Crisis on Impact: Responding to Cyber Attacks on Critical Information Infrastructures, 30 J. Marshall J. Info. Tech. & Privacy L. 31 (2013)

Article


Georgiades, Eugenia, Caelli, William, Christensen, Sharon and Duncan, W.D.. 2013. "Crisis on Impact: Responding to Cyber Attacks on Critical Information Infrastructures, 30 J. Marshall J. Info. Tech. & Privacy L. 31 (2013)." John Marshall Journal of Computer and Information Law. 30 (1).
Article Title

Crisis on Impact: Responding to Cyber Attacks on Critical Information Infrastructures, 30 J. Marshall J. Info. Tech. & Privacy L. 31 (2013)

ERA Journal ID33900
Article CategoryArticle
AuthorsGeorgiades, Eugenia, Caelli, William, Christensen, Sharon and Duncan, W.D.
Journal TitleJohn Marshall Journal of Computer and Information Law
Journal Citation30 (1)
Article Number3
Number of Pages36
Year2013
PublisherUniversity of Chicago
Place of PublicationUnited States
ISSN1078-4128
Web Address (URL)https://repository.law.uic.edu/jitpl/vol30/iss1/3/
Abstract

In the developing digital economy, the notion of traditional attack on enterprises of national significance or interest has transcended into different modes of electronic attack, surpassing accepted traditional forms of physical attack upon a target. The terrorist attacks that took place in the United States on September 11, 2001 demonstrated the physical devastation that could occur if any nation were the target of a large-scale terrorist attack. Therefore, there is a need to protect critical national infrastructure and critical information infrastructure. In particular, this protection is crucial for the proper functioning of a modern society and for a government to fulfill one of its most important prerogatives – namely, the protection of its people. Computer networks have many benefits that governments, corporations, and individuals alike take advantage of in order to promote and perform their duties and roles. Today, there is almost complete dependence on private sector telecommunication infrastructures and the associated computer hardware and software systems. These infrastructures and systems even support government and defense activity. This Article discusses possible at-tacks on critical information infrastructures and the government reactions to these attacks.

ANZSRC Field of Research 2020460402. Data and information privacy
460605. Distributed systems and algorithms
Byline AffiliationsQueensland University of Technology
Griffith University
Permalink -

https://research.usq.edu.au/item/z5660/crisis-on-impact-responding-to-cyber-attacks-on-critical-information-infrastructures-30-j-marshall-j-info-tech-privacy-l-31-2013

  • 45
    total views
  • 3
    total downloads
  • 0
    views this month
  • 0
    downloads this month

Export as

Related outputs

One Checklist At A Time: Towards simplifying satellite internet access in Asia-Pacific
Lawal, Temitope, Jackson, Melanie and Georgiades, E.. 2023. "One Checklist At A Time: Towards simplifying satellite internet access in Asia-Pacific." Centre for Professional Legal Education Blog.
Privacy in the age of remote sensing during natural disasters in Australia and Indonesia
Lawal, Temitope, Jackson, Melanie and Georgiades, Eugenia. 2023. "Privacy in the age of remote sensing during natural disasters in Australia and Indonesia." Digital Law Journal. 4 (2), pp. 15-39. https://doi.org/10.38044/2686-9136-2023-4-2-15-39
Privacy Risks and Legal Jurisprudence in the Emerging Metaverse: Evaluating the Use of Digital Avatar Personas for Governance and Data Privacy Law Reform
Georgiades, Eugenia, Birt, James R. and Svantesson, Dan Jerker B. 2023. Privacy Risks and Legal Jurisprudence in the Emerging Metaverse: Evaluating the Use of Digital Avatar Personas for Governance and Data Privacy Law Reform. Australia. Bond University.
Why Every Law School Should Have A Legal Research Clinic
Jackson, Melanie, Georgiades, Eugenia and Edwards, Holli. 2022. "Why Every Law School Should Have A Legal Research Clinic." Centre for Professional Legal Education Blog.
The limits of protection: why confidentiality doesn't apply to personal images uploaded online
Georgiades, Eugenia. 2022. "The limits of protection: why confidentiality doesn't apply to personal images uploaded online." European Intellectual Property Review. 44 (7), pp. 387-394.
A Right That Should've Been: Protection of Personal Images on the Internet
Georgiades, Eugenia. 2021. "A Right That Should've Been: Protection of Personal Images on the Internet." Idea (Concord): the intellectual property law review. 61 (2), pp. 275-327.
Blind hope, magnificent delusions: the need for privacy protection for personal images uploaded on social networks
Georgiades, Eugenia. 2021. "Blind hope, magnificent delusions: the need for privacy protection for personal images uploaded on social networks." European Intellectual Property Review. 43 (3), pp. 148-155.
Down the Rabbit Hole: Applying a Right to Be Forgotten to Personal Images Uploaded on Social Networks
Georgiades, Eugenia. 2020. "Down the Rabbit Hole: Applying a Right to Be Forgotten to Personal Images Uploaded on Social Networks." Fordham Intellectual Property, Media and Entertainment Law Journal. 30 (4), pp. 1111-1155.
Ignoring the call for law reform: Is it time to expand the scope of protection for personal images uploaded on social networks?
Georgiades, Eugenia. 2019. "Ignoring the call for law reform: Is it time to expand the scope of protection for personal images uploaded on social networks?" Tort Law Review. 26 (3), pp. 166-176.
Protecting the image: applying a right of publicity to images uploaded on social networks
Georgiades, Eugenia. 2019. "Protecting the image: applying a right of publicity to images uploaded on social networks." European Intellectual Property Review. 41 (1), pp. 38-45.
The Limitations of Copyright: Sharing personal Images on social networks
Georgiades, Eugenia. 2018. "The Limitations of Copyright: Sharing personal Images on social networks." European Intellectual Property Review. 40 (4), pp. 230-242.
Reusing images uploaded online: how social networks contracts facilitate the misuse of personal images
Georgiades, Eugenia. 2018. "Reusing images uploaded online: how social networks contracts facilitate the misuse of personal images." European Intellectual Property Review. 40 (7), pp. 435-445.
Closing the gap between copyright and designs: an age of enlightenment or state of confusion?
Georgiades, Eugenia. 2013. "Closing the gap between copyright and designs: an age of enlightenment or state of confusion?" Information and Communications Technology Law. 22 (1), pp. 45-59. https://doi.org/10.1080/13600834.2013.778522
Resolving conflicting interests: software patents versus open source
Georgiades, Eugenia. 2011. "Resolving conflicting interests: software patents versus open source." Information and Communications Technology Law. 20 (3), pp. 225-252. https://doi.org/10.1080/13600834.2011.603964
An Achilles heel: denial of service attacks on Australian critical information infrastructures
Christensen, Sharon, Caelli, William J., Duncan, William D. and Georgiades, Eugenia. 2010. "An Achilles heel: denial of service attacks on Australian critical information infrastructures." Information and Communications Technology Law. 19 (1), pp. 61-85. https://doi.org/10.1080/13600831003708059
When secret use is not so secret
Georgiades, Eugenia. 2010. "When secret use is not so secret." Information and Communications Technology Law. 19 (2), pp. 165-188. https://doi.org/10.1080/13600834.2010.494054
Copyright liability for users and distributors of content sharing and communication technologies: a crossroads between past and present
Georgiades, Eugenia. 2010. "Copyright liability for users and distributors of content sharing and communication technologies: a crossroads between past and present." Information and Communications Technology Law. 19 (1), pp. 1-26. https://doi.org/10.1080/13600831003593154