The regulatory challenges of Australian information security practice. / Burdon, Mark; Siganto, Jodie; Coles-Kemp, Lizzie.

In: Computer Law and Security Review, Vol. 32, No. 4, 08.2016, p. 623-633.

Research output: Contribution to journalArticle

Published

Standard

The regulatory challenges of Australian information security practice. / Burdon, Mark; Siganto, Jodie; Coles-Kemp, Lizzie.

In: Computer Law and Security Review, Vol. 32, No. 4, 08.2016, p. 623-633.

Research output: Contribution to journalArticle

Harvard

Burdon, M, Siganto, J & Coles-Kemp, L 2016, 'The regulatory challenges of Australian information security practice', Computer Law and Security Review, vol. 32, no. 4, pp. 623-633. https://doi.org/10.1016/j.clsr.2016.05.004

APA

Vancouver

Author

Burdon, Mark ; Siganto, Jodie ; Coles-Kemp, Lizzie. / The regulatory challenges of Australian information security practice. In: Computer Law and Security Review. 2016 ; Vol. 32, No. 4. pp. 623-633.

BibTeX

@article{1167cae20d364472b9c697e4409bfd9d,
title = "The regulatory challenges of Australian information security practice",
abstract = "Information security is not directly regulated in Australia and is instead subject to a patchwork of different legal and regulatory frameworks. How Australian information security practitioners construct and action information security therefore becomes important to the overall operation of a fragmented regulatory framework. How then do Australian information security practitioners understand information security and make compliance-oriented decisions? Our exploratory interview research examined how nine Australian information security practitioners understood and constructed their role as delegated regulators of organisational information security processes. Participants expressed a number of concerns that reveal a very different world to that traditionally portrayed as the discipline and practice of information security. We examine these concerns and discuss what they mean in the context of the Australian environment.",
author = "Mark Burdon and Jodie Siganto and Lizzie Coles-Kemp",
year = "2016",
month = "8",
doi = "10.1016/j.clsr.2016.05.004",
language = "English",
volume = "32",
pages = "623--633",
journal = "Computer Law and Security Review",
publisher = "Elsevier",
number = "4",

}

RIS

TY - JOUR

T1 - The regulatory challenges of Australian information security practice

AU - Burdon, Mark

AU - Siganto, Jodie

AU - Coles-Kemp, Lizzie

PY - 2016/8

Y1 - 2016/8

N2 - Information security is not directly regulated in Australia and is instead subject to a patchwork of different legal and regulatory frameworks. How Australian information security practitioners construct and action information security therefore becomes important to the overall operation of a fragmented regulatory framework. How then do Australian information security practitioners understand information security and make compliance-oriented decisions? Our exploratory interview research examined how nine Australian information security practitioners understood and constructed their role as delegated regulators of organisational information security processes. Participants expressed a number of concerns that reveal a very different world to that traditionally portrayed as the discipline and practice of information security. We examine these concerns and discuss what they mean in the context of the Australian environment.

AB - Information security is not directly regulated in Australia and is instead subject to a patchwork of different legal and regulatory frameworks. How Australian information security practitioners construct and action information security therefore becomes important to the overall operation of a fragmented regulatory framework. How then do Australian information security practitioners understand information security and make compliance-oriented decisions? Our exploratory interview research examined how nine Australian information security practitioners understood and constructed their role as delegated regulators of organisational information security processes. Participants expressed a number of concerns that reveal a very different world to that traditionally portrayed as the discipline and practice of information security. We examine these concerns and discuss what they mean in the context of the Australian environment.

U2 - 10.1016/j.clsr.2016.05.004

DO - 10.1016/j.clsr.2016.05.004

M3 - Article

VL - 32

SP - 623

EP - 633

JO - Computer Law and Security Review

JF - Computer Law and Security Review

IS - 4

ER -