Showing 1 - 10 of 11
Secure management of Australia’s commercial Critical Infrastructure presents ongoing challenges to both the owners of this infrastructure as well as to the Australian Federal government. The security management process is currently managed through high-level information sharing via...
Persistent link: https://www.econbiz.de/10009483952
For 20 years Australia has been in political denial about the seismic changes occurring in the way we power our country. Successive governments continue to tell people that power prices will fall while the lights stay on. Debate is reduced to two equally preposterous narratives: coal-fired,...
Persistent link: https://www.econbiz.de/10012136068
Secure management of Australia's commercial critical infrastructure presents ongoing challenges to both the owners of this infrastructure as well as to the government. It is currently managed through high-level information sharing via collaboration but does this situation suit the commercial...
Persistent link: https://www.econbiz.de/10010668801
Persistent link: https://www.econbiz.de/10003971307
Persistent link: https://www.econbiz.de/10009887670
Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional physical attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to coordinate cyber-based attacks. This paper identifies that...
Persistent link: https://www.econbiz.de/10009440775
IT security outsourcing is the establishment of a contractual relationship between an organization with an outside vendor which assumes responsibility for the organisation’s security functions. Outsourcing in IS has had a variable history of success and the complexity of the decision making...
Persistent link: https://www.econbiz.de/10009483706
Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional physical attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to  coordinate cyber-based attacks. This paper identifies...
Persistent link: https://www.econbiz.de/10009483953
Persistent link: https://www.econbiz.de/10007034676
Persistent link: https://www.econbiz.de/10012321350