47 research outputs found
Beyond Triple Zero: towards a digital, proactive emergency response
Whether for police, ambulance or fire fighters, the future of emergency communication is expected to be digital-friendly, flexible and diversified
The dilemma of research in cybersecurity management: What does cybersecurity have to do with āA Beautiful Mindā?
No abstract available
Sinai crash offers lessons on weaknesses in Australian airport security
No abstract available
Teaching Case: Information Security Management in Distress at SkillPlat
In this role-playing teaching case, students impersonate Selective Consulting, a fictitious, Australian-based company tasked with assessing the information security practices of SkillPlat, a provider of apprenticeship and traineeship services. The case develops around the one-week visit paid by Selective Consulting to SkillPlatās headquarters, during which the consultants identify several issues that denote poor information security management practices by the company. After analysing the case materials (the main text, plus seven exhibits), students write a report in which they assess the pros and cons of SkillPlatās information security management practices, offer recommendations for improvement, and indicate other sources of information that could be useful for a more detailed analysis. The report is expected to cover various topics in information security management: policies, user behaviours/human factors, governance, security practices, risk management, physical security, protection of personally identifiable information and privacy, organisational culture, etc. This teaching case has been successfully utilised with two cohorts of Master students as an assessment piece, at the end of a course on cybersecurity management. The present case requires students to offer solid arguments in favour of their assessment and recommendations, tapping into their knowledge of the subject and external resources (e.g., industry reports, academic papers, etc.). This Teaching Case needs to be accompanied by its Teaching Notes
Securing intellectual capital:an exploratory study in Australian universities
Purpose ā To investigate the links between IC and the protection of data, information and knowledge in universities, as organizations with unique knowledge-related foci and challenges.Design/methodology/approach ā We gathered insights from existing IC-related research publications to delineate key foundational aspects of IC, identify and propose links to traditional information security that impact the protection of IC. We conducted interviews with key stakeholders in Australian universities in order to validate these links.Findings ā Our investigation revealed two kinds of embeddedness characterizing the organizational fabric of universities: (1) vertical and (2) horizontal, with an emphasis on the connection between these and IC-related knowledge protection within these institutions.Research implications ā There is a need to acknowledge the different roles played by actors within the university, and the relevance of information security to IC-related preservation.Practical implications ā Framing information security as an IC-related issue can help IT security managers communicate the need for knowledge security with executives in higher education, and secure funding to preserve and secure such IC-related knowledge, once its value is recognized.Originality/value ā This is one of the first studies to explore the connections between data and information security and the three core components of ICās knowledge security in the university context
Ask me if I am Engaged: A Design-led Approach to Collect Student Feedback on their University Experience
Despite being an established practice in Higher Education (HE), the collection of feedback from students, to improve their university experience, has yet to find a unified format. Literature shows that, besides enabling collection of data on aspects of the university journey, feedback collection should also be an engaging experience for students and translate into a learning opportunity. To facilitate studentsā engagement and enhance their role as shapers of their HE experience, we propose an innovative method for the collection of student feedback that leverages the potential of Design Thinking. Our method was tested in two design-led workshops for 59 Master students in a Business School in the UK. The workshops, a blend of content delivery, and individual and team activities, were framed around designing the university of the future. Introduced and concluded by two purpose-built surveys, the workshops were organised in problem-framing; ideas generation; and prototyping. Enthusiastically welcomed by participants as a unique way to co-design their HE journey, the workshops achieved the triple objective of collecting rich data on student feedback; increasing engagement in participants; and delivering notions about design thinking. In this paper, we report on the workshops and share details for our method to be replicated
The privacy paradox applies to IoT devices too:a Saudi Arabian study
The āprivacy paradoxā is the term used to describe the disconnect between self-reported privacy value attributions and actions actually taken to protect and preserve personal privacy. This phenomenon has been investigated in a number of domains and we extend the body of research with an investigation in the IoT domain. We presented participants with evidence of a speciļ¬c IoT deviceās (smart plug) privacy violations and then measured changes in privacy concerns and trust, as well as uptake of a range of behavioural responses. Our Saudi Arabian participants, despite expressing high levels of privacy concerns, generally chose not to respond to this evidence with preventative action. Most preferred to retain the functionality the smart device oļ¬ered, eļ¬ectively choosing to tolerate likely privacy violations. Moreover, while the improved awareness increased privacy concerns and reduced trust in the device straight after the experiment, these had regressed to pre-awareness levels a month later. Our study conļ¬rms the existence of the privacy paradox in the Saudi Arabian IoT domain, and also reveals the limited inļ¬uence awareness raising exerts on long-term privacy concern and trust levels
PRECEPT-4-Justice: A bias-neutralising framework for digital forensics investigations
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Software invisibly permeates our everyday lives: operating devices in our physical world (traffic lights and cars), effecting our business transactions and powering the vast World Wide Web. We have come to rely on such software to work correctly and efficiently. The generally accepted narrative is that any software errors that do occur can be traced back to a human operatorās mistakes. Software engineers know that this is merely a comforting illusion. Software sometimes has bugs, which might lead to erratic performance: intermittently generating errors. The software, hardware and communication infrastructure can all introduce errors, which are often challenging to isolate and correct. Anomalies that manifest are certainly not always due to an operatorās actions. When the general public and the courts believe the opposite, that errors are usually attributable to some human operatorās actions, it is entirely possible for some hapless innocent individual to be blamed for anomalies and discrepancies whose actual source is a software malfunction. This is what occurred in the Post Office Horizon IT case, where unquestioning belief in the veracity of software-generated evidence led to a decade of wrongful convictions. We will use this case as a vehicle to demonstrate the way biases can influence investigations, and to inform the development of a framework to guide and inform objective digital forensics investigations. This framework, if used, could go some way towards neutralising biases and preventing similar miscarriages of justice in the future