Computer networks

FAST Record ID: 

Research report

5 Dec 2016

The rapid growth of the internet is transforming how we engage and communicate. It also creates new opportunities for fraud and data theft. One way cybercriminals exploit the vulnerabilities of new technologies and potential victims is the use of deceptive emails on a massive scale....

Research report

9 Nov 2016


Passenger train services for the Victorian public are an essential service, much like electricity, water, gas and port services. Train services rely on a range of systems and equipment, including control systems that monitor and control service delivery.

We reviewed the...

Research report

12 Oct 2016

The Australian Cyber Security Centre (ACSC) Threat Report continues to reflect the experience, focus, and mandates of the ACSC's member organisations. This report provides an insight into what the centre has been seeing, learning, and responding to, focusing on specific areas of change or new...

Research report

27 Sep 2016

The 2016 Cyber Maturity report is the culmination of 12 months’ research by the ASPI International Cyber Policy Centre. The report assesses the approach of 23 regional countries to the challenges and opportunities that cyberspace presents, in terms of their governance structure, legislation, law enforcement,...

Audio interview

Audio program

7 Jul 2016

A recent legislative amendment in Bulgaria means that it's now law that software developed for the government must be open source.

From now on, Bulgarian government contracts which include computer software, programming interfaces and databases must be freely available for others to read, modify...

Research report

21 Jun 2016


This paper provides an assessment and overview of the ADF’s command, control, computing, communications, intelligence, surveillance and reconnaissance (known commonly as ‘C4ISR’) capabilities in the context of the ADF’s goal of pursuing a network-centric warfare capability. The paper is the final part...

Research report

14 Jun 2016

A fundamental shift is occurring in the management of cyber risk. The idea that cyberattacks are increasingly likely—and perhaps inevitable—is beginning to take hold among executives and boards. Business leaders are realizing that we have interconnected our world mostly using technologies designed for sharing information,...

Journal article

27 Apr 2015

This paper proposes an analysis of digital convergence through the concepts of French philosopher Gilbert Simondon, who develops a theory of technicity as a mode of existence of humanity on par with religion, science and art, and describes an evolution of technicity that culminates in...

Journal article

15 Jan 2015

Keyword search is the most popular technique for querying large tree-structured datasets, often of unknown structure, in the web. Recent keyword search approaches return lowest common ancestors (LCAs) of the keyword matches ranked with respect to their relevance to the keyword query. A major challenge...

Research report

30 May 2012

This briefing document was developed in conjunction with “Public Networks for Public Safety: A Workshop on the Present and Future of Mesh Networking,” which was held on March 30, 2012, at Harvard University.

The workshop was intended as a starting point for conversation about...

Research report

1 Mar 2012

The purpose of this review is to investigate the key issues surrounding young people and ICT in the context of social connectedness, engagement and education. Our review has led to an identification of gaps in knowledge and the development of research questions for further enquiry....

Research report

3 Mar 2011

Developments in access networks, service and device convergence, and the evolution of multimedia services are changing the home network environment. Providing high-speed connectivity, interoperability and portability of services via the last few metres of network in the home is an area of considerable...

Journal article

23 Nov 2010

The existing body of knowledge has generally supported that organizational culture plays a significant role in shaping group identity, work pattern, communication schemes, and interpersonal relations; all of these cultural elements are important organizational factors that shape workplaces and operational routines. In the context of...

Journal article

22 Oct 2010

Cost efficiency has been a dominant perspective in the traditional IT literature. However, in complex technology and business environment, the widely recognized cost efficient assumption of information technology has been increasingly challenged. Drawing from a case study of wireless network implementation situated in a politically...

Journal article

30 Sep 2010

Network technologies are very desirable for social action, allowing activists to achieve more with less, more quickly and with broader impact; on the other hand, the very advantages they bring are equally important to the world of contemporary capitalism that social action seeks to change....

Research report

25 Mar 2010

The position of cable operators within the pay TV market has changed drastically in recent years.

Although video service remains core to the cable industry’s business model, cable TV’s market share has been dropping significantly with intense competition from direct broadcast satellite services (DBS),...

Research report

19 Jan 2010

Sensor networks play an important role in tackling environmental challenges. Sensor applications in smart power grids, smart buildings and smart industrial processes make significant contributions to more efficient resource use and reduce greenhouse gas emissions and other pollutants. This report gives an overview of sensor...

Research report

5 Mar 2009

This report from US think-tank ITIF argues that supporting the deployment of faster broadband networks will be crucial to enabling next-generation Web-based applications and services that will play important roles in improving quality of life and boosting economic growth.

While getting broadband service to...

Research report

3 Dec 2008

Telecommuting, a practice increasingly favored by employers and workers alike, has a great deal to recommend it, but it also raises serious new privacy and security threats that must be addressed in order to prevent this generally beneficial practice from leading to serious privacy and...


2 Dec 2008

Using Delhi's media networks as an example, the author suggests that new domains of nonlegal networks could pose significant problems for classic strategies of incorporation and management in political society. These nonlegal domains open up new spaces of disorder and constant conflict in Indian cities...