Charles Sturt University
Charles Sturt University

Dr Jason Howarth

Dr Jason Howarth

BInfoTech (Hons) Charles Sturt University, PhD

Jason Howarth has a degree in Information Technology from CSU where he graduated with the University Medal. He also has an Honours Degree and PhD, both from Charles Sturt University. Jason has been a lecturer in computing at CSU since 2003. He has also worked as a Course Director,  Associate Head of School and, more recently, as the Sub Dean of Transform Online Learning in the Faculty of Business, Justice and Behavioural Sciences.

Top of page


Teaching Responsibilities

  • ITC518 Principles of Programming using C#
  • ITC593 Network Security
  • ITC595 Information Security
  • ITC596 IT Risk Management

Top of page


Research Focus

  • Information security
  • Computer programming
  • Online education

Top of page


Selected Publications

  • Howarth, J., D'Alessandro, S., Johnson, L., & White, L. (2017). MOOCs to university: A consumer goal and marketing perspective. Journal of Marketing for Higher Education27(1), 144-158. https://doi.org/10.1080/08841241.2017.1306603
  • Howarth, J., D'Alessandro, S., Johnson, L. W., & White, L. (2016). Learner motivation for MOOC registration and the role of MOOCs as a university 'taster'. International Journal of Lifelong Education, 1-12. https://doi.org/10.1080/02601370.2015.1122667
  • Howarth, J., Altas, I., & Dalgarno, B. (2010). Information Flow Control Using the Java Virtual Machine Tool Interface (JVMTI). In IEEE International Conference on Availability, Reliability and Security (AReS) (pp. 689-695). USA: IEEE. https://doi.org/10.1109/ARES.2010.75
  • Altas, I., Messing, J., & Howarth, J. (2008). Implementing Microsoft PiL in Australian Schools. International Journal of Emerging Technologies in Learning, 63-68
  • Howarth, J., Tien, D., & Woodhouse, S. (2007). A management approach to securing geospatial information systems. In 4th ICITA 2007 (pp. 100-105). Sydney, Australia: Macquarie Scientific Publishing
  • White, P., Altas, I., Howarth, J., & Weckert, J. (2007). An internal enterprise framework for identity based management. In VPAC. B. Applebe (Ed.), APAC07: Advanced computing, grid applications and eResearch (pp. 1-10). Australia/New Zealand: APAC
  • Howarth, J., & Stow, E. (2007). A post-mortem JavaSpaces debugger. In S. Verlag (Ed.), ECC2007 (Vol. 2, pp. 553-562). UK: Springer
  • Buckley, D., Altas, I., & Howarth, J. (2007). A real-time intrusion detection system for the Windows environment. In J. Barroso (Ed.), IADIS 2007: WWW/Internet (Vol. 2, pp. 84-88). secretariat@iadis.org: IADIS Press
  • Messing, J., Altas, I., & Howarth, J. (2007). Partners in Learning in Australian Schools. In M. E. Auer (Ed.), Interactive Computer Aided Learning (pp. 1-10). Wien, Austria: International Association of Online Engineering
  • Roy, P., Altas, I., & Howarth, J. (2006). An implementation of a Remote Virtual Network Laboratory for Education Purposes. In R. Braun (Ed.), IEEE International Conference on IT Based Higher Education and Training (ITHET) (pp. 71-76). Sydney: IEEE. https://doi.org/10.1109/ITHET.2006.339746
  • Altas, I., Messing, J., & Howarth, J. (2006). I have not done maths for 20 years. How can I learn it now? In T. Terzioglu (Ed.), ICTM 3: Teaching of Mathematics at the undergraduate level United Kingdom: John Wiley & Sons
  • Lang, T., Howarth, J., & Altas, I. (2006). Uni-Access: A secure location aware communication system providing user privacy. In J. Lin (Ed.), ChinaCom '06: First International Conference (pp. 1-5). USA: IEEE. https://doi.org/10.1109/CHINACOM.2006.344861
  • Howarth, J., Messing, J., & Altas, I. (2004). Delivering online examinations: A case study. Turkish Online Journal of Distance Education5(3), 17-25

Top of page