A FRENCH-AUSTRALIAN COMPARISON OF RESPONSIBILITIES FOR THE MONITORING OF SECURITY AND PRIVACY ISSUES RESULTING FROM THE INTRODUCTION OF NEW INFORMATION TECHNOLOGIES
Abstract
Information technologies have altered the way individuals, businesses and societies live and operate. Along with these changes has come loss of privacy and threats to the security of confidential information. Much research in the social sciences has established marked inter-relationships between technology, society and culture. However, the roles of corporations and governments in ensuring maintenance of security and privacy for citizens are unclear. This study determines and compares the roles and responsibilities of stakeholders in both France and Australia in monitoring and responding to security and privacy issues resulting from the introduction of new information technologies. It is found that governments in these countries remain at arm's length from regulation while investing many resources in education of the public and of small business concerning these issues.
Downloads
References
Agre, P.E. and Rotenberg, M. (1997) Technology and Privacy: The New Landscape. MIT Press, Cambridge, MA.
Attorney-General, Australian Government (2003) Implementing a 'Culture of Security' in Australia. Australian Government. (Available from: http://www.oecd.org/ dataoecd/18/21/36290761.pdf.)
Batten, L.M. and Le Grand, G. (2006) A French-Australian comparison of attitudes towards security and privacy modern information technologies. Proceedings of the Internet Society II. Proc. Int. Symp, Wessex, pp 415-424.
Defence Signals Directorate (2006) Australian Government Information and Communications Technology Security Manual (September). Australian Government. (Available from: http://www.dsd.gov.au/library/infosec/acsi33.html.)
Farquharson, K. and Critchley, C. (2004) Risk, trust and cutting edge technologies: A study of Australian attitudes. Australian Journal of Emerging Technologies and Society, 2 (2) pp 1-23.
Gambetta, D. (1990) Can We Trust Trust? Basil Blackwell, New York, NY.
Le Grand, G. and Batten, L.M. (2006) Government responsibilities for the monitoring of security and privacy issues around new information technologies: A French-Australian comparison. Recent advances in security technology. Proceedings of the 2006 RNSA Security Technology Conference, Canberra, pp 181-191.
Le Grand, G., Riguidel, M., Urien, P., Serhrouchni, A., Tchepnda, C., Naqvi, S., Tastet, F., Lopez, G., Johnson, J., Arujo, J., Gessler, G. and Feroul, M. (2006) Final trust, security and policy framework (Report), Sixth Framework Programme Priority 2, Security Expert Initiative.
McCarthy, J. and Fonseca, B. (2003) Trusting ID management technology. Information Age, Aug/Sept pp 35-39.
Milberg, S.J., Smith, H.J. and Burke, S.J. (2000) Information privacy: Corporate management and national regulation. Organization Science, 11 (1) pp 35-57.
OECD Directorate for Science, Technology and Industry, Working Party for Information Security and Privacy (2003) The promotion of a culture of security for information systems and networks in OECD countries. (Available from: http://www.oecd.org /dataoecd/16/27/35884541.pdf.)
Premier Ministre, Republique Française (2004) Cahier des Clauses Techniques Particulieres, 16 April 2004. (Available from: http://www.ssi.gouv.fr/fr/actualites/marches/ traduction/CCTP_n2004-04_du_16-04-04.pdf.)
Riguidel, M., Urien, P., Serhrouchni, A., Le Grand, G. and Naqvi, S. (2004) Assessment of Threats and Vulnerabilities for Networks. Sixth Framework Programme Priority 2, Security Expert Initiative. August.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2007 The journal of contemporary issues in business and government
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.