Academic literature on the topic 'Australian Security and Intelligence Organisation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Australian Security and Intelligence Organisation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Australian Security and Intelligence Organisation"
Lee, H. P. "The Australian Security Intelligence Organisation—New Mechanisms for Accountability." International and Comparative Law Quarterly 38, no. 4 (1989): 890–905. http://dx.doi.org/10.1093/iclqaj/38.4.890.
Full textIreland-Piper, Danielle, and Jonathan Crowe. "Whistleblowing, National Security and the Constitutional Freedom of Political Communication." Federal Law Review 46, no. 3 (2018): 341–65. http://dx.doi.org/10.1177/0067205x1804600301.
Full textMcKnight, David. "Australian Film and the Cultural Cold War." Media International Australia 111, no. 1 (2004): 118–30. http://dx.doi.org/10.1177/1329878x0411100112.
Full textMcCulloch, Jude, and Joo-Cheong Tham. "Secret State, Transparent Subject: The Australian Security Intelligence Organisation in the Age of Terror." Australian & New Zealand Journal of Criminology 38, no. 3 (2005): 400–415. http://dx.doi.org/10.1375/acri.38.3.400.
Full textMcGarrity, Nicola, and Keiran Hardy. "Digital surveillance and access to encrypted communications in Australia." Common Law World Review 49, no. 3-4 (2020): 160–81. http://dx.doi.org/10.1177/1473779520902478.
Full textHead, Michael. "ASIO’s ‘official history’: More unanswered questions." Alternative Law Journal 42, no. 4 (2017): 304–9. http://dx.doi.org/10.1177/1037969x17732710.
Full textShanapinda, Stanley. "Privacy versus the Use of Location Information for Law Enforcement and Security in Australia." Australian Journal of Telecommunications and the Digital Economy 6, no. 4 (2018): 109–40. http://dx.doi.org/10.18080/ajtde.v6n4.167.
Full textShanapinda, Stanley. "Privacy versus the Use of Location Information for Law Enforcement and Security in Australia." Journal of Telecommunications and the Digital Economy 6, no. 4 (2018): 109–40. http://dx.doi.org/10.18080/jtde.v6n4.167.
Full textWilliams, George. "The Legal Assault on Australian Democracy." QUT Law Review 16, no. 2 (2016): 19. http://dx.doi.org/10.5204/qutlr.v16i2.651.
Full textMcKnight, David. "‘Not Attributable to Official Sources’: Counter-Propaganda and the Mass Media." Media International Australia 128, no. 1 (2008): 5–17. http://dx.doi.org/10.1177/1329878x0812800103.
Full textDissertations / Theses on the topic "Australian Security and Intelligence Organisation"
Thomson, James William Hugh. "Prolegomenon to a political economy of intelligence and security : can microeconomic analysis explain success or failure in intelligence cooperation?" Thesis, Brunel University, 2015. http://bura.brunel.ac.uk/handle/2438/11668.
Full textMarlowe, Kirk S. "The homeland security enterprise where do we fit?" Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FMarlowe.pdf.
Full textSmith, Andrew Humanities & Social Sciences Australian Defence Force Academy UNSW. "The factors influencing the employment of the Australian Defence Organisation in homeland security roles since 11 September 2001." Awarded by:University of New South Wales - Australian Defence Force Academy. School of Humanities and Social Sciences, 2007. http://handle.unsw.edu.au/1959.4/38735.
Full textWHITMORE, Margaret, and whittys2002@yahoo com au. "The search for character: servant-leadership in an Australian organisation." Edith Cowan University. Business And Public Management: School Of Business And Law, 2004. http://adt.ecu.edu.au/adt-public/adt-ECU2006.0003.html.
Full textWhitmore, Margaret R. "The search for character: Servant-leadership in an Australian organisation." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2004. https://ro.ecu.edu.au/theses/113.
Full textO’Rourke, Simon. "An intelligence model for terrorist incident prevention for Australian police: A systemic investigation." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2010. https://ro.ecu.edu.au/theses/379.
Full textSmith, Erin. "Structuring for serendipity: family wealth creation, farmer autonomy and the pursuit of security in an uncertain Australian countryside." Thesis, The University of Sydney, 2014. http://hdl.handle.net/2123/13363.
Full textScott, Rob. "Forging an unusual intelligence partnership : Operation Rusty and the rise of the CIA: how did the newly created CIA get involved with former Nazi military and security staff of the Hitler regime? How and why did the CIA agree to take over control of the Gehlen Organisation from the US Army Intelligence Division?/ Rob Scott." Title page, table of contents and introduction only, 2005. http://web4.library.adelaide.edu.au/theses/09AR/09ars4251.pdf.
Full textHagberg, Mathias. "Sjukvårdsorganisationen vid svenska marina missioner." Thesis, Swedish National Defence College, Swedish National Defence College, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-29.
Full textRichter, Andreas. "Cyberepidemiologi : Hur kan utbrottsdetektion inom folkhälsa hjälpa IT-incidentsövervakning?" Thesis, Försvarshögskolan, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-8375.
Full textBooks on the topic "Australian Security and Intelligence Organisation"
Blesing, Meena. Was your dad a Russian spy?: The personal story of the Combe/Ivanov affair by David Combe's wife. Sun Books, 1986.
Find full text1954-, Bergin Anthony, Hall Robert A. 1947-, and Australian Defence Studies Centre, eds. Intelligence: And Australian national security. Australian Defence Studies Centre, 1994.
Find full textMarsden, Hope Robert, ed. Report on the Australian Security Intelligence Organization, December 1984. Aust. Govt. Publ. Service, 1985.
Find full textFlood, Philip. Report of the inquiry into Australian intelligence agencies. Dept. of the Prime Minister and Cabinet, 2004.
Find full textCain, Frank. Terrorism & intelligence in Australia: A history of ASIO and national surveillance. Australian Scholarly Pub., 2009.
Find full textGobert, Wayne. The origins of Australian diplomatic intelligence in Asia, 1933-1941. Strategic and Defence Studies Centre, Research School of Pacific Studies, Australian National University, 1992.
Find full textCain, Frank. Terrorism & intelligence in Australia: A history of ASIO and national surveillance. Australian Scholarly Pub., 2009.
Find full textSasson, Molly J. More cloak than dagger: One woman's career in secret intelligence. Connor Court Publishing, 2015.
Find full textWesley, Michael. Between probity and proficiency: Challenge and change within the Australian intelligence community = Probité et compétence : défis et changements au sein de l'appareil australien du renseignement. Canadian Security Intelligence Service = Service canadien du renseignement de sécurité, 2006.
Find full textBook chapters on the topic "Australian Security and Intelligence Organisation"
Offner, K. L., E. Sitnikova, K. Joiner, and C. R. MacIntyre. "Towards understanding cybersecurity capability in Australian healthcare organisations: a systematic review of recent trends, threats and mitigation." In Health Security Intelligence. Routledge, 2021. http://dx.doi.org/10.4324/9781003245483-8.
Full textJones, David Martin. "Intelligence and National Security: Australian Dilemmas Post-9/11." In National Security, Surveillance and Terror. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-43243-4_12.
Full textPalmer, Darren, and Ian Warren. "The ‘Security of Security’: Making Up the Australian Intelligence Community 1975–2015." In National Security, Surveillance and Terror. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-43243-4_8.
Full textSusanto, Heru, and Alifya Kayla Shafa Susanto. "Strengthening artificial intelligence implementation of security business management in time of digital economy innovation." In Digitalisation and Organisation Design. Routledge, 2022. http://dx.doi.org/10.4324/9781003163824-15.
Full textWalsh, Patrick F. "Australian National Security Intelligence Collection Since 9/11: Policy and Legislative Challenges." In National Security, Surveillance and Terror. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-43243-4_3.
Full textLayton, Peter. "Evolution Not Revolution: Defence AI in Australia." In Contributions to Security and Defence Studies. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58649-1_26.
Full text"Payne-Scott, Communist Party of Australia, Commonwealth Investigation Service and Australian Security Intelligence Organisation." In Astrophysics and Space Science Library. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-03141-0_13.
Full textLomas, Daniel W. B. "Empire, Commonwealth and security." In Intelligence, Security and the Attlee Governments, 1945-51. Manchester University Press, 2017. http://dx.doi.org/10.7228/manchester/9780719099144.003.0008.
Full text"Embargoes, Espionage and ASIO." In The Australian Security Intelligence Organization. Routledge, 2012. http://dx.doi.org/10.4324/9780203043752-10.
Full text"The Acceptance of ASIO in the USA." In The Australian Security Intelligence Organization. Routledge, 2012. http://dx.doi.org/10.4324/9780203043752-11.
Full textConference papers on the topic "Australian Security and Intelligence Organisation"
Duan, Xiaoxia, Hepu Deng, and Brian Corbit. "The Impacts of Government Policies on the Efficiency of Australian Universities: A Multi-Period Data Envelopment Analysis." In 2008 International Conference on Computational Intelligence and Security (CIS). IEEE, 2008. http://dx.doi.org/10.1109/cis.2008.213.
Full textGrandhi, Lakshmi Sujatha, Srimannarayana Grandhi, and Santoso Wibowo. "A Security-UTAUT Framework for Evaluating Key Security Determinants in Smart City Adoption by the Australian City Councils." In 2021 21st ACIS International Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD-Winter). IEEE, 2021. http://dx.doi.org/10.1109/snpdwinter52325.2021.00013.
Full textAlmer, Alexander, Anna Weber, Florian Haid, et al. "Physiological and cognitive real-time stress analysis as a basis for optimised human-machine teaming and safe decision processes for military forces." In 5th International Conference on Human Systems Engineering and Design: Future Trends and Applications (IHSED 2023). AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1004151.
Full text