What are digital certificates? Are businesses on the web
what they claim to be? Are hackers a danger to your organisation?
What can you do to stop them? Where can you find information
about disaster planning? What's digital watermarking? Can
geolocation technologies put the borders back into the
'borderless' internet and thereby underpin national legislation
about online hate speech
or e-commerce? Are statistics about the net as a haunt
of child molesters credible?
This guide offers insights about those questions. The
guide looks at broader issues about regulating cyberspace.
(including online and offline identity crime)
is discussed separately. A note discusses the private
contents of this guide
The following pages cover -
- differing views in significant Australian and overseas
writing about the nature of online crime, responsibilities,
rights and security
- local and international online security and information
crime frameworks, along with pointers to key government,
business and academic bodies
- critical information infrastructure identification,
protection and attack
- who is committing online offences and what are the
- spam, scams and other messaging questions
& viruses - site defacement and site hijacking
- online fraud studies, statistics and responses
- Australian and overseas digital identification legislation,
standards and technologies such as steganography, as
well as questions of anonymity online
- questions about anonymity, identity and civil society
- comments about online pseudonymity
- things that kill your data and exposure your information
- encryption technologies, issues and practices
- information about geolocation and 'presence awareness'
technologies that might introduce some borders in the
'borderless web' and pose particular questions about
- debate about the cost of infocrime and digital security
- liability, cyber-insurance, identity theft insurance
and other questions
- pointers to writing about crime and regulation regarding
children and teens online,from special 'kids' domain
proposals to statistics about molestation
- the online security industry
- security and privacy audits, white hats and black
- primers and hints about passwords and other action
by responsible surfers, along with comments about the
responsibility of software providers and ISPs
- computer forensics
The guide is supplemented by several profiles.
profile highlights writing about the 'surveillance state'
(whether involving government agencies or the media),
identity schemes such as passports and national identification
cards, biometrics and other authentication technologies,
conspiracy theories and fiction about pervasive surveillance
in the digital environment.
There are separate profiles regarding Forgery
& Fakes, and regulation
of Spam in Australia
There is also a more detailed discussion
of Australian and overseas cryptography regulation, including
the OECD Cryptography Guidelines and Wassenaar Arrangement.
next page (perspectives)