Web Access Research Portal

Researcher: Hartnett, JS (Mrs Jacky Hartnett)

Fields of Research

Artificial life and complex adaptive systems
Cybersecurity and privacy
Modelling and simulation
Data engineering and data science
Data management and data science
Information systems
Image processing
Pattern recognition
Information security management
Network engineering
Information retrieval and web search
Decision support and group support systems
Educational technology and computing
Computational complexity and computability
Knowledge representation and reasoning
Innovation management
Photogrammetry and remote sensing
Cryptography
Human information interaction and retrieval
History and philosophy of engineering and technology
Health informatics and information systems
Software testing, verification and validation
Field robotics
Other information and computing sciences
Neural networks
Operating systems
Communications engineering
Service oriented computing
Health and community services
Forestry sciences
Health services and systems

Research Objectives

Other information and communication services
Information systems, technologies and services
Communication technologies, systems and services
Other health
Health education and promotion
Application software packages
Other plant production and plant primary products
Defence
Mobile technologies and communications
Other education and training
Machinery and equipment
National security
Command, control and communications
Rural and remote area health
Technological and organisational innovation
Evaluation of health and support services
Evaluation, allocation, and impacts of land use
Social impacts of climate change and variability

Career Best Publications

Artificial Intelligence Applications for Analysis of E-mail Communication Activities; The 2nd International Conference on Artificial Intelligence in Science and Technology
Developing Smart Spatial Systems Using Common KADS; GeoDynamics
Intrusion detection by Intelligent analysis of data across multiple gateways in real-time; Austalian Telecommunications networks and Application Conference 2004
Spatial Database Design for Agricultural Applications - Building Efficient Schema using Relational and Object Methods; AURISA 2001 Creating the Links
Why One Signing Key is Not Enough; HIC2003 RACGP12CC

Research Publications

A context aware scan detection system; International Journal of Computer Science and Network Security
A Flexible Tool to Extract Algorithmic Knowledge From Image Interpretation Experts; 3rd International Conference on GeoComputation
A fuzzy approach for detecting anomalous behavious in e-mail traffic; 4th Australian Digital Forensics Conference
A Mini-Raster Data Stucture for Representing and Reasoning with Spatial Objects in Satellite Images; 3rd International Conference on GeoComputation
A Practical Interim Standard for Spatial Meta Data; International Conference of Modeling Geographical and Environmental Systems with Geographical Informational Systems
A Prototype Sea Ice Mapping System using a Geographical Information System and Expert Knowledge; International Geoscience and Remote Sensing Symposium (IGARSS'96)
A Theory into Practice Model for Teaching a General Computer Security Unit; Colloquium for Information Systems Security Education - Asia Pacific (CISSE-AP)
A Visual Tool for Capturing the Knowledge of Expert Image Interpreters: A Picture is Worth More Than a Thousand Words; 1997 International Geoscience and Remote Sensing Symposium
An online tool for learning collaboration and learning while collaborating; Australasian Computing Education Conference (ACE)
An RFID attacker behaviour taxonomy; IEEE Pervasive Computing
Analysis of e-mail communication activities for detecting patterns of pathological behaviour; Conference of Open Innovations Association
Artificial Intelligence Applications for Analysis of E-mail Communication Activities; The 2nd International Conference on Artificial Intelligence in Science and Technology
Building the Knowledge Base; Health Informatics A Socio-Technical Persepective
Catching Spam Before it Arrives: Domain Specific Dynamic Blacklists; Australasian Symposium on Grid Computing and e-Research (AusGrid) and the Australasian Information Security Workshop (Network Security) (AISW)
Deckard: A System to Detect Change of RFID Tag Ownership; International Journal of Computer Science and Network Security
Detecting abnormal changes in e-mail traffic using hierarchical fuzzy systems; IEEE International Conference on Fuzzy Systems
Developing quality training data for a statistical decision tree classifier in a spatial environment; 4th International Conference on GeoComputation '99
Developing Smart Spatial Systems Using Common KADS; GeoDynamics
Developing Smart Spatial Systems Using Common KADS; GeoComputation '03
Doing Databases; Health Informatics A Socio-Technical Perspective
Dynamic WEB: Profile Correlation Using COBWEB; AJCAI
DynamicWEB: A method for reconnaissance activity profiling; International Symposium on Parallel and Distributed Processing with Applications (ISPA)
DynamicWEB: Adapting to concept drift and object drift in COBWEB; AJCAI
E-Mail traffic analysis using visualisation and decision trees; IEEE International conference on intelligence and security informatics
Eliciting Knowledge with Visualization - Instant Gratification for the Expert Image Classifier Who Wants to Show Rather than Tell; The second annual conference Geocomputation'97
Email communications analysis: how to use computational intelligence methods and tools?; CIHSPS: Computational Intelligence for Homeland Security and Personal Safety
Expert Software Support for Ad-hoc Teams - Enabling Online Interaction Rules; AISAT 2004 The 2nd International Conference on Artificial Intelligence in Science and Technology
Handling Spatial Objects in a GIS Database-Relational v Object Oriented Approaches; GeoComputation 2001
Help! Why should first year students of nursing learn computer skills?
How RFID Attacks Are Expressed In OUtput Data; I-SPAN: International Symposium on Pervasive Systems, Algorithms, and Networks
Identifying Reconnaissance Activity: A Strategy for Network Defence; Australian Information Warfare and Security Conference
Interaction Rules: Their Place in Collaboration Software; The Computer Supported Collaborative Learning (CSCL) Conference 2007
Intrusion detection by Intelligent analysis of data across multiple gateways in real-time; Austalian Telecommunications networks and Application Conference 2004
Knowledge Acquisition for Expert Systems used with Geographic Expert Systems; Australasian Urban and Regional Information Systems Association (AURISA 96)
Machine Learning in a Changing World; AISAT: International Workshop on Artificial Intelligence in Science and Technology
Mapping information security standards: a counter-terrorism example; European Conference on Information Systems
Personality trait based simulation model of the email system; International Journal of Network Security
Professional Access Control; Health Informatics Conference (HIC)
Providing a Graphical user Interface for Customised GIS Applications; Joint European Conference and Exhibition on Geographical Information
Spatial Database Design for Agricultural Applications - Building Efficient Schema using Relational and Object Methods; AURISA 2001 Creating the Links
Teaching Internet Technologies Using An Interactive Self Paced Approach; 7th National Health Informatics Conference '99
Teaching Repertory Grid Concepts for Knowledge acquisition in Expert Systems: An Interactive Approach; Australian Society for Computers in Learning in Tertiary Education - ASCILITE '95
The Computer and the Geographer: New Thinking for the New Millenium
The Problem With Lines - Spatial Reasoning With One Dimensional Features in a Two Dimensional Representation of Three Dimensional Space; Third Joint European Conference and Exhibition on Geographical Information
Three Spatial Analysis Techniques Which Incorporate Expert Knowledge Applied to the Selection of the Best Site for a Forestry Plantation; Third Joint European Conference and Exhibition on Geographical Information
Tracking and Monitoring E-mail traffic activities of criminal and terrorist organisations using visualisation tools; Journal of Information Warfare
Tracking and Monitoring E-mail Traffic Activities of Criminal and Terrorist Organisations Using Visualisation Tools; Australian Information Warfare and Security Conference
Tyrell: A RFID Simulation Platform; Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP)
Using a Client-Task Based Approach to Achieve a Privacy Compliant Access Control System; National e-Health Privacy and Security Symposium
Using a client-task based approach to achieve a privacy compliant access control system; electronic Journal of Health Informatics (eJHI)
Using Repertory Grids for Knowledge Acquisition for Spatial Expert Systems; Australian New Zealand Conference on Intelligent Information Systems 96
Why are Computational Processes Important?; 6th International Conference on GeoComputation 2001
Why One Signing Key is Not Enough; HIC2003 RACGP12CC

Research Projects

Australian Government Information and Communications Technology Security: A Framework for Resilience of Critical Infrastructure; Dept of Prime Minister & Cabinet (DPMC)
Leveraging Systems Security Compliance for Counter-Terrorism from Commercial Imperatives; Dept of Prime Minister & Cabinet (DPMC)
Research on the Implementation of Electronic Consent Mechanisms
Telehealth: Up-skilling health professionals to facilitate enhanced access to services for rural, remote and metropolitan communities.

Research Candidate Supervision

A Conceptual Model for Compliant Management Systems
A Whole of System Approach to Analysis of Security in RFID Systems Using an Integrated Layered and Partitioned Reference Model
Computational Intelligence in E-mail Traffic Analysis
Cyber Attack- Preventative Measures in System Analysis and Design.
DynamicWEB- A Conceptual Clustering Algorithm for a Changing World
Interaction Rules and Their Role in Collaboration Software
Outsourcing of E-security for SMEs