9
29 May 2006 29 May 2006 Social Implications of National Sec Social Implications of National Sec urity urity 1 Social Implications of Social Implications of Information Security Information Security Measures on Citizens and Measures on Citizens and Business Business Research Network for Research Network for a Secure Australia- a Secure Australia- RNSA RNSA Centre for eBusiness Centre for eBusiness Application Research- Application Research- CeBAR CeBAR

Social Implications of Information Security Measures on Citizens and Business

Embed Size (px)

DESCRIPTION

Social Implications of Information Security Measures on Citizens and Business. Research Network for a Secure Australia- RNSA Centre for eBusiness Application Research- CeBAR. Session 1- Privacy Chair: Katina Michael. Morning Tea. Session 2- Technology Chair: Holly Tootell. Lunch. - PowerPoint PPT Presentation

Citation preview

Page 1: Social Implications of Information Security Measures on Citizens and Business

29 May 200629 May 2006 Social Implications of National SecuritySocial Implications of National Security 11

Social Implications of Social Implications of Information Security Information Security Measures on Citizens and Measures on Citizens and BusinessBusiness

Research Network for a Research Network for a Secure Australia- RNSASecure Australia- RNSA

Centre for eBusiness Centre for eBusiness Application Research- Application Research- CeBARCeBAR

Page 2: Social Implications of Information Security Measures on Citizens and Business

29 May 200629 May 2006 Social Implications of National SecuritySocial Implications of National Security 22

Session 1- PrivacySession 1- PrivacyChair: Katina MichaelChair: Katina Michael

WelcomeWelcome Katina MichaelKatina Michael

Opening RemarksOpening Remarks Jennifer SeberryJennifer Seberry

Transport Transport SurveillanceSurveillance

Marcus WiganMarcus Wigan

Former NSW Former NSW Privacy Privacy CommissionerCommissioner

Chris PuplickChris Puplick

Page 3: Social Implications of Information Security Measures on Citizens and Business

29 May 200629 May 2006 Social Implications of National SecuritySocial Implications of National Security 33

Morning TeaMorning Tea

Page 4: Social Implications of Information Security Measures on Citizens and Business

29 May 200629 May 2006 Social Implications of National SecuritySocial Implications of National Security 44

Session 2- TechnologySession 2- TechnologyChair: Holly TootellChair: Holly Tootell

Identity Identity ManagementManagement

Margaret JacksonMargaret Jackson

Community Community PerceptionsPerceptions

Suzanne LockhartSuzanne Lockhart

Internet BankingInternet Banking Supriya SinghSupriya Singh

Wireless Network Wireless Network VulnerabilityVulnerability

Mary BarrettMary Barrett

Page 5: Social Implications of Information Security Measures on Citizens and Business

29 May 200629 May 2006 Social Implications of National SecuritySocial Implications of National Security 55

LunchLunch

Page 6: Social Implications of Information Security Measures on Citizens and Business

29 May 200629 May 2006 Social Implications of National SecuritySocial Implications of National Security 66

Session 3- LawSession 3- LawChair: Athol YatesChair: Athol Yates

Regulating Regulating TelecommunicationTelecommunicationss

Simon BronittSimon Bronitt

Anti-terrorism Anti-terrorism LegislationLegislation

Mark RixMark Rix

Critical Social Critical Social TheoryTheory

Holly TootellHolly Tootell

E-courtsE-courts Mark BurdonMark Burdon

Page 7: Social Implications of Information Security Measures on Citizens and Business

29 May 200629 May 2006 Social Implications of National SecuritySocial Implications of National Security 77

Afternoon TeaAfternoon Tea

Page 8: Social Implications of Information Security Measures on Citizens and Business

29 May 200629 May 2006 Social Implications of National SecuritySocial Implications of National Security 88

Session 4- Critical Session 4- Critical InfrastructureInfrastructureChair: M.G. MichaelChair: M.G. MichaelPublic Data Public Data AvailabilityAvailability

Roba AbbasRoba Abbas

Perceived RiskPerceived Risk Peter CrollPeter Croll

Critical Reflexive Critical Reflexive ApproachApproach

Lucy ResnyanskyLucy Resnyansky

Security and Security and Australian Australian UniversitiesUniversities

Lauren MayLauren May

Page 9: Social Implications of Information Security Measures on Citizens and Business

29 May 200629 May 2006 Social Implications of National SecuritySocial Implications of National Security 99

Closing Remarks-Closing Remarks-Co-editor MG MichaelCo-editor MG Michael Outcomes:Outcomes:

– 265 pp proceedings265 pp proceedings– Select paper publication:Select paper publication:

PrometheusPrometheus Journal of Applied and Theoretical Journal of Applied and Theoretical

Electronic Commerce Research (JTAER)Electronic Commerce Research (JTAER)

– Encourage membership to RNSAEncourage membership to RNSA– Future collaborative linksFuture collaborative links– Discourse: a way forwardDiscourse: a way forward