-
1
-
-
84893666127
-
-
AAP, January 13 (accessed March 7, 2013)
-
AAP (2011), "Vodafone sacks staff over privacy breach", January 13, available at: www.news.com.au/business/vodafone-sacks-staff-over-privacy- breach/story-e6frfm1i-1225987337818 (accessed March 7, 2013).
-
(2011)
Vodafone Sacks Staff over Privacy Breach
-
-
-
2
-
-
84893644822
-
-
Australian Bureau of Statistics (accessed March 7, 2013)
-
ABS (2011), 8153.0 - Internet Activity, Australia, June 2011, Australian Bureau of Statistics, available at: www.abs.gov.au/AUSSTATS/abs.nsf/DetailsPage/ 8153.0June%202011 (accessed March 7, 2013).
-
(2011)
8153.0 - Internet Activity, Australia, June 2011
-
-
-
3
-
-
84873382434
-
-
Australian Bureau of Statistics (accessed March 7, 2013)
-
ABS (2012), 1301.0 - Year Book Australia, 2012, Australian Bureau of Statistics, available at: www.abs.gov.au/ausstats/abs.nsf/Lookup/by%20Subject/ 1301.0~2012~Main%20Features~Home%20page~1 (accessed March 7, 2013).
-
(2012)
1301.0 - Year Book Australia, 2012
-
-
-
4
-
-
33750440197
-
The economics of information security
-
Anderson, R. and Moore, T. (2006), "The economics of information security", Science, Vol. 314, pp. 610-613.
-
(2006)
Science
, vol.314
, pp. 610-613
-
-
Anderson, R.1
Moore, T.2
-
5
-
-
84893684864
-
-
accessed May 13, 2012
-
Australian Government Defence Signals Directorate (2011), Strategies to Mitigate Targeted Cyber Intrusions, available at: www.dsd.gov.au/infosec/ top35mitigationstrategies.htm (accessed May 13, 2012).
-
(2011)
Strategies to Mitigate Targeted Cyber Intrusions
-
-
-
6
-
-
84893672570
-
-
accessed November 2, 2012
-
Australian Government Defence Signals Directorate (2012), Information Security Manual Controls, available at: www.dsd.gov.au/publications/Information- Security-Manual-2012-Controls.pdf (accessed November 2, 2012).
-
(2012)
Information Security Manual Controls
-
-
-
7
-
-
33744916686
-
-
Addison-Wesley Professional, Upper Saddle River, NJ
-
Bishop, M. (2004), Introduction to Computer Security, Addison-Wesley Professional, Upper Saddle River, NJ.
-
(2004)
Introduction to Computer Security
-
-
Bishop, M.1
-
8
-
-
84893654534
-
-
Emblemsvag, J. (Ed.) (accessed October 3, 2012)
-
Brockett, P.L., Golden, L.L. and Wolman, W. (2012), "Enterprise cyber risk management, risk management for the future - theory and cases", in Emblemsvag, J. (Ed.), available at: www.intechopen.com/books/risk-management- for-the-future-theory-andcases/enterprisecyber-risk-management (accessed October 3, 2012).
-
(2012)
Enterprise Cyber Risk Management, Risk Management for the Future - Theory and Cases
-
-
Brockett, P.L.1
Golden, L.L.2
Wolman, W.3
-
9
-
-
80054035972
-
Cyber threat landscape faced by financial and insurance industry
-
Choo, K.K.R. (2010), "Cyber threat landscape faced by financial and insurance industry", Trends & Issues in Crime and Criminal Justice, Vol. 408, pp. 1-6.
-
(2010)
Trends & Issues in Crime and Criminal Justice
, vol.408
, pp. 1-6
-
-
Choo, K.K.R.1
-
10
-
-
80955142795
-
The cyber threat landscape: Challenges and future research directions
-
Choo, K.K.R. (2011), "The cyber threat landscape: challenges and future research directions", Computers & Security, Vol. 30 No. 8, pp. 719-731.
-
(2011)
Computers & Security
, vol.30
, Issue.8
, pp. 719-731
-
-
Choo, K.K.R.1
-
11
-
-
0004023286
-
-
2nd ed., Harrow and Heston, New York, NY
-
Clarke, R.V. (1997), Situational Crime Prevention: Successful Case Studies, 2nd ed., Harrow and Heston, New York, NY.
-
(1997)
Situational Crime Prevention: Successful Case Studies
-
-
Clarke, R.V.1
-
13
-
-
38549085184
-
-
McGraw-Hill, New York, NY
-
Conklin, A., White, G., Cothren, C., Williams, D. and Davis, R.L. (2004), Principles of Computer Security, McGraw-Hill, New York, NY.
-
(2004)
Principles of Computer Security
-
-
Conklin, A.1
White, G.2
Cothren, C.3
Williams, D.4
Davis, R.L.5
-
14
-
-
84893657913
-
-
accessed June 27, 2012
-
Domain (2011), Security Center Fradulent Ads, available at: www.domain.com.au/public/SecurityPolicy.aspx (accessed June 27, 2012).
-
(2011)
Security Center Fradulent Ads
-
-
-
15
-
-
36148943853
-
Compliance obstacles to competitiveness
-
Doyle, E. (2007), "Compliance obstacles to competitiveness", Corporate Governance, Vol. 7, pp. 612-622.
-
(2007)
Corporate Governance
, vol.7
, pp. 612-622
-
-
Doyle, E.1
-
17
-
-
84893667208
-
-
accessed July 6, 2012
-
Griffith, C. (2011), "Laptop thieves foiled by remote tracing", The Australian, available at: www.theaustralian.com.au/australian-it/laptop- burglars-foiled-by-remote-tracing/story-e6frga kx-1226130051740 (accessed July 6, 2012).
-
(2011)
Laptop Thieves Foiled by Remote Tracing
-
-
Griffith, C.1
-
18
-
-
84875598792
-
Between hype and understatement: Reassessing cyber risks as a security strategy
-
Guinchard, A. (2011), "Between hype and understatement: reassessing cyber risks as a security strategy", Journal of Strategic Security, Vol. 4 No. 2, pp. 75-96.
-
(2011)
Journal of Strategic Security
, vol.4
, Issue.2
, pp. 75-96
-
-
Guinchard, A.1
-
20
-
-
80052818132
-
Risk assessment for mobile devices
-
Furnell, S., Lambrinoudakis, C. and Pernul, G. (Eds), LNCS, Springer, Berlin
-
Lederm, T. and Clarke, N. (2011), "Risk assessment for mobile devices", in Furnell, S., Lambrinoudakis, C. and Pernul, G. (Eds), Trust, Privacy and Security in Digital Business, LNCS 6863, Springer, Berlin, pp. 210-221.
-
(2011)
Trust, Privacy and Security in Digital Business
, vol.6863
, pp. 210-221
-
-
Lederm, T.1
Clarke, N.2
-
21
-
-
84867375385
-
BYOD: Security and privacy considerations
-
Miller, K.W., Voas, J. and Hurlburt, G.F. (2012), "BYOD: security and privacy considerations", IT Professional, Vol. 14 No. 5, pp. 53-55.
-
(2012)
IT Professional
, vol.14
, Issue.5
, pp. 53-55
-
-
Miller, K.W.1
Voas, J.2
Hurlburt, G.F.3
-
22
-
-
84893659236
-
-
accessed September 28, 2012
-
Mobius (2010), Data Assets and Network Security Insurance, available at: http://mobiusund.com.au/downloads/Mobius%20Cyber%20-%20DANSI%20- %20website%20version.pdf (accessed September 28, 2012).
-
(2010)
Data Assets and Network Security Insurance
-
-
-
23
-
-
84875147433
-
Digital droplets: Microsoft SkyDrive forensic data remnants
-
Quick, D. and Choo, K.-K.R. (2013a), "Digital droplets: Microsoft SkyDrive forensic data remnants", Future Generation Computer Systems, Vol. 23 No. 3, pp. 1378-1394.
-
(2013)
Future Generation Computer Systems
, vol.23
, Issue.3
, pp. 1378-1394
-
-
Quick, D.1
Choo, K.-K.R.2
-
24
-
-
84877809583
-
Dropbox analysis: Data remnants on user machines
-
Quick, D. and Choo, K.-K.R. (2013b), "Dropbox analysis: data remnants on user machines", Digital Investigation, Vol. 10 No. 1, pp. 3-18, available at: http://dx.doi.org/10.1016/j.diin.2013.02.003
-
(2013)
Digital Investigation
, vol.10
, Issue.1
, pp. 3-18
-
-
Quick, D.1
Choo, K.-K.R.2
-
25
-
-
85010594284
-
Cyber criminals on trial
-
Smith, R., Grabosky, P. and Urbas, G. (2004), "Cyber criminals on trial", Criminal Justice Matters, Vol. 58, pp. 22-23.
-
(2004)
Criminal Justice Matters
, vol.58
, pp. 22-23
-
-
Smith, R.1
Grabosky, P.2
Urbas, G.3
-
26
-
-
1842829828
-
-
NIST Special Publication, NIST, Gaithersburg, MD
-
Stoneburner, G., Goguen, A. and Feringa, A. (2002), Risk Management Guide for Information Technology Systems, NIST Special Publication 800-30, NIST, Gaithersburg, MD.
-
(2002)
Risk Management Guide for Information Technology Systems
, pp. 800-830
-
-
Stoneburner, G.1
Goguen, A.2
Feringa, A.3
-
28
-
-
84869141956
-
-
accessed June 26, 12
-
Verizon (2012), Data Breach Investigations Report, available at:www.verizonbusiness.com/resources/reports/rp-data-breach-investigations- report-2012-en-xg.pdf (accessed June 26, 12).
-
(2012)
Data Breach Investigations Report
-
-
|