ECU offers innovative and practical courses across a variety of disciplines and we have a vibrant research culture. ECU is a leader in developing alternative entry pathways to higher education.
We have three campuses in Western Australia. Joondalup and Mount Lawley in the Perth metropolitan area and our South West campus in Bunbury, 200km south of the Perth CBD.
ECU provides a variety of services and facilities that go beyond the classroom, with opportunities for personal development and social interaction for students and staff.
We collaborate with all types of businesses, including new start-ups, small to medium enterprises, not-for-profits, community organisations, government and large corporates in the resources sector.
Children's University Edith Cowan aims to inspire students between seven and fourteen to develop confidence and a love of learning through validated activities beyond the school curriculum.
The Inspiring Minds scholarship program are equity scholarships that give students an opportunity to access an education that may otherwise be out of reach.
Cook, D., Waugh, B., Abdipanah, M., Hashemi, O., Abdul Rahman, S., (2014), Twitter Deception and Influence: Issues of Identity, Slacktivism, and Puppetry. Journal of Information Warfare, 13(1), 58 - 71,
Ahmad, P., Brogan, M., Johnstone, M., (2014), The E-book Power User in Academic and Research Libraries: Deep Log Analysis and User Customisation. Australian Academic and Research Libraries, 45(1), 35-47, DOI: 10.1080/00048623.2014.885374.
2013
Anuar, NB., Papadaki, M., Furnell, S., Clarke, N., (2013), A Response Selection for Intrusion Response Systems: Response Strategy Model (RSM). Security and Communication Networks, N/A(N/A), N/A, Early View Online, DOI: 10.1002/sec.896.
Li, F., Clarke, N., Papadaki, M., Dowland, P., (2013), Active Authentication for Mobile Devices Utilising Behavioural Profiling. International Journal of Information Security, 12(online), 1-14, Germany.
Hocking, C., Furnell, S., Clarke, N., Reynolds, P., (2013), Co-operative user identity verification using an Authentication Aura. Computers and Security, 39(Part b), 486-502, United Kingdom, DOI: 10.1016/j.cose.2013.09.011.
Corkill, J., Davies, A., (2013), The contemporary Australian intelligence domain. The AIPIO Journal, 21(2), 37-53, Deakin West, ACT.
Hannay, P., (2013), Geo Forensics: Classes of Locational Data Sources for Embedded Devices. IACSIT International Journal of Engineering and Technology, 5(2), 261-264.
Khonji, M., Iraqi, Y., Jones, A., (2013), Phishing Detection: A Literature Survey. IEEE Communications Surveys and Tutorials, 15(4), 2091-2121, United States, DOI: 10.1109/SURV.2013.032213.00009.
2012
Hannay, P., Baatard, G., (2012), GeoIntelligence: Data Mining Locational Social Media Content for Profiling and Information Gathering. Journal of Network Forensics, 4(1), 14-26, Joondalup, WA.
Griffiths, M., Brooks, D., (2012), Informing security through Cultural Cognition: The influence of cultural bias on operational security. Journal of Applied Security Research, 7(2), 218-238, Binghamton, NY, DOI: 10.1080/19361610.2012.656256.
Brooks, D., (2012), Corporate Security: Using knowledge construction to define a practising body of knowledge. Asian Journal of Criminology, NA(NA), 1-13, DOI: 10.1007/s11417-012-9135-1.
Johnstone, M., Jarvis, J., (2012), On the Effectiveness of Intrusions into ZigBee-based Wireless Sensor Networks. Journal of Network Forensics, 4(1), 27-39, Perth, Australia.
Larsen, A., Crowley, M. (2012). 'Virtue Ethics: Analysing emotions in a police interview with a crime suspect.' Policing: a journal of policy and practice,6(3), 291-300, Oxford.
Khonji, M., Iraqi, Y., Jones, A., (2012), Enhancing Phishing E-Mail Classifiers: A Lexical URL Analysis Approach. International Journal for Information Security Research, 2(1/2), 236-245, United Kingdom.
Baek, J., Vu, QH., Shoufan, A., Jones, A., Wong, DS., (2012), Stateful Public-Key Encryption Schemes Forward-Secure against State Exposure. The Computer Journal, 56(4), 497-507, DOI: doi:10.1093/comjnl/bxs151.
2011
Ahmad, A., Warren, M., and Ruighaver, A. does traditional security risk assessment have a future in Information Security, Journal of Information Warfare, volume 10 Issue 3, 16-28
Brooks, D. J. (2011). Security risk management: A psychometric map of expert knowledge structure. International Journal of Risk Management, 13(01), 14-41.
Brooks, D. J.. Organizational security: Understanding practice boundaries from knowledge construct to a body of knowledge. Asian Journal of Criminology.
Coles-Kemp, L., Reddington, J. & Williams, P.A.H. (2011). Looking at clouds from both sides: The advantages and disadvantages of placing personal narratives in the cloud. Information Security Technical Report, In presswww.sciencedirect.com/science/article/pii/S1363412711000525
Cook D.M and Smith T (2011) The Battle for Money Transfers: The allure of Paypal and Western Union over Familial remittance networks, Journal of Information Warfare, Volume 10 Issue 1.
Corkill, J., (2011) Not art, not science, but artistry: Why Professional Artistry should matter to the intelligence community. The Journal of the Australian Institute of Professional Intelligence Officers, Volume 19 Issue 1, 3-12
Hocking, C., Furnell, S., Clarke, N., Reynolds, P., (2011) authentication Aura – A distributed approach to user authentication, Journal of Information Assurance and Security, volume 6 Issue 1
Jali, M., Furnell, S., Dowland, P. (2011) Quantifying the effect of graphical password guidelines for better security. IFIP Advances in Information and Communication Technology, volume 354 issue 2011, 80-91
Ledermuller, T. And Clarke, N. (2011) Risk assessment for mobile devices. Lecture Notes in Computer Science, Volume 6863 Issue 2011, 210-221
Li, F, Clarke, N., Papadaki, M., Dowland, (2011) Misuse Detection for mobile devices using behaviour profiling, International Journal of Cyber Warfare & Terrorism, Volume 1 issue 1, 43-55
Scully, T. (2011) The Cyber threat, trophy information and the fortress mentality. Journal of Business Continuity & Emergency Planning, Volume 5 Issue 3, 195-207
2010
Aly, Anne.(2010) “Shifting Positions to the Media Discourse on Terrorism: Critical points in Audience Members’ Meaning Making Experiences.” Media International Australia incorporating Culture and Policy.
Aly, Anne & Lelia Green (2010) “Fear, Anxiety and the State of Terror.” Accepted for publication in Studies in Conflict and Terrorism
Alghafli, K., A. Jones, et al. (2010). "Forensic Analysis of the Windows 7 Registry." Journal of Digital Forensics, Security and Law 5(4): 5-30.
Chipperfield, C. and S. Furnell (2010). "From security policy to practice: Sending the right messages." Computer Fraud & Security 2010(3): 13-19.
Brand, M., C. Valli, et al. (2010). "Malware Forensics: Discovery of the Intent of Deception." Journal of Digital Forensics, Security and Law 5(4): 31-42
Brooks, D. J. (2010). “Security risk management: A psychometric map of expert knowledge structure”. International Journal of Risk Management, 00(00), 1-15. doi: 10.1057/rm.2010.7.
Hutchinson, W. (2010) “New technologies: dissonance, influence and radical behaviours”. Journal of Information Warfare 9(3): 14-25.
Jali, M., S. Furnell, et al. (2010). "Assessing image-based authentication techniques in a web-based environment." Information Management & Computer Security 18(1): 43-53.
Jones, A. and T. Martin (2010). "Digital forensics and the issues of identity." Information Security Technical Report 15(2): 67-71.
Jones, A., C. Valli, et al. (2010). "The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market." Journal of Digital Forensics, Security and Law 5(4): 43-64.
Jones, A. (2010) “How do you make information security user friendly?” Information Security Technical Report 14(4): 213-216.
Kessler, G. and D. Haggerty (2010). "An Online Graduate Program in Digital Investigation Management: Pedagogy and Overview." Journal of Digital Forensic Practice 3(1): 11-22.
Lessard, J. and G. Kessler (2010). "Android Forensics: Simplifying Cell Phone Examinations." Small Scale Digital Device Forensics Journal 4(1): 1-12.
Mislan, R., E. Casey, et al. (2010). "The Growing Need for On-Scene Triage of Mobile Devices." Digital Investigation 6(3-4): 112-124.
Szewczyk, P. S. (2010). "The ADSL Router Forensics Process." Journal of Network Forensics 2(1): 4-13.
Tjhai, G., S. Furnell, et al. (2010). "A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm." Computers & Security 29(6): 712-723.
Valli, C. (2010). "Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity." Journal of Digital Forensics, Security and Law 5(2): 35-44.
2009
Jones, A., C. Valli, et al. (2009). “The 2007 analysis of information remaining on disks offered for sale on the second hand market.”, International Journal of Liability and Scientific Enquiry 2(1): 53 – 68
Jones, A., Dardick, G. S., Davies, G., Sutherland, I. and Valli, C. (2009). “The 2008 analysis of information remaining on disks offered for sale on the second hand market”, Journal of International Commercial Law and Technology (JICLT),4(3).
Help us improve our content
Please leave a comment about your rating so we can better understand how we might improve the page.