Corpus ID: 113599924

Proceedings of The 8 th Australian Information Warfare and Security Conference

  title={Proceedings of The 8 th Australian Information Warfare and Security Conference},
  author={Mount Lawley Campus},
AS/NZS4360:2004 suggests that the risk assessment process should not be conducted or information gathered in isolation. This insular method of data collection may lead to inaccurate risk assessment, as stakeholders with vested interests may emphasise their own risks or game the risk assessment process. The study demonstrated how a consensual risk assessment approach may result in a more acceptable risk assessment outcome when compared to individual assessments. The… Expand


Mapping the Australian Security Industry
This study was designed in response to media claims about dramatic growth in the size of the security industry in Australia, following lethal incidents involving security personnel. All availableExpand
Fighting Terrorism and Insurgency: Shaping the Information Environment
And let there be no doubt, in the years ahead it is likely that we will be surprised again by new adversaries who may also strike in unexpected ways.-Donald H. Rumsfeld1 IN ISKANDARIYAH, Iraq,Expand
Organisational Information Security: A Viable System Perspective
Beer’s Viable System Model (VSM) is used as a ‘lens’ to view such threats and particularly the algedonic signal is identified as a particularly useful notion for incorporation into organisational security structures where corporate complacency may have set in. Expand
Intelligence power in peace and war
Intelligence services form an important but controversial part of the modern state. Drawing mainly on British and American examples, this book provides an analytic framework for understanding theExpand
Watching the Watchmen: State Regulation of Private Security 1982–1998
There are currently over 10,000 security companies in the United States, employing 1.8 million guards. Security guards already outnumber police by almost three to one, and this discrepancy isExpand
Information Warfare: using the viable system model as a framework to attack organisations
This paper uses a proven systemic, analytic framework - the Viable System Model - in a functionalist mode, to analyse the vulnerabilities of an organisation's information resources to this form of aggression. Expand
Information Warfare: corporate attack and defence in a digital world
This text introduces the concepts of information warfare from a non-military, organizational perspective. It is designed to stimulate managers to develop policies, strategies, and tactics for theExpand
Critical infrastructure protection, modelling and management: an Australian commercial case study
A refinement of the previously proposed critical infrastructure model is presented to enhance further the understanding and apprecication of where the likely inter-play and existance of dependency relationships between infrastructures coexist. Expand
Terror on the Internet: The New Arena, the New Challenges
Terror on the Internet offers an excellent overview of the origin and evolution of the scenario of cyberterrorism from the various approaches that shape it and highlights the interests of direct and indirect actors involved in it. Expand
Antiterrorism Legislation in Australia: A Proportionate Response to the Terrorist Threat?
This article examines key provisions of Australia's antiterrorism legislation introduced in the aftermath of the 11 September attacks. Never before in history has Australia witnessed a comparableExpand