138,212 research outputs found
Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues
Improved interoperability between public and private organizations is of key
significance to make digital government newest triumphant. Digital Government
interoperability, information sharing protocol and security are measured the
key issue for achieving a refined stage of digital government. Flawless
interoperability is essential to share the information between diverse and
merely dispersed organisations in several network environments by using
computer based tools. Digital government must ensure security for its
information systems, including computers and networks for providing better
service to the citizens. Governments around the world are increasingly
revolving to information sharing and integration for solving problems in
programs and policy areas. Evils of global worry such as syndrome discovery and
manage, terror campaign, immigration and border control, prohibited drug
trafficking, and more demand information sharing, harmonization and cooperation
amid government agencies within a country and across national borders. A number
of daunting challenges survive to the progress of an efficient information
sharing protocol. A secure and trusted information-sharing protocol is required
to enable users to interact and share information easily and perfectly across
many diverse networks and databases globally.Comment: 20 page
Addressing the cyber safety challenge: from risk to resilience
Addressing the cyber safety challenge: from risk to resilience describes the cyber safety issues emerging from a range of technology trends, how different populations are using technologies and the risks they face, and how we can effectively respond to each group’s unique cyber safety needs.
Written by the University of Western Sydney for Telstra Corporation Ltd, the report advocates for continuing to move cyber safety from a ‘risk and protection’ framework to one that focuses on building digital resilience, as well as fostering trust and confidence in the online environment. To do this we need to:
Address the needs of populations often neglected by current policies and programs – including adults, seniors, parents, and small to medium enterprises
Continue to build the digital literacy skills of all populations, because digital literacy strongly influences users’ ability to engage safely online – this is best achieved by a hands-on learning approach
Keep risk in perspective – the risks and benefits of digital participation go hand in hand
Broaden the focus from awareness-raising to long-term behaviour change.
As digital technologies become further integrated into the everyday lives of Australians, users are potentially exposed to greater risks. However, the risks and benefits of digital participation go hand in hand. The challenge, therefore, is to support users to minimise the risks without limiting their digital participation and their capacity to derive the full benefits of connectivity. If Australians are to benefit as either consumers or providers of online services and products in the e-commerce environment, consumer safety and trust need to be improved.
Cyber safety needs to be considered against a transforming backdrop of technology trends, products and practices. While the rise of social media has tended to dominate recent debate and developments in cyber safety, particularly in relation to young people, a range of other trends is also shaping how users engage online, the risks they potentially face in the new media landscape, and the strategies used to address them. These trends include the rise of user generated content and content sharing platforms; the uptake of mobile technologies and, in particular, the adoption of smartphones; cloud computing; platform integration and single sign-on mechanisms; and the rise of GPS and location based services
Authentication and authorisation in entrusted unions
This paper reports on the status of a project whose aim is to implement and demonstrate in a real-life environment an integrated eAuthentication and eAuthorisation framework to enable trusted collaborations and delivery of services across different organisational/governmental jurisdictions. This aim will be achieved by designing a framework with assurance of claims, trust indicators, policy enforcement mechanisms and processing under encryption to address the security and confidentiality requirements of large distributed infrastructures. The framework supports collaborative secure distributed storage, secure data processing and management in both the cloud and offline scenarios and is intended to be deployed and tested in two pilot studies in two different domains, viz, Bio-security incident management and Ambient Assisted Living (eHealth). Interim results in terms of security requirements, privacy preserving authentication, and authorisation are reported
Recommended from our members
A theoretical model for the application of Web 2.0 in e-Government
Government organisations in many countries have started embracing modern technologies such as second generation web (Web 2.0) in an attempt to maximize on the benefits of these technologies as well as keeping up with the current trend. Nevertheless, the advancement and the adoption of these of technologies is in its initial stages in the public sector. Therefore, the research problem is that the literature surrounding the application of Web 2.0 is still highly tentative and exploratory. In particular, there is a lack of research exploring the application of Web 2.0 technologies in the context of local e-Government. This study aims to address this research problem by presenting a comprehensive decision-making tool to aid the effective application of Web 2.0 technologies amongst local government authorities (LGAs). In doing so, resulting in the development of a theoretical model that is underpinned by information systems evaluation criteria and impact factors of Web 2.0 from an internal organizational perspective. By addressing the research problem, this study will make a significant contribution to the normative literature by providing new insights of Web 2.0 technologies within the public sector. This will be of specific relevance to scholars, policy makers, LGAs and practitioners who are interested in the adoption of Web 2.0 technologies in an e-Government context. This paper presents the proposed theoretical model and is largely devoted to an explanation on the development of the model
Identity principles in the digital age: a closer view
Identity and its management is now an integral part of web-based services and applications. It is also a live political issue that has captured the interest of organisations, businesses and society generally. As identity management systems assume functionally equivalent roles, their significance for privacy cannot be underestimated. The Centre for Democracy and Technology has recently released a draft version of what it regards as key privacy principles for identity management in the digital age. This paper will provide an overview of the key benchmarks identified by the CDT. The focus of this paper is to explore how best the Data Protection legislation can be said to provide a framework which best maintains a proper balance between 'identity' conscious technology and an individual's expectation of privacy to personal and sensitive data. The central argument will be that increased compliance with the key principles is not only appropriate for a distributed privacy environment but will go some way towards creating a space for various stakeholders to reach consensus applicable to existing and new information communication technologies. The conclusion is that securing compliance with the legislation will prove to be the biggest governance challenge. Standard setting and norms will go some way to ease the need for centralised regulatory oversight
Recommended from our members
Trust in the digital world - the return of the kings of old
Drawing principally on examples and literature from the Anglosphere, the author argues that the high salience given to "trust" and "trustworthiness" in recent scholarly literature, and which (notably in Putnam's work) attributes declining trust to a widely mistrusted mass media does not acknowledge the trustbuilding potential (realised in some instances) of interactive "Web 2.0" applications. Drawing on O'Neill's proposal that trust inheres in dialogue and mutual checking and verification, the author argues that "Web 2.0" media provide a variety of instances where the "dialogic" character of "Web 2.0" has established and enhanced trustworthiness. He argues normatively for a combination of "Web 2.0" interactivity and the adoption and implementation of self-regulatory codes in order to enhance the trustworthiness of the media
Online privacy: towards informational self-determination on the internet : report from Dagstuhl Perspectives Workshop 11061
The Dagstuhl Perspectives Workshop "Online Privacy: Towards Informational Self-Determination on the Internet" (11061) has been held in February 6-11, 2011 at Schloss Dagstuhl. 30 participants from academia, public sector, and industry have identified the current status-of-the-art of and challenges for online privacy as well as derived recommendations for improving online privacy. Whereas the Dagstuhl Manifesto of this workshop concludes the results of the working groups and panel discussions, this article presents the talks of this workshop by their abstracts
Future bathroom: A study of user-centred design principles affecting usability, safety and satisfaction in bathrooms for people living with disabilities
Research and development work relating to assistive technology
2010-11 (Department of Health)
Presented to Parliament pursuant to Section 22 of the Chronically Sick and Disabled Persons Act 197
- …