scholarly journals Dude, Where’s My Data? The Effectiveness of Laws Governing Data Breaches in Australia

Author(s):  
Jack Hile

The increasing prevalence of large-scale data breaches prompted Australia to strengthen the Privacy Act by enacting the Privacy Amendment (Notifiable Data Breaches) Act to regulate the behaviour of entities entrusted with personal data. However, this paper argues that these legislative instruments are ineffective when dealing with data breaches and their associated problems. In supporting this conclusion, this paper first develops a criterion for effective data breach law, and then evaluates the Australian framework against this criterion to determine its operational effectiveness. In addition, this paper analyses practical developments in the area of data-breach law to garner insights as to how the Australian framework can be made more effective. Ultimately, this paper concludes that the Australian framework is ineffective when dealing with large-scale data breaches, and recommends future legislative amendment as a means of bolstering its effectiveness.

2019 ◽  
Vol 15 (4) ◽  
pp. 365-378 ◽  
Author(s):  
Reinder Broekstra ◽  
Judith Aris-Meijer ◽  
Els Maeckelberghe ◽  
Ronald Stolk ◽  
Sabine Otten

Exponential increases in digital data and calls for participation in human research raise questions about when and why individuals voluntarily provide personal data. We conducted 36 in-depth interviews with ex-participants, participants, and nonparticipants in a biobank to identify key factors influencing trust in centralized large-scale data repository for human research. Our findings indicated that trust depends strongly on whether such data repository benefits the public, the interests of data collectors, the characteristics of the collected data, and application of informed consent for retaining control over personal data. Concerns about the aims and range of data repository appeared to influence withdrawal of participation. Our findings underscore ethical and practical issues relating to data collection and consent procedures in human research.


Neurology ◽  
2021 ◽  
pp. 10.1212/WNL.0000000000012884
Author(s):  
Hugo Vrenken ◽  
Mark Jenkinson ◽  
Dzung Pham ◽  
Charles R.G. Guttmann ◽  
Deborah Pareto ◽  
...  

Multiple sclerosis (MS) patients have heterogeneous clinical presentations, symptoms and progression over time, making MS difficult to assess and comprehend in vivo. The combination of large-scale data-sharing and artificial intelligence creates new opportunities for monitoring and understanding MS using magnetic resonance imaging (MRI).First, development of validated MS-specific image analysis methods can be boosted by verified reference, test and benchmark imaging data. Using detailed expert annotations, artificial intelligence algorithms can be trained on such MS-specific data. Second, understanding disease processes could be greatly advanced through shared data of large MS cohorts with clinical, demographic and treatment information. Relevant patterns in such data that may be imperceptible to a human observer could be detected through artificial intelligence techniques. This applies from image analysis (lesions, atrophy or functional network changes) to large multi-domain datasets (imaging, cognition, clinical disability, genetics, etc.).After reviewing data-sharing and artificial intelligence, this paper highlights three areas that offer strong opportunities for making advances in the next few years: crowdsourcing, personal data protection, and organized analysis challenges. Difficulties as well as specific recommendations to overcome them are discussed, in order to best leverage data sharing and artificial intelligence to improve image analysis, imaging and the understanding of MS.


2017 ◽  
Vol 37 (1) ◽  
pp. 56-74 ◽  
Author(s):  
Thomas Kude ◽  
Hartmut Hoehle ◽  
Tracy Ann Sykes

Purpose Big Data Analytics provides a multitude of opportunities for organizations to improve service operations, but it also increases the threat of external parties gaining unauthorized access to sensitive customer data. With data breaches now a common occurrence, it is becoming increasingly plain that while modern organizations need to put into place measures to try to prevent breaches, they must also put into place processes to deal with a breach once it occurs. Prior research on information technology security and services failures suggests that customer compensation can potentially restore customer sentiment after such data breaches. The paper aims to discuss these issues. Design/methodology/approach In this study, the authors draw on the literature on personality traits and social influence to better understand the antecedents of perceived compensation and the effectiveness of compensation strategies. The authors studied the propositions using data collected in the context of Target’s large-scale data breach that occurred in December 2013 and affected the personal data of more than 70 million customers. In total, the authors collected data from 212 breached customers. Findings The results show that customers’ personality traits and their social environment significantly influences their perceptions of compensation. The authors also found that perceived compensation positively influences service recovery and customer experience. Originality/value The results add to the emerging literature on Big Data Analytics and will help organizations to more effectively manage compensation strategies in large-scale data breaches.


Author(s):  
Ronald M. Baecker

Throughout history, humanity has invented valuable technologies and ways to organize society. These innovations are typically accompanied by risks. Fire cooks food, and also provides heat on cold nights. Yet, when left unchecked, fire can cause huge damage as well as loss of life. Cities enabled new forms of community and commerce. However, they brought us more thievery, and made it easier for epidemics to spread. The automobile allowed a separation of locales for work and residence; trucks allowed goods to be shipped long distances. But vehicular accidents have caused far greater injury and loss of life than did mishaps with horses and mules. Information technology, like other technologies, has potential for good and for harm. In the first six chapters, we introduced aspects of human activity, such as education, medicine, and government, in which IT has been transformative and mostly positive. The next three chapters examine areas in which the negatives of IT are dominant, in which risks seem everywhere. This chapter focuses on security. IT security flaws are exploited by outsiders for personal or political gain. In Chapter 8 we shall look at safety, where the risks are often injury or loss of life. In Chapter 9, we shall look at privacy, where the risks are exposure of private, confidential, and even sensitive information. Security is the attribute of a computer system that ensures that it can continue to function properly after an attack. Attacks against computer systems happen routinely now, are in the news almost every week, and are accelerating in numbers and in impact. Damage to both individuals and organizations—financial losses, chaos, and deteriorating morale— is severe. We shall provide a primer on the multitude of ways computer systems, from large networks to mobile phones, can be ‘hacked’ so that they no longer function properly. We shall define the most common kinds of destructive software, often called malware. We will discuss large-scale data breaches, which now happen frequently and expose the personal data of millions to billions of people. The word hackers refers to individuals who disrupt digital technologies and thereby damage the functioning of an institution or a society.


2009 ◽  
Vol 28 (11) ◽  
pp. 2737-2740
Author(s):  
Xiao ZHANG ◽  
Shan WANG ◽  
Na LIAN

Sign in / Sign up

Export Citation Format

Share Document