The Social Implications of

Information Security Measures on Citizens and Business

 

The First Workshop on Social Implications of National Security

University of Wollongong, NSW, Australia

29 May 2006

 

ISBN Details

Editors:  Michael, K. & Michael, M.G.
Series:  Research Network for a Secure Australia (RNSA)
Publisher:  University of Wollongong, Centre for eBusiness Application Research (CeBAR) (School of Information Technology and Computer Science)
Publication Year:  2006
Format:  Book
ISBN-13:  978-1-74128-118-7
ISBN-10:  1-74128-118-0

 

How do I reference a paper from the proceedings?

 

Wigan, M. and Clarke, R. (2006), “Social impacts of transport surveillance”, in K. Michael and M.G. Michael (eds), The Social Implications of Information Security Measures on Citizens and Business, University of Wollongong, NSW, Australia.

 

Workshop Presentations

Workshop Overview

 

Workshop Welcome

Katina Michael

Centre for eBusiness Application Research (CeBAR)

 

Opening Remarks

Jennifer Seberry

Centre for Computer Security, University of Wollongong

 

National ID Card

Chris Puplick

Former Privacy Commissioner of NSW

 

Presenter Biographies

 

1        The proliferation of identification techniques for citizens throughout the ages   

Katina Michael and M.G. Michael

School of Information Technology and Computer Science, University of Wollongong

 

2        Social impacts of transport surveillance                                                                           

Marcus Wigan and Roger Clarke

Oxford Systematics, Xamax Consultancy Pty Ltd

 

3        Identity management: is an identity card the solution for Australia?

Margaret Jackson and Julian Ligertwood

School of Accounting and Law, RMIT University

 

4        Community perceptions of biometric technology                                      

Suzanne Lockhart

Department of Criminology, University of Melbourne

 

5        The social context of the security of Internet banking                               

Supriya Singh

Royal Melbourne Institute of Technology /Smart Internet Technology Cooperative Research Centre (SITCRC)

 

6        The importance of utilising electronic identification for total farm management in Australia 

Adam Trevarthen

School of Information Technology and Computer Science, University of Wollongong

 

7        Using scenario planning in the evaluation of information security applications

Laura Perusco

School of Information Technology and Computer Science, University of Wollongong

 

8        Regulating telecommunications interception & access: a seachange in surveillance laws     

Simon Bronitt and James Stellios

ANU College of Law, The Australian National University

 

9       The application of critical social theory to national security research

Holly Tootell
School of Information Technology and Computer Science, University of Wollongong

 

10      Australia’s anti-terrorism legislation: the national security state and the community legal sector      

Mark Rix
Graduate School of Business, University of Wollongong

 

11      E-courts: toward information protection management structures

Lauren May and Mark Burdon

Information Security Institute, Queensland University of Technology

 

12      Citizen participation platform guaranteeing freedom of speech                  

E. Pérez, A. Gómez, S. Sánchez, J.D. Carracedo, J. Carracedo, C. González, J. Moreno

Departamento de Ingeniería y Arquitecturas Telemáticas de la Universidad Politécnica de Madrid & Observatorio para la Democracia Digital y los Derechos de la Ciudadanía en Internet

 

13      The risk of public data availability on critical infrastructure protection

Roba Abbas

School of Information Technology and Computer Science, University of Wollongong

 

14      Perceived risk: human factors affecting ICT of critical infrastructure

Peter R Croll and Hasmukh Morarji

Faculty of Information Technology, QUT, Brisbane, Australia

 

15      Conceptualisation of terrorism in modelling tools: critical reflexive approach

Lucy Resnyansky

Defence Science and Technology Organisation

 

16      Towards protecting critical infrastructure - the role of information security management in Australian universities

Lauren May and Tim Lane
Information Security Institute, Queensland University of Technology

 

17      Organisational factors and Australian IT professionals’ views of wireless network vulnerability assessments

Keir Dyce and Mary Barrett
Centre for Computer Security Research, School of Management and Marketing, University of Wollongong

 

Workshop Close

MG Michael

Centre for eBusiness Application Research (CeBAR)