No previous study has offered a systematic comparative analysis of different forms of regulatory chilling effects online. This article discusses a first-of-its-kind case study that does so.
Introduction In 2007, the Australian government took a dramatic new approach to the governance and management of remote Indigenous communities. The ‘Northern Territory Intervention’, as it became commonly known, was introduced as a means to combat child abuse and domestic violence in remote Indigenous communities, and included far-reaching changes
Acknowledgement: Thanks to the Melbourne Networked Society Institute at the University of Melbourne for funding our research project ‘The Internet of Things (IoT) and Consumer Privacy’, 2015-2016, and to our participants for generously sharing their experiences and concerns about the IoT. Some of the information and ideas in this article draw on
Internet accessibility for people with disabilities is long overdue. We draw on pioneering Australian efforts, compared with recent US and European initiatives, to argue for better disability internet policy now.
The ‘lawful’ intrusion or interference with information communication infrastructures poses challenges to democratic freedoms in Australia.
Part I: The Data Retention Act In April 2015, the Australian government passed the Telecommunications (Interception and Access) Amendment (Data Retention) Act , which requires Internet Service Providers (ISPs) and telecommunications providers to store information about their subscribers’ online activity for a period of two years. The data
Papers in this special issue Editorial Angela Daly, Queensland University of Technology, Australia Julian Thomas, RMIT University, Australia The passage of Australia’s data retention regime: national security, human rights, and media scrutiny Nicolas Suzor, Queensland University of Technology, Australia Kylie Pappalardo, Queensland University of
Artworks in the public space are not in the public domain: an apparent lightweight topic is polarising European copyright lobbyists.
Internet users need a cyber security mindset, argues William H. Dutton. This paper seeks to explain the concept of a security ‘mindset’ and its social significance.