Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Entire DC Network

Cloud Computing Data Breaches: A Socio-Technical Review Of Literature, David Kolevski, Katina Michael Oct 2015

Cloud Computing Data Breaches: A Socio-Technical Review Of Literature, David Kolevski, Katina Michael

Professor Katina Michael

As more and more personal, enterprise and government data, services and infrastructure moves to the cloud for storage and processing, the potential for data breaches increases. Already major corporations that have outsourced some of their IT requirements to the cloud have become victims of cyber attacks. Who is responsible and how to respond to these data breaches are just two pertinent questions facing cloud computing stakeholders who have entered an agreement on cloud services. This paper reviews literature in the domain of cloud computing data breaches using a socio-technical approach. Socio-technical theory encapsulates three major dimensions- the social, the technical, …


Panel 2- Regulation, Policy Recommendations And Responses, Jonathan Clough, Scott Mellis, Simon Brown, Graham Ingram, Alana Maurushat, Katina Michael, Jason Ryning Nov 2013

Panel 2- Regulation, Policy Recommendations And Responses, Jonathan Clough, Scott Mellis, Simon Brown, Graham Ingram, Alana Maurushat, Katina Michael, Jason Ryning

Professor Katina Michael

A roundtable to be held on cybercrime at ANU. Panel 1 to be on the changing nature of cybercrime: threat and trend update. Panel 2 on regulation, policy recommendations and responses. Panel 3 on technical measures to combat cybercrime. Panel 4 on the investigation of cybercrime and victimisation. Panel 2 to be keynoted by Keith Besgrove (DBCD) and chaired by Jonathan Clough.


Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael Aug 2012

Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael

Professor Katina Michael

This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.


Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael Apr 2012

Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael

Professor Katina Michael

Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.


Policy Implications Of Convergence In The New Security Environment: An Investigation Into The Symbiosis Between Risk Management And Intelligence, K. Michael, M. Loves Jul 2008

Policy Implications Of Convergence In The New Security Environment: An Investigation Into The Symbiosis Between Risk Management And Intelligence, K. Michael, M. Loves

Professor Katina Michael

For some time there has been a movement away from the traditional view of security as a purely functional activity which occurs within a single department of an agency or enterprise, to security being understood as a value added capability serving the overall mission of an organization. Enterprise risk management (ERM) is a process that is conducted by private companies for the purpose of due diligence informing key decision makers like chief information officers (CIOs). In the same light, the intelligence cycle is conducted by government organizations for the purpose of maintaining national security and informing policy makers like heads …


Social And Organizational Aspects Of Information Security Management, Katina Michael May 2008

Social And Organizational Aspects Of Information Security Management, Katina Michael

Professor Katina Michael

This paper aims to explore social and organizational aspects of information security management. The changing nature of security is revealed against the backdrop of globalization. It provides a thorough review of literature on the topics of cyberethics as related to information security and transnational law. The objective of the paper is to cover broadly socio-organizational themes providing for the purpose of definition and a basis for further research. It thus raises a number of pressing issues facing organizations today, and offers an overview discussion on potential solutions. The main outcome of the paper is in showing that successful security strategies …


Is Rfid Safe And Secure?, E. Latham, K. Michael Feb 2007

Is Rfid Safe And Secure?, E. Latham, K. Michael

Professor Katina Michael

No abstract provided.


The Social Implications Of Information Security Measures On Citizens And Business, K. Michael, M. G. Michael May 2006

The Social Implications Of Information Security Measures On Citizens And Business, K. Michael, M. G. Michael

Professor Katina Michael

The 2006 Workshop on the Social Implications of Information Security Measures on Citizens and Business was organised by the Research Network for a Secure Australia (RNSA) funded by the Australian Research Council. The Workshop will become a biennial event bringing together both researchers and practitioners in the fields relating to the national research priority entitled Safeguarding Australia.

In 2006, the workshop was held on the 29th May, at the Function Centre at the University of Wollongong between 8.30 am and 5.00 pm.

The Workshop was organised by RNSA members of the Centre for eBusiness Applications Research at the University of …