Information Systems - Theses
Now showing items 1-10 of 30
Brokering algorithms for data replication and migration across cloud-based data stores
Cloud computing provides users with highly reliable, scalable and flexible computing and storage resources in a pay-as-you-go manner. Data storage services are gaining increasing popularity and many organizations are ...
Player negotiated digital multiplayer game experiences
This thesis covers the negotiation of rules and experiences by players of digital multiplayer games. An examination of existing literature found that overall contemporary games studies can be seen to suffer from an ...
Towards intelligence-driven information security risk management: an intelligent information security method
Information security risk management (ISRM) methods aim to protect organizational information infrastructure from a range of security threats using efficient and cost‐effective means. A review of the literature identified ...
Enhancing the security and privacy of cloud-based health records systems
Electronic health records (EHR) and personal health records (PHR) are emerging services for electronic health. They allow healthcare providers, clinicians and patients to manage, access and share medical data. EHR and PHR ...
Designing digital memorials: commemorating the Black Saturday Bushfires
Digital memorials are novel technologies used for commemorative purposes. There is a growing interest in their design amongst HCI researchers. Existing studies focus on commemorating deceased loved ones, where personal and ...
Mitigating BYOD information security risks
BYOD is a trend in organizations to allow employees, contractors and suppliers to use their personal devices in the workplace. Users can access electronic organizational resources from their tablets, smartphones, laptops, ...
Information security manager as a strategist
The modern organisation operates within a highly complex and sophisticated security threat landscape that exposes its information infrastructure to a range of security risks. This threat landscape includes advanced persistent ...
Audience experience in domestic videogaming
Videogames are frequently played socially, but not all participants actively play. Audience members observe gameplay, often participating and experiencing the game indirectly. While the existence of non-playing audience ...
Strategies to manage the influences from persuasive technologies: the case of self-monitoring and social comparison
Persuasive technologies are systems designed to support and motivate people to adopt, maintain or change their behaviours. Persuasive systems deliver influences to the user containing information that aims to: 1) trigger ...
A model for digital forensic readiness in organisations
Organisations are increasingly reliant upon information systems for almost every facet of their operations. As a result, there are legal, contractual, regulatory, security and operational reasons why this reliance often ...