This paper is part of Australian internet policy , a special issue of Internet Policy Review guest-edited by Angela Daly and Julian Thomas. Introduction In 2007, the Australian government took a dramatic new approach to the governance and management of remote Indigenous communities. The ‘Northern Territory Intervention’, as it became commonly
Filtered results
This paper is part of Australian internet policy , a special issue of Internet Policy Review guest-edited by Angela Daly and Julian Thomas. Acknowledgement: Thanks to the Melbourne Networked Society Institute at the University of Melbourne for funding our research project ‘The Internet of Things (IoT) and Consumer Privacy’, 2015-2016, and to our
Internet accessibility for people with disabilities is long overdue. We draw on pioneering Australian efforts, compared with recent US and European initiatives, to argue for better disability internet policy now.
The ‘lawful’ intrusion or interference with information communication infrastructures poses challenges to democratic freedoms in Australia.
This paper is part of Australian internet policy , a special issue of Internet Policy Review guest-edited by Angela Daly and Julian Thomas. Part I: The Data Retention Act In April 2015, the Australian government passed the Telecommunications (Interception and Access) Amendment (Data Retention) Act , which requires Internet Service Providers (ISPs
Papers in this special issue Introducing Australian internet policy: problems and prospects Angela Daly, Queensland University of Technology, Australia Julian Thomas, RMIT University, Australia The passage of Australia’s data retention regime: national security, human rights, and media scrutiny Nicolas Suzor, Queensland University of Technology,
Cloud computing is an inherently international matter, because it usually involves storage and processing of data in different locations. However, regulatory frameworks in non-EU contries do not always live up to European demands, i.e. concerning data protection. Looking at the EU cloud computing strategy, three political mechanisms can be