Academic literature on the topic 'Data Protection – Australia'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data Protection – Australia.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Data Protection – Australia"
Jackson, Margaret. "DATA PROTECTION - AUSTRALIA." Computer Law & Security Review 16, no. 3 (June 2000): 166–69. http://dx.doi.org/10.1016/s0267-3649(00)88911-6.
Full textvon Dietze, A., and A. M. Allgrove. "Australian privacy reforms--an overhauled data protection regime for Australia." International Data Privacy Law 4, no. 4 (July 2, 2014): 326–41. http://dx.doi.org/10.1093/idpl/ipu016.
Full textWalters, Robert. "Insolvency and Data Protection." Business Law Review 42, Issue 1 (January 1, 2021): 2–12. http://dx.doi.org/10.54648/bula2021001.
Full textJackson, M. "Data protection regulation in Australia after 1988." International Journal of Law and Information Technology 5, no. 2 (June 1, 1997): 158–91. http://dx.doi.org/10.1093/ijlit/5.2.158.
Full textRees, Frank. "European directive on data protection could see Australia blacklisted." Computer Audit Update 1996, no. 8 (August 1996): 5. http://dx.doi.org/10.1016/0960-2593(96)84048-1.
Full textJoyce, Daniel. "Data associations and the protection of reputation online in Australia." Big Data & Society 4, no. 1 (May 29, 2017): 205395171770982. http://dx.doi.org/10.1177/2053951717709829.
Full textAnderson, Helen, Michelle Welsh, Ian Ramsay, and Peter Gahan. "THE EVOLUTION OF SHAREHOLDER AND CREDITOR PROTECTION IN AUSTRALIA: AN INTERNATIONAL COMPARISON." International and Comparative Law Quarterly 61, no. 1 (January 2012): 171–207. http://dx.doi.org/10.1017/s0020589311000595.
Full textJackson, Margaret. "Turns and roundabouts: The new data protection environment in Australia." Computer Law & Security Review 15, no. 4 (July 1999): 238–42. http://dx.doi.org/10.1016/s0267-3649(99)80049-1.
Full textBroadley, Karen, and Chris Goddard. "A Public Health Approach to Child Protection: Why Data Matter." Children Australia 40, no. 1 (November 3, 2014): 69–77. http://dx.doi.org/10.1017/cha.2014.37.
Full textCheytani, Samir, and Sammy Lap Ip Chan. "Data analysis of the long-term residual effect of cathodic protection on reinforced concrete structures." MATEC Web of Conferences 361 (2022): 02002. http://dx.doi.org/10.1051/matecconf/202236102002.
Full textDissertations / Theses on the topic "Data Protection – Australia"
Hicks, Michael. "Organisational barriers and their relationship to the effective use of information system audit trails." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2006. https://ro.ecu.edu.au/theses/335.
Full textSnell, Mark A. "Data protection and transborder data flow : a British and Australian perspective." Thesis, University of Oxford, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.360014.
Full textScarfe, Bradley Edward. "Oceanographic Considerations for the Management and Protection of Surfing Breaks." The University of Waikato, 2008. http://hdl.handle.net/10289/2668.
Full textLondon, R. W. "Comparative data protection and security : a critical evealuation of legal standards." Thesis, 2013. http://hdl.handle.net/10500/13859.
Full textLL.D. (Laws)
London, Ray William. "Comparative data protection and security : a critical evaluation of legal standards." Thesis, 2013. http://hdl.handle.net/10500/13859.
Full textLL. D.
Fok, Yiu Cheung George. "A comparative study of legislation affecting privacy and personalization factors of website design in Australia, Singapore and Hong Kong." Thesis, 2012. http://hdl.handle.net/1959.13/931161.
Full textThis paper focused on website design factors with respect to online websites access by consumers resulting in collecting personal information. In today’s information age, focusing on personal data privacy protection issues will undoubtedly be a priority in promoting electronic commerce in Asia Pacific. Hong Kong is a pioneer in legislating comprehensive data privacy protection law amongst the common-law regimes. Hong Kong enacted the Personal Data (Privacy) Ordinance way back in 1995. In the Asia Pacific region, Australia and Hong Kong are two jurisdictions supporting the nine principles of the APEC Electronic Commerce Steering Group framework by passing comprehensive data privacy protection laws. Singapore is lagging behind and only promulgates a Model Data Protection Codes (MDPC) without any legislative support. When comparing the underlying principles of the MDPC with those stipulated in the data privacy regulatory framework of Hong Kong Australia, they are similar. This study examined websites’ data privacy design factors and the extent of the privacy policy information found in the websites. The first observatory survey visited a random sample of 307 websites with roughly equal number in Australia, Hong Kong and Singapore. The survey used a questionnaire to guide the collection of design factors related to the manner of personal data collection, the format and location of the privacy policy statement, and the types of information provided in such statement. The second survey was an email survey. Eighty seven website operators gave valid responses to a questionnaire collecting their views on personal data privacy related website design issues. Data analysis for both surveys involved counting frequencies, calculating percentages, and using Chi-square tests. This study proposed the hypotheses that were used to examine the extent of personal data privacy intrusion and the level of the privacy policy information disclosure of the websites. The proposed hypotheses assumed that these privacy related website design factors were largely influenced by the regulatory framework implemented by the government. Results of the first survey revealed that most websites collected personal data on a non-voluntary way, and there was no significant country difference. However, most websites in Australia and Hong Kong provided some form of the privacy policy statement. Singapore is the only country using a legislative threat approach instead of actual legislation to regulate personal data privacy. The results revealed that 61.8% of Singaporean websites did not provide any form of the privacy policy information. The country difference in the format and location of the privacy policy statement found in websites was significant. The results revealed that more websites in Australia and Hong Kong provided information about the purpose of collection, use of personal data, right to ensure accuracy of data stored, and data transmission security than those in Singapore. The country difference did not show up on the other types of information including the use of cookies, right to refuse promotional materials, divulge of personal data, and data retention policy. Results of the second survey were not conclusive. Hence, the website operators email survey results did not support the hypothesis that legislative and non-legislative approach would have different effects on influencing the views of the website operators.
Books on the topic "Data Protection – Australia"
Hughes, Gordon. Data protection in Australia. Sydney: Law Book Co., 1991.
Find full textMargaret, Jackson. Hughes on data protection in Australia. 2nd ed. Sydney: Lawbook Co., 2001.
Find full textTucker, Greg. Information privacy law in Australia. Melbourne, Australia: Longman Professional, 1992.
Find full textClark, E. Eugene. Cyber law in Australia. Alphen aan den Rijn, The Netherlands: Kluwer Law International, 2010.
Find full textClark, E. Eugene. Cyber law in Australia. Alphen aan den Rijn, The Netherlands: Kluwer Law International, 2010.
Find full textCyber law in Australia. Alphen aan den Rijn, The Netherlands: Kluwer Law International, 2010.
Find full textWestern Australia. Office of the Attorney General. Privacy legislation for Western Australia policy research paper. Perth, , WA: Privacy Working Group, 2003.
Find full textACISP 2004 (2004 Sydney, N.S.W.). Information security and privacy: 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings. Berlin: Springer, 2004.
Find full text1944-, Seberry Jennifer, and Zheng Yuliang 1962-, eds. Advances in cryptology--AUSCRYPT '92: Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992 : proceedings. Berlin: Springer-Verlag, 1993.
Find full text1949-, Pieprzyk Josef, and Seberry Jennifer 1944-, eds. Information security and privacy: First Australian Conference, ACISP '96, Wollongong, NSW, Australia, June 24-26, 1996 : proceedings. Berlin: Springer, 1996.
Find full textBook chapters on the topic "Data Protection – Australia"
Walters, Robert, Leon Trakman, and Bruno Zeller. "Australia." In Data Protection Law, 115–46. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-8110-2_5.
Full textMadsen, Wayne. "Australia, Canada and New Zealand Data Protection." In Handbook of Personal Data Protection, 152–70. London: Palgrave Macmillan UK, 1992. http://dx.doi.org/10.1007/978-1-349-12806-8_6.
Full textCavoukian, Ann, and Michelle Chibba. "Privacy Seals in the USA, Europe, Japan, Canada, India and Australia." In Privacy and Data Protection Seals, 59–82. The Hague: T.M.C. Asser Press, 2018. http://dx.doi.org/10.1007/978-94-6265-228-6_5.
Full textWard, Harriet, Lynne Moggach, Susan Tregeagle, and Helen Trivedi. "Adult Outcomes." In Outcomes of Open Adoption from Care, 223–65. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-76429-6_8.
Full textPovey, Jenny, Stefanie Plage, Yanshu Huang, Alexandra Gramotnev, Stephanie Cook, Sophie Austerberry, and Mark Western. "Adolescence a Period of Vulnerability and Risk for Adverse Outcomes across the Life Course: The Role of Parent Engagement in Learning." In Family Dynamics over the Life Course, 97–131. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-12224-8_6.
Full textBoutros, Andrew. "Investigations, Privacy and Data Security Issues." In From Baksheesh to Bribery, 593–604. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190232399.003.0022.
Full textAdams, Mitchell, and Amanda Scardamaglia. "Non-Traditional Trademarks." In The Protection of Non-Traditional Trademarks, 37–58. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198826576.003.0003.
Full textHullin, Carol, and Mario Donoso. "Indigenous Scientist: Digital & Health Science Transformation." In Studies in Health Technology and Informatics. IOS Press, 2022. http://dx.doi.org/10.3233/shti220939.
Full textDubowitz, Howard. "A Global Snapshot of Child Maltreatment and Child Protection." In Principles of Global Child Health: Education and Research, 359–80. American Academy of Pediatrics, 2018. http://dx.doi.org/10.1542/9781610021906-part04-ch20.
Full textMuñoz-Chávez, J. Patricia, Rigoberto García-Contreras, and David Valle-Cruz. "Panic Station." In Advances in Marketing, Customer Relationship Management, and E-Services, 51–73. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-4168-8.ch003.
Full textConference papers on the topic "Data Protection – Australia"
Chonglin Liu and S. Heckman. "Using total lightning data in severe storm prediction: Global case study analysis from north America, Brazil and Australia." In 2011 International Symposium on Lightning Protection (XI SIPDA). IEEE, 2011. http://dx.doi.org/10.1109/sipda.2011.6088433.
Full textBudimir, Vjekoslav, Helene Lanter, and Sascha Schultes. "GUARD - smart flexible protection systems against natural hazards." In 7th International Conference on Road and Rail Infrastructure. University of Zagreb Faculty of Civil Engineering, 2022. http://dx.doi.org/10.5592/co/cetra.2022.1493.
Full textSkoczylas, Paul. "Update of Field Experience with Hydraulically Regulated Progressing Cavity Pumps." In SPE Artificial Lift Conference and Exhibition - Americas. SPE, 2022. http://dx.doi.org/10.2118/209764-ms.
Full textEdwar, M., Shindi Marlina Oktaviani, Aipujana Tiara Santoso, Syachrul Gibran Muzhaffar, Irvan Husni Saugi, Muhammad Alif Putra Dafi, Galuh Mardiansyah, et al. "Development of commercial-off-the-shelf imaging payload for cloud coverage monitoring." In Symposium on Space Educational Activities (SSAE). Universitat Politècnica de Catalunya, 2022. http://dx.doi.org/10.5821/conference-9788419184405.106.
Full textGabler, Hampton C., Brian N. Fildes, and Michael Fitzharris. "Improved Side Impact Protection: A Search for Systems Modeling Priorities." In ASME 2000 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2000. http://dx.doi.org/10.1115/detc2000/dac-14248.
Full textMelchers, R. E., X. L. Jiang, and K. J. Lu. "Coating Life Prediction for Water Ballast Tank." In ASME 2005 24th International Conference on Offshore Mechanics and Arctic Engineering. ASMEDC, 2005. http://dx.doi.org/10.1115/omae2005-67425.
Full textReports on the topic "Data Protection – Australia"
Smit, Amelia, Kate Dunlop, Nehal Singh, Diona Damian, Kylie Vuong, and Anne Cust. Primary prevention of skin cancer in primary care settings. The Sax Institute, August 2022. http://dx.doi.org/10.57022/qpsm1481.
Full textBaszler, Timothy, Igor Savitsky, Christopher Davies, Lauren Staska, and Varda Shkap. Identification of bovine Neospora caninum cytotoxic T-lymphocyte epitopes for development of peptide-based vaccine. United States Department of Agriculture, March 2006. http://dx.doi.org/10.32747/2006.7695592.bard.
Full text