Академический Документы
Профессиональный Документы
Культура Документы
This list is a guide and shows the kinds of projects different staff members might supervise, and
is a useful starting point in the search for an appropriate project. Students are strongly
encouraged to speak to staff about a project as early in their studies as possible.
Important: For official web-pages where you can find contact details and other information
about potential supervisors see http://cis.unimelb.edu.au/people.
Table of Contents
Topics 1-76 are most relevant for students who want to do a Computer Science
related project. Topics 79-144 are most relevant for students who want to do a
project in Information Systems or Human Computer Interaction.
This project is suitable for students with a background and interest in distributed computing,
programming and human-computer interaction. Expected background: Strong Angular JS and NodeJS
(Javascript), basic Arduino or Raspberry Pi, some experience with cloud servers and NoSQL, but not
essential.
Preferred background: Some experience with an interactive theorem prover (e.g. Isabelle or Coq) would
be beneficial.
Preferred background: experience in mobile phone app development (either iOS or Android); strong
programming skills.
Expected background: Good programming skills. Knowledge of machine learning would be beneficial.
Experience with Python and GUI programming preferable.
Expected background: Good C++ programming skills. Experience with interaction design, graphics
programming and OpenGL preferable.
-----
10. Simulation of bone drilling dust and suction for virtual ear surgery
Ear surgery on the temporal bone typically involves the removal of mastoid bone using a surgical drill. This
process produces bone dust which must be removed using irrigation and suction. The University of
Melbournes virtual reality ear surgery simulator does not currently have the ability to simulate the production
and removal of bone dust during drilling. This limits the visual realism of the simulator. The aim of this project
is to develop a module for this simulator that will simulate the production of bone dust and its removal using a
virtual suction tool.
Expected background: Good C++ programming skills. Knowledge of basic physics and experience with GPU
programming and OpenGL preferable.
Expected background: Good C++ programming skills. Knowledge of basic physics and experience with GPU
programming and OpenGL preferable.
The project will be completed in collaboration with Dr Jason Lodge and Professor Gregor Kennedy
(Melbourne Centre for the Study of Higher Education & Learning Analytics Research Group).
Reading:
Dorado, A., Calic, J., & Izquierdo, E. (2004). A rule-based video annotation system. IEEE Transactions
on Circuits and Systems for Video Technology, 14(5), 622-633.
Firstly, what is the difference between a successful idea (gets into legislation) and a failed idea (never
legislated)? Secondly, what is the factual content of parliamentary Question Time, and has it changed
over the years? Both projects will make use of topic modelling and other text analytics tools.
Expected background: Strong Scripting and Python, basic probability & statistics, some experience with
text processing desirable, but not essential.
In this project, simulation models will be designed and developed to investigate the urban morphology of
informal settlements. Using selected favelas in Sao Paulo, Brazil as case studies, an agent-based
simulation model will be developed. Simulation experiments will be used to identify the emergent
interaction rules guiding the fragmented publicprivate interface and fuzzy boundaries within informal
settlements. The key research question to be answered is: What are the underlying characteristics that
allow favelas to adapt and reconfigure in responses to external stimuli?
This project will be completed in collaboration with A/Prof Justyna Karakiewicz (Faulty of Architecture,
Building and Planning).
Expected background:
This project will suit independent students with strong programming abilities, particularly in Java, and an
interest in artificial intelligence, agents and simulation.
Reading:
Barros, J. (2012). Exploring Urban Dynamics in Latin American Cities Using an Agent-Based Simulation
Approach. A.J. Heppenstall et al. (eds.), Agent-Based
Portugali, J. (2011). Cognition and the City (Understanding Complex Systems). Springer.
In this project, an evolutionary game theoretic framework will be used to investigate the evolution of
cooperation. Multi-player normal form games encapsulating cooperative dilemmas will guide the
investigation. Specifically, we will examine how "signalling" of intentions and stochastic rewards affect
evolutionary trajectories. The implications of varying levels of agent cognitive capacity will also be
explored.
This project will be completed in collaboration with Prof Yoshi Kashima (Melbourne School of
Psychology Sciences).
Expected background:
This project will suit independent students with strong programming abilities, an interest in game theory
and artificial intelligence.
Reading:
Rand, D. and Nowak, M. (2013). Human Cooperation. Trends in Cognitive Science 17(8):413-425.
De Weerd, Harmen, Rineke Verbrugge, and Bart Verheij. "How much does it help to know what she
knows you know? An agent-based simulation study." Artificial Intelligence 199 (2013): 67-92.
of tweets. This project explores to what extent different sample strategies conserve features (such as the
degree sequence or textual content) of the full stream.
Expected background: C programming and proficiency in algorithms.
Data storage, server replicas/mirrors, virtual machines, and so on can all be regarded as different types of
resources. Effective allocation of resources to geographically distributed clients becomes a key challenge
due to the large numbers of resources and clients, enormous potential operating costs, and multiple
constraints. Resource allocation plays an important role in modern computing such as content-distribution
networks (say deployed for fast Youtube video streaming) and cloud computing (think Amazon EC2).
Research over the last two decades has found that some commonly used in-memory data structures and
algorithms could be made dramatically more efficient by effective use of CPU cache. The complexity of
the interaction between cache and memory meant that some of these results were counter-intuitive, with
for example the observation that in some cases hash tables could be made more efficient by reducing table
size, even though this increased the collision rate. This research, however, was largely undertaken in the
context of single-core processors; the emergence of multi-core and multi-thread architectures has opened
new possibilities for further efficiency gains. This project will investigate how to design and configure
string data structures for current machines and applications, building on previous work on string hashing
and trie sorting.
The recent US election has shown the importance of being able to audit an election result. Foreign
hackers, buggy software, and ordinary cheating could all sway an election outcome derived from
computers. How could we check? Australian Senate votes are counted in an entirely automated process
although paper records exist, current law doesnt require any sort of audit to check that the paper votes
match the official outcome. We have some background ideas and open-source software to address this
problem, described at https://arxiv.org/abs/1610.00127
The project has two separate directions, suitable for two different students. One part is to improve the
user interface and offer an intuitive way for users to interact with the complex auditing process. The
other is more suitable for statisticians to extend the existing methods to make finer inferences based on
a better understanding of the data.
However, access to the source code of these pore network construction methods is frequently lacking, and
the omittance of subtle details in the implementation hinder reproduction of existing approaches.
Therefore, this project proposes to develop a fast pore network construction algorithm for 3D images of
real geomaterials (recently obtained from the Australian Synchrotron). The proposed stages of this inter-
disciplinary project are (1) a literature study on existing pore network construction methods, (2) an
implementation of one of these methods (possibly improved) in a langue of choice, (3) a case study using
the algorithm on the 3D images.
The student will gain in-depth knowledge of developing an end-to-end application in an inter-disciplinary
setting, building skills in software design and applied algorithms and data structures. The expected
outcomes of this project are to develop a source code for the algorithm that is potentially patentable (IP
ownership to be shared among students and supervisors involved) and/or publishable (in a co-authored
publication) in an academic journal.
Expected/preferred background
No prior knowledge of relevant physics is required. The algorithm may be implemented in a language of
choice, with a preference for a fast, object-oriented language (C++). A basic understanding of algorithms
and data structures (graphs and trees) is required.
Supervisors
The seemingly never-ending stream of password breaches seen over the past decade has highlighted the
dangers and prevalence of password reuse. Many websites already allow users who have entered their
password once to avoid having to do so again by storing a long-term authentication cookie in the user's
browser. This project will investigate whether passwords can be avoided altogether by using long-term
http:// authentication cookies instead, which effectively act as high-entry, phishing resistant passwords
that the user never has to remember.
You will implement a proof-of-concept authentication mechanism based on authentication cookies: when
a user creates a new account, rather than setting a password a high-entropy authentication cookie is set
instead.
To allow cookies, and thus accounts, to be used from multiple devices, you will also implement a browser
extension for syncing authentication cookies to the cloud (e.g. Google drive).
In this project you will implement attacks that attempt to steal sensitive information from systems built
with instruction-based scheduling, by exploiting the imprecision of IBS. You will carry out measurements
to determine how effective your attacks are and so to quantify the real effectiveness of IBS against skilled
adversaries.
Pedestrian monitoring is an important problem application domains such as public safety, retail and
building management. Recently, low cost sensors are becoming available to collect measurements about
the movements of pedestrians. However, the challenge remains to how to interpret the stream of data that
these sensors provide in order to detect higher-level events of interest, such as how people interact with
the building during normal activities or in an emergency. This project will investigate the use of data
mining techniques to (1) detect and summarise movement pedestrian patterns using low-cost commercial
sensors, and (2) correlate these movement patterns over time to identify events of interest. This project
will provide the opportunity to learn about data mining and machine learning techniques, and apply these
techniques to real-life data in an important infrastructure management problem.
47. Methods for efficient N-gram counting: State of the art and
Beyond
N-grams are fragments of text of length N words. Many technologies rely on N-gram counts or
their derivatives, N-gram probabilities, such as spell checking (how likely is the spelling of a
particular word given a particular context), or query auto completion (given some previously
entered words, what are the most likely next words). Some questions that arise are: what is the
state of the art of counting N-grams, and what are the opportunities to improve on these
methods? How can we make best use of additional term information (such as knowing that a
particular term is a singleton or that a term predominantly followed by a specific other the term
such as Saudi and Arabia) and detect and remove incomplete phrases? How can we cope
with misspellings and lexical variants? How can we automatically classify some N-grams as
accidental consequences of the scattering of words, and others as meaningful phrases? Can we
further apply these insights to the area of Language Modelling to create synthetic text
collections which adhere to certain properties?. Other project proposals, particularly in the area
of Information Retrieval, will be considered.
Expected background: a keen interest in search engine technologies and could lead to further
academic work in this area (academic publication and/or postgraduate studies) or employment
opportunities in the search engine industry. A suitable student would be proficient in C coding
and be keen to work independently.
Supervisors: Bodo Billerbeck bodob@microsoft.com and Matthias Petri
matthias.petri@unimelb.edu.au (External supervisor: David Hawking dahawkin@microsoft.com)
High throughput sequencing technologies produce massive volumes of genetic data, in the form
of billions of 'reads' consisting of short substrings randomly extracted from an input genome. A
common operation on this data is to attempt to assemble it into a continuous string representing
this genome, an operation that is complicated by biases and errors, using structures such as a de
Bruijn graph. However, a graph built from the reads can also be used to address other biological
questions, such as detection of irregularities in the genome, which may be indicative of disease
risk or of mechanisms for disease progression. We propose exploration of new applications of
genomic de Bruijn graphs, making use of data derived from sources such as cancer genomes.
Expected background: Undergraduate computer science with strength in algorithms,
C/C++ programming; good knowledge of theory and analysis preferred but not essential.
Knowledge of biology helpful but not necessary.
Supervisors: Jan Schroeder (WEHI), Justin Zobel
Programming languages today are either declarative, which make it easy for the programmer to
reason about the correctness of each part of the program separately, or imperative, which usually
produce more efficient programs because they allow programmers to use more efficient data
structures. Attempts to date to combine the two paradigms have generally sacrificed the ability to
reason declaratively. In this project we will develop a language to get the best of both worlds
without sacrificing the key characteristics of either. Depending on interest and ability, the
project could concentrate on anything from language implementation to proving properties of
type systems.
Supervisors: Peter Schachte and Lee Naish
This area examines how emotional driven modelling can inform the design, implementation and
adoption of smart fall detection technologies to support and enable older Australians to live
independently in the home and community, including those living in regional, rural and remote
settings. Research in this area applies theories from a range of disciplines that include: software
engineering, agent oriented modelling, information systems, HCI and psychology. The outcome
of this research will support both the elderly and health care professionals in the delivery of
patient services using mobile technologies.
Supervisors Dr Antonette Mendoza, Dr Tim Miller
The CIS Department has NAO robots that are used to demonstrate the wonders of Computer Science
and Information systems to high school students. These humanoid robots are fully programmable,
with vision, hearing, speech, facial recognition, motion, and so on. We need some clever students to
develop cool demonstration programs including: a day in the life of a robot, cooperative
interactions (e.g. Fist bumps, hand shakes, and so on), magic card tricks, performance art and so on.
You need excellent Python or C++ skills, creativity, and patience for these projects.
Supervisor:
A/Prof
Andrew
Turpin.
http://www.aldebaran.com/en
Expected background: Discrete maths, data structures and algorithms, compilers and program analysis
would be preferable.
The new MiniZinc software is a component based system for model analysis and transformation. We have
a number of interesting model analyses and transformations to investigate. A list can be found at
www.minizinc.org/projects.html. These projects will involve working with the NICTA optimization
research group, and designing and building components for the most widespread constraint programming
modelling language
Expected background: Discrete maths, data structures and algorithms, compilers and program analysis
would be preferable.
Supervisor: Peter Stuckey
Prerequisites Good knowledge of algorithms is required and experience in machine learning techniques
is preferable.
Prerequisites Good understanding of human computer interaction (HCI) is required and experience in
GUI development is preferable.
Expected background: Good programming skills. Knowledge of machine learning would be beneficial.
Experience with Python and GUI programming preferable.
62. Ear surgery simulation with Oculus Rift and Leap Motion
Head-mounted displays such as the Oculus Rift offer the opportunity to completely immerse oneself in a
virtual environment. Immersion has been shown to have pedagogical benefits in virtual reality based
training systems by fostering increased user engagement with the activity being simulated. This project
aims to integrate the Oculus Rift and Leap Motion technologies into an existing 3D virtual ear surgery
simulator with haptic feedback. The scope of the project includes the implementation of modules to
handle graphical rendering for the Oculus Rift, as well as the design of appropriate interactions within the
virtual operating room provided by the Oculus Rift.
Expected background: Good C++ programming skills. Experience with interaction design, graphics
programming and OpenGL preferable.
Contact: Sudanthi Wijiewickrema
63. Simulation of bone drilling dust and suction for virtual ear surgery
Ear surgery on the temporal bone typically involves the removal of mastoid bone using a surgical drill.
This process produces bone dust which must be removed using irrigation and suction. The University of
Melbournes virtual reality ear surgery simulator does not currently have the ability to simulate the
production and removal of bone dust during drilling. This limits the visual realism of the simulator. The
aim of this project is to develop a module for this simulator that will simulate the production of bone dust
and its removal using a virtual suction tool.
Expected background: Good C++ programming skills. Knowledge of basic physics and experience with
GPU programming and OpenGL preferable.
Expected background: Good C++ programming skills. Knowledge of basic physics and experience with
GPU programming and OpenGL preferable.
66. OpenGL rendering of an ear surgery simulator for GeForce graphics cards
The current version of the University of Melbourne VR ear surgery simulator requires expensive
professional-level graphics cards to achieve adequate graphical rendering frame rates, due to the use of
OpenGL features that are not well supported on consumer-level graphics cards (such as DisplayLists).
This limitation restricts the hardware on which the simulator can be operated, and limits the wider
acceptability of the simulator. This project aims to refactor the graphical rendering component of the
simulator to utilise modern OpenGL features (such as Vertex Buffer Objects) that will allow adequate
rendering speeds on consumer-level NVIDIA GeForce graphics cards.
Expected background: Good C++ programming skills. Experience with GPU programming and OpenGL
preferable.
Automated Planning involves finding a sequence of actions (i.e., a plan) that maps a given initial state of
the world to a goal state. Most planning solvers accept an input that describes succinctly the environment
to plan within as well as the problem itself: the Planning Domain Definition Language (PDDL). This
language consists of a set of actions that define the transition function, the predicates and objects defining
the variables, the initial valuations that describe the initial state, and the goal situation. As this language is
general, many different benchmarks and instances can be encoded (e.g., logistics, navigation, etc.) by
attaching different semantics to the actions.
Validating and understanding the quality of plans is an important task that assesses the correctness of the
PDDL encoding, as well as the usefulness of the solver solution. Surprisingly, there is little work that
focuses on developing a tool to visualize graphically the course of action from the initial configuration to
the goal. To do so, one needs to extend the actions and objects described in the problem with annotations,
binding images from a gallery to variables and transformations to actions that will automatically animate
the course of action.
The Lightweight Automated Planning Toolkit (http://lapkt.org) is a framework written in C++ and Python
that contains some of the most successful solvers, developed with clear interfaces for generic proposes.
This project will implement the visualization framework and extend the annotations needed for PDDL to
animate paths in the possible world states of a problem. Finally, the visualization will be set up as a web
service with tight integration into the Planning.Domains (http://planning.domains) project that exposes
the planning experience in a browser. It is a great opportunity for interns to learn about the practical
issues of state-of-the-art automated planning solvers, and contribute to a larger project used by
researchers world-wide.
Supervisors: Nir Lipovetzky, University of Melbourne, and Christian Muise, Massachusetts Institute
of Technology (MIT).
Primary Supervisor: Dr. Bahadorreza Ofoghi Secondary supervisor: A/Prof Karin Verspoor
70. Exploring CommViz for intelligence analysis [Research project]
CommViz,is a novel information visualisation solution to the requirements of analysts who are struggling
to gain insight into the patterns of communication in complex message datasets. The solution brings
together multiple dimensions of communication data including thematic (topic-based), time-based, and
individual-level (sender/recipient) patterns. The solution has been developed at the University of
Melbourne in collaboration with the Defence Science and Technology Organization of Australia.
In this project, we will adapt CommViz to a new data set of 17,000+ ISIS communications on Twitter,
and explore the characteristics of that data through the lens of information visualisation. We will also
apply social network analysis strategies to the data, to understand the connectivity in the network from a
quantitative perspective. We are interested in comparing the insights we are able to derive from the
dataset through the visualisation to the quantitative analysis.
Primary Supervisor: A/Prof Karin Verspoor Secondary supervisor: Dr. Bahadorreza Ofoghi
The student needs to demonstrate an understanding of the C# programming language, as well as PHP and
a good understanding of web system development concepts and technologies. Some knowledge of
ontologies is desirable.
[1] Ofoghi B, Lopez Campos GH, Verspoor K, Martin Sanchez FJ. (2014) BiomRKRS: A Biomarker
Retrieval and Knowledge Reasoning System. Health Information and Knowledge Management conf.
(HIKM 2013), Auckland, NZ.
Requirements: familiarity or willingness to learn about REST, JSON, and other web data exchange
protocols.
This project will explore connecting the two projects together can corpora available in Pubannotation be
made available in Alveo for analysis? If this turns out to be easy, we will also explore how the TextAE
visualisation currently available in Pubannotation could be adopted within Alveo.
Requirements: familiarity or willingness to learn about REST, JSON, and other web data exchange
protocols and models for text annotation on the semantic web.
We will analyse linguistic characteristics of previously collected MOOC essay responses using automated
NLP tools to assess the grammatical structure and well-formedness of the responses, linguistic
complexity such as use of prepositions, adjectives, and diversity of vocabulary. We will perform analysis
of the key terms in responses, and clustering of responses to identify themes, as well as considering the
overlap of terminology between the responses and the reading assignment. We will also analyse the peer
review graph, in order to consider the relationship of the peer feedback to the characteristics of the
reviewed writing, and potentially identify bias or other graph-based influences in that feedback. We will
apply machine learning methods to build a quantitative predictive model capable of detecting high-quality
responses.
75. Comparing methods for Entity Recognition and Mapping (in Biomedical
Literature) [Research project]
This project consists of finding protein/gene names (codes) in biomedical literature, and maps them to the
correct entry in a dictionary. The student will explore and develop mainly two methods: (1) A machine
learning based approach for entity recognition (see GNAT http://gnat.sourceforge.net/) VS (2) a
straightforward method, which consists of defining rules and patterns that may spot protein/gene names
from the text. Then, the student will perform computational experiments to evaluate the performance of
those methods on testing data (see: http://www.biocreative.org/tasks/biocreative-iii/gn/).
Qualifications
[1] Ricardo Baeza-Yates and Berthier Ribeiro-Neto. Modern Information Retrieval. Addison-Wesley
Publishing Company, USA, 2nd edition, 2010.
Preferred background: accessing public Internet APIs, NoSQL databases, text mining techniques.
Supervisor: Jianzhong Qi
Preferred background: accessing public Internet APIs, NoSQL databases, text mining techniques.
Supervisor: Jianzhong Qi
This project will be undertaken in collaboration with researchers from the Melbourne School of Design.
The outcome of this project will be the design, implementation and evaluation of the interactive EA.
There is also scope to extend this work to build a plug-in for commercial packages such as Grasshopper
and Rhino http://www.grasshopper3d.com
Expected background: strong programming skills in Python and GUI development; some experience with
Artificial Intelligence techniques and/or evolutionary computing
The topics to follow are most relevant for students who would like to
do a project in the areas of Information Systems or Human-
Computer Interaction.
79. Uber, Airbnb and Lyft: How Does the 'Sharing Economy' Transform
Service?
'Airbnb' and 'Uber' represent the forerunners of the so-called 'sharing economy' and have found novel
ways to utilize ICTs for facilitating the co-creation of value between service providers and customers. The
sharing economy is based on the fundamental premise that non-traditional economic actors (i.e. 'anyone')
can utilize their physical assets (i.e. car or apartment) to engage in service. By providing the necessary
infrastructure, Airbnb and Uber introduce service capabilities ranging from payment systems to
advertising. While the immediate economic benefits are obvious - Airbnb is currently valued at US$10bn
- the implications resulting from the socio-economic disruptions on society and established service sectors
remain ambiguous.
The importance of inter-organisational relationships in ICT supply chain management and outsourcing
has been widely recognised in the literature. However, factors affecting inter- personal relationships
between the people in both parties who are involved in crafting and managing these arrangements and the
impact on the successful outcomes are not well studied. This project is aimed at exploring how the
personal styles, values and behaviours of actors who are involved in managing inter-organisational
relationship affect the success of contracts between buyers and sellers of ICT services and products. The
research method can be negotiated with the supervisors. Options include a critical literature analysis to
refine a number of propositions, or analysis of existing data on a typology developed and collected by the
industry partner (The Cullen Group).
Useful readings:
Cullen, S. (2009) Team Chemistry: Are the individuals in the parties well suited?, Sourcing & Vendor
Relationships Executive Update, Cutter Consortium, Vol 10: No 6.
Cullen, S. (2012) A study of contract management styles in Australia 2011-12: The different values and behaviours
exhibited by the people who develop and manage contracts, Chartered Institute of Purchasing and Supply,
Melbourne.
Useful reading: Tamm, T., Seddon, P., Parkes, A. and Kurnia, S. (2014) A Model of Strategic IT Decision-Making
Processes, 25th Australasian Conference on Information Systems, 8th -10th Dec 2014, Auckland, New Zealand
Business Intelligence (BI) systems improve decision-making and optimise business processes.
Understanding how and why BI systems provide value and competitive advantage for organisations is
important. One useful perspective on this is the maturity of organizational BI infrastructure and
capabilities.
Maturity models may be used to assess the level of development of an organisations BI infrastructure
and capabilities. Two main types of maturity model are staged and contextual. Staged maturity models
comprise a simple and broad set of stages that build on each other in a linear fashion. Contextual maturity
models comprise a larger number of components that may each mature at different rates and interact with
each other.
This project will examine the BI maturity of an organisation using both a staged BI maturity model (from
the Data Warehousing Institute) and a contextual BI maturity model (from the PhD work of Ranko
Cosic). The project will identify the strengths and weaknesses of each approach, and provide the
organisation involved with useful information about their BI maturity.
We tend to use methods and theories from HCI (Human-Computer Interaction) and data from qualitative
field work to contribute to the design of new tracking technology and data visualisations. We are
particularly interested how tracking data gets used collaboratively, e.g., by sharing data with peers, or by
analysing data in collaboration with domain experts.
We tend to use methods and theories from HCI (Human-Computer Interaction) and data from qualitative
field work to contribute to the design of new technology.
This is a research project and will require students to write a minor thesis.
91. HoloLens
We aim to explore the combined possibilities of body tracking and holograms using
HoloLens and Kinect. The project will develop Windows 10 Universal app that
connects to a Unity application that provides body tracking using a Microsoft Kinect.
The project also expands to integrate other natural user interfaces with HoloLens,
such as gaze tracking and voice.
We
aim
to
develop
a
spatially
augmented
learning
environment
using
Microsoft
Kinect
and
projectors.
The
system
provides
an
innovative
way
for
instructor
and
student
to
facilitate
learning,
especially
in
the
area
of
physiotherapy
education.
We
propose
augmented-
feedback
via
live
annotations
(text
and
graphical)
on
moving
human
body.
The
project
will
develop
software
that
enables
annotation
on
the
scene
via
a
touch
screen
tablet.
Expected
background:
augmented
reality,
human
computer
interaction,
touch
screen
app
development.
Preferred
background:
computer
vision,
and
computer
graphics
The
eyes
offer
a
powerful
window
into
users'
cognitive
processes.
The
goal
of
this
project
is
to
design
an
optimal
methodology
for
evaluating
games
using
eye
tracking.
Though
there
is
some
understanding
of
how
to
evaluate
conventional
systems
using
eye
tracking
data,
little
is
known
about
how
it
can
be
useful
for
evaluating
games.
It
will
involve
recording
eye
tracking
data
of
novice
and
experienced
players
and
analyse
how
the
data
can
inform
the
game
design.
Expected
background:
strong
data
analysis
skills,
interest
in
games
and
in
conducting
user
studies.
Supervisor:
Eduardo
Velloso
This research project aims to test whether a positive correlation between technical coding skills and
performance exists in a professional consulting firm. This research will assess level of coding
understanding in newly employed graduates and monitor how this contributes to performance as a
consultant after one, two and three years. These outcomes will be measured in terms of performance
indicators used for assess salary rates and promotions and link into the firms employee performance
measurement system.
The study will conduct a literature review, design and apply the data collection instrument, analyse the
results and report findings. Data will be collected by survey and face to face interviews.
Preparing Information Security (InfoSec) Managers for the challenges they face in the workplace is one
of the key objectives of any InfoSec teaching subject. There are a number of textbooks in the area of
InfoSec management that focus on the fundamental concepts, principles and methods that govern the
discipline. Unfortunately, some of the key challenges facing practitioners such as security strategizing in
crises, building effective teams, and security decision-making are not covered in such textbooks and are
therefore not included in such curricula. This project requires the student to conduct a literature review of
innovative teaching strategies and initiatives that may be usefully included into an ISM teaching
curriculum. For example, innovative ways of teaching strategy using playing cards may be adapted for
Security Education Training and Awareness (SETA).
Expected background: Students attempting this project will benefit from having completed the
elective subject ISYS90070 Information Security Consulting.
Supervisors: Atif Ahmad Sean Maynard
106. Teleworking and (In)security
High-speed broadband networking over the last mile makes teleworking an increasingly attractive
prospect for organizations. A flexible work environment has a number of benefits to employees as well as
significant cost savings for employers. However, allowing employees to work outside organizational
premises introduces new security risks (e.g. employees accessing sensitive organizational information
over untrusted networks using unsupported devices). This project requires the student to explore the range
of novel security risks that may arise in teleworking. The primary source of research data will come from
literature, however the student is encouraged to arrange interviews with security experts as well.
Expected background: Students attempting this project will benefit from having completed the
elective subject ISYS90070 Information Security Consulting.
107. Security and mobility:What does Bring Your Own Device (BYOD)
mean for security?
The distinction between work and personal devices has all but disappeared as organizations embrace the
convenience and cost-effectiveness of BYOD. However, lack of control over employee devices poses
security challenges for organizations. Does information security policy apply to employee-owned
devices? What if an employees device is stolen or lost? How can organizational information be protected
in these circumstances? This project requires the student to identify the security challenges to
organizations arising from BYOD. The primary source of research data will come from literature,
however the student is encouraged to arrange interviews with security experts as well.
Expected background: Students attempting this project will benefit from having completed the
elective subject ISYS90070 Information Security Consulting.
Expected background: Students attempting this project will benefit from having completed the
elective subject ISYS90070 Information Security Consulting.
Expected background: Students attempting this project will benefit from having completed the
elective subject ISYS90070 Information Security Consulting.
Expected background: Students attempting this project will benefit from having completed the
elective subject ISYS90070 Information Security Consulting.
Expected background: Students attempting this project will benefit from having completed the
elective subject ISYS90070 Information Security Consulting.
Expected background: Students attempting this project will benefit from having completed the
elective subject ISYS90070 Information Security Consulting.
113. The DARK WEB A training ground for new types of security attacks
The layers of the Internet go far beyond the surface content that many can easily access in their daily
searches. The other content is that of the Deep Web, content that has not been indexed by traditional
search engines such as Google. The furthest corners of the Deep Web, segments known as the Dark Web,
contain content that has been intentionally concealed. The Dark Web may be used for legitimate purposes
as well as to conceal criminal or otherwise malicious activities. It is the exploitation of the Dark Web for
illegal practices that has garnered the interest of officials and policy makers. This project requires the
student to review security and related literature on the Dark Web with the aim of understanding the
implications for the evolution of security threats to organizations. The resulting thesis will contribute
towards understanding security threats and the high-level tactics used to attack organizations.
Expected background: Students attempting this project will benefit from having completed the
elective subject ISYS90070 Information Security Consulting.
Expected background: Students attempting this project will benefit from having completed the
elective subject ISYS90070 Information Security Consulting.
Expected background: Students attempting this project will benefit from having completed the
elective subject ISYS90070 Information Security Consulting.
One of the key factors in successful information security management is the effective compliance of
security policies and proper integration of people, process and technology. When it comes to the
issue of people, this effectiveness can be achieved through several mechanisms, one of which is the
security awareness training of employees. Although there has been some research on training people, a
key factor, i.e. age has not been considered. Related research in the area of risk and compliance
indicates that age is a key factor that influences perceptions and compliance-related behavior of
employees in organizations. This project requires the student to reviewing the training and education
literature to determine teaching strategies aimed at different age groups. The resulting thesis will
contribute towards research in SETA.
Expected background: Students attempting this project will benefit from having completed the
elective subject ISYS90070 Information Security Consulting.
Digital platforms are increasingly important for contemporary practices associated with commemorating
the deceased. Growing numbers of people are deploying the general-purpose resources of social
networking sites, websites and blogs to connect with others and share in the commemoration of their
loved ones, and commercial providers are in turn responding to these practices through the provision of a
specialist range of platforms and services. This project will investigate a digital memorial case-study.
The student will be encouraged to analysis the entwined commemorative practices, technology platforms
and social formations associated with the case-study.
Transient migrants are those who move to a new country for a temporary period (eg. expatriates and
international students). The information seeking strategies and behaviours of this group of migrants are
often evolving and changing. This project seeks to understand these online behaviours in order to provide
better online information and services to them.
Social media is increasingly being used as a platform for public health communication and education.
However, the effectiveness varies in different contexts. This project requires a student to be familiar with
content and text analysis with live public health sites. In particular, the site for this project will be the Being
Brendo Facebook and YouTube sites (with a focus on the context of the health of Men who have sex
with Men (MSM)). Therefore, the topic contains sexual health information and contexts. The project has
implications of understanding the veracity of social media platforms as a way for public health
communication. The outcome of the project will include publications in practitioner and academic outlets.
126. Analysing the Potential of Online Learning Tools and Social Media in
Educating Vulnerable Communities
Social media can also be used in the community sector to support the education and empowerment of
vulnerable communities. This project will involve the student working with Project Respect, an NGO that
works with women in the sex industry. It seeks to understand the potential of ICT solutions for this sector.
For information of Project Respect, see www.projectrespect.org.au
This project explores the complementary nature of emerging decision support tools and human cognitive
abilities as antecedents for effective, intelligent decision-making. The project will involve the design and
development of an automated decision-making tool that interprets health-care datasets and integrate
these with human cognitive elements for decision making using an interdisciplinary approach. The
acquired knowledge will be an important step forward with respect to sense-making for decision makers
in organizations.
Supervisors: Antonette Mendoza and Rachelle Bosua
This project will examine the quality criteria for Big Data sets that can be collected and aggregated from
social networks, sensory devices and organisational transactions. This data can be structured or
unstructured in nature. The project will identify and prioritise the big data quality/reliability criteria, and
provide the organisations involved with useful information about their big data projects.
This project will examine the factors that individuals consider when contributing their personal data to big
data service providers such as Google and Facebook and the potential privacy and ethical issues that
might arise from using such big data technologies.
The following projects are based in the The Microsoft Research Centre for Social
Natural User Interfaces (SocialNUI)
This project would suit a student with an interest in search engine technologies and could lead to further
academic work in this area (postgraduate studies) or employment opportunities in the search engine
industry.
Supervisor: Bodo Billerbeck bodob@microsoft.com Lab: Microsoft Centre for Social NUI at the
University of Melbourne