Browse By Person: May, Lauren
|Up a level|
Group by: Item Type | Date
Number of items: 20.
Liu, Vicky, May, Lauren J., Caelli, William J., & Croll, Peter R. (2008) Strengthening Legal Compliance for Privacy in Electronic Health Information Systems: A Review and Analysis. electronic Journal of Health Informatics, 3(1), pp. 1-14.
May, Lauren J. & Burdon, Mark (2006) Information protection management structures in Australian E-courts. Journal of Theoretical and Applied Electronic Commerce Research, 1(3), pp. 58-67.
Lane, Tim & May, Lauren (2006) A Model for Improving E-Security in Australian Universities. Journal of Theoretical and Applied Electronic Commerce Research (JTAER), 1(2), pp. 90-97.
Liu, Vicky, Caelli, William, Smith, Jason, May, Lauren J., Lee, Min Hui, Ng, Zi Hao, et al. (2010) A secure architecture for Australia’s index based e-health environment. In Maeder , Anthony & Hansen, David (Eds.) Proceedings of The Australasian Workshop on Health Informatics and Knowledge Management (part of Australasian Computer Science Week ACSW 2010), Conferences in Research and Practice in Information Technology (CRPIT), Queensland University of Technology, Brisbane, Queensland.
Liu, Vicky, Caelli, William J., May , Lauren , & Sahama , Tony (2009) Privacy and security in open and trusted health information systems. In Warren, James R. (Ed.) Proceedings of the Third Australasian Workshop on Health Informatics and Knowledge Management (HIKM 2009), Australian Computer Society, Wellington, New Zealand, pp. 25-30.
Alfawaz, Salahuddin, May, Lauren J., & Mohannak, Kavoos (2008) E-government security in developing countries : a managerial conceptual framework. In International Research Society for Public Management Conference, 26-28 March 2008, Queensland University of Technology, Brisbane.
Liu, Vicky, Caelli, William J., May, Lauren J., & Croll, Peter R. (2008) Open Trusted Health Informatics Structure(OTHIS). In Yu, Ping, Warren, James R., Yearwood, John, & Patrick, Jon (Eds.) Second Australasian Workshop on Health Data and Knowledge Management (HDKM 2008), 22nd - 25th January 2008, University of Wollongong NSW Australia.
Carey-Smith, Mark T., Nelson, Karen J., & May, Lauren J. (2007) Improving Information Security Management in Nonprofit Organisations with Action Research. In Valli, Craig & Woodward, Andrew (Eds.) 5th Australian Information Security Management Conference, 4 December 2007, Perth, Western Australia.
Liu, Vicky, May, Lauren J., Caelli, William J., & Croll, Peter R. (2007) A Sustainable Approach to Security and Privacy in Health Information Systems. In Toleman, Mark, Cater-Steel, Aileen, & Roberts, Dave (Eds.) 18th Australasian Conference on Information Systems, 5-7 December, Toowoomba, Qld, Australia.
May, Lauren J. & Burdon, Mark (2006) E-courts: Toward information protection management structures. In Michael, Katina & Michael, M. G. (Eds.) The First Workshop on the Social Implications of National Security, 29 May, Wollongong.
May, Lauren J. & Burdon, Mark (2006) Ensuring the integrity of Australia’s e-Court process. In Mendis, Priyan, Lai, Joseph, & Dawson, Edward P. (Eds.) RNSA Security Technology Conference 2006, 20 October, Canberra.
Carey-Smith, Mark T. & May, Lauren J. (2006) The Impact of Information Security Technologies Upon Society. In Social Change in the 21st Century Conference 2006, 27 October 2006, Carseldine, Brisbane.
Carey-Smith, Mark T. & May, Lauren J. (2006) Information Security and Civil Society Organisations. In Mendis, P., Lai, J., & Dawson, E. (Eds.) 2006 RNSA Security Technology Conference: Recent Advances in Security Technology, 19-21 September, Canberra, ACT, Australia.
Liu, Vicky, Caelli, William J., & May, Lauren J. (2006) Strengthening legal compliance for privacy in electronic health information systems : a review and analysis. In Croll, P., Morarji, H., & Au, R. (Eds.) National E-Health Privacy and Security Symposium 2006, 24-25 October 2006, Brisbane, Qld, Australia.
May, Lauren J. & Lane, Tim (2006) Towards Protecting Critical Infrastructure - The Role of Information Security Management in Australian Universities. In Michael, K. & Michael, M. (Eds.) The First Workshop on the Social Implications of Information Security Measures on Citizens and Business, 29 May, Wollongong, Australia.
Gauravaram, Praveen, May, Lauren, & Millan, William (2004) CRUSH: A New Cryptographic Hash Function Using Iterated Halving Technique. In Dawson, E & Klemm, W (Eds.) Cryptographic Algorithms and Their Uses, 5-6 July 2004, Gold Coast, Queensland.
Lane, Tim & May, Lauren (2004) Information Security Management in Australian Universities. In Kozan, Erhan (Ed.) APIEMS 2004, 12 - 15 December 2004, Gold Coast, Australia.
Carter, Gary, Dawson, Edward, Henricksen, Matthew, May, Lauren, & Millan, William (2002) Strengthening the Key Schedule of the AES. In Batten, & Seberry, (Eds.) Information Security and Privacy (ACISP 02), 3-5 July, 2002, Melbourne.
Liu, Vicky, Caelli, William J., May, Lauren J., Croll, Peter R., & Henricksen, Matthew P. (2007) Current Approaches to Secure Health Information Systems are Not Sustainable: an Analysis. In Medinfo 2007, 20- 24 Aug 2007, Brisbane, Australia.
May, Lauren Jeanette (2002) Design, analysis and implementation of symmetric block ciphers. PhD thesis, Queensland University of Technology.