Please use this identifier to cite or link to this item:
https://hdl.handle.net/1959.11/18954
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Quirico, Ottavio | en |
local.source.editor | Editor(s): Hitoshi Nasu and Kim Rubenstein | en |
dc.date.accessioned | 2016-05-06T16:00:00Z | - |
dc.date.issued | 2015 | - |
dc.identifier.citation | Legal Perspectives on Security Institutions, p. 308-322 | en |
dc.identifier.isbn | 9781107102781 | en |
dc.identifier.uri | https://hdl.handle.net/1959.11/18954 | - |
dc.description.abstract | The past decade may be portrayed as a period of growing cyber threats and a time of increasing cyber insecurity. In fact, given that societies increasingly rely on information systems and the Internet, cyberspace - a virtual and interactive, non-physical environment created through computer networks accessible regardless of geographic location - has become a vulnerable landscape. Thus, governmental authorities around the world have launched cyber security programmes. For example, the Australian Cyber Security Strategy defines the roles, responsibilities and policies of Australian intelligence, cyber and policing agencies to protect Australian Internet users. The United States (US) funded the Trustworthy Cyber Infrastructure for the Power Grid through its Departments of Energy and Homeland Security, which aims to secure new 'smart meters' against hackers' attacks. Similarly, the Infocomm Security Masterplan in Singapore seeks to defend national critical infrastructures, such as finance, energy, water and telecommunications, against cyber attacks. The European Union considers cyber terrorist threats the highest priority for the security of critical energy infrastructure. | en |
dc.language | en | en |
dc.publisher | Cambridge University Press | en |
dc.relation.ispartof | Legal Perspectives on Security Institutions | en |
dc.relation.ispartofseries | Connecting International Law with Public Law | en |
dc.relation.isversionof | 1 | en |
dc.title | Legal challenges to cyber security institutions | en |
dc.type | Book Chapter | en |
dc.subject.keywords | Law | en |
dc.subject.keywords | Legal Practice, Lawyering and the Legal Profession | en |
local.contributor.firstname | Ottavio | en |
local.subject.for2008 | 180199 Law not elsewhere classified | en |
local.subject.for2008 | 180121 Legal Practice, Lawyering and the Legal Profession | en |
local.subject.seo2008 | 940406 Legal Processes | en |
local.subject.seo2008 | 949999 Law, Politics and Community Services not elsewhere classified | en |
local.profile.school | School of Law | en |
local.profile.email | oquirico@une.edu.au | en |
local.output.category | B1 | en |
local.record.place | au | en |
local.record.institution | University of New England | en |
local.identifier.epublicationsrecord | une-20160429-104719 | en |
local.publisher.place | Cambridge, United Kingdom | en |
local.identifier.totalchapters | 14 | en |
local.format.startpage | 308 | en |
local.format.endpage | 322 | en |
local.contributor.lastname | Quirico | en |
dc.identifier.staff | une-id:oquirico | en |
local.profile.orcid | 0000-0001-8268-7501 | en |
local.profile.role | author | en |
local.identifier.unepublicationid | une:19155 | en |
dc.identifier.academiclevel | Academic | en |
local.title.maintitle | Legal challenges to cyber security institutions | en |
local.output.categorydescription | B1 Chapter in a Scholarly Book | en |
local.relation.url | http://trove.nla.gov.au/version/220901429 | en |
local.search.author | Quirico, Ottavio | en |
local.uneassociation | Unknown | en |
local.year.published | 2015 | en |
local.subject.for2020 | 480199 Commercial law not elsewhere classified | en |
local.subject.for2020 | 480505 Legal practice, lawyering and the legal profession | en |
local.subject.seo2020 | 230406 Legal processes | en |
Appears in Collections: | Book Chapter |
Files in This Item:
File | Description | Size | Format |
---|
Page view(s)
1,316
checked on Jan 28, 2024
Download(s)
2
checked on Jan 28, 2024
Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.