Top of page
Main Content

Publications

2011

  • Coles-Kemp, E., Reddington, J., Williams, P.A.H., (2011), Looking at clouds from both sides: The advantages and disadvantages of placing personal narratives in the cloud. Information Security Technical Report, 16(3-4), 115-122, London UK, DOI: 10.1016/j.istr.2011.09.001.
  • Knight, S., (2011), Considering Complexity Theory in Understanding Information Management in Health Systems. Journal of Information Technology Review, 2(4), 172-182, India
  • Knight, S., (2011), Information management in health systems: Considering an organic approach. 2011 6th International Conference on Digital Information Management, ICDIM 2011, 276-281, DOI: 10.1109/ICDIM.2011.6093336.
  • Mahncke, R., Williams, P.A.H., (2011), Australian Primary Health Care Check: Who is Accountable for Information Security?. Proceedings of the 9th Australian Information Security Management Conference, 165-171, Perth.
  • McCauley, V., Williams, P.A.H., (2011), Trusted Interoperability and the Patient Safety Issues of Parasitic Health Care Software. Proceedings of the 9th Australian Information Security Management Conference, 189-195, Perth.
  • Williams, P.A.H., (2011), Is the biggest threat to medical information simply a lack of understanding?. Health Informatics: The transformative Power of Innovation, 179-187, Netherlands, DOI: 10.3233/978-1-60750-791-8-179.
  • Williams, P.A.H., (2011), Why Australia's EHealth System Will Be A Vulnerable National Asset. Proceedings of the 2nd International Cyber Resilience Conference, 95-99, Perth.
  • Williams, P.A.H., (2011), Help or hindrance: The practicality of applying security standards in healthcare. Proceedings of the 9th Australian Information Security Management Conference, 238-244, Perth, Western Australia.

2010

  • McDermid, D. C., Kristjanson, L. and Spry, N. (2010). “Factors affecting the sustainability of Information Systems: Embedding new technology in hospitals”, The International Journal of Healthcare Information Systems and Informatics, Vol. 5, No. 1, pp 1-15.
  • Dongguang Li, Gene expression studies with DGL global optimization for the molecular classification of cancer. Soft Computing, in press, 2010.
  • McDermid, D., Mahncke, R., Williams, P.A.H., (2010), An Information Security Governance Framework for Australian Primary Care Health Providers. Proceedings of the 8th Australian Information Security Management Conference, 62-68, Perth, WA.
  • McDermid, D., Mahncke, R., Williams, P.A.H., (2010), An Information Security Governance Encounter for Australian Primary Care Health Providers. Proceedings of the 2010 International Conference on Security & Management, SAM 2010, 637-643, USA.
  • Patel, N., Williams, P.A.H., (2010), Breaches in medical information security: The problem of reporting. Proceedings of the 2010 International Conference on Security & Management, (SAM '10), II(12-15 July), 633-636, USA.
  • Sinclair, JR., Hingston, P., Masek, M., Nosaka, K., (2010), Testing an Exergame for Effectiveness and Attractiveness. Games Innovations Conference (ICE-GIC), 2010 International IEEE Consumer Electronics Society's, 1-8, Piscataway, N.J., DOI: 10.1109/ICEGIC.2010.5716909.
  • Williams, P.A.H., (2010), Improving Medical Information Security using Contextualization Models. Proceedings of the Annual International Conference on Infocomm Technologies in Competitive Strategies (ICT 2010),, 65-68, Singapore, DOI: 10.5176/978-981-08-7240-3 I-33.
  • Williams, P.A.H., (2010), Is cyber resilience in medical practice security achievable?. Proceedings of the 1st International Cyber Resilience Conference, 105-111, Perth, Western Australia.
  • Williams, P.A.H., (2010), An ill-defined problem : Effective biomedical informatics curriculum?. HIC 2010 Handbook of Abstracts & Proceedings CD, 101-107, Brunswick East Victoria.
  • Williams, P.A.H., (2010), Medical Information Security: Is it all too hard?. Proceedings of the 2010 International Conference on Security & Management, SAM 2010, (12-15 July), 644-650, USA.
  • Yaoyu Chen, Cong Peng, Con Sullivan, Dongguang Li and Shaoguang Li, Critical molecular pathways in cancer stem cells of chronic myeloid leukemia. Leukemia, in press, 2010.
  • Sullivan C, Peng C, Chen Y, Li D, Li S, Targeted therapy of chronic myeloid leukemia. Biochemical Pharmacology, in press, 2010.
  • Yaoyu Chen, Cong Peng, Con Sullivan, Dongguang Li and Shaoguang Li, Novel therapeutic agents against cancer stem cells of chronic myeloid leukemia. Anti-Cancer Agents in Medicinal Chemistry, 10, 111-115, 2010.
  • Yaoyu Chen, Cong Peng, Dongguang Li, Shaoguang Li, Molecular and cellular bases of chronic myeloid leukemia. Protein and Cell, 1(2): 124–132, 2010.

2009

  • Yaoyu Chen, Dongguang Li and Shaoguang Li, The Alox5 gene is a novel therapeutic target in cancer stem cells of chronic myeloid leukemia. Cell Cycle, 8:21, 1-5, November, 2009.
  • J. Sinclair, P. Hingston, M. Masek, K. Nosaka, Using a Virtual Body to Aid in Exergaming System Development, IEEE Computer Graphics and Applications, to appear, March 2009.
  • Veal, D. Maj, S. P. and Makasiranondh, W. (2009). Dynamic patterns for low vision internetworking students. World Transactions on Engineering and Technology Education. WIETE, Vol 7, No.2. Melbourne, Vic, Australia.
  • Green, L., and Costello,L. (2009). Fractures between an online and offline community (and the ethical responses).International Journal of Web Based Communities, 5(3), 462-475.
  • McDermid, D. C., Mahncke R. and Williams, P.A. (2009), "Challenges in improving information security practice in Australian General Practice", Proceedings of 7th Australian Information Security Management Conference, Perth, Australia.
  • Mahncke R., McDermid, D. C. and Williams, P.A. (2009), "Measuring Information Security Governance within general medical practice", Proceedings of 7th Australian Information Security Management Conference, Perth, Australia.
  • Sinclair, JR., Hingston, P., Masek, M., Nosaka, K., (2009), Using a Virtual Body to Aid in Exergaming System Development. IEEE Computer Graphics and Applications, 29(2), 39-48, United States, DOI: 10.1109/MCG.2009.37.

2008

  • Shaoguang Li and Dongguang Li, "DNA Microarray technology and data analysis in cancer research", December 2008, World Scientific Pub Co Inc, ISBN-10: 9812790454, ISBN-13: 9789812790453.
  • Dongguang Li, "DGL Global Strategies in DNA Microarray Gene Expression Analysis and Data Mining for Human Blood Cancers" in the book "Mouse models of human ood cancers", ISBN: 978-0-387-69130-5, Springer, New York, 25 July 2008.
  • Williams, P.A.H. (2008). When trust defies common security sense. Health Informatics Journal, 14(3), 211-221.
  • Williams, P.A.H. (2008) A practical application of CMM to medical security capability. Information Management and Computer Security, 16 (1), 58-73.
  • Williams, P.A.H. (2008). In a 'trusting' environment, everyone is responsible for information security. Information Security Technical Report, 13(4), 207-215.
  • Williams, P. A. H. (2008) How addressing implementation issues can assist in medical information security governance. In N.L. Clarke & S.M. Furnell (Eds.), Proceedings of the Second International Symposium on Human Aspects of Information Security and Assurance, (pp. 116-125), Plymouth: University of Plymouth.
  • Williams, P. A. H. (2008). Can an Adapted Clinical Governance Model be Used to Improve Medical Information Security? In D. Remenyi (Ed.), Proceedings of the 7th European Conference on Information Warfare and Security. (pp.219-228), Reading: Academic Conferences Limited.
  • Williams, P. A. H., and Valli, C. (2008). Trust me. I am a Doctor. Your records are safe. In C. Valli and A. Woodward (Eds.), Proceedings of the 6th Australian Information Security Management Conference, (pp.155-162), SECAU Security Research Centre, Edith Cowan University, Perth, WA.
  • Bhuman Soni, Philip Hingston. Bots Trained to Play Like a Human Are More Fun, IEEE International Joint Conference on Neural Networks, IJCNN 2008, Hong Kong, June 2008

2007

  • Jeff Sinclair, Philip Hingston and Martin Masek, Considerations for the Design of Exergames, GRAPHITE 2007, Perth, December 2007.
  • Martin Masek and Philip Hingston, Use of Online Tools to aid Group Work, Transforming Information and Learning Conference, TILC2007, Perth, November 2007.
  • Philip Hingston and Martin Masek, Explorations with Monte Carlo Othello, 2007 IEEE Congress on Evolutionary Computation, Singapore, September, 2007.
  • Shaoguang Li and Dongguang Li, “Stem cell and kinase activity-independent pathway in resistance of leukemia to BCR-ABL kinase inhibitors", Journal of Cellular and Molecular Medicine, Vol. 11, No. 6, page 1251-1262, 2007, ISSN: 1582-1838 (JCR 2007 Impact factor 6.807).
  • Bonniface (Costello), L., and Green, L. (2007). Finding a new kind of knowledge on the HeartNET website. Health Information and Libraries Journal, 24(s1), 67-76.
  • Green, L., Bonniface (Costello), L., and McMahon, T. (2007). Adapting to a new identity: Reconstituting the self as a heart patient [Electronic Version]. M/C Journal, 10 from journal.media-culture.org.au.
  • Bonniface (Costello), L., and Green, L. (2007). Online Community: The near death experience - masks and miscommunication. Paper presented at the IADIS International Conference, Web Based Communities 2007, Salamanca, Spain.
  • Williams, P.A. H. (2007). Information governance: A model for security in medical practice. Journal of Digital Forensics, Security and Law, 2(1), 54-67.
  • Williams, P.A. H. (2007). Medical data security: Are you informed or afraid?. International Journal of Information and Computer Security, 1(4), 414-429.
  • Ami-Narh, J. T. and Williams, P. A. H. (2007). The need for a security/privacy model for the health sector in Ghana. In C. Valli and A. Woodward (Eds.), Proceedings of the 5th Australian Information Security Management Conference, 96-102, School of Computer and Information Science, Edith Cowan University, Perth, WA.
  • Mahncke, R.J. and Williams, P. A. H. (2007). The issues in securing electronic health information in transit. In H.R. Arabnia and S. Aissi (Eds.) Proceedings of the 2007 World Congress in Computer Science, Computer Engineering, and Applied Computing - SAM'07 - The 2007 International Conference on Security and Management, 489-495. USA: CSREA Press.
  • Williams, P. A. H. (2007). Medical insecurity: when one size does not fit all. In C. Valli and A. Woodward (Eds.),Proceedings of the 5th Australian Information Security Management Conference, 226-233, School of Computer and Information Science, Edith Cowan University, Perth, WA.
  • Williams, P. A. H. (2007). The effects of IT on information culture in general medical practice. Paper presented at the TILC 2007 T2-Technology and Transformation: Transforming Information and Learning Conference, Edith Cowan University.
  • Williams, P. A. H. (2007). A holistic perspective on models for medical information security. In H.R. Arabnia & S. Aissi (Eds.) Proceedings of the 2007 World Congress in Computer Science, Computer Engineering, and Applied Computing - SAM'07 - The 2007 International Conference on Security and Management, 510-519. USA: CSREA Press.
  • Woodward, A and Williams, P. A. H. (2007). Wireless Rx - Risk assessment and recommendations for securing a wireless network in a medical practice. In H.R. Arabnia and S. Aissi (Eds.) Proceedings of the 2007 World Congress in Computer Science, Computer Engineering, and Applied Computing - SAM'07 - The 2007 International Conference on Security and Management, 501-505. USA: CSREA Press.
  • Cong Peng, Dongguang Li and Shaoguang Li, “Heat shock protein 90: a potential therapeutic target in leukemic progenitor and stem cells harboring mutant BCR-ABL resistant to kinase inhibitors, Vol. 6, No. 18, Page 2227-2231, Cell Cycle, September, 2007. ISSN: 1538-4101(JCR 2006 Impact factor 3.214)
  • Veal, D. (2007). A GUI for the Deaf-Blind: An additional concepts paper. Paper presented at the T2: Technology and Transformation. 3rd Transforming Information and Learning Conference, November 30 - December 1. Perth WA Australia.
  • Veal, D. (2007). Improving security for vision impaired ATM access via dynamic patterns. Paper presented at the Sixth International Workshop for Applied PKC (IWAP07), December 3-4. Perth WA Australia.
Skip to top of page