|
|
|
|
| With over 30 years of experience in the IT industry, Neil holds a Graduate Diploma in Technology Management and Master of Business Administration (Technology Management) from Deakin University. Neil is experienced in project management, business analysis, system design, configuration management, security analysis, system documentation, programming and testing. He has taught customer education courses and provided consulting services on Fujitsu's behalf in Victoria, New South Wales, ACT, Queensland, Northern Territory, Papua New Guinea, England, Illinois, California, Florida, Indonesia, Japan and Malaysia. He is also the holder of a Certificate in Software Quality from the Software Quality Association (SQA), an independent body affiliated with the Australian Organization for Quality (AOQ). Neil’s current role is as Principal Software Development Engineer for Fujitsu Australia Software Technology. Neil has managed a number of software development projects, some in house using Fujitsu staff and contractors, and some conducted entirely by independent contractors. Prior to his current role, he worked as a project manager in a large systems integration project for an Australian government client. He also provided customizations and associated education services for automated software testing of an advanced point-of-sale software solution for a global company, working in Australia, Illinois (USA) and London (UK). Earlier, he was the leader of a team responsible for the deployment, customization and technical support of the same software for a number of markets in the Asia-Pacific region, the Middle East and Africa. |
|
|
|
Date Reviewed |
|
|
1 - 10 of 54
reviews
|
|
|
|
|
|
|
|
A survey of security and privacy issues in ePassport protocols Avoine G., Beaujeant A., Hernandez-Castro J., Demay L., Teuwen P. ACM Computing Surveys 48(3): 1-37, 2016. Type: Article
The security measures of ePassports that conform to International Civil Aviation Organization (ICAO) specifications are covered in this paper....
|
Mar 25 2016 |
|
|
|
|
|
|
An integrated information system for snowmelt flood early-warning based on Internet of Things Fang S., Xu L., Zhu Y., Liu Y., Liu Z., Pei H., Yan J., Zhang H. Information Systems Frontiers 17(2): 321-335, 2015. Type: Article
This Chinese academic paper was first published in English in October 2013. The project under discussion appears to be a large, well-funded research project, so significant resources have apparently been invested in its production. It ...
|
Jan 19 2016 |
|
|
|
|
|
|
Information security strategies: towards an organizational multi-strategy perspective Ahmad A., Maynard S., Park S. Journal of Intelligent Manufacturing 25(2): 357-370, 2014. Type: Article
This academic paper, originally published in 2012, classifies organizational security strategies into nine basic approaches; provides a summary of prior work; and describes a study involving two focus groups in Korea. The authors are t...
|
Jul 16 2015 |
|
|
|
|
|
|
Securing business processes using security risk-oriented patterns Ahmed N., Matulevičius R. Computer Standards & Interfaces 36(4): 723-733, 2014. Type: Article
This well-written and clearly illustrated academic paper was first published in 2013. It covers the important area of security in the early design phase of software development....
|
Jun 18 2015 |
|
|
|
|
|
|
BulaPay: a novel web service based third-party payment system for e-commerce Huang X., Dai X., Liang W. Electronic Commerce Research 14(4): 611-633, 2014. Type: Article
First published in 2014, this paper describes a system of online payment to address the commercial niche occupied by PayPal and similar systems. It is reasonably well written and clearly illustrated, although it suffers from inadequate...
|
May 19 2015 |
|
|
|
|
|
|
Intelligent methods for cyber warfare Yager R., Reformat M., Alajlan N., Springer Publishing Company, Incorporated, Cham, Switzerland, 2014. 278 pp. Type: Book (978-3-319086-23-1)
This collection of papers describes current work in the cyber security area. It contains 12 academic papers, with detailed mathematical explanations of the algorithms offered. It is recommended reading for its narrow target audience, a...
|
Jan 28 2015 |
|
|
|
|
|
|
Adaptable, model-driven security engineering for SaaS cloud-based applications Almorsy M., Grundy J., Ibrahim A. Automated Software Engineering 21(2): 187-224, 2014. Type: Article
This paper presents a novel approach to security for applications that are run on a central server and supplied to multiple consuming organizations (tenants) as a service. The issues associated with the separation of data and security ...
|
Oct 29 2014 |
|
|
|
|
|
|
Cyberpatterns: unifying design patterns with security and attack patterns Blackwell C., Zhu H., Springer Publishing Company, Incorporated, New York, NY, 2014. 264 pp. Type: Book (978-3-319044-46-0)
This is a collection of academic papers. It falls toward the theory end of the theory-practice spectrum. Blackwell and Zhu are major contributors to the work as well as being joint editors. The papers, as a collection, provide a framew...
|
Sep 11 2014 |
|
|
|
|
|
|
The Office demon: Minos Dechaux J. Journal of Computer Virology and Hacking Techniques 9(3): 125-135, 2013. Type: Article
An instruction manual on the use of a program for injecting malicious payloads into Office documents, this paper is interesting but not useful to defenders of computer installations....
|
Jul 14 2014 |
|
|
|
|
|
|
IRIS: a robust information system against insider DoS-attacks Eikel M., Scheideler C. SPAA 2013 (Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures, Montreal, Canada, Jul 23-25, 2013) 119-129, 2013. Type: Proceedings
This academic paper presents the theory and use of an algorithm designed to detect denial-of-service (DoS) attacks by an adversary who has detailed knowledge of the system under attack....
|
Jan 20 2014 |
|
|
|
|
|
|
|
|
|
|
|