Query Result Set
Skip Navigation Links
   ActiveUsers:1621Hits:18317309Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
DATA SECURITY (6) answer(s).
 
SrlItem
1
ID:   131314


Cyber maturity in the Asia-Pacific 2014 / Australian Strategic Policy Institute 2014  Book
Australian Strategic Policy Institute Book
0 Rating(s) & 0 Review(s)
Publication Australia, Australian Strategic Policy Institute, 2014.
Description 71p.Pbk
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
057770005.8095/AUS 057770MainOn ShelfGeneral 
2
ID:   112575


Cyber Security Essentials / Graham, James (ed); Howard, Richard (ed); Olson, Ryan (ed) 2011  Book
Graham, James (ed) Book
0 Rating(s) & 0 Review(s)
Publication New York, CRC Press, 2011.
Description xv, 325p.Pbk
Standard Number 9781439851234
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
056534005.8/GRA 056534MainOn ShelfGeneral 
3
ID:   135740


Cybersecurity: global, regional and domestic dynamics / Samuel, Cherian 2014  Book
Samuel, Cherian Book
0 Rating(s) & 0 Review(s)
Publication New Delhi, Institute for Defence Studies and Analyses, 2014.
Description 84p.Pbk
Series IDSA Monograph Series No.42, December 2014
Standard Number 9789382169482
        Export Export
Copies: C:2/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
058079005.8/SAM 058079MainOn ShelfGeneral 
058080005.8/SAM 058080MainOn ShelfGeneral 
4
ID:   130993


Digital security governance and risk anticipation: what about the role of security officials in privacy protection? ( / Eijkman, Quirine   Journal Article
Eijkman, Quirine Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract The anticipatory turn in managing security and safety relies not only on innovative technological tools, but also on social practice. New information and communication technology, for instance, facilitates digital security governance1 which entails the collection, processing, storage, and sharing of digital personal data for risk profiling, but little is known about the role of security officials in preemptive security. Although people, or "data subjects," are categorized according to a (predefined) level of potential threat on the basis of digital data, it is often unclear which actor or agency was responsible for this categorization. This is especially unclear when information was shared across the globe between several security agencies and/or private companies. Nonetheless, as the assessment of risk or dangerousness affects someone's real-life opportunities, privacy rights or claims to something or someone are likely to be evoked.
        Export Export
5
ID:   046097


Fundamentals of network security / Canavan, John E 2001  Book
Canavan, John E Book
0 Rating(s) & 0 Review(s)
Publication Boston, Artech House Inc., 2001.
Standard Number 1580531768
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
046754005.8/CAN 046754MainOn ShelfGeneral 
6
ID:   192082


Understanding the risks of China-made CCTV surveillance cameras in Australia / Bernot, Ausma; Smith, Marcus   Journal Article
Bernot, Ausma Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract In the global interconnected economy, China-made information-collecting technologies such as closed-circuit television (CCTV) surveillance cameras have become popular products for routine video-based surveillance. Hikvision and Dahua are the two largest global suppliers of CCTV cameras, with both companies supplying their products to over 200 countries. Despite their popularity, national security concerns are commonly cited when adopting these cameras, citing manufacturer links with the Communist Party of China (CPC), cybersecurity vulnerabilities, and sales recorded in the Xinjiang region, that has records of human rights violations. This paper is structured in three parts: first, we explore the predominance of China-made information-gathering technologies in Australia; second, we summarise common national security concerns usually associated with China-based technology manufacturers; and third, we propose regulatory measures to regulating China-made CCTV cameras in Australia. The paper suggests that while state and Federal decision-makers are free to remove Chinese CCTV surveillance cameras, they should avoid overt politisation. Overall, a stronger focus should be placed on evaluating cybersecurity risks of Internet of Things (IoT) information-collecting technologies and considering their timely and effective regulation from the perspective of individual and national interests.
Key Words National Security  Surveillance  Data Security  Privacy  CCTV  China’s Party–State 
IoT‌ 
        Export Export