Evolution, Implications, and Future of Australian Cyber Security Laws

Verified

Added on  2022/08/16

|22
|6363
|15
Essay
AI Summary
Read More
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: CYBER SECURITY LAWS AND REGULATION
Cyber Security Laws and Regulation
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1CYBER SECURITY LAWS AND REGULATION
Introduction
The extensive development in the field of IT has led to the growth and development
of numerous issues like viruses, worms, DoS attacks and phishing emails (Austin and Slay
2016). Numerous measures are required to be taken to deal with the threats coming from each
of these issues. To address these issues there are few security steps which are usually taken
such as the advanced firewalls, anti-virus software, diverse categories of intrusion detection
systems, different types of encryption techniques, use of complex and longer alphanumeric
passwords. These security steps are usually taken in most of the commercial establishments
all around the word to deal with these issues.
Cyber security laws are regulations are very much useful both in commercial
establishments as well as in our society. These regulations are very much useful to protect
any kinds of devices which are connected to an active internet connection. In Australia, each
of these issues falls under the category of Criminal Code Act of 1995 (Anwar Gill and
Beydoun 2018). Most of the spamming and the hacking activities related to cyber-crime is
related withy this code of jurisdiction. The maximum penalty for a contravention based on
this code is a maximum of 10 years of imprisonment. There are numerous clauses related
with this code as well such as the S.135.1 (5) and S.135.1 (3) (Lawcouncil.asn.au. 2020).
Along with these clauses there are numerous divisions related with this clause as well such
division 372 which is focussed in any identify fraudulent activities related to cyber-crime.
Previously the Crimes Act 1900 (Cth) helped the Australians to maintain law and order on
their soil.
Individual essay is defined as the type of essay which is very much coherent and well
organized in nature (Askari 2018). This essay shall focus on numerous aspects such the
evolutionary trends of the cyber security laws and regulations in Australia over the years, the
Document Page
2CYBER SECURITY LAWS AND REGULATION
consequence of each of these trends shall be discussed in this individual essay as well.
Present and the future implications of each of these security laws shall be evaluated and
discussed in this individual essay.
Cyber criminals and hackers are using new methods in each of their cyber security
activities thus, it can be suggested that these security laws has be revised and modified on a
regular interval so that the impact of these issues do not have an adverse impact on our
society and in commercial organizations (Anwar, Gill and Beydoun 2018). The changes
required in the security laws shall be recommended in the conclusive unit of this individual
essay in an organized manner.
Evolutionary view of the trend (past, current and future)
Past
Privacy Act 1988: The Australian Privacy Principles (APP) are one of the most
significant ways which will be maintained in Australia to address the threats of disclosure of
personal information, addressing the threats of an agency’s governance and accountability,
maintain the integrity of the personal information, issues related with data access. Numerous
regulatory actions are required to be taken in the future in order to deal with the increasing
number of cyber security incidents. APP is an integral part of the Privacy Act 1988
(Aph.gov.au. 2020). Most of the commercial establishments of Australia are secured with the
help of this privacy act. Numerous data which revolves around the commercial
establishments of Australia such as the tax file numbers, health and medical research and
credit reporting systems. Each of these essential documents was secured with the help of this
privacy act.
Telecommunications Act Australia: There are numerous surveillance devices which
are increasingly used in the healthcare organisations and military operations. As a result
Document Page
3CYBER SECURITY LAWS AND REGULATION
maintaining security of these devices is very much critical for the growth and development of
these industries. Security issues of the tele-communication sector was having a huge impact
on the other industries of Australia, the establishment of this act was very much useful to
maintain security of the data which are accessed with the help of the Telecommunications
Act (Cyber.gov.au. 2020).
Spam act 2003 Australia: The threats coming from the electronic messages were a
huge source of concern for the Australians as it was having a direct impact on the
development of the Australian economy (Australia.gov.au. 2020). The civil penalty options
were not at all very much useful to deal with the fraudulent activities which were conducted
through the electronic messages. There are numerous provisions related to this act as well in
terms of the subsections like subsection 16(1), (6) and (9). This act was very much
successful as compared with the other cyber security acts as it helped in preventing
spamming activities in most of the healthcare industries and IT industries. Transparency of
the online procurement process was maintained after this legislation was successfully
incorporated in the Australian society.
Do Not Call Register Act 2006: In the early 2000, there were numerous cyber
security incidents in the Australian soil and to address the threats coming from these incidents
this act was established in the year 2006 (Phys.org. 2020). Threats coming from the
telemarketing calls of the spammers were a huge source of concern for the Australians and
after the establishment of this act this criminal activity was minimised to a huge extent.
Threats coming from the unsolicited marketing faxes were also minimised with the help of
this act. The threats coming from the overseas based tele-commuters to help solicit sales were
partially disrupted due to this legislation. Consumer forums were created where each of these
fraudulent activities are reported was created after the legislation was formed.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4CYBER SECURITY LAWS AND REGULATION
Federal Information Security Management Act (FISMA): This security act was
helpful to minimise with the data security issues of the commercial establishments of
Australia (Mann et al. 2018). The protection programs of each organization are very much
useful to minimise the security threats coming from the cyber criminals. Thus, it can be said
that the security of each of these sensitive documents was secured to a huge extent after the
establishment of this law in the year 2002.
Current
The entire computer networking architecture of the Australian commercial
establishments are decentralized in nature. Most of the connectivity and the community
issues of the Australian society are addressed with the help of the cyber security laws which
are described in the above unit of this individual essay (Manwaring and Hanrahan 2019). The
organizational structure of the critical infrastructure centre can be understood using the
pictorial representation.
Figure 1: Organizational structure
(Source: Selby 2017)
Document Page
5CYBER SECURITY LAWS AND REGULATION
There are diverse categories of cyber security challenges which are faced by the
Australian citizens due to the deployment of the social media platforms. New vulnerabilities
are getting cropping up in the last few years such as the SQL injection attacks and the crypto
jacking attacks (Porcedda 2018). Each of these attacks ate having a direct impact on the
productivity of commercial organizations in the Australian soil.
Criminal Code Act 1995: It is one of the most significant codes which exist in the
Australian soil to address the security challenges which are being faced in the physical IT
systems which are used in commercial establishments for different purposes. This code is
very much useful to deal with the criminal activities related with misuse of information. The
threats of the public administration offices were restricted to a huge extent with the help of
this act ((Pandey et al. 2016). There are diverse categories offences which were saved after
the establishment of the criminal code act such as the hybrid offences, indictable offences,
and conviction offences. The impact of the issues related with negligence was also minimized
with the help of this code. Thus, it can be said that the basic value of the society was restored
with the help the help of this act as well.
Computer Misuse Act: Established in the year 1990, this law is very much useful to
manage the networking security of an organization (Brevini 2017). Most of the unauthorized
access in an organizational network can be avoided in the first place with the help of this act.
This act is also very much useful for protection the confidential information which travels
across the business unit of the commercial establishments of Australia. Based on this act,
different types of fines are enacted for the criminals. The national security of this country was
enhanced after the establishment of this law as well. Most of the illegal activities of a
commercial business organization such as the data alteration is being minimised with the help
of this code.
Document Page
6CYBER SECURITY LAWS AND REGULATION
There are diverse of computer misuses such as the hacking activities, data misuse,
maintaining the copyright of the software or any other project, pornographic contents,
identify and financial abuses and viruses (Chang, Zhong and Grabosky 2018). Each of these
computer misuses can be minimised using this code. Misuse of devices is also getting
addressed using this code as well.
Most of the criminal activities of the cyber-criminals are getting minimized in the first
place with the help of this criminal code as well (Coventry and Branley 2018). The inter
locking regime was also maintained with the help of this computer security laws. The
percentage of the number of actors related with the anti-cyber-crime activities can be
understood from the below pictorial representation.
Figure 2: Actors supporting anti cyber crime
(Source: Broadhurst 2017)
Future
The future of cyber security is very much on the higher side in Australia as the
government of Australia are investing millions of dollars to enhance the network (Aldawood
and Skinner 2018). New IT experts are getting hired in each every government offices as a
result the networking security of these organizations are getting enhanced each and every
day. Response management team is very much significant to deal with the cyber security
issues.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7CYBER SECURITY LAWS AND REGULATION
Numerous emerging technologies are being used to deal with the cyber security
threats coming from the spammers (Quisumbing 2017). IT security policies are getting
incorporated in commercial business organizations to deal with the threats coming from
inside the commercial establishments.
Australian investigative department and agencies are very much capable to deal with
most of the online security threats such as the spamming emails. Artificial Intelligence is
going to be one of the most popular technologies in most of the commercial business
establishments all around Australia. This technology shall not only help to enhance and
support the existing cyber security laws but shall also help the governing councils to create
new cyber security laws and cyber warfare (Abu-Taieh 2017). Technologies like AI can also
help Australia to make decision of the International treaties. Thus, it can be assumed that
most of the computer related time can be minimised with the help of AI as well.
The incorporation of the emerging technologies such as AI can be very much useful to
cost of managing the cybercrimes (AM Slay 2016). Most of the micro level attacks of
Australia can be avoided in the first place with the help of these technologies. In the future,
most of the cyber-attack technologies are expected to enhance the quality of the business
operations military operations. Financial gain is one of the most significant future prospects
of the different categories of cyber security laws.
Cyber security opening is one of the other positive relayed with the cyber security
laws which exists in Australia (Mackey and Nayyar 2016). Thus, it can be said that the
productivity of the cyber warfare department and digital forensics departments of Australia
has to be enhanced with the help of these cyber security laws and cyber-attack technologies.
Implication of the trend to the world that we live in:
Document Page
8CYBER SECURITY LAWS AND REGULATION
In 2016, more than 10000 cyber-crimes was recorded in Australia and there were
more than 1 million cases which were recorded based on the cyber security threats. Security
breaches are getting observed in most of the SMEs (Quisumbing 2017). Australian
Cybercrime Online Reporting Network is currently working hard on the ways to improve
the ways to improve the risk identification procedures which are adopted by most of the
commercial establishments all over Australia.
The needs and requirements of our society as well as the commercial business
establishments keep on changing every moment. New technologies and business practices
are getting introduced in most of the contemporary business establishments. Every aspect of
the society is now related with different types of computer systems which are connected with
active internet connection. The productivity of each of the diverse categories of industries is
getting enhanced due to the improvement of the data management capability of business
organizations (Shackelford, Russell and Kuehn 2016). As a result of using diverse categories
of systems, there is a direct threat coming from both the users of the systems as well as
from the cyber criminals.
The cyber security skills gap is also one of the major limitations of most of the
Australian commercial establishments who are trying to make their mark outside Australia
(AM Slay 2016). Most of these commercial establishments make the most out of the cloud
computing services as they want to store and manage their essential business documents and
there is numerous security concerns related with the use of cloud computing as well.
Integration and Automation are the other cyber security trends related with most of the
commercial establishments. Growing awareness of the cyber security is one of the other
cyber security trends in the last two years. State sponsored cyber-attacks are one of the other
current trends of the cyber security as well. At the same time, it can also be decided that there
Document Page
9CYBER SECURITY LAWS AND REGULATION
are diverse categories of risks related with the use of IT systems which optimises business
operations.
Based on the current trends, it can be saved that there are numerous cyber security
vulnerabilities related with most of the commercial business organizations such as the threat
coming from inside the organization as well as from the diverse categories of cyber security
threats such as ransomware. Thus, securing the network security vulnerabilities is one of the
recent trends related with the cyber security laws which are practised in the Australian
conditions (Min, Chai and Han 2015). Having a better security is one of the prime trends
which is being followed in most of the commercial establishments all around Australia due to
the threats coming from the Korean and Japanese hackers.
Numerous manufacturing industries are making the most out of the cyber security
programs to optimise different business operations. Cost of maintenance of services has
drastically reduced after the deployments of numerous Information Security policies (Kshetri
2015). There are numerous data security threats like data alteration and data
encapsulation, which can be minimised using Information Security policies as well. The data
collection procedure of the Australian organizations has enhanced a lot in the last five years
as compared to what it was in the mid-90s.
Current most of the social engineers all around the world are using diverse categories
of mobile devices as an attack vector (Persadha, Waskita and Yazid 2015). Most of the
business communications are managed in the first place with the help of these mobile
devices, thus it is very much easier for the cyber criminals to compromise the data from these
mobile devices.
There are numerous legal complication related with the role of the government when
a cyber-security attack occurs. Currently, most of the ransomware attacks come from the
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10CYBER SECURITY LAWS AND REGULATION
malware bytes. Presently, most of the commercial establishments are creating new data
privacy policies to make sure that there are no real threats coming from the employees of an
organization (Slay and Austin 2018). Maintaining the privacy standards is very much useful
to identify the exact network vulnerability. Uses of latest encryption techniques are also very
much useful to restrict issues like data alteration, as this phenomenon has a direct impact on
the market reputation of commercial establishments.
Recently, numerous new technologies are being created in the IT laboratories of
Australia to deal with the cyber security issues like DevSecOps (Mikolic-Torreira et al.
2017). This software is beneficial to address cloud security issues related with most of the
commercial establishments of Australia. The collaboration of the engineers of a commercial
establishment and security teams is getting enhanced due to the use of DevSecOps.
Considering the most recent trends, it can be said that ransomware attacks of 2019
was very much different this this attack which was carried out in the previous years. In 2019,
most of the social engineers set a target or a specific business; as a result the cyber attackers
can cause maximum business disruption. Thus, huge amount of money in the bit coins are
taken from the victims.
Nowadays, phishing mail attacks can also be conducted with the help of an email
account, new attack vectors were identified by the social engineers all around the world
which can be useful tom extract any type of sensitive data (Kenderdine 2017). SMS texts are
used by the social engineers to spread this cyber security attack. The use of the diverse
categories of online social platforms like Facebook can also lead to a phishing attack as well.
The use of the mobile banking malware have increased over the years, the availability
of the malware developers is one of the notable reasons behind the over use of this virus.
Multi vector generation V cyber-attacks are also one of the trending topics which are related
Document Page
11CYBER SECURITY LAWS AND REGULATION
with most of the IoT devices which are either used in a corporate establishment or in a
society (Botton and Lee-Makiyama 2018). Inspite of taking numerous holistic approaches
these threats is a huge source of concern for both the citizens of our society as well as for the
employees of commercial establishments.
Most of the cyber criminals are using AI to identify the networking vulnerabilities and
the ways which will be most feasible for them to compromise a network. Development of
evasive software is supported from this technology as well. Based on the current cyber
security trends, it can be said that traditional pen testing has become obsolete due to the
creation of better attack simulation technologies by the social engineers. The risk of the micro
breaches has increased considerable due to the cyber security activities such as the
gamification, document hunt and bug bounty.
Application of legal and legislative considerations
What is yet to happen?
The level of connectivity among each of the commercial business organizations is
expected to get enhanced due to the cyber security laws. Each of the diverse categories of
laws is expected to be very much useful for organizations to deal with the networking threats
and the legal problems faced due to the cyber security threats. Based on the current trends, it
can be said that human behaviour is also expected to get tracked with the help of the cyber
security laws as well (Sabillon, Cavaller and Cano 2016). The global reach of most of the
reputed Australian commercial establishments is also expected to get enhanced due to the
cyber security laws. The productivity of the investigative departments of commercial
establishments is also expected to enhance due to the current trends of cyber security
programs.
Document Page
12CYBER SECURITY LAWS AND REGULATION
Security measures need to be taken due to different types of cyber security attacks like
crypto jacking (Daly 2018). The productivity of the coal mining industries which is very
much vulnerable to the cyber security laws can also be enhanced using the cyber security
laws. Security issues due to unauthorised access of the credential theft are decresing in the
Australian society due to the existing cyber security laws as well. Security of data even after
a web based attack shall be enhanced in the first place with the help of the cyber security laws
as well, at it will help in the identification of the networking vulnerabilities. Prioritization of
the use of security patches in most of the commercial establishments is surely one of the
prime activities which are yet to happen due to the use of the cyber security laws. Regulatory
compliances of commercial business organization are also expected to get modified in the
coming year if each of these cyber security laws considers the use of emerging technologies.
Most of the global business leaders are huge expected to get the assistance of the of
the cyber security regulations, as the data security of the organization depends hugely on the
data management ability of the business leaders. The strategic investments of the commercial
organizations are also expected to get boosted with the help of cyber security measures and
defences.
What to look out for in future?
Most of the criminal activities are subjected to get resolved in a minimum time with
the help of the cyber security laws which were introduced and described in the earlier
segments of this individual essay (Shackelford, Russell and Haut 2015). Predictive
intelligence of the investigative department is also expected to enhance with the help of the
cyber security laws. Security investments of the commercial organizations can be improved
using the cyber security laws. It can also be said that business operations of the major
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13CYBER SECURITY LAWS AND REGULATION
commercial industries such as stakeholder analysis is expected to get improved using the
cyber security laws.
Background: Botnet attacks is one of the most popular cyber security attack which
have a direct impact on the growth and reputation of commerce business organizations such
as the healthcare (Brookes 2015). Botnet attacks are very much popular among most of the
social engineers all around the world and each of the social engineers are making the most
out of the cloud computing vulnerabilities to make way for this attack. SQL injections are
increasingly used by the social engineers in each of the recent botnet attacks. Thus, botnet
monitoring is one of the prime objectives of most of the commercial organizations all around
Australia.
The cyber security laws are very much useful to address the botnet monitoring
procedure of a commercial establishment. Most of the cyber security activities in
commercial organizations is expected to get tracked in the coming future with the help of the
cyber threat sponsor. Each of these network security threats can be addressed in the first place
with the help of the network sensors as well.
In the future the cyber security programs are very much useful to maintain the
strategic relationship with the business partners to help to guide digital transformation
procedures (Tovino 2016). Engagement of each of the business stakeholders is expected to
get more boosted in the coming years due to the cyber security laws. Thus, it can be said that
maintaining a secured road map of success is one of the prime future prospects of the cyber
security laws.
Background: There are numerous networking security threats across the major
healthcare and educational organizations of Australia due to the threats coming from cyber
security issues like ransomware. These threats can have both financial loss as well as
Document Page
14CYBER SECURITY LAWS AND REGULATION
reputational loss on each of these organizations. However, the advancement in the field of IT
has led to the growth of numerous new concepts such as cyber preparedness.
Cyber preparedness is expected to be beneficial to minimise the cyber security
incidents such as ransomware (Newman and Kreick 2015). This process is very much useful
to enhance the capability of an organization to deal with the network security threats. The
network analysing capability of the commercial establishments is expected to get enhanced
due to this concept. It is expected that numerous cyber security attempts from the cyber
criminals can be foiled with the help of cyber preparedness.
Creation of cyber preparedness programs are also very much useful for the employees
of the commercial organization so that they can understand they contribution to deal with any
type of cyber security challenge. Networking assurance and digital forensics is also expected
to get enhanced due to these cyber preparedness programs.
The cyber threat level of each of the commercial establishment such as the cyber
vandalism, cyber theft, cyber conflict, and cyber incursions (Cohen and Mello 2018). Each of
these different types of threats has to be avoided using cyber preparedness levels like critical
information protection perimeter defence, responsive awareness and pervasive agility.
Conclusion
The latest development in the field of IT has both advantages and limitations, the
prime positives related with the IT innovations are the technologies which optimises business
operations such as the Artificial Intelligence and the prime negatives includes the cyber
security challenges like DoS Attacks. This individual essay was very much useful for the
readers as it helped in providing information about the numerous types of cyber security laws
which are established on the Australian soil such as the Criminal Code Act of 1995. The
Privacy Act of 1988 was very much useful to address the threats coming from managing the
Document Page
15CYBER SECURITY LAWS AND REGULATION
personal information both in the Australian society and in the Australian commercial
establishments. The tele-communication acts are very much useful to maintain the
networking security of the healthcare industries as well as the military operations of the
commandoes. Spamming through electronic messages was one of the huge source of concern
for the Australian government which was addressed when the Spam Act was established in
the year 2003. In the early 2000s, spamming activities was occurring with the help of the tele-
marketing calls, in order to deal with this threat and minimise its impact on the progress of
business organizations. Do Not Call Register Act was passed in the year 2006. The increasing
data security threats in this country was minimised to a huge extent due to the establishment
of FISMA, this act was very much useful to minimise security attacks like ransomware. The
individual essay helped in concluding the significance of the Criminal Code Act of 1995
which is very much useful to deal with the activities like misuse of information and issues
faced due to negligence. This essay also highlighted the significance of the Computer Misuse
Act which was established in 1990 to deal with the challenges which are faced by
commercial establishments to maintain networking security.
Government of Australia are spending millions of dollars to enhance the network
security of both the commercial establishments as well as the government offices every year.
The capability of the investigative departments of Australia is expected to enhance as a result
of the security measures taken by the Australian government. Emerging technologies like AI
are being used by the digital forensic departments to reduce the cost of managing the cyber-
crimes.
The needs and requirements of our society as well as commercial establishment keep
on changing every moment and new technologies are getting introduced in the contemporary
business environments. Cyber security threats come not only from the cyber criminals but
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
16CYBER SECURITY LAWS AND REGULATION
also from the threats coming from inside a commercial establishment as well. Most of the
corporate establishments have their network security plans to deal with the threats coming
from the social engineers. The cyber security laws are very much beneficial for the growth of
Australian commercial establishments as these cyber security threats are increasing every
year. In the future, time required to solve the criminal cases is expected to get reduced
considerable due to the maintenance of the cyber security laws.
Recommendation
The lists of recommendation of this individual essay are as followings:
Laws must be created in such a manner so that new clauses can be added whenever
required.
Laws must be promoted in social media platforms to reach out to maximum people in
a fraction of second.
Regulations must not have any adverse impact on the national economy of Australian
in terms of the international trade relations.
Document Page
17CYBER SECURITY LAWS AND REGULATION
References
Abu-Taieh, E.M., 2017, November. Cyber security body of knowledge. In 2017 IEEE 7th
International Symposium on Cloud and Service Computing (SC2) (pp. 104-111). IEEE.
Aldawood, H. and Skinner, G., 2018, December. Educating and raising awareness on cyber
security social engineering: A literature review. In 2018 IEEE International Conference on
Teaching, Assessment, and Learning for Engineering (TALE) (pp. 62-68). IEEE.
AM Slay, J., 2016. Training and education for cyber security, cyber defence and cyber
warfare.
Anwar, M.J., Gill, A.Q. and Beydoun, G., 2018, January. A review of information privacy
laws and standards for secure digital ecosystems. In ACIS 2018-29th Australasian
Conference on Information Systems.
Anwar, M.J., Gill, A.Q. and Beydoun, G., 2018, January. A review of information privacy
laws and standards for secure digital ecosystems. In ACIS 2018-29th Australasian
Conference on Information Systems.
Aph.gov.au. (2020). Cybersecurity, cybercrime and cybersafety: a quick guide to key internet
links Parliament of Australia. [online] Available at:
https://www.aph.gov.au/About_Parliament/Parliamentary_Departments/
Parliamentary_Library/pubs/rp/rp1819/Quick_Guides/CybersecurityCybercrimeCybersafety
[Accessed 5 Feb. 2020].
Askari, M.M.U.R., 2018. Significance of Ever-evolving Cybersecurity Landscape:
Challenges and Possible Pathways. National Journal of Cyber Security Law, 1(1), pp.22-37.
Document Page
18CYBER SECURITY LAWS AND REGULATION
Austin, G. and Slay, J., 2016. Australia's Response to Advanced Technology Threats: An
Agenda for the Next Government. UNSW Canberra, Canberra, Australian Centre for Cyber
Security Discussion Paper, 3.
Australia.gov.au. (2020). Cyber security | australia.gov.au. [online] Available at:
https://www.australia.gov.au/information-and-services/security-and-defence/national-
security/cyber-security [Accessed 5 Feb. 2020].
Botton, N. and Lee-Makiyama, H., 2018. 5G and national security after Australia's telecom
sector security review (No. 8/2018). ECIPE Policy Brief.
Brevini, B., 2017. Metadata laws, journalism and resistance in Australia. Media and
Communication, 5(1), pp.76-83.
Broadhurst, R., 2017. Cybercrime in Australia. In The Palgrave Handbook of Australian and
New Zealand Criminology, Crime and Justice (pp. 221-235). Palgrave Macmillan, Cham.
Brookes, C., 2015. Cyber Security: Time for an integrated whole-of-nation approach in
Australia. Centre for Defence and Strategic Studies,(March 2015). Retrieved from:
http://www. defence. gov. au/ADC/Publications/IndoPac/150327% 20Brookes% 20IPS%
20paper.
Chang, L.Y., Zhong, L.Y. and Grabosky, P.N., 2018. Citizen co‐production of cyber security:
Self‐help, vigilantes, and cybercrime. Regulation & Governance, 12(1), pp.101-114.
Cohen, I.G. and Mello, M.M., 2018. HIPAA and protecting health information in the 21st
century. Jama, 320(3), pp.231-232.
Coventry, L. and Branley, D., 2018. Cybersecurity in healthcare: a narrative review of trends,
threats and ways forward. Maturitas, 113, pp.48-52.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
19CYBER SECURITY LAWS AND REGULATION
Cyber.gov.au. (2020). Privacy | Cyber.gov.au. [online] Available at:
https://www.cyber.gov.au/privacy [Accessed 5 Feb. 2020].
Daly, A., 2018. The introduction of data breach notification legislation in Australia: A
comparative view. Computer law & security review, 34(3), pp.477-495.
Kenderdine, T., 2017. China's industrial policy, strategic emerging industries and space
law. Asia & the Pacific Policy Studies, 4(2), pp.325-342.
Kshetri, N., 2015. Cybercrime and cybersecurity issues in the BRICS economies. Journal of
Global Information Technology Management, 18(4), pp.245-249.
Lawcouncil.asn.au. (2020). Cyber Security. [online] Available at:
https://www.lawcouncil.asn.au/tags/cyber-security [Accessed 5 Feb. 2020].
Mackey, T.K. and Nayyar, G., 2016. Digital danger: a review of the global public health,
patient safety and cybersecurity threats posed by illicit online pharmacies. British medical
bulletin, 118(1), pp.110-126.
Mann, M., Daly, A., Wilson, M. and Suzor, N., 2018. The limits of (digital)
constitutionalism: Exploring the privacy-security (im) balance in Australia. International
Communication Gazette, 80(4), pp.369-384.
Manwaring, K. and Hanrahan, P.F., 2019. BEARing responsibility for cyber security in
Australian financial institutions: The rising tide of directors’ personal liability. Journal of
Banking and Finance Law and Practice, 30(1), pp.20-42.
Mikolic-Torreira, I., Snyder, D., Price, M., Shlapak, D.A., Beaghley, S.M., Bishop, M.,
Harting, S.J., Oberholtzer, J., Pettyjohn, S., Weinbaum, C. and Westerman, E., 2017.
Exploring Cyber Security Policy Options in Australia. RAND.
Document Page
20CYBER SECURITY LAWS AND REGULATION
Min, K.S., Chai, S.W. and Han, M., 2015. An international comparative study on cyber
security strategy. International Journal of Security and Its Applications, 9(2), pp.13-20.
Newman, T. and Kreick, J., 2015. The Impact of HIPAA (and Other Federal Law) on
Wearable Technology. SMU Sci. & Tech. L. Rev., 18, p.429.
Pandey, S., Shah, N., Sharma, A. and Farik, M., 2016. Cybersecurity Situation In
Fiji. International Journal of Scientific & Technology Research, 5(7), pp.215-219.
Persadha, P.D., Waskita, A.A. and Yazid, S., 2015, October. Comparative study of cyber
security policies among malaysia, australia, indonesia: A responsibility perspective. In 2015
Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic
(CyberSec) (pp. 146-150). IEEE.
Phys.org. (2020). Australia passes cyber snooping laws with global implications. [online]
Available at: https://phys.org/news/2018-12-australia-cyber-snooping-laws-global.html
[Accessed 5 Feb. 2020].
Porcedda, M.G., 2018. Patching the patchwork: appraising the EU regulatory framework on
cyber security breaches. Computer law & security review, 34(5), pp.1077-1098.
Quisumbing, L.A., 2017. Global Perspectives on Cyber security Using Latent Dirichlet
Allocation Algorithm. International Journal of Applied Engineering Research, 12(20),
pp.10310-10323.
Sabillon, R., Cavaller, V. and Cano, J., 2016. National cyber security strategies: global trends
in cyberspace. International Journal of Computer Science and Software Engineering, 5(5),
p.67.
Selby, J., 2017. Data localization laws: trade barriers or legitimate responses to cybersecurity
risks, or both?. International Journal of Law and Information Technology, 25(3), pp.213-232.
Document Page
21CYBER SECURITY LAWS AND REGULATION
Shackelford, S.J., Russell, S. and Haut, J., 2015. Bottoms up: a comparison of voluntary
cybersecurity frameworks. UC Davis Bus. LJ, 16, p.217.
Shackelford, S.J., Russell, S. and Kuehn, A., 2016. Unpacking the international law on
cybersecurity due diligence: lessons from the public and private sectors. Chi. J. Int'l L., 17,
p.1.
Slay, J. and Austin, G., 2018, March. Development in Training and Education for Australian
Cyber Security. In Journal of The Colloquium for Information System Security
Education (Vol. 5, No. 2, pp. 27-27).
Tovino, S.A., 2016. The HIPAA Privacy Rule and the EU GDPR: illustrative
comparisons. Seton Hall L. Rev., 47, p.973.
chevron_up_icon
1 out of 22
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]