overview
perspectives
frameworks
agencies
CII
desktops
criminals
messaging
vandalism
fraud
authentication
anonymity
pseudonymity
malware
crypto
geolocation
economics
insurance
kids
s-business
appraisal
self-help
forensics
related
Guides:
Governance
Information
Economy
Consumers
& Trust
Privacy
Identity
related
Profiles:
Law
Forgery
Surveillance
|
overview
What are digital certificates? Are businesses on the web
what they claim to be? Are hackers a danger to your organisation?
What can you do to stop them? Where can you find information
about disaster planning? What's digital watermarking? Can
geolocation technologies put the borders back into the
'borderless' internet and thereby underpin national legislation
about online hate speech
or e-commerce? Are statistics about the net as a haunt
of child molesters credible?
This guide offers insights about those questions. The
separate Governance
guide looks at broader issues about regulating cyberspace.
Identity
(including online and offline identity crime)
is discussed separately. A note discusses the private
security industry.
contents of this guide
The following pages cover -
- perspectives
- differing views in significant Australian and overseas
writing about the nature of online crime, responsibilities,
rights and security
- frameworks
- local and international online security and information
crime frameworks, along with pointers to key government,
business and academic bodies
- agencies
- CII
- critical information infrastructure identification,
protection and attack
- desktops
- criminals
- who is committing online offences and what are the
motivations
- messaging
- spam, scams and other messaging questions
- vandalism
& viruses - site defacement and site hijacking
- fraud
- online fraud studies, statistics and responses
- authentication
- Australian and overseas digital identification legislation,
standards and technologies such as steganography, as
well as questions of anonymity online
- anonymity
- questions about anonymity, identity and civil society
in cyberspace
- pseudonymity
- comments about online pseudonymity
- malware
- things that kill your data and exposure your information
- crypto
- encryption technologies, issues and practices
- geolocation
- information about geolocation and 'presence awareness'
technologies that might introduce some borders in the
'borderless web' and pose particular questions about
privacy
- economics
- debate about the cost of infocrime and digital security
- insurance
- liability, cyber-insurance, identity theft insurance
and other questions
- kids
- pointers to writing about crime and regulation regarding
children and teens online,from special 'kids' domain
proposals to statistics about molestation
- s-business
- the online security industry
- appraisal
- security and privacy audits, white hats and black
hats
- self-help
- primers and hints about passwords and other action
by responsible surfers, along with comments about the
responsibility of software providers and ISPs
- forensics
- computer forensics
associated material
The guide is supplemented by several profiles.
The Surveillance
profile highlights writing about the 'surveillance state'
(whether involving government agencies or the media),
identity schemes such as passports and national identification
cards, biometrics and other authentication technologies,
conspiracy theories and fiction about pervasive surveillance
in the digital environment.
There are separate profiles regarding Forgery
& Fakes, and regulation
of Spam in Australia
and elsewhere.
There is also a more detailed discussion
of Australian and overseas cryptography regulation, including
the OECD Cryptography Guidelines and Wassenaar Arrangement.
next page (perspectives)
|
|