The Social Implications of

Information Security Measures on Citizens and Business

 

The First Workshop on Social Implications of National Security

University of Wollongong, NSW, Australia

29 May 2006

 

* Special Thanks: Research Network for a Secure Australia (RNSA)

 

** To Download a Soft Copy of the Proceedings- FREE

 

*** To Purchase a Hard Copy of the Proceedings

 

Cover, Copyright, Foreward, Reviewers, Contents

Editors:  Michael, K. & Michael, M.G.
Series:  Research Network for a Secure Australia (RNSA)
Publisher:  University of Wollongong, Centre for eBusiness Application Research (CeBAR) (School of Information Technology and Computer Science)
Publication Year:  2006
Format:  Book
ISBN-13:  978-1-74128-118-7
ISBN-10:  1-74128-118-0

 

Workshop Presentations

Workshop Overview

 

Workshop Welcome

Katina Michael

Centre for eBusiness Application Research (CeBAR)

 

Opening Remarks

Jennifer Seberry

Centre for Computer Security, University of Wollongong

 

National ID Card

Chris Puplick

Former Privacy Commissioner of NSW

 

Presenter Biographies

 

1        The proliferation of identification techniques for citizens throughout the ages   

Katina Michael and M.G. Michael

School of Information Technology and Computer Science, University of Wollongong

 

2        Social impacts of transport surveillance                                                                           

Marcus Wigan and Roger Clarke

Oxford Systematics, Xamax Consultancy Pty Ltd

 

3        Identity management: is an identity card the solution for Australia?

Margaret Jackson and Julian Ligertwood

School of Accounting and Law, RMIT University

 

4        Community perceptions of biometric technology                                      

Suzanne Lockhart

Department of Criminology, University of Melbourne

 

5        The social context of the security of Internet banking                               

Supriya Singh

Royal Melbourne Institute of Technology /Smart Internet Technology Cooperative Research Centre (SITCRC)

 

6        The importance of utilising electronic identification for total farm management in Australia 

Adam Trevarthen

School of Information Technology and Computer Science, University of Wollongong

 

7        Using scenario planning in the evaluation of information security applications

Laura Perusco

School of Information Technology and Computer Science, University of Wollongong

 

8        Regulating telecommunications interception & access: a seachange in surveillance laws     

Simon Bronitt and James Stellios

ANU College of Law, The Australian National University

 

9       The application of critical social theory to national security research

Holly Tootell
School of Information Technology and Computer Science, University of Wollongong

 

10      Australia’s anti-terrorism legislation: the national security state and the community legal sector      

Mark Rix
Graduate School of Business, University of Wollongong

 

11      E-courts: toward information protection management structures

Lauren May and Mark Burdon

Information Security Institute, Queensland University of Technology

 

12      Citizen participation platform guaranteeing freedom of speech                  

E. Pérez, A. Gómez, S. Sánchez, J.D. Carracedo, J. Carracedo, C. González, J. Moreno

Departamento de Ingeniería y Arquitecturas Telemáticas de la Universidad Politécnica de Madrid & Observatorio para la Democracia Digital y los Derechos de la Ciudadanía en Internet

 

13      The risk of public data availability on critical infrastructure protection

Roba Abbas

School of Information Technology and Computer Science, University of Wollongong

 

14      Perceived risk: human factors affecting ICT of critical infrastructure

Peter R Croll and Hasmukh Morarji

Faculty of Information Technology, QUT, Brisbane, Australia

 

15      Conceptualisation of terrorism in modelling tools: critical reflexive approach

Lucy Resnyansky

Defence Science and Technology Organisation

 

16      Towards protecting critical infrastructure - the role of information security management in Australian universities

Lauren May and Tim Lane
Information Security Institute, Queensland University of Technology

 

17      Organisational factors and Australian IT professionals’ views of wireless network vulnerability assessments

Keir Dyce and Mary Barrett
Centre for Computer Security Research, School of Management and Marketing, University of Wollongong

 

Workshop Close

MG Michael

Centre for eBusiness Application Research (CeBAR)

 

 

Media Reports

1. Write-Up (17/05/06): Wollongong Advertiser.

 

2. Write-Up (19/05/06):  The social implications of national security, UOW Media Release, http://media.uow.edu.au/news/2006/0519c/index.html

 

3. Interview (23/05/06: 5.00pm):  Jenny Feltham, VOXFM: Crossfire, 106.9 FM, URL: http://www.vox.1earth.net/index.html

 

4. Interview (24/05/06: 11.00am): George Messaris, SBS Radio: Greek News, 1107 AM, URL: http://www9.sbs.com.au/radio/language.php?language=Greek

 

5. Interview (26/05/06: 10.45am): Nick Rheinberger, ABC Illawarra: Morning Show, 97.3 FM, URL: http://www.abc.net.au/illawarra/mornings/

 

6. Interview (26/05/06: 2.15pm): Emma, ABC Illawarra, 97.3 FM, URL: http://www.abc.net.au/illawarra/mornings/

 

7. Write-up (29/05/06): What should Australians give up in interest of national security?  UOW Media Release, http://media.uow.edu.au/news/2006/0529b/index.html

 

8. Television (29/05.06: 6.14pm): Chris Puplick, WIN TV (9).

 

 

Other Information

1. How do I reference a paper from the proceedings?

Wigan, M. and Clarke, R. (2006), “Social impacts of transport surveillance”, in K. Michael and M.G. Michael (eds), The Social Implications of Information Security Measures on Citizens and Business, University of Wollongong, NSW, Australia.

 

2. How do I purchase, listen, view the proceedings?

More information will be made available soon.

 

3. Will updated proceedings be published in a journal(s)?

Yes. The proceedings will be published in special issue journals. At this stage half the papers will be published in the Journal of Applied and Theoretical Electronic Commerce Research (JTAER). Still waiting for confirmation of papers to appear elsewhere.

 

4. Can I view the actual presentation schedule delivered at the workshop?

Yes.

 

5. What were the submission guidelines for authors?

Download.

 

6. What was the acceptance rate of papers?

Thirty-eight percent.

 

7. How many people registered for the workshop?

Eighty-eight.

 

 

Workshop Survey- What People Had to Say About the Workshop?

Thanks for the workshop- interesting, informative, high research culture and interaction with different communities- a very useful and well-organised event! It has demonstrated that people are interested in such issues. Further talk may be needed.

 

You’ve all done a fine job- congratulations! I’ll look forward to the next workshop.

 

Well done! I really enjoyed today and feel my horizon has been broadened.

 

A great opportunity to network.

 

Schedule was tight but worth it.

 

Was a great learning experience. Is always nice to learn about different perspectives.

 

A well-organised workshop which provided a good insight into the other side of security technologies which I was not very much aware of.

 

Excellent organisation of papers and selection of speakers.

 

A follow-up seminar would be very interesting.

 

Very good day. Really relevant and to the point. Appreciated the opportunity to attend.

 

Sensational arrangement of speakers. Thanks also for the great hospitality.

 

I would like to thank you for your organization and arrangement of the workshop. It was very useful for me and I gained a lot of knowledge out of it.

 

Thank you for a very warm and friendly conference.

 

You should be proud of what you achieved. It was tremendous and well-received.

 

Just wanted to say congratulations and thanks for organising the seminar. It really was very informative and very worthwhile. The first step is always the hardest one to take so well done for having the courage and the foresight to take it.