Upload
ginger-bass
View
10
Download
1
Embed Size (px)
DESCRIPTION
Social Implications of Information Security Measures on Citizens and Business. Research Network for a Secure Australia- RNSA Centre for eBusiness Application Research- CeBAR. Session 1- Privacy Chair: Katina Michael. Morning Tea. Session 2- Technology Chair: Holly Tootell. Lunch. - PowerPoint PPT Presentation
Citation preview
29 May 200629 May 2006 Social Implications of National SecuritySocial Implications of National Security 11
Social Implications of Social Implications of Information Security Information Security Measures on Citizens and Measures on Citizens and BusinessBusiness
Research Network for a Research Network for a Secure Australia- RNSASecure Australia- RNSA
Centre for eBusiness Centre for eBusiness Application Research- Application Research- CeBARCeBAR
29 May 200629 May 2006 Social Implications of National SecuritySocial Implications of National Security 22
Session 1- PrivacySession 1- PrivacyChair: Katina MichaelChair: Katina Michael
WelcomeWelcome Katina MichaelKatina Michael
Opening RemarksOpening Remarks Jennifer SeberryJennifer Seberry
Transport Transport SurveillanceSurveillance
Marcus WiganMarcus Wigan
Former NSW Former NSW Privacy Privacy CommissionerCommissioner
Chris PuplickChris Puplick
29 May 200629 May 2006 Social Implications of National SecuritySocial Implications of National Security 33
Morning TeaMorning Tea
29 May 200629 May 2006 Social Implications of National SecuritySocial Implications of National Security 44
Session 2- TechnologySession 2- TechnologyChair: Holly TootellChair: Holly Tootell
Identity Identity ManagementManagement
Margaret JacksonMargaret Jackson
Community Community PerceptionsPerceptions
Suzanne LockhartSuzanne Lockhart
Internet BankingInternet Banking Supriya SinghSupriya Singh
Wireless Network Wireless Network VulnerabilityVulnerability
Mary BarrettMary Barrett
29 May 200629 May 2006 Social Implications of National SecuritySocial Implications of National Security 55
LunchLunch
29 May 200629 May 2006 Social Implications of National SecuritySocial Implications of National Security 66
Session 3- LawSession 3- LawChair: Athol YatesChair: Athol Yates
Regulating Regulating TelecommunicationTelecommunicationss
Simon BronittSimon Bronitt
Anti-terrorism Anti-terrorism LegislationLegislation
Mark RixMark Rix
Critical Social Critical Social TheoryTheory
Holly TootellHolly Tootell
E-courtsE-courts Mark BurdonMark Burdon
29 May 200629 May 2006 Social Implications of National SecuritySocial Implications of National Security 77
Afternoon TeaAfternoon Tea
29 May 200629 May 2006 Social Implications of National SecuritySocial Implications of National Security 88
Session 4- Critical Session 4- Critical InfrastructureInfrastructureChair: M.G. MichaelChair: M.G. MichaelPublic Data Public Data AvailabilityAvailability
Roba AbbasRoba Abbas
Perceived RiskPerceived Risk Peter CrollPeter Croll
Critical Reflexive Critical Reflexive ApproachApproach
Lucy ResnyanskyLucy Resnyansky
Security and Security and Australian Australian UniversitiesUniversities
Lauren MayLauren May
29 May 200629 May 2006 Social Implications of National SecuritySocial Implications of National Security 99
Closing Remarks-Closing Remarks-Co-editor MG MichaelCo-editor MG Michael Outcomes:Outcomes:
– 265 pp proceedings265 pp proceedings– Select paper publication:Select paper publication:
PrometheusPrometheus Journal of Applied and Theoretical Journal of Applied and Theoretical
Electronic Commerce Research (JTAER)Electronic Commerce Research (JTAER)
– Encourage membership to RNSAEncourage membership to RNSA– Future collaborative linksFuture collaborative links– Discourse: a way forwardDiscourse: a way forward