Lyria Bennett Moses, C. Compton, M. Murdocca, Heejin Kim, Andrew Ray, Kate Renehan, Charlotte Michalowski
{"title":"提交给外交和贸易部关于澳大利亚国际网络和关键技术参与战略的文件","authors":"Lyria Bennett Moses, C. Compton, M. Murdocca, Heejin Kim, Andrew Ray, Kate Renehan, Charlotte Michalowski","doi":"10.2139/ssrn.3708041","DOIUrl":null,"url":null,"abstract":"Submission to the Department of Foreign Affairs and Trade on Australia's International Cyber and Critical Technology Engagement Strategy. \n \nOur submission is not intended as a comprehensive response to all the issues in the inquiry, but rather focuses on topics on which our research can shed light. We thus limit our submission to the following issues: \n \nQuestion 1: Need for integrated approach \n \nQuestions 2 and 3: Political misinformation, Internet of Things, telecommunications infrastructure \n \nQuestion 4: Engagement with inter-governmental organisations \n \nQuestion 5: Map of legal and regulatory framework for cyber security in Australia","PeriodicalId":238624,"journal":{"name":"IRPN: Governance (Sub-Topic)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Submission to the Department of Foreign Affairs and Trade on Australia's International Cyber and Critical Technology Engagement Strategy\",\"authors\":\"Lyria Bennett Moses, C. Compton, M. Murdocca, Heejin Kim, Andrew Ray, Kate Renehan, Charlotte Michalowski\",\"doi\":\"10.2139/ssrn.3708041\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Submission to the Department of Foreign Affairs and Trade on Australia's International Cyber and Critical Technology Engagement Strategy. \\n \\nOur submission is not intended as a comprehensive response to all the issues in the inquiry, but rather focuses on topics on which our research can shed light. We thus limit our submission to the following issues: \\n \\nQuestion 1: Need for integrated approach \\n \\nQuestions 2 and 3: Political misinformation, Internet of Things, telecommunications infrastructure \\n \\nQuestion 4: Engagement with inter-governmental organisations \\n \\nQuestion 5: Map of legal and regulatory framework for cyber security in Australia\",\"PeriodicalId\":238624,\"journal\":{\"name\":\"IRPN: Governance (Sub-Topic)\",\"volume\":\"96 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-06-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IRPN: Governance (Sub-Topic)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2139/ssrn.3708041\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IRPN: Governance (Sub-Topic)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2139/ssrn.3708041","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Submission to the Department of Foreign Affairs and Trade on Australia's International Cyber and Critical Technology Engagement Strategy
Submission to the Department of Foreign Affairs and Trade on Australia's International Cyber and Critical Technology Engagement Strategy.
Our submission is not intended as a comprehensive response to all the issues in the inquiry, but rather focuses on topics on which our research can shed light. We thus limit our submission to the following issues:
Question 1: Need for integrated approach
Questions 2 and 3: Political misinformation, Internet of Things, telecommunications infrastructure
Question 4: Engagement with inter-governmental organisations
Question 5: Map of legal and regulatory framework for cyber security in Australia