title for Publications page
home | about | site use | resources | publications | timeline   spacer graphic   blaw



This part of the site provides access to conference papers, submissions to government and other bodies, and research papers.

subsection heading icon     presentations

Recent presentations include -

  • Digital Handcuffs or Electronic Nannies: Children, Privacy and Emerging Surveillance Technologies - plenary session paper at Victorian Privacy Commissioner's Watch This Space children and privacy conference, May 2010 (PDF)
  • Dracula in the Dock: A Translegal Perspective on Australian Law - presentation at LLAA/LSAANZ conference (Griffith University, 2009)
  • Doesn't ADD Up? ADHD, ADD and Australian Courts - presentation at University of Sydney Postgraduate Law Conference (University of Sydney, 2009)
  • Building A Profile of the Financial Criminal - presentation for the Australian Bankers' Association 2008 Financial Crime Forum, 24 October 2008 (PDF)
  • Identity Crime in the Cybercrime Environment - presentation for Management of Serious Crime (MOSC) program, Australia Federal Police College, 2 October 2007 (PDF)
  • Identity Crime - presentation for Property & Liability Discussion Group, Australia & New Zealand Institute of Insurance & Finance, 16 May 2007 (PDF)

Recent and forthcoming articles and reviews include -

  • 'Burning With Indignation: Arson, Law and the 2009 Victorian Bushfires', 15(1) Local Government Law Journal (2009) 35-45
  • 'The European Union and the Culture Industries: Regulation and the Public', 13 International Journal of Communications Law & Policy (2009) 206-210
  • 'Identity Fever', 13 SCU Law Review (2009/10)
  • 'Ambient anomie in the virtualised landscape? Autonomy, Surveillance and Flows in the 2020 streetscape', 13(2) M/C - A Journal of Media and Culture (2010) - with Margalit Levin
  • 'Roboguard for hire - Are robots the security solution?', 63 Security Solutions (2010) 79-82 - footnoted version here
  • 'Robot Fever', 62 Security Solutions (2009)
  • 'Security Two Point Oh? Security, Sharing and Web 2.0 – Who is Watching You', 62 Security Solutions (2009) 57-66
  • 'No Identity Cards On The Village Green?', 6(8) Privacy Law Bulletin (2010)
  • 'One Card To Rule Them All? Privacy, Biometric Cards and National Registration in India', 6(8) Privacy Law Bulletin (2010)
  • 'Relatively Speaking: Genetic Privacy and Public Interest Determinations 11 and 11A under the Privacy Act 1988 (Cth)', 7(1) Privacy Law Bulletin (2010) - with Dr Wendy Bonython
  • 'Contexts and Controversies: New Literature on Privacy', 7(1) Privacy Law Bulletin (2010)

Older papers include -

The Other Side of the Counter: What Do Consumers Think About Privacy? (presentation at Victorian Department of Justice Practical Privacy Workshop, 31 August 2006)

Reparation and Memory: Perspectives on the Klimt Case and the repatriation of cultural property

How much did the network cost (and who paid for it)? Colonial telecommunication economics and Telstra privatisation

It's my flag and it'll burn if I want to - perspectives on flag burning

It cures cancer, warts and dandruff: Community Expectations and Spin in the Tasmanian Broadband Over Powerline (BPL) Trial

Avoiding The Privacy Pitfalls: Managing Privacy, Managing DRM (half day workshop at Digital Rights Management 2006, March 2006)

Redefining Citizenship? - Internet Governance, National Citizens and Expectations of Representation - Australian Electronic Governance Conference 2004 (with Liz Williams) here

A Wireless Millennium? - connectivity, m-commerce and the wireless office

Lost in Cyberspace: Portals After The Dot Com Crash - a study of search strategies, markets and web directory development in 2002

Identity Theft

Web Surveys: Usability & Effectiveness

Making Sense of SOCOG: The Maguire Case and Accessibility - a 2001 paper on the SOCOG v Maguire dispute and its implications

Is It True Or Merely Online
- principles and practices in evaluating web sites

Grosse Politik Goes Digital - a survey of national historic document publishing online

subsection heading icon     articles and reviews

Older articles and reviews include -

  • 'Adieu to Adhocracy?: The Australian Law Reform Commission's Privacy discussion paper and the Uniform Privacy Principles' - 4(5) Privacy Law Bulletin (2007) 58-60
  • Reconceptualising Privacy?' - Privacy Law Bulletin, May 2007
  • 'The Devil's Playground? Crime and Online Auction Sites', 48 Security Solutions (2007) 59-68
  • 'Losing It - Corporate Reporting on Data Theft', 3(8) Privacy Law Bulletin (2007) 101-103
  • 'Cyber Scams and Computer Cons', 41 Security Solutions (2006) 52-63
  • 'Government response to privacy report on access card', 3(6/7) Privacy Law Bulletin (2006) 80-84
  • 'Identity Theft', 38 Security Solutions (2005) 54-64

subsection heading icon     submissions

In addition to assisting clients in the preparation of submissions to government and industry inquiries, Caslon Analytics on occasion makes submissions in its own right.

Examples include -

response to Australian Communication & Media Authority 2010 discussion paper on a Fax Marketing Industry Standard under the Do Not Call Act 2006 (Cth) - PDF

response to February 2001 Competition and Name Policy reports by panels of the au Domain Administration (auDA) -

response to auDA May 2001 proposals for additional 2LDs within the dot-au domain space

response to auDA May 2001 proposals for a dot-au Dispute Resolution Policy (auDRP)

response to auDA May 2001 proposed dot-au Competition Model

You will require Adobe Acrobat Reader to read some of the documents (free download from the Adobe site).

Adobe Acrobat logo


this site
the web


version of October 2010
© Bruce Arnold
caslon.com.au | caslon analytics