Business, Justice and Behavioural Sciences

  • Phone(02) 6338 4000
Filter
Chapter (peer-reviewed)

Search results

  • 2013

    Audio and visual speech recognition recent trends

    Wei, L. H., Seng, K. P. & Ang, L-M., 2013, Intelligent image and video interpretation: Algorithms and applications. Tian, J. & Chen, L. (eds.). Hershey, PA: Information Science Reference, p. 42-86 45 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    1 Citation (Scopus)
  • Business benefits from keeping codes of ethics up to date

    Bowern, M. & Burmeister, O., 2013, Professionalism in the information and communication technology industry. Weckert, J. & Lucas, R. (eds.). Canberra, Australia: ANU E Press, p. 295-311 17 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    Open Access
    File
    94 Downloads (Pure)
  • Computer vision-aided video coding

    Paul, M. & Lin, W., 2013, Advanced video communications over wireless networks. Zhu, C. & Li, Y. (eds.). Boca Raton, FL: CRC Press, p. 57-84 28 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    2 Downloads (Pure)
  • Correlation mining in graph databases with a new measure

    Samiullah, M., Ahmed, C. F., Nishi, M. A., Fariha, A., Abdullah, S. M. & Islam, MD. R., 2013, Web technologies and applications: 15th Asia-Pacific Web Conference, APWeb 2013, Sydney, Australia, April 4-6, 2013 proceedings . Ishikawa, Y., Li, J., Wang, W., Zhang, R. & Zhang, W. (eds.). Berlin : Springer-Verlag London Ltd., Vol. 7808. p. 88-95 8 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    3 Citations (Scopus)
    7 Downloads (Pure)
  • Do professions differ in their beliefs about the causes and treatment of attention-deficit hyperactivity disorder?

    Dryer, M., Kiernan, M. & Tyson, G., 2013, ADHD: Cognitive symptoms, genetics and treatment outcomes. Thompson, R. & Miller, N. J. (eds.). New York: Nova Science Publishers, p. 61-79 19 p. (Neurodevelopmental diseases- laboratory and clinical research ).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    Open Access
    File
    58 Downloads (Pure)
  • Exploring timeline-based Malware classification

    Islam, MD. R., Altas, I. & Islam, S., 2013, Security and privacy protection in information processing systems : 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings . Janczewski, L. J., Wolfe, H. B. & Shenoi, S. (eds.). Germany: Springer, p. 1-13 13 p. (IFIP advances in information and communication technology; vol. 405).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    1 Citation (Scopus)
    6 Downloads (Pure)
  • Geomorphological and Geoforensic Interpretation of Maps, Aerial Imagery, Conditions of Diggability and the Colour Coded RAG Prioritisation System in Searches for Criminal Burials

    Donnelly, L. J. & Harrison MBE, M., 2013, Environmental and Criminal Geoforensics. Geological Society of London, p. 173-194.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Humour in new media: comparing China, Australia and the United States

    Crawford, H., 2013, Humour in Chinese life and culture: Resistance and control in modern times. Davis, J. M. & Chey, J. (eds.). Hong Kong: Hong Kong University Press, p. 173-191 19 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    2 Citations (Scopus)
    9 Downloads (Pure)
  • Illicit organizations and financial intelligence

    West, L-J., 2013, Intelligence and private investigation: Developing sophisticated methods for conducting Inquiries. Prunckun, H. (ed.). Springfield, ILL, USA: Charles C. Thomas Publisher Ltd, p. 113-130 27 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    15 Downloads (Pure)
  • Implementation of biological inspired components in embedded vision systems

    Ngau, C. W. H., Ang, L-M. & Seng, K. P., 2013, Developing and applying biologically-inspired vision systems: Interdisciplinary concepts. Pomplun, M. & Suzuki, J. (eds.). United States: IGI Global, p. 307-345 39 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    1 Citation (Scopus)
  • Jus ad vim and the just use of lethal force-short-of-war

    Ford, S., 2013, Routledge handbook of ethics and war: Just war theory in the 21st century. Allhoff, F., Evans, N. G. & Henschke, A. (eds.). Abingdon, Oxon: Routledge, p. 63-75 13 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    10 Citations (Scopus)
  • Low complexity minimal instruction set computer design using Anubis cipher for wireless identification and sensing platform

    Kong, J. H., Ang, L. -M. & Seng, KP., 2013, Security and trends in wireless identification and sensing platform tags: Advancements in RFID. Lopez, P. P., Hernandez-Castro, J. C. & Li, T. (eds.). Hershey PA: IGI Global, p. 144-171 28 p. (Premier reference source ).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Problematic professional identity construction: A theoretical explanation

    Douglas, F., 2013, Discourse, power, and resistance down under. Vicars, M. & McKenna, T. (eds.). Rotterdam: Sense Publishers, Vol. 2. p. 67-76 10 p. (Transgressions: cultural studies and education).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Security concerns and remedy in a cloud based e-learning system

    Masud, M., Islam, MD. R. & Abawajy, J., 2013, Security and privacy in communication networks: 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, revised selected papers . Zia, T., Zomaya, A., Varadharajan, V. & Mao, M. (eds.). United States: Springer, Vol. 127. p. 356-366 11 p. (Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 127).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    4 Citations (Scopus)
  • The Good Doctor and the Insurance Consultant

    King, M., 2013, Insurance fraud casebook: Paying a premium for crime. Hymes, L. & Wells, J. T. (eds.). Hoboken, N.J: John Wiley & Sons

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • The problem of writing as a solution: Writing reflexively in poststructural terrain

    Nic Giolla Easpaig, B., 2013, Discourse, power, and resistance down under. Vicars, M. & McKenna, T. (eds.). 1 ed. The Netherlands: Sense Publishers, Vol. 2. p. 77-84 7 p. (Transgressions: Cultural Studies and Education).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Using simulations in police education

    Davies, A., 2013, Realising exemplary practice-based education. Higgs, J., Sheehan, D., Baldry Currens, J., Letts, W. & Jensen, G. M. (eds.). Rotterdam: Sense Publishers, p. 239-247 9 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • 2012

    3D face recognition using an adaptive non uniform face mesh

    Chew, W. J., Seng, K. P. & Ang, L-M., 2012, Depth map and 3D imaging applications : Algorithms and technologies. Malik, A. S., Choi, T. S. & Nisar, H. (eds.). 1st ed. Hershey, Pa.: IGI Global, p. 562-573 12 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    4 Downloads (Pure)
  • Accounting ethics

    Plummer, K., 2012, Applied ethics: Strengthening ethical practices. Bowden, P. (ed.). Prahran, Vic: Tilde Publishing, p. 158-166 9 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • A comparative study of malware family classification

    Islam, MD. R. & Altas, I., 2012, Information and communications security: 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings. Chim, T. W. & Yuen, T. H. (eds.). Berlin, Germany: Springer, p. 488-496 9 p. (Lecture Notes in Computer Science; vol. 7618).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    6 Citations (Scopus)
  • A dilemma for the civil disobedient: Pleading guilty or not guilty in the courtroom?

    Moraro, P., 2012, The public in law: Representations of the political in legal discourse. Michelon, C., Clunie, G., McCorkindale, C. & Psarras, H. (eds.). Farnham, England: Ashgate Publishing Limited, p. 99-111 13 p. (The Edinburgh/glasgow law and society series ).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    1 Citation (Scopus)
  • A leap of faith: Embedding e-simulation in an associate degree in policing practice

    Davies, A., 2012, Simulations, games and role play in university education. Nygaard, C., Courtney, N. & Leigh, E. (eds.). Faringdon, UK: Libri Publishing, p. 223-237 15 p. (Learning in higher education series. ).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • An analysis of entrepreneurship characteristics in Saudi Arabia

    Skoko, H., 2012, The GCC economies: Stepping up to future challenges. Ramady, M. (ed.). New York: Springer, p. 205-215 11 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    6 Citations (Scopus)
  • Audio-visual speech processing for human computer interaction

    Chin, S. W., Seng, K. P. & Ang, L-M., 2012, Advances in robotics and virtual reality. Gulrez, T. & Hassanien, A. E. (eds.). 1 ed. Berlin, Heidelberg: Springer, Vol. 26. p. 135-165 31 p. (Intelligent Systems Reference Library; vol. 26).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    13 Citations (Scopus)
    4 Downloads (Pure)
  • Audio visual system for large scale people authentication and recognition over internet protocol (IP)

    Ch'ng, S. I., Ong, F. T., Seng, K. P. & Ang, L-M., 2012, Information assurance and security technologies for risk assessment and threat management: Advances. Chou, T-S. (ed.). 1st ed. Hershey, PA: IGI Global, p. 183-203 21 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    3 Downloads (Pure)
  • Best practice pricing principles vs. the politics of water pricing

    Cooper, B., Crase, L. & Pawsey, N., 2012, Sustainable irrigation and drainage IV : Management, technologies and policies. Bjornlund, H., Brebbia, C. A. & Wheeler, S. (eds.). United Kingdom: WIT Press, p. 509-520 12 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    Open Access
    File
    3 Downloads (Pure)
  • Chemical ecology providing novel strategies against vineyard pests in Australia

    Simpson, M., Connick, V., Guisard, Y., Reynolds, O., Saliba, A. & Gurr, G., 2012, Arthropod management in vineyards: Pests, approaches, and future directions. Bostanian, N. J., Vincent, C. & Isaacs, R. (eds.). The Netherlands: Springer, p. 119-138 20 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    1 Citation (Scopus)
  • Conclusion: Biodiversity as an asset rather than a burden

    Gurr, G., Wratten, S., Synder, W. E. & Read, D., 2012, Biodiversity and insect pests: Key issues for sustainable management. Gurr, G. M., Wratten, S. D., Synder, W. E. & Read, D. M. Y. (eds.). Chichester: Wiley-Blackwell, p. 331-339 9 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Do harsh penalties deter juvenile offending?

    McGrath, A., 2012, Children and childhoods 2: Images of childhood . Wyver, S. & Whiteman, P. (eds.). 1 ed. Newcastle upon Tyne, UK: Cambridge Scholars Publishing, p. 70-87 18 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • "For when equality if given to unequals, the result is inequality": The socio-legal ethics of vulnerable people

    Bartkowiak, I. & Corbo Crehan, A., 2012, Policing vulnerability. Bartkowiak-Theron, I. B. & Asquith, N. L. (eds.). 1 ed. Sydney, Australia: Federation Press, p. 33-46 14 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • FPGA technology for implementation in visual sensor networks

    Chia, W. C., Ngau, W. H., Ang, L-M., Seng, K. P., Chew, L. W. & Yeong, L. S., 2012, Visual Information processing in wireless sensor networks : Technology, trends, and applications . Ang, L-M. & Seng, K. P. (eds.). 1st ed. Hershey, PA: IGI Global, p. 293-324 32 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Group life in babies: Opening up perceptions and possibilities

    Ben, S. B., Selby, J. & Urwin, C., 2012, Infant observation and research: Emotional processes in everyday lives. Urwin, C. & Sternberg, J. (eds.). 1st ed. Hove, East Sussex: Routledge, p. 275-295 20 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    9 Citations (Scopus)
  • Improved energy-efficient ant-based routing algorithm in wireless sensor networks

    Zungeru, A. M., Ang, L-M., Prabaharan, S. R. S. & Seng, K. P., Jan 2012, Wireless sensor networks and energy efficiency: Protocols, routing and management. Zaman, N., Ragab, K. & Abdullah, A. B. (eds.). 1st ed. Hershey, PA: IGI Global, p. 420-444 25 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    6 Citations (Scopus)
  • Influencing factors model of information and communication technology (ICT) in Saudi Arabian small and medium enterprises (SMEs)

    Skoko, H., 2012, The GCC economies: Stepping up to future challenges. Ramady, M. A. (ed.). New York: Springer, p. 229-234 6 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    2 Citations (Scopus)
  • Labshare: Towards cross-institutional laboratory sharing

    Lowe, D., Conlon, S., Murray, S., Weber, L., de la Villefromoy, M., Lindsay, E., Nafalski, A., Nageswaran, W. & Tang, T., 2012, Internet accessible remote laboratories: Scalable E-Learning tools for engineering and science disciplines. Azad, A. K. M., Auer, M. E. & Harward, V. J. (eds.). Hershey, PA: IGI Global, p. 453-467 15 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    16 Citations (Scopus)
  • Low complexity processor designs for energy-efficient security and error correction in wireless sensor networks

    Kong, J. H., Ong, J. J., Ang, L-M. & Seng, K. P., 2012, Wireless sensor networks and energy efficiency : Protocols, routing, and management . Zaman, N., Ragab, K. & Abdullah, A. B. (eds.). 1 ed. Hershey, PA: IGI Global, p. 348-366 19 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Maximising benefits from Murray-Darling Basin water resource management

    Connor, J., Banerjee, O., Tapuswan, S., Ryan, A., Hatton MacDonald, D. & Morrison, M., 2012, Water policy reform: Lessons in sustainability from the Murray-Darling Basin. Quiggin, J., Mallawaarachchi, T. & Chambers, S. (eds.). Cheltenham: Edward Elgar Publishing, p. 136-158 23 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    9 Downloads (Pure)
  • Police uniforms from 1901

    Aspland, D., 2012, True blue : 150 years of service and sacrifice of the NSW police force. Lindsay, P. (ed.). Sydney: Harper Collins, p. 116-121 6 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Police uniforms of the colonial era

    Aspland, D., 2012, True blue : 150 years of service and sacrifice of the New South Wales police force. Lindsay, P. (ed.). Sydney: Harper Collins, p. 72-75 4 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Police weapons from 1901

    Aspland, D., 2012, True blue: 150 years of service and sacrifice of the NSW police force. Lindsay, P. (ed.). Sydney: Harper Collins, p. 122-125 4 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Radio frequency energy harvesting and management for wireless sensor networks

    Zungeru, A. M., Ang, L-M., Prabaharan, S. & Seng, K. P., 2012, Green mobile devices and networks: Energy optimization and scavenging techniques. Venkataraman, H. & Muntean, G-M. (eds.). Boca Raton, FL: CRC Press, p. 341-367 27 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    6 Downloads (Pure)
  • Starting the revolution: Implementing an identity management architecture

    White, P., 2012, Digital identity and access management: Technologies and frameworks. Gupta, M. G. M. (ed.). Hershey PA: Information Science Reference, p. 148-167 20 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • The eagle of nemesis: A history of the New South Wales Police crest 1959-2007

    Lindsay, P. & Aspland, D., 2012, True blue: 150 years of service and sacrifice of the NSW police force. Lindsay, P. (ed.). 38 ed. Sydney: Harper Collins, p. 316-316 1 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • The era of the 'hard men'

    Aspland, D., 2012, True blue : 150 years of service and sacrifice of the NSW police force. Lindsay, P. (ed.). Sydney: Harper Collins, p. 164-165 2 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • The Native police corps

    Aspland, D., 2012, True blue : 150 years of service and sacrifice of the NSW police force. Lindsay, P. (ed.). Sydney: Harper Collins, p. 66-71 6 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Women in the force

    Aspland, D., 2012, True blue: 150 years of service and sacrifice of the NSW police force. Lindsay, P. (ed.). Sydney: Harper Collins, p. 126-135 10 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • 2011

    An econometric method of allocating police resources in New Zealand

    den Heyer, G., Mitchell, M., Ganesh, S. & Devery, C., 2011, Effective crime reduction strategies: International perspectives. Albrecht, J. F. & Das, D. K. (eds.). 1st ed. Broca Raton, FL: CRC Press, p. 347-376 30 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Anxiety and self medication with alcohol

    Saliba, A. & Moran, C., 2011, Handbook of behavior, food and nutrition. Preedy, V. R., Watson, R. R. & Martin, C. R. (eds.). UK: Springer, Vol. 5. p. 3061-3074 14 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Communication skills for policing

    Roberts, K. & Davies, A., 2011, Policing in practice. Birch, P. & Herrington, V. (eds.). Melbourne: Palgrave Macmillan, p. 67-88 22 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Core border management disciplines: Risk based compliance management

    Widdowson, D. & Holloway, S., 2011, Border management modernization. McLinden, G., Fanta, E., Widdowson, D. & Doyle, T. (eds.). Washington DC: World Bank, p. 95-113 19 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    5 Downloads (Pure)