Web Access Research Portal

Researcher: Broucek, V (Dr Vlasti Broucek)

Fields of Research

Information Retrieval and Web Search
Information Systems Theory
Information Systems Management
Information Systems
Information and Computing Sciences
Nursing
Interorganisational Information Systems and Web Services
Computer System Security
Health Information Systems (incl. Surveillance)

Research Objectives

Mobile Data Networks and Services
Information and Communication Services
Communication Networks and Services
Justice and the Law
Law Enforcement
Expanding Knowledge in the Information and Computing Sciences
Health Education and Promotion
Internet Hosting Services (incl. Application Hosting Services)
Rural Health
Information Processing Services (incl. Data Entry and Capture)
Integrated Systems
Computer Software and Services
Application Tools and System Utilities

Career Best Publications

Forensic Computing Developing a Conceptual Approach in the Era of Information Warfare; Journal of Information Warfare
Intrusion Detection: Issues and Challenges in Evidence Acquisition; International Review of Law Computers & Technology
Music piracy, universities and the Australian Federal Court: Issues for forensic computing specialists; Computer Law & Security Report
Technical, legal and ethical dilemmas: distinguishing risks arising from malware and cyber-attack tools in the 'cloud' - a forensic computing perspective; Journal of Computer Virology and Hacking Techniques

Research Publications

'Riding furiously in all directions' - implications of uncoordinated technical, organisational and legal responses to illegal or inappropriate on-line behaviours; EICAR
Helping Hands: Transforming practice through innovation in supervision; Transforming Practice through Innovation and Partnerships: Teaching Matters 2016
Helping Hands: Using Augmented Reality to Provide Remote Guidance to Health Professionals; Studies in Health Technology and Informatics
A forensic computing perspective on the need for improved user education for Information Systems Security Management; Current Security Management and ethical issues of information technology
Computer Incident Investigations: e-forensic Insights on Evidence Acquisition; Technical, Legal & Social Aspects of IT-Security
Considerations for E-Forensics: Insights Into Implications of Uncoordinated Technical, Organisational and Legal Responses to Illegal or Inappropriate on-line Behaviours; International Scientific Journal of Computing
Counting the Cost of University Internet Access: The Challenges of Balancing Security, Privacy and Forensic Computing; EICAR
Developing a Conceptual Approach for an Emerging Academic Discipline; Proceedings of the 5th Australian Security Research Symposium
Developing Forensic Computing Tools and Techniques within a holistic framework: an Australian Approach; 2004 IEEE IA Workshop
Electronic Evidence Management for Computer Incident Investigations - A Prospect of CTOSE; Security Management No. 18
Email and WWW Browsers: A Forensic Computing Perspective on the Need for Improved User Education for Information Systems Security Management; Issues and Trends of Information Technology Management in Contemporary Organizations
Forensic Computing Developing a Conceptual Approach in the Era of Information Warfare; Journal of Information Warfare
Forensic Computing theory and practice towards developing a methodology for a standardised approach to computer misuse; 1st Australian Computer Network and Information Forensics Conference
Forensic Computing: Exploring Paradoxes
Forward - for Journal in Computer Virology; Journal in Computer Virology
Guest Editors - Journal in Computer Virology; Journal in Computer Virology
Intrusion detection: Forensic computing insights arising from a case study on SNORT; EICAR 2003
Intrusion Detection: Issues and Challenges in Evidence Acquisition; International Review of Law Computers & Technology
Managing university internet access: Balancing the need for security, privacy and digital evidence; Journal in Computer Virology
Music piracy, universities and the Australian Federal Court: Issues for forensic computing specialists; Computer Law & Security Report
Proceedings of the 14th International EICAR Conference, Valletta, Malta; 14th EICAR Annual Meeting
Refining the Taxonomy of Forensic Computing in the era of E Crime: Insights from a survey of Australian Forensic Computing investigation (FCI) teams; 4th Australian Information Warfare & IT Security Conference
Rising awareness of forensic issues; SANE 2002
Risks and Solutions to Problems Arising from Illegal or Inappropriate On-line Behaviours: Two Core Debates Within Forensic Computing; EICAR 2002 Conference
Technical, legal and ethical dilemmas: distinguishing risks arising from malware and cyber-attack tools in the 'cloud' - a forensic computing perspective; Journal of Computer Virology and Hacking Techniques
Technical, legal and ethical dilemmas: distinguishing risks from malware and cyber-attack tools in the age of 'cloud computing'; 21st Annual EICAR Conference
The Federal Court, the Music Industry and the Universities: Lessons for Forensic Computing Specialists; 1st Australian Computer, Network and Information Forensics Conference
Winning the Battles, Losing the War? Rethinking Methodology for Forensic Computing Research; Journal in Computer Virology
Winning the Battles, Losing the War? Rethinking Methodology for Forensic Computing Research; EICAR

Research Projects

Research Candidate Supervision