Cyberspace governance struggles with three accountability challenges, the problem of many hands, the profusion of issue areas, as well as the hybridity and malleability of institutional arrangements. In order to address and mitigate these challenges, accountability relationships need to be consciously reframed and discursively constructed.
Research articles on Privacy & Security
The campaign against Israel’s biometric database demonstrates how civil society can advocate for privacy even when “privacy is dead”.
Introduction In 2007, the Australian government took a dramatic new approach to the governance and management of remote Indigenous communities. The ‘Northern Territory Intervention’, as it became commonly known, was introduced as a means to combat child abuse and domestic violence in remote Indigenous communities, and included far-reaching changes
Acknowledgement: Thanks to the Melbourne Networked Society Institute at the University of Melbourne for funding our research project ‘The Internet of Things (IoT) and Consumer Privacy’, 2015-2016, and to our participants for generously sharing their experiences and concerns about the IoT. Some of the information and ideas in this article draw on
The ‘lawful’ intrusion or interference with information communication infrastructures poses challenges to democratic freedoms in Australia.
Part I: The Data Retention Act In April 2015, the Australian government passed the Telecommunications (Interception and Access) Amendment (Data Retention) Act , which requires Internet Service Providers (ISPs) and telecommunications providers to store information about their subscribers’ online activity for a period of two years. The data
Internet users need a cyber security mindset, argues William H. Dutton. This paper seeks to explain the concept of a security ‘mindset’ and its social significance.
This paper provides qualitative analysis of Google’s and Microsoft’s policies and examines case studies to enhance understanding about the privacy role of information intermediaries in self-regulatory arrangements.
Focusing on different democratic ways of negotiating online privacy the authors identify several governance modes, including the currently prevailing protectionist mode.
Internet governance bodies agree that improving online security is important, but disagree on what a more secure internet would look like.