| overview 
 perspectives
 
 frameworks
 
 agencies
 
 CII
 
 desktops
 
 criminals
 
 messaging
 
 vandalism
 
 fraud
 
 authentication
 
 anonymity
 
 pseudonymity
 
 malware
 
 crypto
 
 geolocation
 
 economics
 
 insurance
 
 kids
 
 s-business
 
 appraisal
 
 self-help
 
 forensics
 
 
 
 
 
 
 
 
 
 
 related
 Guides:
 
 Governance
 
 Information
 Economy
 
 Consumers
 & Trust
 
 Privacy
 
 Identity
 
 
 
 related
 Profiles:
 
 Law
 
 Forgery
 
 Surveillance
 
 
 
 |  overview 
 What are digital certificates? Are businesses on the web 
                        what they claim to be? Are hackers a danger to your organisation? 
                        What can you do to stop them? Where can you find information 
                        about disaster planning? What's digital watermarking? Can 
                        geolocation technologies put the borders back into the 
                        'borderless' internet and thereby underpin national legislation 
                        about online hate speech 
                        or e-commerce? Are statistics about the net as a haunt 
                        of child molesters credible?
 
 This guide offers insights about those questions. The 
                        separate Governance 
                        guide looks at broader issues about regulating cyberspace. 
                        Identity 
                        (including online and offline identity crime) 
                        is discussed separately. A note discusses the private 
                        security industry.
 
 contents of this guide
 
 The following pages cover -
 
                        perspectives 
                          - differing views in significant Australian and overseas 
                          writing about the nature of online crime, responsibilities, 
                          rights and security frameworks 
                          - local and international online security and information 
                          crime frameworks, along with pointers to key government, 
                          business and academic bodiesagenciesCII 
                          - critical information infrastructure identification, 
                          protection and attackdesktopscriminals 
                          - who is committing online offences and what are the 
                          motivations messaging 
                          - spam, scams and other messaging questionsvandalism 
                          & viruses - site defacement and site hijacking fraud 
                          - online fraud studies, statistics and responsesauthentication 
                          - Australian and overseas digital identification legislation, 
                          standards and technologies such as steganography, as 
                          well as questions of anonymity onlineanonymity 
                          - questions about anonymity, identity and civil society 
                          in cyberspace pseudonymity 
                          - comments about online pseudonymitymalware 
                          - things that kill your data and exposure your informationcrypto 
                          - encryption technologies, issues and practices geolocation 
                          - information about geolocation and 'presence awareness' 
                          technologies that might introduce some borders in the 
                          'borderless web' and pose particular questions about 
                          privacyeconomics 
                          - debate about the cost of infocrime and digital security 
                          insurance 
                          - liability, cyber-insurance, identity theft insurance 
                          and other questions kids 
                          - pointers to writing about crime and regulation regarding 
                          children and teens online,from special 'kids' domain 
                          proposals to statistics about molestations-business 
                          - the online security industryappraisal 
                          - security and privacy audits, white hats and black 
                          hats self-help 
                          - primers and hints about passwords and other action 
                          by responsible surfers, along with comments about the 
                          responsibility of software providers and ISPsforensics 
                          - computer forensics      
                        associated material
 The guide is supplemented by several profiles.
 
 The Surveillance 
                        profile highlights writing about the 'surveillance state' 
                        (whether involving government agencies or the media), 
                        identity schemes such as passports and national identification 
                        cards, biometrics and other authentication technologies, 
                        conspiracy theories and fiction about pervasive surveillance 
                        in the digital environment.
 
 There are separate profiles regarding Forgery 
                        & Fakes, and regulation 
                        of Spam in Australia 
                        and elsewhere.
 
 There is also a more detailed discussion 
                        of Australian and overseas cryptography regulation, including 
                        the OECD Cryptography Guidelines and Wassenaar Arrangement.
 
 
 
 
 next page  (perspectives)
 
 
 
 | 
                         
                       
                          |