Yu, Ping, Yu, Hui and Soar, Jeffrey. 2011. "Methods to evaluate health information systems." Journal of Medical Informatics. 32 (2), pp. 15-21.
Privacy aware access control with trust management in web service
Li, Min, Sun, Xiaoxun, Wang, Hua, Zhang, Yanchun and Zhang, Ji. 2011. "Privacy aware access control with trust management in web service." World Wide Web. 14 (4), pp. 407-430. https://doi.org/10.1007/s11280-011-0114-8
XML documents and access control management
Sun, Lili. 2010. XML documents and access control management. PhD Thesis Doctor of Philosophy. University of Southern Queensland.
Building an information quality lab on e-health in the rural areas for healthcare education
Su, Ying and Soar, Jeffrey. 2010. "Building an information quality lab on e-health in the rural areas for healthcare education." Tan, Honghua (ed.) EDT 2010: International Conference on E-Health Networking, Digital Ecosystems and Technologies. Shenzhen, China 17 - 18 Apr 2010 Piscataway, NJ. United States. https://doi.org/10.1109/EDT.2010.5496355
DISTRO: a system for detecting global outliers from distributed data streams with privacy protection
Zhang, Ji, Dekeyser, Stijn, Wang, Hua and Shu, Yanfeng. 2010. "DISTRO: a system for detecting global outliers from distributed data streams with privacy protection." Kitagawa, Hiroyuki, Ishikawa, Yoshiharu, Li, Qing and Watanabe, Chiemi (ed.) DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications. Tsukuba, Japan 01 - 04 Apr 2010 Germany. Springer. https://doi.org/10.1007/978-3-642-12098-5_54
On memory and I/O efficient duplication detection for multiple self-clean data sources
Zhang, Ji, Shu, Yanfeng and Wang, Hua. 2010. "On memory and I/O efficient duplication detection for multiple self-clean data sources." Yoshikawa, M. (ed.) DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications. Tsukuba, Japan 01 - 04 Apr 2010 Germany. Springer. https://doi.org/10.1007/978-3-642-14589-6_14
A case study of an ambient living and wellness management health care model in Australia
Soar, Jeffrey, Livingstone, Anne and Wang, Szu-Yao. 2009. "A case study of an ambient living and wellness management health care model in Australia." ICOST 2009: 7th International Conference on Smart Homes and Health Telematics: Ambient Assistive Health and Wellness Management in the Heart of the City. Tours, France 01 - 03 Jul 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-02868-7_7
M-service and its framework
Sun, Lili, Li, Yan and Wang, Hua. 2005. "M-service and its framework." 11th Asia-Pacific Conference on Communications. Perth, Australia 03 - 05 Oct 2005 United States. https://doi.org/10.1109/APCC.2005.1554180
A flexible electronic payment scheme and its management
Wang, Hua, Cao, Jinli, Zhang, Yanchun and Huang, Xiaodi. 2004. "A flexible electronic payment scheme and its management ." Information. 7 (2), pp. 187-196.
Achieving p-sensitive k-anonymity via anatomy
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Ross, David. 2009. "Achieving p-sensitive k-anonymity via anatomy." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.34
Extended K-anonymity models against attribute disclosure
Sun, Xiaoxun, Wang, Hua and Sun, Lili. 2009. "Extended K-anonymity models against attribute disclosure." NSS 2009: 3rd International Conference on Network and System Security. Gold Coast, Australia 19 - 21 Oct 2009 United States. https://doi.org/10.1109/NSS.2009.23
Trust-based access control for privacy protection in collaborative environment
Li, Min, Wang, Hua and Ross, David. 2009. "Trust-based access control for privacy protection in collaborative environment." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.66
Privacy preserving on radio frequency identification systems
Wang, Hua, Sun, Lili, Yong, Jianming and Zhang, Yongbing. 2009. "Privacy preserving on radio frequency identification systems." CSCWD 2009: 13th International Conference on Computer Supported Cooperative Work in Design. Santiago, Chile 22 - 24 Apr 2009 United States. https://doi.org/10.1109/CSCWD.2009.4968136
Delegating revocations and authorizations in collaborative business environments
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2009. "Delegating revocations and authorizations in collaborative business environments." Information Systems Frontiers: a journal of research and innovation. 11 (3), pp. 293-305. https://doi.org/10.1007/s10796-008-9091-6
Effective collaboration with information sharing in virtual universities
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2009. "Effective collaboration with information sharing in virtual universities." IEEE Transactions on Knowledge and Data Engineering. 21 (6), pp. 840-853. https://doi.org/10.1109/TKDE.2008.132
Assistive technologies for the frail elderly, chronic illness sufferers and people with disabilities - a case study of the development of a Smart Home
Soar, Jeffrey and Croll, Peter. 2007. "Assistive technologies for the frail elderly, chronic illness sufferers and people with disabilities - a case study of the development of a Smart Home." Toleman, Mark, Cater-Steel, Aileen and Roberts, Dave (ed.) 18th Australasian Conference on Information Systems (ACIS 2007). Toowoomba, Australia 05 - 07 Dec 2007 Toowoomba, Australia.
Protecting disseminative information in e-learning
Sun, Lili, Wang, Hua and Li, Yan. 2008. "Protecting disseminative information in e-learning." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_49
Secure and Efficient Information Sharing in Multi-university E-Learning Environments
Wang, Hua and Li, Qing. 2008. "Secure and Efficient Information Sharing in Multi-university E-Learning Environments." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_48
L-diversity based dynamic update for large time-evolving microdata
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "L-diversity based dynamic update for large time-evolving microdata." Wobcke, Wayne and Zhang, Mengjie (ed.) AI 2008: 21st Australasian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence . Auckland, New Zealand 01 - 05 Dec 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-89378-3_47
Authorization approaches for advanced permission-role assignments
Wang, Hua, Yong, Jianming, Li, Jiuyong and Peng, Min. 2008. "Authorization approaches for advanced permission-role assignments." Shen, Weiming, Zheng, Qinghua, Luo, Junzhou, Yong, Jianming, Duan, Zhenhua and Tian, Feng (ed.) CSCWD 2008: 12th International Conference on Computer Supported Cooperative Work in Design . Xi'an, China 16 - 18 Apr 2008 United States. https://doi.org/10.1109/CSCWD.2008.4536994
Optimal privacy-aware path in hippocratic databases
Li, Min, Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2009. "Optimal privacy-aware path in hippocratic databases." Zhou, X. (ed.) DASFAA 2009: 14th International Conference on Database Systems for Advanced Applications. Brisbane, Australia 21 - 23 Apr 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-00887-0_39
Portable devices of security and privacy preservation for e-learning
Yong, Jianming, Li, Jiuyong and Wang, Hua. 2008. "Portable devices of security and privacy preservation for e-learning." Shen, Weiming, Zheng, Qinghua, Luo, Junzhou, Yong, Jianming, Duan, Zhenhua and Tian, Feng (ed.) CSCWD 2008: 12th International Conference on Computer Supported Cooperative Work in Design . Xi'an, China 16 - 18 Apr 2008 China. https://doi.org/10.1109/CSCWD.2008.4537121
Access control management for ubiquitous computing
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2008. "Access control management for ubiquitous computing." Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 24 (8), pp. 870-878. https://doi.org/10.1016/j.future.2007.07.011
Robustness analysis of diversified ensemble decision tree algorithms for microarray data classification
Hu, Hong, Li, Jiuyong, Wang, Hua, Daggard, Grant and Wang, Li-Zhen. 2008. "Robustness analysis of diversified ensemble decision tree algorithms for microarray data classification." ICMLC 2008: 7th International Conference on Machine Learning and Cybernetics. Kunming, China 12 - 15 Jul 2008 United States. https://doi.org/10.1109/ICMLC.2008.4620389
ABDM: an extended flexible delegation model in RBAC
Li, Min and Wang, Hua. 2008. "ABDM: an extended flexible delegation model in RBAC." Wu, Qiang and He, Xiangjian (ed.) 8th IEEE International Conference on Computer and Information Technology. Sydney, Australia 08 - 11 Jul 2008 United States. https://doi.org/10.1109/CIT.2008.4594707
(p+, α)-sensitive k-anonymity: a new enhanced privacy protection model
Sun, Xiaoxun, Wang, Hua, Truta, Traian Marius, Li, Jiuyong and Li, Ping. 2008. "(p+, α)-sensitive k-anonymity: a new enhanced privacy protection model." Wu, Qiang (ed.) 8th IEEE International Conference on Computer and Information Technology. Sydney, Australia 08 - 11 Jul 2008 United States. https://doi.org/10.1109/CIT.2008.4594650
Advanced permission-role relationship in role-based access control
Li, Min, Wang, Hua, Plank, Ashley and Yong, Jianming. 2008. "Advanced permission-role relationship in role-based access control." Mu, Yi, Susilo, Willy and Seberry, Jennifer (ed.) ACISP 2008: 13th Australasian Conference on Information Security and Privacy . Wollongong, Australia 07 - 09 Jul 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-70500-0-29
On the complexity of restricted k-anonymity problem
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "On the complexity of restricted k-anonymity problem." Yanchun, Zhang (ed.) 10th Asia-Pacific Web Conference (APWeb 2008). Shenyang, China 26 - 28 Apr 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-78849-2_30
Delegating revocations and authorizations
Wang, Hua and Cao, Jinli. 2008. "Delegating revocations and authorizations." ter Hofstede, A., Benatallah, B. and Paik, H. Y. (ed.) 5th International Conference on Business Process Management (BPM 2007) . Brisbane, Australia 24 - 28 Sep 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78238-4_29
A global ticket-based access scheme for mobile users
Wang, Hua, Cao, Jinli, Zhang, Yanchun and Kambayahsi, Yahiko. 2004. "A global ticket-based access scheme for mobile users." Information Systems Frontiers. 6 (1), pp. 35-46. https://doi.org/10.1023/B:ISFI.0000015873.35795.5e
Achieving secure and flexible M-services through tickets
Wang, Hua, Zhang, Yanchun, Cao, Jinli and Varadharajan, Vijay. 2003. "Achieving secure and flexible M-services through tickets." Systems, Man, and Cybernetics. Part A. 33 (6), pp. 697-708. https://doi.org/10.1109/TSMCA.2003.819917
A flexible payment scheme and its role-based access control
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2005. "A flexible payment scheme and its role-based access control." IEEE Transactions on Knowledge and Data Engineering. 17 (3), pp. 425-436. https://doi.org/10.1109/TKDE.2005.35
Role-based delegation with negative authorization
Wang, Hua, Cao, Jinli and Ross, David. 2006. "Role-based delegation with negative authorization." Zhou, X., Li, Jianzhong, Shen, Heng Tao, Kitsuregawa, Masaru and Zhang, Yanchun (ed.) 8th Asia-Pacific Web Conference (APWeb 2006): Frontiers of WWW Research and Development. Harbin, China 16 - 18 Jan 2006 Germany. Springer. https://doi.org/10.1007/11610113_28
Combined gene selection methods for microarray data analysis
Hu, Hong, Li, Jiuyong, Wang, Hua and Daggard, Grant. 2006. "Combined gene selection methods for microarray data analysis." Gabrys, Bogdan, Howlett, Robert J. and Jain, Lakhmi C. (ed.) 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2006). Bournemouth, United Kingdom 09 - 11 Oct 2006 Germany. Springer. https://doi.org/10.1007/11892960_117
Aged-care - privacy and security of the Smart Home
Soar, Jeffrey. 2006. "Aged-care - privacy and security of the Smart Home." Croll, Peter (ed.) e-PASS, National e-Health Privacy and Security Symposium. Brisbane, Australia 24 - 26 Oct 2006 Brisbane, Australia.
Supporting indigenous sexual and reproductive health via the internet
Soar, Jeffrey and Yuginovich, Trudy. 2006. "Supporting indigenous sexual and reproductive health via the internet." IPSI Bgd Transactions on Advanced Research. 2 (2), pp. 10-14.
IT without tears
Soar, Jeffrey. 2007. "IT without tears." National Healthcare Journal.
Australian nurses access and attitudes to information technology - a national survey
Hegney, Desley, Eley, Robert, Buikstra, Elizabeth, Fallon, Anthony Bruce, Soar, Jeffrey and Gilmore, Victoria. 2006. "Australian nurses access and attitudes to information technology - a national survey." Park, H.-A., Murray, P. and Delaney, C. (ed.) 9th International Congress on Nursing Informatics (NI2006). Seoul, Korea 11 - 14 Jun 2006 Amsterdam, Netherlands.
Towards secure XML document with usage control
Cao, Jinli, Sun, Lili and Wang, Hua. 2005. "Towards secure XML document with usage control." Zhang, Yanchun, Tanaka, Katsumi, Yu, Jeffrey Xu, Wang, Shan and Li, Minglu (ed.) 7th Asia-Pacific Web Conference: Web Technologies Research and Development (APWeb 2005). Shanghai, China 29 Mar - 01 Apr 2005 Germany. Springer. https://doi.org/10.1007/978-3-540-31849-1_30
A framework for role-based group delegation in distributed environments
Wang, Hua, Li, Jiuyong, Addie, Ron, Dekeyser, Stijn and Watson, Richard. 2006. "A framework for role-based group delegation in distributed environments." Estivill-Castro, Vladimir and Dobbie, Gillian (ed.) 29th Australasian Computer Science Conference (ACSC 2006). Hobart, Australia 16 - 19 Jan 2006 Australia.
Implementing e-procurement initiatives: impact of organisational learning across the public sector
Soar, Jeffrey, Vaidya, Kishor, Riquelme, Hernan and Gao, Junbin. 2004. "Implementing e-procurement initiatives: impact of organisational learning across the public sector." 5th International Conference of the Continuous Innovation Network (CINet). Sydney, Australia 22 - 25 Sep 2004 Sydney.
An analysis of the major issues for successful information technology transfer in Arab countries
Al-Mabrouk, Khalid and Soar, Jeffrey. 2009. "An analysis of the major issues for successful information technology transfer in Arab countries." Journal of Enterprise Information Management. 22 (5), pp. 504-522. https://doi.org/10.1108/17410390910993518
Assistive technology: opportunities and implications
Horner, Barbara, Soar, Jeffrey and Koch, Bill. 2009. "Assistive technology: opportunities and implications." Nay, Rhonda and Garrett, Sally (ed.) Older people: issues and innovations in care, 3rd ed.. Sydney, Australia. Elsevier. pp. 391-412
Cultural matter in the development of an interactive multimedia self-paced educational health program for aboriginal health workers
El Sayed, Faeka, Soar, Jeffrey and Wang, Zoe. 2011. "Cultural matter in the development of an interactive multimedia self-paced educational health program for aboriginal health workers." Aboriginal and Islander Health Worker Journal. 35 (4), pp. 12-18.
Formal authorization approaches for permission-role assignments using relational algebra operations
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2003. "Formal authorization approaches for permission-role assignments using relational algebra operations." Schewe, Klaus-Dieter and Zhou, Xiaofang (ed.) 14th Australasian Database Conference 2003: Database Technologies (ADC2003). Adelaide, Australia 04 - 07 Feb 2003 Australia.
A flexible payment scheme and its permission-role assignment
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2003. "A flexible payment scheme and its permission-role assignment." Oudshoorn, Michael J. (ed.) 26th Australasian Computer Science Conference (ACSC2003). Adelaide, Australia 04 - 07 Feb 2003 Darlinghurst, Australia.
Specifying role-based access constraints with object constraint language
Wang, Hua, Zhang, Yanchun, Cao, Jinli and Yang, Jian. 2004. "Specifying role-based access constraints with object constraint language." Yu, Jeffrey Xu, Lin, Xuemin, Lu, Hongjun and Zhang, Yanchun (ed.) 6th Asia-Pacific Web Conference: Advanced Web Technologies and Applications (APWeb 2004). Hangzhou, China 14 - 17 Apr 2004 Berlin, Germany. Springer.
A new blind signature for electronic commerce
Wang, Hua and Addie, Ron. 2004. "A new blind signature for electronic commerce." 3rd International Conference on Information (INFO'2004). Tokyo, Japan 2004
Validating privacy requirements in large survey rating data
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2011. "Validating privacy requirements in large survey rating data." Bessis, Nik and Xhafa, Fatos (ed.) Next generation data technologies for collective computational intelligence. Berlin, Germany. Springer. pp. 445-469
Microdata protection method through microaggregation: a median-based approach
Kabir, Md Enamul and Wang, Hua. 2011. "Microdata protection method through microaggregation: a median-based approach." Information Security Journal: a Global Perspective. 20 (1), pp. 1-8. https://doi.org/10.1080/19393555.2010.515288
Purpose-based access control policies and conflicting analysis
Wang, Hua, Sun, Lili and Varadharajan, Vijay. 2010. "Purpose-based access control policies and conflicting analysis." Rannenberg, Kai, Varadharajan, Vijay and Weber, Christian (ed.) SEC 2010: Security and Privacy: Silver Linings in the Cloud. Brisbane, Australia 20 - 23 Sep 2010 Germany. https://doi.org/10.1007/978-3-642-15257-3_20
Specifying usage control model with object constraint language
Li, Min and Wang, Hua. 2010. "Specifying usage control model with object constraint language." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.10
Systematic clustering-based microaggregation for statistical disclosure control
Kabir, Md Enamul and Wang, Hua. 2010. "Systematic clustering-based microaggregation for statistical disclosure control." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Washington, DC, USA. https://doi.org/10.1109/NSS.2010.66
Integration of VSAT with WiMAX technology for E-health in Chinese rural areas
Su, Ying and Soar, Jeffrey. 2010. "Integration of VSAT with WiMAX technology for E-health in Chinese rural areas." Luo, Qi and Chao-Lin, Kuo (ed.) 3CA 2010: International Symposium on Computer, Communication, Control and Automation. Tainan, Taiwan 05 - 07 May 2010 Piscataway, NJ. United States. https://doi.org/10.1109/3CA.2010.5533764
The status of training and education in information and communication technology of Chinese nurses: a hospital survey
Su, Ying and Soar, Jeffrey. 2010. "The status of training and education in information and communication technology of Chinese nurses: a hospital survey." Chen, Jian (ed.) ICSSSM 2010: 7th International Conference on Service Systems and Service Management. Tokyo, Japan 28 - 30 Jun 2010 Tokyo, Japan. https://doi.org/10.1109/ICSSSM.2010.5530182
Detecting anomalies from high-dimensional wireless network data streams: a case study
Zhang, Ji, Gao, Qigang, Wang, Hai and Wang, Hua. 2011. "Detecting anomalies from high-dimensional wireless network data streams: a case study." Soft Computing. 15 (6), pp. 1195-1215. https://doi.org/10.1007/s00500-010-0575-1
Satisfying privacy requirements: one step before anonymization
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2010. "Satisfying privacy requirements: one step before anonymization." Zaki, Mohammed Javeed, Yu, Jeffrey Xu, Ravindran, B. and Pudi, Vikram (ed.) 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2010). Hyderabad, India 21 - 24 Jun 2010 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-13657-3_21
A pairwise systematic microaggregation for statistical disclosure control
Kabir, Md Enamul, Wang, Hua and Zhang, Yanchun. 2010. "A pairwise systematic microaggregation for statistical disclosure control." Webb, Geoffrey I., Liu, Bing, Zhang, Chengqi, Gunopulos, Dimitrios and Wu, Xindong (ed.) 10th IEEE International Conference on Data Mining (ICDM 2010). Sydney, Australia 14 - 17 Dec 2010 Los Alamitos, CA. United States. https://doi.org/10.1109/ICDM.2010.111
A conditional role-involved purpose-based access control model
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "A conditional role-involved purpose-based access control model." Journal of Organizational Computing and Electronic Commerce. 21 (1), pp. 71-91. https://doi.org/10.1080/10919392.2011.541007
Changing ICT for client/patient management and clinical information in residential and community aged care services in regional Australia: structured interviews with service managers
Soar, Jeffrey and Eley, Rob. 2010. "Changing ICT for client/patient management and clinical information in residential and community aged care services in regional Australia: structured interviews with service managers." Lee, Yeunsook, Bien, Z. Zenn, Mokhtari, Mounir, Kim, Jeong Tai, Park, Mignon, Kim, Jongbae, Lee, Heyoung and Khalil Ibrahim, Ismail (ed.) ICOST 2010: 8th International Conference on Smart Homes and Health Telematics: Aging Friendly Technology for Health and Independence. Seoul, South Korea 22 - 24 Jun 2010 Berlin / Heidelberg, Germany. Springer. https://doi.org/10.1007/978-3-642-13778-5_14
Access control method with XML databases
Sun, Lili, Li, Yan and Wang, Hua. 2011. "Access control method with XML databases." Wang, John (ed.) Information systems and new applications in the service sector: models and methods. Hershey, PA, USA. IGI Global. pp. 227-239
Internet access in selected aged care services in rural and regional Queensland
Soar, Jeffrey. 2010. "Internet access in selected aged care services in rural and regional Queensland." Hansen, D. P., Schaper, L. K. and Rowlands, D. (ed.) 18th Annual Health Informatics Conference: Informing the Business of Healthcare (HIC 2010). Melbourne, Australia 24 - 26 Aug 2010 Melbourne, Australia.
Trust-involved access control in collaborative open social networks
Wang, Hua and Sun, Lili. 2010. "Trust-involved access control in collaborative open social networks." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.13
A purpose based usage access control model
Sun, Lili and Wang, Hua. 2010. "A purpose based usage access control model." International Journal of Computer and Information Engineering. 4 (1), pp. 44-51.
Privacy protection for genomic data: current techniques and challenges
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue, Wang, Hua and Wang, Junhu. 2010. "Privacy protection for genomic data: current techniques and challenges." Ras, Zbigniew W. and Tsay, Li-Shang (ed.) Advances in intelligent information systems. Berlin, Germany. Springer. pp. 175-193
A purpose based access control in XML databases system
Sun, Lili, Wang, Hua, Jururajin, Raj and Sriprakash, Sri. 2010. "A purpose based access control in XML databases system." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Los Alamitos, CA. USA. https://doi.org/10.1109/NSS.2010.28
A Delphi study on issues for successful information technology transfer in the Arab world
Al-Mabrouk, Khalid and Soar, Jeffrey. 2009. "A Delphi study on issues for successful information technology transfer in the Arab world." The International Arab Journal of Information Technology. 6 (1), pp. 7-16.
Human interface considerations for ambient assisted living systems
Soar, Jeffrey and Symonds, Judith. 2010. "Human interface considerations for ambient assisted living systems." Electronic Journal of Health Informatics. 5 (2), pp. 1-7.
Towards identify anonymization in large survey rating data
Sun, Xiaoxun and Wang, Hua. 2010. "Towards identify anonymization in large survey rating data." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.11
Developing a self-paced continuing training program for indigenous health workers - learning approach
El Sayed, Faeka, Soar, Jeffrey and Wang, Zoe. 2010. "Developing a self-paced continuing training program for indigenous health workers - learning approach." Aboriginal and Islander Health Worker Journal. 34 (4), pp. 28-31.
Ageing, chronic disease, technology and smart homes: an Australian perspective
Soar, Jeffrey. 2011. "Ageing, chronic disease, technology and smart homes: an Australian perspective." Soar, Jeffrey, Swindell, Rick and Tsang, Philip (ed.) Intelligent technologies for bridging the grey digital divide. Hershey, PA, United States. IGI Global. pp. 15-29
A Delphi examination of emerging issues for successful information technology transfer in North Africa a case of Libya
Al-Mabrouk, Khalid and Soar, Jeffrey. 2009. "A Delphi examination of emerging issues for successful information technology transfer in North Africa a case of Libya." African Journal of Business Management. 3 (3), pp. 107-114.
The potential of information and communication technologies to support ageing and independent living
Soar, Jeffrey. 2010. "The potential of information and communication technologies to support ageing and independent living." Annals of Telecommunications. 65 (9-10), pp. 479-483. https://doi.org/10.1007/s12243-010-0167-1
The influence of B2B e-commerce on SMEs' performance and efficiency: a review of the literature
Al-Bakri, Anas, Cater-Steel, Aileen and Soar, Jeffrey. 2010. "The influence of B2B e-commerce on SMEs' performance and efficiency: a review of the literature." International Journal of Liability and Scientific Enquiry. 3 (3), pp. 213-224. https://doi.org/10.1504/IJLSE.2010.033356
Systematic clustering method for l-diversity model
Kabir, Md Enamul, Wang, Hua, Bertino, Elisa and Chi, Yunxiang. 2010. "Systematic clustering method for l-diversity model." Shen, Heng Tao and Bouguettaya, Athman (ed.) ADC 2010: 21st Australasian Conference on Database Technologies. Brisbane, Australia 18 - 22 Jan 2010 Sydney, Australia.
Information for guided chronic disease self-management in community settings
Soar, Jeffrey and Wang, Szu-Yao. 2009. "Information for guided chronic disease self-management in community settings." Sintchenko, Vitali and Croll, Peter (ed.) Health Informatics Conference (HIC 2009): Frontiers of Health Informatics - Redefining Healthcare. Canberra, Australia 19 - 21 Aug 2009 Melbourne, Australia.
Microdata protection through approximate microaggregation
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2009. "Microdata protection through approximate microaggregation." Mans, Bernard (ed.) 32nd Australasian Computer Science Conference (ACSC 2009). Wellington, New Zealand 19 - 23 Jan 2009 Adelaide, Australia.
Privacy-aware access control with generalization boundaries
Li, Min, Wang, Hua and Plank, Ashley. 2009. "Privacy-aware access control with generalization boundaries." Mans, Bernard (ed.) 32nd Australasian Computer Science Conference (ACSC 2009). Wellington, New Zealand 19 - 23 Jan 2009 Sydney, Australia.
Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2009. "Injecting purpose and trust into data anonymisation." Cheung, David, Song, Il-Yeol, Chu, Wesley, Hu, Xiaohua and Lin, Jimmy (ed.) 18th ACM International Conference on Information and Knowledge Management (CIKM 2009) . Hong Kong, China 02 - 06 Nov 2009 New York, USA. https://doi.org/10.1145/1645953.1646166
Anonymous access scheme for electronic services
Wang, Hua, Sun, Lili, Zhang, Yanchun and Cao, Jinli. 2004. "Anonymous access scheme for electronic services." Estivill-Castro, Vladimir (ed.) 27th Australasian Computer Science Conference (ACSC2004). Dunedin, New Zealand 18 - 22 Jan 2004 Sydney, NSW, Australia.
Conditional purpose based access control model for privacy protection
Kabir, Md Enamul and Wang, Hua. 2009. "Conditional purpose based access control model for privacy protection." Bouguettaya, Athman and Lin, Xuemin (ed.) ADC 2009: 20th Australasian Conference on Australasian Database. Wellington, New Zealand 20 - 23 Jan 2009 Sydney, Australia.
Authorization algorithms for the mobility of user-role relationship
Wang, Hua, Sun, Lili, Zhang, Yanchun and Cao, Jinli. 2005. "Authorization algorithms for the mobility of user-role relationship." Estivill-Castro, Vladimir (ed.) ACSC 2005: 28th Australasian Computer Science Conference. Newcastle, Australia 28 Jan - 03 Feb 2005 Sydney, Australia.
A user centred approach to the analysis and design of a prototype electronic aged care resident information management system
Yu, P. and Soar, Jeffrey. 2003. "A user centred approach to the analysis and design of a prototype electronic aged care resident information management system." Coiera, Enrico, Chu, Stephen and Simpson, Carmel (ed.) Health Informatics Conference 2003 (HIC 2003). Darling Harbour, Australia Aug 2003 Brunswick East, Australia.
Authorization algorithms for permission-role assignments
Sun, Lili, Wang, Hua and Yong, Jianming. 2009. "Authorization algorithms for permission-role assignments." Journal of Universal Computer Science. 15 (9), pp. 1782-1796. https://doi.org/10.3217/jucs-015-09-1782
An integrated model for next page access prediction
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2009. "An integrated model for next page access prediction." International Journal of Knowledge and Web Intelligence. 1 (1/2), pp. 48-80. https://doi.org/10.1504/IJKWI.2009.027925
Using usage control to access XML databases
Sun, Lili and Li, Yan. 2009. "Using usage control to access XML databases." International Journal of Information Systems in the Service Sector. 1 (3), pp. 32-44.
The current status of health informatics higher education in China
Wu, M. X., Yu, P. and Soar, Jeffrey. 2003. "The current status of health informatics higher education in China." Health Informatics Journal. 9 (4), pp. 211-223.
Developing China's health informatics program through integrating the developed country's experience
Wu, M. X., Yu, P. and Soar, Jeffrey. 2003. "Developing China's health informatics program through integrating the developed country's experience." 2nd Symposium of the Asian Medical Education Association: Asian Medical Education in the 21st Century. Shanghai, China 02 - 04 Nov 2003 Shanghai, China.
Information management and communication technology for conflict prevention and peace
Soar, Jeffrey. 2008. "Information management and communication technology for conflict prevention and peace." Suder, Gabriele (ed.) International business under adversity - a role in corporate responsibility, conflict prevention and peace. USA. Edward Elgar Publishing. pp. 73-92
Brainmatics: can hand-held technologies ameliorate the early onset of dementia? - a model for a longitudinal investigation of prediagnosed but potentially susceptible dementia suffers
Livingstone, Anne, Soar, Jeffrey, Mula, Joseph M. and Wang, Szu-Yao. 2009. "Brainmatics: can hand-held technologies ameliorate the early onset of dementia? - a model for a longitudinal investigation of prediagnosed but potentially susceptible dementia suffers." 19th IAGG World Congress of Gerontology and Geriatrics. Paris, France 05 - 09 Jul 2009
Enhanced p-sensitive k-anonymity models for privacy preserving data publishing
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Truta, Traian Marius. 2008. "Enhanced p-sensitive k-anonymity models for privacy preserving data publishing." Transactions on Data Privacy. 1 (2), pp. 53-66.
Integrating recommendation models for improved web page prediction accuracy
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2008. "Integrating recommendation models for improved web page prediction accuracy." Dobbie, Gillian and Mans, Bernard (ed.) ACSC 2008: 31st Australasian Computer Science Conference. Wollongong, Australia 22 - 25 Jan 2008 Sydney, Australia.
Priority driven K-anonymisation for privacy protection
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "Priority driven K-anonymisation for privacy protection." Roddick, John F., Li, Jiuyong, Christen, Peter and Kennedy, Paul J. (ed.) 7th Australasian Data Mining Conference (AusDM 2008). Glenelg, Adelaide 27 - 28 Nov 2008 Gold Coast, Australia.
Towards an authentication protocol for service outsourcing over IP networks
Lai, David, Zhang, Zhongwei and Wang, Hua. 2005. "Towards an authentication protocol for service outsourcing over IP networks." Arabnia, Hamid R. (ed.) 2005 International Conference on Security and Management. Las Vegas, United States of America 20 - 23 Jun 2005 Las Vegas, Nevada, USA.
Building a framework for understanding and improving information technology transfer process in the Arab countries
Al-Mabrouk, Khalid and Soar, Jeffrey. 2008. "Building a framework for understanding and improving information technology transfer process in the Arab countries." Soliman, Khalid (ed.) 9th IBIMA Conference: Information Management in Modern Organisations - Trends & Challenges. Marrakesh, Morocco 04 - 06 Jan 2008 Istanbul, Turkey.
Issues for successful IT transfer in the Arab world: a multiple stakeholder perspective
Al-Mabrouk, Khalid and Soar, Jeffrey. 2008. "Issues for successful IT transfer in the Arab world: a multiple stakeholder perspective." Soliman, Khalid (ed.) 9th IBIMA Conference: Information Management in Modern Organisations - Trends & Challenges. Marrakesh, Morocco 04 - 06 Jan 2008 Marrakech, Morocco.
Information management in healthcare all gaps and opportunities
Soar, Jeffrey. 2008. "Information management in healthcare all gaps and opportunities." Soliman, Khalid (ed.) 9th IBIMA Conference: Information Management in Modern Organisations - Trends & Challenges. Marrakesh, Morocco 04 - 06 Jan 2008
Current developments of k-anonymous data releasing
Li, Jiuyong, Wang, Hua, Jin, Huidong and Yong, Jianming. 2008. "Current developments of k-anonymous data releasing." Electronic Journal of Health Informatics. 3 (1).
Hospital avoidance through to Smart Home environments – evaluation of two Australian projects
Soar, Jeffrey. 2007. "Hospital avoidance through to Smart Home environments – evaluation of two Australian projects." ITAC – Information Technology in Aged Care, conference and trade exhibition (2007). Melbourne, Australia 23 - 25 Jul 2007
Protecting information sharing in distributed collaborative environment
Li, Min and Wang, Hua. 2008. "Protecting information sharing in distributed collaborative environment." 10th Asia-Pacific Web Conference (APWeb 2008). Shenyang, China 26 - 28 Apr 2008 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-540-89376-9-19
An efficient hash-based algorithm for minimal k-anonymity
Sun, Xiaoxun, Li, Min, Wang, Hua and Plank, Ashley. 2008. "An efficient hash-based algorithm for minimal k-anonymity." Dobbie, Gillian and Mans, Bernard (ed.) ACSC 2008: 31st Australasian Computer Science Conference. Wollongong, Australia 22 - 25 Jan 2008 Sydney, Australia.
XML and web services security
Sun, Lili and Li, Yan. 2008. "XML and web services security." CSCWD 2008: 12th International Conference on Computer Supported Cooporative Work in Design. Xi'an, China 16 - 18 Apr 2008 Piscataway, NJ, USA. https://doi.org/10.1109/CSCWD.2008.4537075
Nurses' confidence and experience in using information technology
Eley, Robert, Fallon, Tony, Soar, Jeffrey, Buikstra, Elizabeth and Hegney, Desley. 2008. "Nurses' confidence and experience in using information technology." Australian Journal of Advanced Nursing. 25 (3), pp. 23-35.
Aged-care privacy and security for Smart Home in Australia
Soar, Jeffrey, Hamano, Tsuyoshi and Fujisawa, Yoshikazu. 2007. "Aged-care privacy and security for Smart Home in Australia." Niigata Journal of Health and Welfare. 6 (1), pp. 31-37.
Enhancing healthcare through technology – reducing hospital admission and supporting care in smart home environments
Soar, Jeffrey. 2007. "Enhancing healthcare through technology – reducing hospital admission and supporting care in smart home environments ." Kwok, P. and Tsang, M. W. (ed.) 2007 International Conference on ICT in Teaching and Learning - Symposium on Enhancing Healthcare Education, Research & Practice Through Technology. Hong Kong, China 09 - 10 Jul 2007 Hong Kong.
Integrating Markov Model with clustering for predicting web page accesses
Khalil, Faten, Wang, Hua and Li, Jiuyong. 2007. "Integrating Markov Model with clustering for predicting web page accesses." 13th Australasian World Wide Web Conference (AusWeb 2007). Coffs Harbour, Australia 30 Jun - 04 Jul 2007 Australia.
Integrating recommendation models for improved web page prediction accuracy
Khalil, Faten, Wang, Hua and Li, Jiuyong. 2007. "Integrating recommendation models for improved web page prediction accuracy." 13th Australasian World Wide Web Conference (AusWeb 2007). Coffs Harbour, Australia 30 Jun - 04 Jul 2007 Australia.
Nurses and information technology
Hegney, Desley, Buikstra, Elizabeth, Eley, Robert, Fallon, Anthony Bruce, Gilmore, Victoria and Soar, Jeffrey. 2007. Nurses and information technology. Canberra, Australia. Commonwealth of Australia.
Human capital, innovation and the productive ageing: growth and senior aged health in the regional community through engaged higher education
Garlick, Steve and Soar, Jeffrey. 2007. "Human capital, innovation and the productive ageing: growth and senior aged health in the regional community through engaged higher education." 4th Annual AUCEA Conference. Alice Springs, Australia 02 - 04 Jul 2007 Kyneton, Vic, Australia.
Human capital, innovation and the productive ageing: growth and senior aged health in the regional community through engaged higher education
Garlick, Steve and Soar, Jeffrey. 2007. "Human capital, innovation and the productive ageing: growth and senior aged health in the regional community through engaged higher education." Australasian Journal of University Community Engagement. 2 (1), pp. 46-55.
Health and aged care enabled by information technology
Soar, Jeffrey and Seo, Youngjoon. 2007. "Health and aged care enabled by information technology." Annals of the New York Academy of Sciences. 1114 (1), pp. 154-161. https://doi.org/10.1196/annals.1396.040
Building a consumer anonymity scalable payment protocol for [the] Internet purchases
Wang, Hua, Cao, Jinli and Kambayahsi, Yahiko. 2002. "Building a consumer anonymity scalable payment protocol for [the] Internet purchases." 12th International Workshop on Research Issues in Data Engineering: Engineering E-Commerce/E-Business Systems (RIDE'02). San Jose, USA 24 - 25 Feb 2002 US.
Barriers to use of information and computer technology by Australia's nurses: a national survey
Eley, Robert, Fallon, Anthony Bruce, Soar, Jeffrey, Buikstra, Elizabeth and Hegney, Desley. 2009. "Barriers to use of information and computer technology by Australia's nurses: a national survey." Journal of Clinical Nursing. 18 (8), pp. 1151-1158. https://doi.org/10.1111/j.1365-2702.2008.02336.x
XML schema in XML documents with usage control
Sun, Lili and Li, Yan. 2007. "XML schema in XML documents with usage control." International Journal of Computer Science and Network Security. 7 (10), pp. 170-177.
The status of training and education in information and computer technology of Australia's nurses: a national survey
Eley, Robert, Fallon, Tony, Soar, Jeffrey, Buikstra, Elizabeth and Hegney, Desley. 2008. "The status of training and education in information and computer technology of Australia's nurses: a national survey." Journal of Clinical Nursing. 17 (20), pp. 2758-2767. https://doi.org/10.1111/j.1365-2702.2008.02285.x
XML undeniable signatures
Sun, Lili and Li, Yan. 2005. "XML undeniable signatures." Mohammadian, M. (ed.) International Conference on Intelligent Agents, Web Technologies & Internet Commerce (2005). Vienna, Austria 28 - 30 Nov 2005 USA.
A flexible payment scheme and its user-role assignment
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2002. "A flexible payment scheme and its user-role assignment." Chan, A., Chan, S., Leong, H. and Ng, V. (ed.) 2nd International Workshop on Cooperative Internet Computing. Hong Kong, China 18 - 19 Aug 2002 Hong Kong.
A protocol for untraceable electronic cash
Wang, Hua and Zhang, Yanchun. 2000. "A protocol for untraceable electronic cash." Lu, Hongjun and Zhou, Aoying (ed.) 1st Web-Age Information Management International Conference (WAIM 2000). Shanghai, China 21 - 23 Jun 2000 Berlin, Germany. https://doi.org/10.1007/3-540-45151-X_18
A consumer anonymity scalable payment scheme with role based access control
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2001. "A consumer anonymity scalable payment scheme with role based access control." 2nd International Conference on Web Information Systems Engineering (WISE 2001). Kyoto, Japan 03 - 06 Dec 2007
Formal authorization allocation approaches for role-based access control based on relational algebra operations
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2002. "Formal authorization allocation approaches for role-based access control based on relational algebra operations." 3rd International Conference on Web Information Systems Engineering, 2002 (WISE 2002). Singapore 12 - 14 Dec 2002
An electronic cash scheme and its management
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2004. "An electronic cash scheme and its management." Concurrent Engineering: Research and Application Journal. 12 (3), pp. 247-257. https://doi.org/10.1177/1063293X04046194
Reducing avoidable hospital admissions of the frail elderly using intelligent referrals
Soar, Jeffrey, Yuginovich, Trudy and Whittaker, Frank. 2007. "Reducing avoidable hospital admissions of the frail elderly using intelligent referrals." Electronic Journal of Health Informatics. 2 (1).
Ubiquitous computing environments and its usage access control
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2006. "Ubiquitous computing environments and its usage access control." 1st International Conference on Scalable Information Systems. Hong Kong, China 29 May - 01 Jun 2006 New York, USA.
Ticket-based mobile commerce scheme and its implementation
Wang, Hua, Huang, Xiaodi and Dodda, Goutham Reddy. 2006. "Ticket-based mobile commerce scheme and its implementation ." 9th ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems. Terromolinos, Spain 02 - 06 Oct 2006 New York, NY, USA.
A maximally diversified multiple decision tree algorithm for microarray data classification
Hu, Hong, Li, Jiuyong, Wang, Hua, Daggard, Grant and Shi, Mingren. 2006. "A maximally diversified multiple decision tree algorithm for microarray data classification." Boden, Mikael and Bailey, Timothy (ed.) Workshop on Intelligent Systems for Bioinformatics (2006). Hobart, Australia 04 Dec 2006 Sydney, Australia.
A framework of combining Markov model with association rules for predicting web page accesses
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2006. "A framework of combining Markov model with association rules for predicting web page accesses." Christen, Peter, Kennedy, Paul J., Li, Jiuyong, Simoff, Simeon J. and Williams, Graham J. (ed.) 5th Australasian Conference on Data Mining and Analystics (AusDM 2006). Sydney, Australia 29 - 30 Nov 2006 Canberra, Australia.
A comparative study of classification methods for microarray data analysis
Hu, Hong, Li, Jiuyong, Plank, Ashley, Wang, Hua and Daggard, Grant. 2006. "A comparative study of classification methods for microarray data analysis." Christen, Peter, Kennedy, Paul J., Li, Jiuyong, Simoff, Simeon J. and Williams, Graham J. (ed.) 5th Australasian Conference on Data Mining and Analystics (AusDM 2006). Sydney, Australia 29 - 30 Nov 2006 Canberra, Australia.
Improving health and public safety through knowledge management
Soar, Jeffrey. 2004. "Improving health and public safety through knowledge management." Thailand International Conference on Knowledge Management (2004). Bangkok, Thailand 24 - 25 Nov 2004 Bangkok.
Aged care in the future and baby boomers: shall the twain ever meet? - baby boomers and aged care
Fallon, Anthony Bruce, Price, Kay, Hegney, Desley, Abbey, Jennifer, Neville, Christine C., Oxlade, Deborah and Soar, Jeffrey. 2004. "Aged care in the future and baby boomers: shall the twain ever meet? - baby boomers and aged care." Conrick, Moya and Soar, Jeffrey (ed.) 1st Australian Aged and Community Care Informatics Conference (ACCIC'04). Brisbane, Australia 24 - 25 Aug 2004 Brunswick East, Australia.
Potential applications of geospatial information systems for planning and managing aged care services in Australia
Bhaskaran, Sunil and Soar, Jeffrey. 2004. "Potential applications of geospatial information systems for planning and managing aged care services in Australia." Conrick, Moya and Soar, Jeffrey (ed.) 1st Australian Aged and Community Care Informatics Conference (ACCIC'04). Brisbane, Australia 24 - 25 Aug 2004 Brunswick East, Vic, Australia.
Baby boomers in Queensland: where are they and where are they moving?
Liu, Yan and Soar, Jeffrey. 2005. "Baby boomers in Queensland: where are they and where are they moving?" Bellman, Chris, Cartwright, William and Shortis, Mark (ed.) 2005 Spatial Sciences Institute Biennial Conference: Spatial Intelligence, Innovation and Praxis (SSC2005). Melbourne, Australia 12 - 16 Sep 2005 Melbourne, Australia.
A model for Internet-based training to support rural and remote Practice Nurses in providing sexual and reproductive health education
Soar, Jeffrey and Yuginovich, Trudy. 2006. "A model for Internet-based training to support rural and remote Practice Nurses in providing sexual and reproductive health education." Milutinovic, V. (ed.) IPSI Conference (2006). Marbella, Spain 10 - 12 Feb 2006 Belgrade.
An information model for coordination of referrals to community care
Whittaker, Frank and Soar, Jeffrey. 2006. "An information model for coordination of referrals to community care." Barnett, M. (ed.) Aged Care Informatics Conference 2006 (ACCIC'06). Hobart, Australia 08 - 10 May 2006 Melbourne, Australia.
Preliminary investigation to explore perceptions of security issues associated with wireless technology in healthcare in Australia
Tiong, I. C., Hafeez-Baig, Abdul, Gururajan, Raj and Soar, Jeffrey. 2006. "Preliminary investigation to explore perceptions of security issues associated with wireless technology in healthcare in Australia." Westbrook, J. and Callen, J. (ed.) Health Infomatics Conference 2006: Bridging the Digital Divide: Clinician, Consumer and Computer (HIC 2006). Sydney, Australia 20 - 22 Aug 2006 Melbourne, Australia.
Software management
Soar, Jeffrey and Conrick, Moya. 2006. "Software management." Conrick, Moya (ed.) Informatics in healthcare: transforming healthcare with technology. Melbourne, Australia. Thomson Social Science Press. pp. 212-221
Health information systems
Ayres, Dianne, Soar, Jeffrey and Conrick, Moya. 2006. "Health information systems." Conrick, Moya (ed.) Informatics in healthcare: transforming healthcare with technology. Melbourne, Australia. Thomson Social Science Press. pp. 197-211
DTD level authorization in XML documents with usage control
Sun, Lili and Li, Yan. 2006. "DTD level authorization in XML documents with usage control." International Journal of Computer Science and Network Security. 6 (11), pp. 244-250.
A stock-take of existing aged care clinical placements for undergraduate nursing students in Australia
Neville, Christine C., Yuginovich, Trudy, Fallon, Anthony Bruce, Soar, Jeffrey, Boyes, Joanne and Grasby, David. 2006. A stock-take of existing aged care clinical placements for undergraduate nursing students in Australia. Toowoomba, Australia. University of Southern Queensland.
Access management in electronic commerce system
Wang, Hua. 2004. Access management in electronic commerce system. PhD Thesis Doctor of Philosophy. University of Southern Queensland.
Current developments of k-anonymous data releasing
Li, Jiuyong, Wang, Hua, Jin, Huidong and Yong, Jianming. 2006. "Current developments of k-anonymous data releasing." Croll, Peter, Morarji, Hasmukh and Au, Richard (ed.) National e-Health Privacy and Security Symposium 2006. Brisbane, Australia 24 - 26 Oct 2006 Brisbane.
A program for collaborative research in ageing and aged care
Gururajan, Raj, Gururajan, Vijaya and Soar, Jeffrey. 2005. "A program for collaborative research in ageing and aged care." Soar, Jeffrey and Edgecumbe, Joan (ed.) 2nd Australian Aged and Community Care Informatics Conference (ACCIC'05). Hobart, Tasmania 04 - 06 May 2005 Brunswick East, Australia.
Mobile solutions for aged care: a transformational framework
Soar, Jeffrey, Tsai, Heng-Sheng, Yong, Jianming and Gururajan, Raj. 2005. "Mobile solutions for aged care: a transformational framework." Soar, Jeffrey and Edgecumbe, Joan (ed.) 2nd Australian Aged and Community Care Informatics Conference (ACCIC'05). Hobart, Tasmania 04 - 06 May 2005 Brunswick East, Australia.
Challenges for implementing wireless hand-held technology in health care: views from selected Queensland nurses
Gururajan, Raj, Moloney, Clint and Soar, Jeffrey. 2005. "Challenges for implementing wireless hand-held technology in health care: views from selected Queensland nurses." Journal of Telemedicine and Telecare. 11 (2 (Supplement)), pp. 37-38. https://doi.org/10.1258/135763305775124849
Innovation in ageing for regional communities: planning for productive ageing in the Wide Bay/Burnett region of Queensland
Soar, Jeffrey, Garlick, Steve, Waterman, P. and Gururajan, Raj. 2005. "Innovation in ageing for regional communities: planning for productive ageing in the Wide Bay/Burnett region of Queensland." Abbey, Jennifer (ed.) 38th National Conference of the Australian Association of Gerontology. Gold Coast, Australia 09 - 11 Nov 2005 Sydney, Australia.
A brave new world for aged care
Soar, Jeffrey. 2005. "A brave new world for aged care." National Healthcare Journal.
Necessity for a new technology acceptance model to predict adoption of wireless technology in healthcare
Gururajan, Raj, Toleman, Mark and Soar, Jeffrey. 2004. "Necessity for a new technology acceptance model to predict adoption of wireless technology in healthcare." Health Informatics Conference 2004 (HIC 2004). Brisbane, Australia 2004 Melbourne, Australia.
Introducing mobile technologies in support of healthcare
Gururajan, Raj, Murugesan, San and Soar, Jeffrey. 2005. "Introducing mobile technologies in support of healthcare." Cutter IT Journal. 18 (8), pp. 12-18.
Informatics in health and aged care: a research program to support strategy development and implementation
Soar, Jeffrey. 2005. "Informatics in health and aged care: a research program to support strategy development and implementation." Ledingham, I., Soar, Jeffrey and Breton, A. (ed.) Second Middle East Conference on Healthcare Informatics (MECHCI'2005). Dubai, United Arab Emirates 09 - 10 Apr 2005 Dubai.
Attitudes of Australian nurses to information technology in the workplace: A national survey
Eley, Robert, Soar, Jeffrey, Buikstra, Elizabeth, Fallon, Tony and Hegney, Desley. 2009. "Attitudes of Australian nurses to information technology in the workplace: A national survey." CIN: Computers, Informatics, Nursing. 27 (2), pp. 114-121. https://doi.org/10.1097/NCN.0b013e318197557e