The 2006 Workshop on the Social Implications of Information Security Measures on Citizens and Business was organised by the Research Network for a Secure Australia (RNSA) funded by the Australian Research Council. The Workshop will become a biennial event bringing together both researchers and practitioners in the fields relating to the national research priority entitled Safeguarding Australia.
In 2006, the workshop was held on the 29th May, at the Function Centre at the University of Wollongong between 8.30 am and 5.00 pm.
The Workshop was organised by RNSA members of the Centre for eBusiness Applications Research at the University of Wollongong jointly with the University of Melbourne.
It provided a forum for the exchange of ideas and research findings between core groups or individuals interested in the social implications of national security measures, focused on the big picture question of Security v Civil Liberties.
Workshop participants will learn about the current and potential status of information security measures in Australia, consider their implications on citizens and business, and identify their impact on legislation and privacy at a local and global level.
The cross-disciplinary workshop was seeking perspectives which covered a diverse array of interest areas such as security, law, philosophy, sociology, religion, politics, history, culture, science and technology studies, and business.
The workshop included papers by Professor of Management Mary Barrett, Professor of Law Simon Bronitt (invited keynote), Professor of Software Engineering Peter Croll, Professor of Computer Law Margaret Jackson, Professor Sociology of Communications Supriya Singh, and Professor of Transport Systems Marcus Wigan (invited keynote). Other professionals included Roger Clarke Principal of Xamax Consultancy, DSTO research scientist Dr Lucy Resnyansky and the Information Security Institute’s Dr Lauren May.
The Workshop Proceedings contains only peer reviewed papers. The acceptance rate was 38%. Each paper was subjected to a rigorous review process conducted by at least two experts in the appropriate field. The authors were requested to revise the papers according to reviewer’s comments. In addition, the editors made extensive comments to at least two revisions of each paper.
- national security,
- information technology,
Available at: http://works.bepress.com/kmichael/50/