Charles Sturt University
Charles Sturt University

Jason Howarth

 Jason Howarth

BInfoTech (Hons) Charles Sturt University

Profile

Jason Howarth has a degree in Information Technology from CSU where he graduated with the University Medal.  He has been a lecturer in the School of Computing and Mathematics at CSU, and more recently, a Course Director in the Faculty of Business, Justice and Behavioural Sciences.

Jason completed his Honours Degree with research into the debugging of distributed systems written in Java.  His other research interests include information security, cryptography, computer viruses and MOOCs. He is currently completing a PhD on the use of MOOCs as a marketing tool in higher education.

Top of page


Teaching Responsibilities

  • ITC593  Network Security
  • ITC596 IT Risk Management
  • ITC519 Web Information systems
  • ITC593 Network Security
  • ITC518 Principles of Programming using C#
  • ITC543 Enterprise Design Patterns
  • ITC595 Information Security

Top of page


Research

Research Focus
  • Distributed programming
  • Cryptography
  • Information security
  • Enforcement of security policy
Research Project Supervision
  • Information security, cryptography, security policy, programming

Top of page


Selected Publications

  • Howarth, J. , Messing, J., & Altas, I. (2004). Delivering online examinations: A case study.
  • Turkish Online Journal of Distance Education, 5(3).
  • Altas, I. , Messing, J., & Howarth, J. (2006). I haven't done maths for 20 years. How can I learn it now? Proceedings of the 3 rd International Conference on the Teaching of Mathematics at Undergraduate Level, Istanbul , Turkey .
  • Roy , P., Altas, I. , & Howarth, J. (2006). An implementation of a Remote Virtual Network
  • Laboratory for Education Purposes. Proceedings of the 7 th International Conference on
  • Information Technology Based Higher Education and Training, 162-167.
  • Lang, T., Howarth, J., & Altas, I. (2006). Uni-Access: A secure location aware communication
  • system providing user privacy. Conference Proceedings on Communications and Networking in China, ChinaCom 2006
  • Buckley D., Altas I. , & Howarth, J. (2007). A real-time intrusion detection system for the Windows environment. Proceedings of the IADIS International Conference WWW / Internet , 2 , 84-88.
  • Howarth, J. & Stow , E. (2007) A post-mortem Javaspaces debugger. Proceedings of the ECC 2007 (in press).
  • Messing, J., Altas, I. , & Howarth, J. (2007) Partners in learning in Australian schools. Conference Proceedings ICL 2007, Kassel University Press .
  • White, P., Altas, I. , Howarth, J., & Weckert J. (2007). An internal enterprise framework for identity based management. APAC 07 (in press).
  • Woodhouse, S., Howarth, J., & Tien, D. (2007). A management approach to securing geospatial information systems. Paper presented at the ICITA 2007 IEEE 4th International Conference on Information Technology and Applications, Heilongjiang University , Harbin China , 15th - 18th January 2007.

Top of page