Photo of  Jason Howarth Jason Howarth

BInfoTech (Hons) CSturt

Jason Howarth has a degree in Information Technology from CSU, where he graduated with the University Medal. Since then, he has been a lecturer in the School of Information Studies at CSU, and more recently, in the School of Computing and Mathematics on the Wagga Wagga campus.

Jason completed his Honours degree with research into the debugging of distributed systems written in Java. His other research interests include information security, cryptography and computer viruses.

Jason teaches a broad range of subjects within the School of Computing and Mathematics, including network security, C# programming, and IT risk management.

Top of page


Teaching Responsibilities

  • ITC593  Network Security
  • ITC596 IT Risk Management
  • ITC519 Web Information systems
  • ITC593 Network Security
  • ITC518 Principles of Programming using C#
  • ITC543 Enterprise Design Patterns
  • ITC595 Information Security

Top of page


Research

Research Focus
  • Distributed programming
  • Cryptography
  • Information security
  • Enforcement of security policy
Research Project Supervision
  • Information security, cryptography, security policy, programming

Top of page


Selected Publications

  • Howarth, J. , Messing, J., & Altas, I. (2004). Delivering online examinations: A case study.
  • Turkish Online Journal of Distance Education, 5(3).
  • Altas, I. , Messing, J., & Howarth, J. (2006). I haven't done maths for 20 years. How can I learn it now? Proceedings of the 3 rd International Conference on the Teaching of Mathematics at Undergraduate Level, Istanbul , Turkey .
  • Roy , P., Altas, I. , & Howarth, J. (2006). An implementation of a Remote Virtual Network
  • Laboratory for Education Purposes. Proceedings of the 7 th International Conference on
  • Information Technology Based Higher Education and Training, 162-167.
  • Lang, T., Howarth, J., & Altas, I. (2006). Uni-Access: A secure location aware communication
  • system providing user privacy. Conference Proceedings on Communications and Networking in China, ChinaCom 2006
  • Buckley D., Altas I. , & Howarth, J. (2007). A real-time intrusion detection system for the Windows environment. Proceedings of the IADIS International Conference WWW / Internet , 2 , 84-88.
  • Howarth, J. & Stow , E. (2007) A post-mortem Javaspaces debugger. Proceedings of the ECC 2007 (in press).
  • Messing, J., Altas, I. , & Howarth, J. (2007) Partners in learning in Australian schools. Conference Proceedings ICL 2007, Kassel University Press .
  • White, P., Altas, I. , Howarth, J., & Weckert J. (2007). An internal enterprise framework for identity based management. APAC 07 (in press).
  • Woodhouse, S., Howarth, J., & Tien, D. (2007). A management approach to securing geospatial information systems. Paper presented at the ICITA 2007 IEEE 4th International Conference on Information Technology and Applications, Heilongjiang University , Harbin China , 15th - 18th January 2007.

Top of page