Zero To Eight Young Children Internet Use – UK LSE August 2013

EU Kids Online has spent seven years investigating 9-16 year olds’ engagement with the internet, focusing on the benefits and risks of children’s internet use. While this meant examining the experiences of much younger children than had been researched before EU Kids Online began its work in 2006, there is now a critical need for […]

E-Crime in the UK - House of Commons Jul 2013

E-Crime in the UK – House of Commons July 2013

We live in a world where terms like “Cyber crime” no longer belong in the realm of science fiction. Modern devices such as smart phones and tablets have brought the internet not only to our fingertips but to our bedsides, our pockets and to our children. And yet there is strong evidence that access to […]

Economic Impact of Cybercrime and Cyber Espionage - CSIS July 2013

Economic Impact of Cybercrime and Cyber Espionage – CSIS McAfee July 2013

Is cybercrime, cyber espionage, and other malicious cyber activities what some call “the greatest transfer of wealth in human history”, or is it what others say is a “rounding error in a fourteen trillion dollar economy”? The wide range of existing estimates of the annual loss – from a few billion dollars to hundreds of […]

Enter The Cyber Dragon - Chinese Military Cyber Capabilities

Enter The Cyber Dragon – Chinese Military Cyber Capabilities – ASPI June 2013

China’s intelligence services and Chinese Military Cyber Capabilities have long been underanalyzed as major bureaucratic organizations and components of state power. This may have mattered relatively little during China’s inward‑looking and under‑developed years. Today, its leaders are significant players on the world stage, and understanding how and what they learn about the world and how […]

2007 Information Security for Enterprise Architecture – TISN DCITA

Report :   2007 Information Security for Enterprise Architecture – TISN DCITA Rapid development in information and communication technologies and the changing business environment present a range of challenges for organisations that rely on such technologies for day-to-day operations. Critical infrastructure sectors are at particular risk from interruption to information technology operations as this can lead […]

2007 Managing IT Security When Outsourcing TISN DCITA

Report : 2007 Managing IT Security When Outsourcing TISN DCITA This guide provides resources and checklists to assist managers to address IT security issues when organisations are negotiating new, or renegotiating existing outsourcing contracts for their IT arrangements. The ITSEAG has released a guide to effective IT security governance which should be seen as a […]

2006 IT Security Governance – A CIO’s Guide TISN DCITA

2006 IT Security Governance – A CIO’s Guide TISN DCITA Whatever your business, security and privacy are key matters that affect your enterprise and those dependent upon you. There is a realisation, domestically and abroad, that an organisation cannot effectively achieve its corporate and IT governance objectives without high-level executive support. These issues are now […]

2006 Leading Practices For Enterprise Security Governance TISN DCITA

2006 Leading Practices For Enterprise Security Governance TISN DCITA Corporate Governance is top of mind in boardrooms across Australia. It is now widely understood that effective corporate governance is required to protect the interest of an organisation’s stakeholders, which in turn protects Australia’s economic and social interests. Information Technology (IT) governance is a relatively new […]