Monday 14 February 2022
| AEDT | |
| Chairs | David Abramson, Rachel Cardell-Oliver |
| 12:00 – 13:00 | ACSW Opening Plenary Session
Opening & Welcome |
| 13:00 – 13:30 | Break |
| 1330 – 1730 | Australasian Computing Education Conference (ACE 2022) |
View Session Details
| Chair | Paul Denny & Judithe Sheard |
| 1330 –1350 | Opening ACE 2022 |
| 1350 – 1410 | A Bibliometrics Analysis of Australian Computing Education Conference Proceedings Alireza Ahadi, Luke Mathieson |
| 1410 – 1430 | The Robots Are Coming: Exploring the Implications of OpenAI Codex on Introductory Programming James Finnie-Ansley, Paul Denny, Brett Becker, Andrew Luxton-Reilly, James Prather |
| 1430 –1450 | Break |
| 1450 – 1510 | Online Examinations in a Large Australian CS1 Course Bryn Jeffries, Timothy Baldwin, Marion Zalk |
| 1510 – 1530 | Online Assessment and COVID: Opportunities and Challenges Simon, Meena Jha, Sander J.J. Leemans, Regina Berretta, Ayse Aysin Bilgin, Lakmali Jayarathna, Judy Sheard |
| 1530–1630 | Break |
| 1630 – 1650 | Teaching Code Quality in High School Programming Courses – Understanding Teachers’ Needs Diana Kirk, Tyne Crow, Andrew Luxton-Reilly, Ewan Tempero |
| 1650 – 1710 | CodeProcess Charts: Visualizing the Process of Writing Code Raj Shrestha, Juho Leinonen, Arto Hellas, Petri Ihantola, John Edwards |
| 1710 – 1730 | A case for co-construction with teachers in curricular reform: Introducing computer science in primary school Laila El-Hamamsy, Barbara Bruno, Helena Kovacs, Morgane Chevalier, Jessica Dehler Zufferey, Francesco Mondada |
Close Session Details
| 1330 -1530 | Australasian Information Security Conference (AISC 2022) |
View Session Details
| Chair | Jason Xue |
| 1330 – 1340 | Opening Remarks |
| 1340 – 1400 | Dissecting Malware in the Wild. Hamish Spencer, Wei Wang, Ruoxi Sun, Minhui Xue |
| 1400 – 1420 | Statically Detecting Adversarial Malware through Randomised Chaining. Matthew Crawford, Wei Wang, Ruoxi Sun, Minhui Xue |
| 1420 – 1440 | A CNN Based Encrypted Network Traffic Classifier. Zulu Okonkwo, Ernest Foo, Qinyi Li, Zhe Hou |
| 1440 – 1450 | Break |
| Chair | Huaming Chen |
| 1450 – 1510 | Blockchain Applications in Smart Grid. Ziqiang Xu, Ahmad Salehi Shahraki, Carsten Rudolph |
| 1510 – 1530 | Privacy of Fitness Applications and Consent Management in Blockchain. May Alhajri, Ahmad Salehi Shahraki, Carsten Rudolph |
Close Session Details
| 1330 – 1530 | Australasian Symposium on Parallel and Distributed Computing (AusPDC 2022) |
View Session Details
| Chair | Adel, N Toosi |
| 1330-1345 | Welcome and Introduction |
| 1345- 1415 | Towards Higher-Level Abstractions for Quantum Computing Adrian Cobb, Jean-Guy Schneider, Kevin Lee |
| 1415 – 1445 | Deep Reinforcement Learning with Pre-training for Time-efficient Training of Automatic Speech Recognition Thejan Rajapakshe, Rajib Rana, Sara Khalifa, Jiajun Liu, Björn Schuller |
| 1445 – 1515 | Opportunistic Uploading: Latency Aware Data Deduplication In Peer-to-Peer Push/Mesh Networks Thomas Passmore, Zhiyi Huang |
| 1515 – 1530 | Closing remarks and discussion |
Close Session Details
| 1330 – 1730 | Australasian Conference on Health Informatics and Knowledge Management (HIKM 2022) |
View Session Details
| Chair | Kerryn Butler-Henderson |
| 13:30 – 14:00 | Identifying a Minimum Dataset for Enhancing Disaster Healthcare Information Exchange Reem Abbas, Tony Norris and Dave Parry |
| 14:00 – 14:25 | Planning digital health interventions: Digital collection of patient-reported measures from older adults Gayanika M. Hettiarachchi Senarath, Pari Delir Haghighi, Denise O’Connor, David Snowdon, Velandai Srikanth |
| 14:25 – 14:55 | Design features and health outcomes of mHealth applications for patient self-management of asthma: a systematic review Ting Song, Ping Yu, Zhenyu Zhang |
| 14:55 – 15:20 | Informing App Design to Reduce Self-Management Challenges Identified for Chronic Disease Selena Firmin, Sadaf Khurram |
| 15:20 – 16:30 | Break |
| 1630 – 1730 | HIKM Workshop Artificial Intelligence in Knowledge Management and Health Information – Ethical concerns of AI. Chair Klaus Veil |
Close Session Details
| 15:30 – 16:30 | Poster Session |
| Alistair Moffat Hall | Lin Padgham Hall | John Grundy Hall |
| Motif-Enhanced Graph Neural Networks for Recommender Systems Yuqi Zhang, Jian Yu and Mo Nguyen |
A framework for retaining women in Information Technology studies Jane Joseph |
PIETS: Parallelised Irregularity Encoders for Forecasting with Heterogeneous Time-Series Futoon Abu Shaqra, Hao Xue, Yongli Ren and Flora D. Salim |
| “We trust Facebook, we trust mobile apps, but we don’t trust our own healthcare systems like MyHealthRecord”: Preparing users for healthcare cybersecurity attacks. Wendy Burke, Andrew Stranieri, Taiwo Oseni, Iqbal Gondal and Charlynn Miller |
A Pilot Study of Using Facial Electromyography to measure Avatar Realism and Uncanniness Perceptions through the lens of Gender(Sex)-Based Differences Jacqueline Bailey and Karen Blackmore |
Corona: Code Reference Autonomous Assistance Muftah Afrizal Pangestu and Simon |
| Automating text processing in General Practice: Opportunities and challenges for natural language processing and user experience design. David Fraile Navarro, A. Baki Kocaballi, Mark Dras and Shlomo Berkovsky |
ConCQeng: an Engine for Cost-Effective Context Provisioning in Context Management Platforms Kanaka Sai Jagarlamudi, Arkady Zaslavsky, Seng Loke, Alireza Hassani and Alexey Medvedev |
Enhancing Mass casualty incident training with Virtual Reality and Artificial Intelligence Peng Xia, Ji Ruan and Dave Parry |
| Customization of Order Alerts through Filters: Impact on Pharmacists’ Override Rate and Perceptions of Alert Fatigue Daniel Chan |
Defending Blockchain from Malicious Contracts Using Anomaly Detection Duy Huynh, Son Hoang Dau and Xiaodong Li |