home | about | site use | resources | publications | timeline     Ketupa

overview

perspectives

frameworks

agencies

CII

desktops

criminals

messaging

vandalism

fraud

authentication

anonymity

pseudonymity

malware

crypto

geolocation

economics

insurance

kids

s-business

appraisal

self-help

forensics










related
Guides:

Governance

Information
Economy


Consumers
& Trust


Privacy

Identity



related
Profiles:


Law

Forgery

Surveillance


section heading icon      overview

What are digital certificates? Are businesses on the web what they claim to be? Are hackers a danger to your organisation? What can you do to stop them? Where can you find information about disaster planning? What's digital watermarking? Can geolocation technologies put the borders back into the 'borderless' internet and thereby underpin national legislation about online hate speech or e-commerce? Are statistics about the net as a haunt of child molesters credible?

This guide offers insights about those questions. The separate Governance guide looks at broader issues about regulating cyberspace. Identity
(including online and offline identity crime) is discussed separately. A note discusses the private security industry.

     contents of this guide

The following pages cover -

  • perspectives - differing views in significant Australian and overseas writing about the nature of online crime, responsibilities, rights and security
  • frameworks - local and international online security and information crime frameworks, along with pointers to key government, business and academic bodies
  • agencies
  • CII - critical information infrastructure identification, protection and attack
  • desktops
  • criminals - who is committing online offences and what are the motivations
  • messaging - spam, scams and other messaging questions
  • vandalism & viruses - site defacement and site hijacking 
  • fraud - online fraud studies, statistics and responses
  • authentication - Australian and overseas digital identification legislation, standards and technologies such as steganography, as well as questions of anonymity online
  • anonymity - questions about anonymity, identity and civil society in cyberspace 
  • pseudonymity - comments about online pseudonymity
  • malware - things that kill your data and exposure your information
  • crypto - encryption technologies, issues and practices
  • geolocation - information about geolocation and 'presence awareness' technologies that might introduce some borders in the 'borderless web' and pose particular questions about privacy
  • economics - debate about the cost of infocrime and digital security
  • insurance - liability, cyber-insurance, identity theft insurance and other questions
  • kids - pointers to writing about crime and regulation regarding children and teens online,from special 'kids' domain proposals to statistics about molestation
  • s-business - the online security industry
  • appraisal - security and privacy audits, white hats and black hats
  • self-help - primers and hints about passwords and other action by responsible surfers, along with comments about the responsibility of software providers and ISPs
  • forensics - computer forensics

     associated material

The guide is supplemented by several profiles.

The Surveillance profile highlights writing about the 'surveillance state' (whether involving government agencies or the media), identity schemes such as passports and national identification cards, biometrics and other authentication technologies, conspiracy theories and fiction about pervasive surveillance in the digital environment.

There are separate profiles regarding Forgery & Fakes, and
regulation of Spam in Australia and elsewhere.

There is also a more detailed discussion of Australian and overseas cryptography regulation, including the OECD Cryptography Guidelines and Wassenaar Arrangement.






       next page  (perspectives)




this site
the web

   

 

version of August 2004
© Bruce Arnold
caslon.com.au | caslon analytics