Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (5)
- Computer Sciences (4)
- Physical Sciences and Mathematics (4)
- Engineering (3)
- Business (2)
-
- Computer Law (2)
- Criminology (2)
- Internet Law (2)
- Law (2)
- Law and Society (2)
- Other Engineering (2)
- Public Affairs, Public Policy and Public Administration (2)
- Public Policy (2)
- Science and Technology Studies (2)
- Social Policy (2)
- Sociology (2)
- Technology and Innovation (2)
- Education (1)
- Political Science (1)
Articles 1 - 8 of 8
Full-Text Articles in Entire DC Network
Cloud Computing Data Breaches: A Socio-Technical Review Of Literature, David Kolevski, Katina Michael
Cloud Computing Data Breaches: A Socio-Technical Review Of Literature, David Kolevski, Katina Michael
Professor Katina Michael
As more and more personal, enterprise and government data, services and infrastructure moves to the cloud for storage and processing, the potential for data breaches increases. Already major corporations that have outsourced some of their IT requirements to the cloud have become victims of cyber attacks. Who is responsible and how to respond to these data breaches are just two pertinent questions facing cloud computing stakeholders who have entered an agreement on cloud services. This paper reviews literature in the domain of cloud computing data breaches using a socio-technical approach. Socio-technical theory encapsulates three major dimensions- the social, the technical, …
Panel 2- Regulation, Policy Recommendations And Responses, Jonathan Clough, Scott Mellis, Simon Brown, Graham Ingram, Alana Maurushat, Katina Michael, Jason Ryning
Panel 2- Regulation, Policy Recommendations And Responses, Jonathan Clough, Scott Mellis, Simon Brown, Graham Ingram, Alana Maurushat, Katina Michael, Jason Ryning
Professor Katina Michael
A roundtable to be held on cybercrime at ANU. Panel 1 to be on the changing nature of cybercrime: threat and trend update. Panel 2 on regulation, policy recommendations and responses. Panel 3 on technical measures to combat cybercrime. Panel 4 on the investigation of cybercrime and victimisation. Panel 2 to be keynoted by Keith Besgrove (DBCD) and chaired by Jonathan Clough.
Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael
Professor Katina Michael
This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.
Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael
Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael
Professor Katina Michael
Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.
Policy Implications Of Convergence In The New Security Environment: An Investigation Into The Symbiosis Between Risk Management And Intelligence, K. Michael, M. Loves
Policy Implications Of Convergence In The New Security Environment: An Investigation Into The Symbiosis Between Risk Management And Intelligence, K. Michael, M. Loves
Professor Katina Michael
For some time there has been a movement away from the traditional view of security as a purely functional activity which occurs within a single department of an agency or enterprise, to security being understood as a value added capability serving the overall mission of an organization. Enterprise risk management (ERM) is a process that is conducted by private companies for the purpose of due diligence informing key decision makers like chief information officers (CIOs). In the same light, the intelligence cycle is conducted by government organizations for the purpose of maintaining national security and informing policy makers like heads …
Social And Organizational Aspects Of Information Security Management, Katina Michael
Social And Organizational Aspects Of Information Security Management, Katina Michael
Professor Katina Michael
This paper aims to explore social and organizational aspects of information security management. The changing nature of security is revealed against the backdrop of globalization. It provides a thorough review of literature on the topics of cyberethics as related to information security and transnational law. The objective of the paper is to cover broadly socio-organizational themes providing for the purpose of definition and a basis for further research. It thus raises a number of pressing issues facing organizations today, and offers an overview discussion on potential solutions. The main outcome of the paper is in showing that successful security strategies …
Is Rfid Safe And Secure?, E. Latham, K. Michael
Is Rfid Safe And Secure?, E. Latham, K. Michael
Professor Katina Michael
No abstract provided.
The Social Implications Of Information Security Measures On Citizens And Business, K. Michael, M. G. Michael
The Social Implications Of Information Security Measures On Citizens And Business, K. Michael, M. G. Michael
Professor Katina Michael
The 2006 Workshop on the Social Implications of Information Security Measures on Citizens and Business was organised by the Research Network for a Secure Australia (RNSA) funded by the Australian Research Council. The Workshop will become a biennial event bringing together both researchers and practitioners in the fields relating to the national research priority entitled Safeguarding Australia.
In 2006, the workshop was held on the 29th May, at the Function Centre at the University of Wollongong between 8.30 am and 5.00 pm.
The Workshop was organised by RNSA members of the Centre for eBusiness Applications Research at the University of …