29 May 2006 Social Implications of National Security 1 Social Implications of Information Security Measures on Citizens and Business Research Network for.

Slides:



Advertisements
Similar presentations
Steps towards E-Government in Syria
Advertisements

Hong Zhu School of Technology Safety Technology Brookes Interdisciplinary Research Theme.
(The Global Programme of Research On Climate Change Vulnerability, Impacts and Adaptation) Adaptation Knowledge Day V: Climate Change Adaptation Gaps BONN,
Paul Hubbard Portfolio Manager, Border and Transportation Security Information Sharing: Barriers and Solutions Sept 9 Workshop Summary Presented to Armed.
Simon Bronitt and James Stellios ANU College of Law, The Australian National University Regulating Telecommunications Interception and Access: A Seachange.
29 May 2006RNSA Workshop 1 Social Implication of National Security RNSA Workshop The risk of public data availability on critical infrastructure protection.
RNSA Social Implications Workshop 29 May Australia’s Anti-Terrorism Legislation: The National Security State and the Community Legal Sector Dr Mark.
1 E-Courts: Toward Information Protection Management Structures Presentation to the RNSA Workshop “Social Implications of Security Measures” University.
Organisational Factors and Australian IT Professionals’ Views of Wireless Network Vulnerability Assessments Keir Dyce Centre for Research in Computer Security.
1 Suzanne Lockhart M.A. Criminology thesis University of Melbourne, 2005 Current: PhD candidate University of S.A Identity Fraud – Displacement effects.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
Department of Computer Science City College of New York City College of New York Spring 2006 Copyright © 2006 by Abbe Mowshowitz CSc 375 SOCIAL ISSUES.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
Risk Management Strategies in an Uncertain World April 12-13, 2002 Objectives of Roundtable Agenda for Roundtable.
What is an Information System? Input of DataResourcesProcessing Data Data Control of System Performance Storage of Data Resources Output of InformationProducts.
The Social Context of the Security of Internet Banking By Supriya Singh RMIT University/SITCRC Paper.
9:00 Jeff Rogut AACS ED 9.15 Karim Sumar AACS Chairman 9.30 Michael Baker Michael Baker Consulting Australia Chris Thomas him! research & consulting.
Developing handheld technology The mNet Australia Project.
Creating Trust in Critical Network Infrastructures Canadian Case Study Michael Harrop.
FSCPC1 Privacy in the workplace Chris Connolly Director Financial Services Consumer Policy Centre.
Predicting the Unpredictable - The FCC and the Future of Telecommunications and the Internet David J. Farber Alfred Fitler Moore Professor of Telecommunication.
IEEE Systems Council VP Technical Operations Status; April 9, 2010 ieeesystemscouncil.org The SC has established a distinguished lecturer program. AESS.
11 – E-Commerce 1. What is Electronic Commerce? 2. What is a contract? 3. Elements of an enforceable contract 4. Standard terms of a contract 5. Form and.
Seeking Solutions to the Privacy Challenges of Emerging Technologies Blair Stewart, Assistant Privacy Commissioner Presentation to NZ Computer Society,
Hosted by the African Union Addis Ababa, Ethiopia June 19 & Focus on Energy Security Infrastructure Consortium for Africa.
Wellington Injury Forum and ICE Meeting 2012 Welcome and overview Ronan Lyons Chair, ICE.
Promoting Research and Application of Information Assurance and Cybersecurity 6 th Annual Security Summit May 20, 2009 Mark Weatherford, Chief Information.
Standards and Critical Network Infrastructures Michael Harrop TSACC GSC-8111 SOURCE:TSACC TITLE:Standards and Critical Network Infrastructures AGENDA ITEM:Joint.
AEMI - A CENTRE OF EXCELLENCE Michael Tarrant Disasters and Crisis: Dilemmas and Challenges for Boards.
Communicating with Vulnerable Populations
Evaluate e-business models BSBEBUS502A John Loftus - Welcome to the evolution of e-business models © John Loftus.
Government 2.0 in Australia Peter Alexander Manager, Online Services Branch Australian Government Information Management Office 1 AUSTRALIAN GOVERNMENT.
Copyright © 2009 International Water Association Welcome and global update of WSP implementation Tom Williams Programme Officer, International Water Association.
The European influence on privacy law and practice Nigel Waters, Pacific Privacy Consulting International Dimension of E-commerce and Cyberspace Regulation.
HOW PAKISTANI COMPANIES ARE DOING ONLINE/EBUSIN ESS. FUTURE OF E-BUSINESS YUSRA AMJAD 109.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Financial Services Privacy - the interaction of the privacy and financial services regulatory systems Chris Connolly Financial Services Consumer Policy.
Chapter Seven E-Business Risks. E-Business Model Evolution EDI EDI Web pages Web pages The online environment The online environment Distributed e-business.
International Governance Cluster Report Outcomes and Plans 2013/2014.
E-Science Projects and Security M. Angela Sasse & Mike Surridge.
AfL Network Meeting 6 th March Agenda 1.00Welcome, introductions 1.15AfL Leading Teachers initiative 1.25Alan Banks – the AfL Wiki 1.45Gloucestershire.
#FOLG15 The Future of Local Government May 2015 Municipal Association of Victoria.
ISPA Internet Week Regulatory Session The Regulation of Interception of Communications (RIC) Bill 12 September 2002 Tracy Cohen.
WALIS Marine Group Workshop Perth Convention Centre 12 March 2008.
Presentation to the Select Committee: Final Acts of the ITU Plenipotentiary Conference – Antalya, Turkey February 2011 Making South Africa a Global.
The World Bank Working for a World Free of Poverty.
The Annual ARIOPS Railway Occupational Health Conference 2008 “European Challenges, Opportunities and Threats to the UK Railway Industry” Monday 30th June.
Country case study: The Netherlands The views expressed in this paper are those of the authors and do not necessarily reflect the opinions of the ITU,
Greek Mobility Centres Network Launch Event, 5 November 2004 Dagmar M. Meyer MCFA Chair The Marie Curie Fellowship Association Dagmar M. Meyer Chair of.
Telecommunications regulatory developments and its new horizons Workshop contribution on “Broken concepts - the Australian communications legislative landscape”
AORAKI EHSAS CLUSTER. 9:30 - Across school collaboration – What makes a good leader? List 10 key elements of good leadership? 10:15 - Examining a leadership.
In-Service Teacher Training Assessment in IGCSE Business Studies 0450 Session 3: Mark schemes and Examiners Reports.
International Telecommunication Union ITU-T Workshop All Stars Access Network Geneva, 2-4 June 2004 Session 7: Regulatory issues, their status and resolution.
The Business Research Company Technology. Technology Industry Taxonomy TBRC Business Research. All Rights Reseserved 2 Technology Computer Hardware &
The National Smartcard Project Sue Devlin Bolton Metropolitan Borough Council Work Package 7 Leader.
Gerard Ibarra Published Papers and Articles G. Ibarra, J. Stracener, and S. Szygenda, “Transportation in the Critical Infrastructure: A Holistic Approach.
1 st International Marine Protected Areas Congress (IMPAC 1) 25 weeks to go!
Strategy To Action November 13, 2012 Steve Peters Steve Peters Arizona Telecommunications and Information Council.
+ Serendipity Early Learning Centre The Outdoor Environment Policy Review.
ALPA Information Technology Conference November 16-18, 2005.
The BCCEC, Cuba and the Way Forward. Current State of Affairs Change in US policies means changes for Cuba and entire Caribbean Opportunities for business.
Electronic counter surveillance.
International Journal of Sensor Networks and Data Communications
Information Technology Sector
Telecommunications and Networking
Privacy …refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected.
National Science Learning Network
Session 1.6a: PRESENTATION
LO1 - Know about aspects of cyber security
Table 2. Descriptive statistics and reliability coefficients
Presentation transcript:

29 May 2006 Social Implications of National Security 1 Social Implications of Information Security Measures on Citizens and Business Research Network for a Secure Australia- RNSA Centre for eBusiness Application Research- CeBAR

29 May 2006Social Implications of National Security2 Session 1- Privacy Chair: Katina Michael Welcome Katina Michael Opening Remarks Jennifer Seberry Transport Surveillance Marcus Wigan Former NSW Privacy Commissioner Chris Puplick

29 May 2006Social Implications of National Security3 Morning Tea

29 May 2006Social Implications of National Security4 Session 2- Technology Chair: Holly Tootell Identity Management Margaret Jackson Community Perceptions Suzanne Lockhart Internet Banking Supriya Singh Wireless Network Vulnerability Mary Barrett

29 May 2006Social Implications of National Security5 Lunch

29 May 2006Social Implications of National Security6 Session 3- Law Chair: Athol Yates Regulating Telecommunications Simon Bronitt Anti-terrorism Legislation Mark Rix Critical Social Theory Holly Tootell E-courts Mark Burdon

29 May 2006Social Implications of National Security7 Afternoon Tea

29 May 2006Social Implications of National Security8 Session 4- Critical Infrastructure Chair: M.G. Michael Public Data Availability Roba Abbas Perceived Risk Peter Croll Critical Reflexive Approach Lucy Resnyansky Security and Australian Universities Lauren May

29 May 2006Social Implications of National Security9 Closing Remarks- Co-editor MG Michael Outcomes: Outcomes: –265 pp proceedings –Select paper publication: Prometheus Prometheus Journal of Applied and Theoretical Electronic Commerce Research (JTAER) Journal of Applied and Theoretical Electronic Commerce Research (JTAER) –Encourage membership to RNSA –Future collaborative links –Discourse: a way forward