47 research outputs found

    Beyond Triple Zero: towards a digital, proactive emergency response

    Get PDF
    Whether for police, ambulance or fire fighters, the future of emergency communication is expected to be digital-friendly, flexible and diversified

    Risk management revolution

    Get PDF
    No abstract available

    Brussels airport attacks are not just a matter of airport security

    Get PDF
    No abstract available

    Sinai crash offers lessons on weaknesses in Australian airport security

    Get PDF
    No abstract available

    Teaching Case: Information Security Management in Distress at SkillPlat

    Get PDF
    In this role-playing teaching case, students impersonate Selective Consulting, a fictitious, Australian-based company tasked with assessing the information security practices of SkillPlat, a provider of apprenticeship and traineeship services. The case develops around the one-week visit paid by Selective Consulting to SkillPlatā€™s headquarters, during which the consultants identify several issues that denote poor information security management practices by the company. After analysing the case materials (the main text, plus seven exhibits), students write a report in which they assess the pros and cons of SkillPlatā€™s information security management practices, offer recommendations for improvement, and indicate other sources of information that could be useful for a more detailed analysis. The report is expected to cover various topics in information security management: policies, user behaviours/human factors, governance, security practices, risk management, physical security, protection of personally identifiable information and privacy, organisational culture, etc. This teaching case has been successfully utilised with two cohorts of Master students as an assessment piece, at the end of a course on cybersecurity management. The present case requires students to offer solid arguments in favour of their assessment and recommendations, tapping into their knowledge of the subject and external resources (e.g., industry reports, academic papers, etc.). This Teaching Case needs to be accompanied by its Teaching Notes

    Securing intellectual capital:an exploratory study in Australian universities

    Get PDF
    Purpose ā€“ To investigate the links between IC and the protection of data, information and knowledge in universities, as organizations with unique knowledge-related foci and challenges.Design/methodology/approach ā€“ We gathered insights from existing IC-related research publications to delineate key foundational aspects of IC, identify and propose links to traditional information security that impact the protection of IC. We conducted interviews with key stakeholders in Australian universities in order to validate these links.Findings ā€“ Our investigation revealed two kinds of embeddedness characterizing the organizational fabric of universities: (1) vertical and (2) horizontal, with an emphasis on the connection between these and IC-related knowledge protection within these institutions.Research implications ā€“ There is a need to acknowledge the different roles played by actors within the university, and the relevance of information security to IC-related preservation.Practical implications ā€“ Framing information security as an IC-related issue can help IT security managers communicate the need for knowledge security with executives in higher education, and secure funding to preserve and secure such IC-related knowledge, once its value is recognized.Originality/value ā€“ This is one of the first studies to explore the connections between data and information security and the three core components of ICā€™s knowledge security in the university context

    Ask me if I am Engaged: A Design-led Approach to Collect Student Feedback on their University Experience

    Get PDF
    Despite being an established practice in Higher Education (HE), the collection of feedback from students, to improve their university experience, has yet to find a unified format. Literature shows that, besides enabling collection of data on aspects of the university journey, feedback collection should also be an engaging experience for students and translate into a learning opportunity. To facilitate studentsā€™ engagement and enhance their role as shapers of their HE experience, we propose an innovative method for the collection of student feedback that leverages the potential of Design Thinking. Our method was tested in two design-led workshops for 59 Master students in a Business School in the UK. The workshops, a blend of content delivery, and individual and team activities, were framed around designing the university of the future. Introduced and concluded by two purpose-built surveys, the workshops were organised in problem-framing; ideas generation; and prototyping. Enthusiastically welcomed by participants as a unique way to co-design their HE journey, the workshops achieved the triple objective of collecting rich data on student feedback; increasing engagement in participants; and delivering notions about design thinking. In this paper, we report on the workshops and share details for our method to be replicated

    The privacy paradox applies to IoT devices too:a Saudi Arabian study

    Get PDF
    The ā€œprivacy paradoxā€ is the term used to describe the disconnect between self-reported privacy value attributions and actions actually taken to protect and preserve personal privacy. This phenomenon has been investigated in a number of domains and we extend the body of research with an investigation in the IoT domain. We presented participants with evidence of a speciļ¬c IoT deviceā€™s (smart plug) privacy violations and then measured changes in privacy concerns and trust, as well as uptake of a range of behavioural responses. Our Saudi Arabian participants, despite expressing high levels of privacy concerns, generally chose not to respond to this evidence with preventative action. Most preferred to retain the functionality the smart device oļ¬€ered, eļ¬€ectively choosing to tolerate likely privacy violations. Moreover, while the improved awareness increased privacy concerns and reduced trust in the device straight after the experiment, these had regressed to pre-awareness levels a month later. Our study conļ¬rms the existence of the privacy paradox in the Saudi Arabian IoT domain, and also reveals the limited inļ¬‚uence awareness raising exerts on long-term privacy concern and trust levels

    PRECEPT-4-Justice: A bias-neutralising framework for digital forensics investigations

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Software invisibly permeates our everyday lives: operating devices in our physical world (traffic lights and cars), effecting our business transactions and powering the vast World Wide Web. We have come to rely on such software to work correctly and efficiently. The generally accepted narrative is that any software errors that do occur can be traced back to a human operatorā€™s mistakes. Software engineers know that this is merely a comforting illusion. Software sometimes has bugs, which might lead to erratic performance: intermittently generating errors. The software, hardware and communication infrastructure can all introduce errors, which are often challenging to isolate and correct. Anomalies that manifest are certainly not always due to an operatorā€™s actions. When the general public and the courts believe the opposite, that errors are usually attributable to some human operatorā€™s actions, it is entirely possible for some hapless innocent individual to be blamed for anomalies and discrepancies whose actual source is a software malfunction. This is what occurred in the Post Office Horizon IT case, where unquestioning belief in the veracity of software-generated evidence led to a decade of wrongful convictions. We will use this case as a vehicle to demonstrate the way biases can influence investigations, and to inform the development of a framework to guide and inform objective digital forensics investigations. This framework, if used, could go some way towards neutralising biases and preventing similar miscarriages of justice in the future
    corecore