Trish Williams

Orcid: 0000-0003-3479-3523

Affiliations:
  • Flinders University, Adelaide, Australia


According to our database1, Trish Williams authored at least 38 papers between 2001 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
A Novel Privacy Preservation and Quantification Methodology for Implementing Home-Care-Oriented Movement Analysis Systems.
Sensors, 2022

Student Experience and Its Relationship with Campus Mental Well-Being.
Proceedings of the Advances in Informatics, Management and Technology in Healthcare, 2022

2020
Points of Failure: A Systematic Review of information-flow using Medication Use Cases.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

2019
Teaching as a Collaborative Practice: Reframing Security Practitioners as Navigators.
Trans. Edutainment, 2019

2018
An Australian Longitudinal Study Into Remnant Data Recovered From Second-Hand Memory Cards.
Int. J. Inf. Secur. Priv., 2018

Cybersecurity and medical devices: Are the ISO/IEC 80001-2-2 technical controls up to the challenge?
Comput. Stand. Interfaces, 2018

2017
Health Smart Homes: New Challenges.
Proceedings of the MEDINFO 2017: Precision Healthcare through Informatics, 2017

Consumer Perspectives on MyHealth Record: A Review.
Proceedings of the Integrating and Connecting Care, 2017

The Socio-Technical Impact on Security of the Healthcare Internet of Things in the Use of Personal Monitoring Devices (PMDs).
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017

Security of ePrescriptions: data in transit comparison using existing and mobile device services.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

Vulnerabilities associated with wi-fi protected setup in a medical environment.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

2016
Always connected: The security challenges of the healthcare Internet of Things.
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

I know what you did last summer... an investigation into remnant data on USB storage devices sold in Australia in 2015.
Proceedings of the Australasian Computer Science Week Multiconference, 2016

2014
Interpreting international governance standards for health IT use within general medical practice.
Proceedings of the Investing in E-Health: People, Knowledge and Technology for a Healthy Future, 2014

2013
Information security governance: A risk assessment approach to health information systems protection.
Proceedings of the Health Information Governance in a Digital Environment, 2013

It will never happen to us: The likelihood and impact of privacy breaches on health data in Australia.
Proceedings of the Health Informatics: Digital Health Service Delivery - The Future Is Now!, 2013

Creating context: Making sense of geo-location and social media data for health.
Proceedings of the Health Informatics: Digital Health Service Delivery - The Future Is Now!, 2013

2011
Looking at clouds from both sides: The advantages and disadvantages of placing personal narratives in the cloud.
Inf. Secur. Tech. Rep., 2011

Is the Biggest Security Threat to Medical Information Simply a Lack of Understanding?
Proceedings of the Health Informatics: The Transformative Power of Innovation, 2011

2010
Medical Information Security: Is it all too hard?
Proceedings of the 2010 International Conference on Security & Management, 2010

An Information Security Governance Encounter for Australian Primary Care Health Providers.
Proceedings of the 2010 International Conference on Security & Management, 2010

2008
In a 'trusting' environment, everyone is responsible for information security.
Inf. Secur. Tech. Rep., 2008

A practical application of CMM to medical security capability.
Inf. Manag. Comput. Secur., 2008

When trust defies common security sense.
Health Informatics J., 2008

How addressing implementation issues can assist in medical information security governance.
Proceedings of the 2nd International Conference on Human Aspects of Information Security and Assurance, 2008

Is There an Ideal Forensic Process?.
Proceedings of the 2008 International Conference on Security & Management, 2008

2007
Information Governance: A Model for Security in Medical Practice.
J. Digit. Forensics Secur. Law, 2007

Medical data security: Are you informed or afraid?
Int. J. Inf. Comput. Secur., 2007

Wireless Rx - Risk Assessment and Recommendations for Securing a Wireless Network in a Medical Practice.
Proceedings of the 2007 International Conference on Security & Management, 2007

A Holistic Perspective on Models for Medical Information Security.
Proceedings of the 2007 International Conference on Security & Management, 2007

The Issues Involved in Securing Electronic Health Information in Transit.
Proceedings of the 2007 International Conference on Security & Management, 2007

2006
Security Immunization Using Basic Countermeasures.
Proceedings of the 2006 International Conference on Security & Management, 2006

The Role of Standards in Medical Information Security: An Opportunity for Improvement.
Proceedings of the 2006 International Conference on Security & Management, 2006

2005
Where are the Policies for PDA Usage in the Australian Healthcare Environment?
Proceedings of the 4th European Conference on Information Warfare and Security, 2005

The underestimation of threats to patient data in clinical practice.
Proceedings of the 3rd Australian Information Security Management Conference, 2005

Physician secure thyself.
Proceedings of the 3rd Australian Information Security Management Conference, 2005

2004
Securing PDAs in the Healthcare Environment.
Proceedings of the 2nd Australian Information Security Management Conference, 2004

2001
Is the Internet an Integral Part of General Practice in Australia?
Proceedings of the MEDINFO 2001, 2001


  Loading...