ECU Security Research Institute

Edith Cowan University
ECU-SRI Security Congress

2014 SRI Security Congress
"Security on the Move"

1-3 December, 2014
Perth, Western Australia

The SRI Security Congress hosts 5 security based conferences over 3 days. The 2014 Security Congress aims to draw together all areas of security professions and disciplines as part of a holistic engagement with the wider security discourse.

The modern security environment is increasingly mobile that process vast amounts of data. In the first half of 2013 Australians purchased 2.6 million tablets or smart phones. The increasing heterogeneity, mobility and emergent expansion of the Internet through the adoption of mobile platforms and emergent IP version 6 will not abate. The mobility and flux this produces in a network generates increasing uncertainty in decision-making for cyber security. We are now in a state of dealing with a highly chaotic, entropic and some would say, decaying level of security and by implication order.

The aim of this conference is to explore methods which help to increase the efficacy and ability of decision making in an increasingly chaotic network. It should also explore methods, tools, techniques and frameworks in dealing with some of the wicked problems that our increasingly interconnected, digitised systems are producing that threaten our economic and social well-being.

The 5 hosted conferences are:

 

Conference Chair - Dr Bill Hutchinson, Edith Cowan University - w.hutchinson@ecu.edu.au

The impact of automated and autonomous technologies on Information warfare and information operations.

The aim of the Australian Information Warfare Conference 2014 (AIWC 2014) is to provide an opportunity for scholars and practitioners from a broad range of disciplines to examine and discuss the multi-disciplinary nature of Information warfare within the context of national security, global commerce and public interest. Scholars of the following disciplines are encouraged to participate; strategic studies, public affairs, communication studies, international politics, criminology, business and management, information and computer science, political science, social science, psychology and cognitive science, and security studies.

Information warfare in the contemporary environment is a growing discipline as the need to influence at all levels within society increases. The need for more people to understand the techniques of communication and influence is becoming critical. 

Papers are invited, but not limited to, the following areas:

  • Information warfare and operations
  • Deception and covert influence
  • Information warfare approaches used by civilian organisations
  • Psychological and influence operations
  • The use of information technology in influence operations
  • Automated technology such as drones in information warfare
  • The impact of Artificial intelligence and associated technologies on the human species

Submissions to the conference are expected to report substantial research results relevant for the subjects listed above.

Conference Chair - Dr Mike Johnstone, Edith Cowan University - m.johnstone@ecu.edu.au

Information security, specifically maintaining the confidentiality, availability and integrity of information, is the foundation of security. It is crucial because information, as a corporate asset, has value both internally and to competitors.  In an environment where users of information are constantly on the move, demand access to services in  areas that are insecure and use a wide range of devices to facilitate that access, it is essential to discuss and discover new processes, protocols and techniques for the protection of information. The aim of the conference is to encourage the dissemination of research to all stakeholders in the information security sphere of influence, including security practitioners, academics, law enforcement and management.

Conference Chair - Professor Craig Valli, Edith Cowan University - c.valli@ecu.edu.au

The changing use of information technology by an increasing number of users constantly presents new challenges for digital forensics practitioners. These include: increasing use of social media services, greater download speeds, new types of storage and an increasing variety of small devices with storage capability. Further confounding the issue is the increasing use of information technology for illicit or illegal activities. These challenges make ongoing research and engagement an essential part of being a digital forensic practitioner or researcher. The aim of the conference is to foster the exchange of information and increase knowledge amongst the digital forensics community.

The aim of the Australian Digital Forensics Conference 2014 (ADF 2014) is to provide an opportunity for scholars and practitioners from a broad range of disciplines to examine and discuss the multi-disciplinary nature of digital forensics within the context of personal and commercial security.

Conference Chair - Professor Narayan Srinivasan, Edith Cowan University - n.srinivasan@ecu.edu.au

Countering crime: Securing communities

The aim of the Australian Security and Intelligence Conference 2014 (ASIC 214) is to provide an opportunity for scholars and practitioners from a broad range of disciplines to examine and discuss the multi-disciplinary nature of security within the context of countering crime and protecting community. Scholars of the following disciplines are encouraged to participate; strategic studies, international politics, criminology, business and management, information science, political science, social science, psychology and security science.

Security in all its guises should be about protecting the community and maintaining safety and wellbeing.  In the contemporary environment the threat of terrorism and organized crime has been the reason for all manner of security response, not all of which are in the best interest of the community.  Notwithstanding that security is the foundation on which community exists.  Therefore the following questions are posed:

•        How much and what sort of protection is enough?
•        What are the issues when security seeks to control rather than protect?
•        How much protection is necessary and who should decide such?
•        Protection from whom and what?

The purpose of this conference is not so much to answer, rather to begin a discussion and consider the implications of decision making in the name of security.

Papers are invited, but not limited to, the following areas:

  • Countering violence
  • Security deviance
  • Concepts of security, safety and risk
  • Security and policy
  • The private and public security debate
  • Intelligence and counter-intelligence
  • Resilience
  • Surveillance and privacy
  • Security, crime and the law
  • Corporate security
  • Security technology, opportunity and danger
Submissions to the conference are expected to report substantial research results relevant for the subjects listed above.

Conference Chair - Associate Professor Trish Williams, Edith Cowan University - trish.williams@ecu.edu.au

Security on the move: The impact of mobile health

Mobile health (mHealth) offers enormous opportunities in the provision of healthcare. However, critical challenges exist in large-scale implementation of mobile solutions, in the reliable interoperability between electronic health record systems, and in the impact on clinical workflow that the mHealth opportunity presents. This integration of healthcare with technology, where devices are dependent on telecommunications, networking and infrastructure, presents us with new issues to address across the healthcare, computing and security professions.

The world of mHealth opens a wealth of prospects to support flexibility, access and communication in healthcare. Will this mobile revolution bring dramatic change to our healthcare systems and result in better patient care? Are there significant benefits in information flow whilst preserving patient privacy?  Can we ensure secure interoperability yet develop and deliver implementable solutions rapidly? These are only a few of the questions that the adoption and proliferation of mHealth raises.

The 3rd Australian eHealth Informatics and Security Conference builds upon the multi-disciplinary nature that is characteristic of eHealth informatics, with mobile health an increasingly significant part of the eHealth domain. Whilst under the umbrella of the SRI Security Congress, this conference is seeking submissions on all aspects of mHealth informatics, including strategy, technology, devices, use, application development and security.

Papers are invited, but not limited to, the following areas:

  • mHealth architectures
  • mHealth security/privacy breaches
  • Integrating mobile technology into healthcare
  • mHealth security standards
  • National security frameworks
  • Challenges in mHealth security
  • Privacy and mHealth
  • Secure clinical communications
  • Remote patient monitoring
  • Case studies of mHealth applications
  • mHealth innovations for low to middle income countries (LMIC)
  • mHealth and location based health tracking
  • Predictive analysis using mHealth data

Contact Details

Emma Burke
Congress Coordinator
sri@ecu.edu.au
(61 8) 6304 5176

Important Dates

Paper Submission Deadline
30 September 2014

Acceptance Notification
24 October 2014

Camera Ready Papers
3 November 2014

Early Bird Registration
2 November 2014

Supporters

  • Australian Computer Society
  • Australian Security Magazine
  • CISCO

Sponsors

  • Edith Cowan University