Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Burgess, Neil
Fujitsu Australia Software Tech
Sydney, Australia
 
   Featured Reviewer
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 

With over 30 years of experience in the IT industry, Neil holds a Graduate Diploma in Technology Management and Master of Business Administration (Technology Management) from Deakin University.

Neil is experienced in project management, business analysis, system design, configuration management, security analysis, system documentation, programming and testing.

He has taught customer education courses and provided consulting services on Fujitsu's behalf in Victoria, New South Wales, ACT, Queensland, Northern Territory, Papua New Guinea, England, Illinois, California, Florida, Indonesia, Japan and Malaysia. He is also the holder of a Certificate in Software Quality from the Software Quality Association (SQA), an independent body affiliated with the Australian Organization for Quality (AOQ).

Neil’s current role is as Principal Software Development Engineer for Fujitsu Australia Software Technology.

Neil has managed a number of software development projects, some in house using Fujitsu staff and contractors, and some conducted entirely by independent contractors.

Prior to his current role, he worked as a project manager in a large systems integration project for an Australian government client.

He also provided customizations and associated education services for automated software testing of an advanced point-of-sale software solution for a global company, working in Australia, Illinois (USA) and London (UK). Earlier, he was the leader of a team responsible for the deployment, customization and technical support of the same software for a number of markets in the Asia-Pacific region, the Middle East and Africa.

 
 
Options:
Date Reviewed  
 
1
- 10 of 54 reviews

   
  A survey of security and privacy issues in ePassport protocols
Avoine G., Beaujeant A., Hernandez-Castro J., Demay L., Teuwen P. ACM Computing Surveys 48(3): 1-37, 2016.  Type: Article

The security measures of ePassports that conform to International Civil Aviation Organization (ICAO) specifications are covered in this paper....

Mar 25 2016  
  An integrated information system for snowmelt flood early-warning based on Internet of Things
Fang S., Xu L., Zhu Y., Liu Y., Liu Z., Pei H., Yan J., Zhang H. Information Systems Frontiers 17(2): 321-335, 2015.  Type: Article

This Chinese academic paper was first published in English in October 2013. The project under discussion appears to be a large, well-funded research project, so significant resources have apparently been invested in its production. It ...

Jan 19 2016  
  Information security strategies: towards an organizational multi-strategy perspective
Ahmad A., Maynard S., Park S. Journal of Intelligent Manufacturing 25(2): 357-370, 2014.  Type: Article

This academic paper, originally published in 2012, classifies organizational security strategies into nine basic approaches; provides a summary of prior work; and describes a study involving two focus groups in Korea. The authors are t...

Jul 16 2015  
  Securing business processes using security risk-oriented patterns
Ahmed N., Matulevičius R. Computer Standards & Interfaces 36(4): 723-733, 2014.  Type: Article

This well-written and clearly illustrated academic paper was first published in 2013. It covers the important area of security in the early design phase of software development....

Jun 18 2015  
  BulaPay: a novel web service based third-party payment system for e-commerce
Huang X., Dai X., Liang W. Electronic Commerce Research 14(4): 611-633, 2014.  Type: Article

First published in 2014, this paper describes a system of online payment to address the commercial niche occupied by PayPal and similar systems. It is reasonably well written and clearly illustrated, although it suffers from inadequate...

May 19 2015  
  Intelligent methods for cyber warfare
Yager R., Reformat M., Alajlan N., Springer Publishing Company, Incorporated, Cham, Switzerland, 2014. 278 pp.  Type: Book (978-3-319086-23-1)

This collection of papers describes current work in the cyber security area. It contains 12 academic papers, with detailed mathematical explanations of the algorithms offered. It is recommended reading for its narrow target audience, a...

Jan 28 2015  
  Adaptable, model-driven security engineering for SaaS cloud-based applications
Almorsy M., Grundy J., Ibrahim A. Automated Software Engineering 21(2): 187-224, 2014.  Type: Article

This paper presents a novel approach to security for applications that are run on a central server and supplied to multiple consuming organizations (tenants) as a service. The issues associated with the separation of data and security ...

Oct 29 2014  
  Cyberpatterns: unifying design patterns with security and attack patterns
Blackwell C., Zhu H., Springer Publishing Company, Incorporated, New York, NY, 2014. 264 pp.  Type: Book (978-3-319044-46-0)

This is a collection of academic papers. It falls toward the theory end of the theory-practice spectrum. Blackwell and Zhu are major contributors to the work as well as being joint editors. The papers, as a collection, provide a framew...

Sep 11 2014  
  The Office demon: Minos
Dechaux J. Journal of Computer Virology and Hacking Techniques 9(3): 125-135, 2013.  Type: Article

An instruction manual on the use of a program for injecting malicious payloads into Office documents, this paper is interesting but not useful to defenders of computer installations....

Jul 14 2014  
  IRIS: a robust information system against insider DoS-attacks
Eikel M., Scheideler C.  SPAA 2013 (Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures, Montreal, Canada, Jul 23-25, 2013) 119-129, 2013.  Type: Proceedings

This academic paper presents the theory and use of an algorithm designed to detect denial-of-service (DoS) attacks by an adversary who has detailed knowledge of the system under attack....

Jan 20 2014  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy