326 research outputs found

    Commercial critical systems and critical infrastructure protection : a future research agenda

    Get PDF
    Secure management of Australia&rsquo;s commercial critical infrastructure presents ongoing challenges to owners and the government. Although it is currently managed through high-level information sharing via collaboration, but does this suit the commercial sector. One of the issues facing Australia is that the majority of critical infrastructure resides under the control of the business sector and certain aspects such of the critical infrastructure such as Supply Chain Management (SCM) systems are distributed entities and not a single entity. The paper focuses upon the security issues associated with SCM systems and critical infrastructure protection.<br /

    Attack vectors against social networking systems : the Facebook example

    Get PDF
    Social networking systems (SNS&rsquo;s) such as Facebook are an ever evolving and developing means of social interaction, which is not only being used to disseminate information to family, friends and colleagues but as a way of meeting and interacting with &quot;strangers&quot; through the advent of a large number of social applications. The attractiveness of such software has meant a dramatic increase in the number of frequent users of SNS&rsquo;s and the threats which were once common to the Internet have now been magnified, intensified and altered as the potential for criminal behaviour on SNS&rsquo;s increases. Social networking sites including Facebook contain a vast amount of personal information, that if obtained could be used for other purposes or to carry out other crimes such as identity theft. This paper will focus on the security threats posed to social networking sites and gain an understanding of these risks by using a security approach known as &ldquo;attack trees&rdquo;. This will allow for a greater understanding of the complexity associated with protecting Social Networking systems with a particular focus on Facebook.<br /

    Ethics and electronic commerce

    Full text link
    Ethics is an important element in all aspects of computing, but proves to be a real problem in the development and delivery of electronic commerce systems. There are many aspects of ethics that can affect electronic commerce systems, but perhaps the most notable and worrying to both consumers and developers is that of trust.In a world where so much information is transmitted and shared electronically, ethical standards that in general society are applied to this medium, are often ignored or forgotten. This paper will discuss some of the ethical considerations that should be considered in electronic commerce and offer the possible solutions that can encourage developers to consider ethical considerations and prove excellence and trust to the consumer.<br /

    Supply chain management security : the weak link of Australian critical infrastructure protection

    Full text link
    Secure management of Australia&rsquo;s commercial Critical Infrastructure presents ongoing challenges to both the owners of this infrastructure as well as to the Australian Federal government. The security management process is currently managed through high-level information sharing via collaboration, but does this situation suit the commercial sector? One of the issues facing Australia is that the majority of critical infrastructure resides under the control of the business sector and certain aspects such of the critical infrastructure such as Supply Chain Management (SCM) systems are distributed entities that span a number of commercial organisations. Another issue is that these SCM systems can be used for the transportation of varied items, such as retail items or food. This paper will explore the security issue related to food SCM systems and their relationship to critical infrastructure. The paper will focuses upon the security and risk issues associated with SCM system protection within the realms of critical infrastructure protection. The paper will review the security standard ISO 28000 - Supply Chain Security Management Standard. The paper will propose a new conceptual security risk analysis approach that will form the basis of a future Security Risk Analysis approach. This new approach will be aimed at protecting SCM systems.<br /

    Designing on-line learning systems using participation

    Full text link
    The review of literature pertaining to systems analysis and design and the design of systems for on-line teaching and learning has identified some &quot;gaps&quot; and shown the need for participation in educational system design. This paper presents research which was conducted to develop an approach for the design of educational systems involving the participation of student and academics in the design of educational on-line learning systems.<br /

    Designing ethical systems for online systems

    Full text link
    Ethics is an important element in all aspects of Information Systems (IS), from the design, operation and delivery of such systems. Most research has focused upon traditional IS system design and the associated ethical issues. There are many aspects of ethics that can impact the design and operation of Information Systems, but online system design is often overlooked. The paper will focus upon a design approach that allows for the design on online systems and considers the ethical issues. The approach was developed and validated in regards to a tertiary environment.<br /

    Australian national critical infrastructure protection : a case study

    Full text link
    Australia has developed sophisticated national security policies and physical security agencies to protect against current and future security threats associated with critical infrastructure protection and cyber warfare protection. This paper will discuss some of the common security risks that face Australia and how their government policies and strategies have been developed and changed over time, for example, the proposed Australian Homeland Security department. This paper will discuss the different steps that Australia has undertaken in relation to developing national policies to deal with critical infrastructure protection.<br /

    Using problem based learning to teach future Australian IS professionals

    Full text link
    Teaching Information Systems (IS) to Australian tertiary students has become increasing problematic with many of them relying on a surface level approach to study. This will surely affect their understanding of IS material and in turn affect their effectiveness in the workplace.This paper examines the issues behind this trend and considers Problem Based Learning (PBL) asan aid to counteract it.<br /

    The impact of security surveys within Australia and New Zealand

    Get PDF
    Information security is portrayed as a global problem that impacts all countries that are considered as part of the Information Society. Recent surveys show that there are increased concerns about computer crime. The paper will focus upon recent national security surveys from Australia and New Zealand and the trends that this research shows. Is it fair to assume the security practices are the same all over the world? The paper looks at security practices from a number of different countries perspectives and shows that security practices are not generic and vary from country to country. The paper will also evaluate the worth that National Security Surveys have in the field of Information Security Surveys
    • …
    corecore