Openly accessible

The multifaceted and ever-changing directions of information security - Australia get ready!

Ngo, Leanne and Zhou, Wanlei 2005, The multifaceted and ever-changing directions of information security - Australia get ready!, in Third International Conference on Information Technology and Applications : 4-7 July 2005, Sydney, Australia : proceedings, IEEE Computer Society, Los Alamitos, Calif., pp. 230-233.

Attached Files
Name Description MIMEType Size Downloads
zhou-multifacetedandever-2005.pdf Published version application/pdf 236.44KB 4

Title The multifaceted and ever-changing directions of information security - Australia get ready!
Author(s) Ngo, Leanne
Zhou, Wanlei
Conference name International Conference on Information Technology and Applications (3rd : 2005 : Sydney, Australia)
Conference location Sydney, Australia
Conference dates 4-7 July 2005
Title of proceedings Third International Conference on Information Technology and Applications : 4-7 July 2005, Sydney, Australia : proceedings
Editor(s) He, X.
Hintz, T.
Piccardi, M.
Wu, Q.
Huang, M.
Tien, D.
Publication date 2005
Conference series International Conference on Information Technology and Applications
Start page 230
End page 233
Publisher IEEE Computer Society
Place of publication Los Alamitos, Calif.
Keyword(s) security of data
Summary In recent years, we have witnessed many information security developmental trends. As a consequence, the dimensions of information security - once single disciplinary area - have become multifaceted and convoluted. This paper aims to (1) recapitulate these key developments: (2) argue that the emergence of many complex information security dimensions are the result of 'constant change agents' (CCAs); (3) discuss the implications on Australia's society, i. e. government, companies and individuals; and (4) propose key consideration areas and possible solutions thereof. We hope that the discussion presented here will position Australia to make better aligned information security and strategic plans, such as choosing appropriate investments and adopting effective solutions to strengthen and secure Australia's national information security posture.
Notes This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
ISBN 0769523161
9780769523163
Language eng
Field of Research 080610 Information Systems Organisation
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2005, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30005723

Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Access Statistics: 383 Abstract Views, 47 File Downloads  -  Detailed Statistics
Created: Mon, 07 Jul 2008, 09:53:20 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.