References

  1. ASIC. (2022). Guidance for consumers impacted by the Optus data breach. Retrieved from ASIC: https://asic.gov.au/about-asic/news-centre/news-items/guidance-for-consumers-impacted-by-the-optus-data-breach/
  2. OAIC. (n.d.). The Privacy Act / Rights and responsibilities. Retrieved from OAIC: https://www.oaic.gov.au/privacy/the-privacy- act/rights-and-responsibilities
  3. Chen, R.-R., Lin, Y.-H., Chiang, S.-C., & Chang, H.-K. (2010, June 29). Management of personal health information sharing for long term care services. 2010 7th International Conference on Service Systems and Service Management. doi:10.1109/ICSSSM.2010.5530130
  4. Ball, K. S. (2001, December 1). Surveillance Society: Monitoring Everyday Life. Information Technology & People, 14, 406-419. doi: https://doi.org/10.1108/itp.2001.14.4.406.5
  1. Bélanger, F., & Crossler, R. E. (2011, December). Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems. 35, 1017-1041. doi:https://doi.org/10.2307/41409971
  2. Conger, S., Pratt, J. H., & Loch, K. D. (2012, June 01). Personal information privacy and emerging technologies. Information System Journal. doi: https://doi.org/10.1111/j.1365-2575.2012.00402.x
  3. KU. (2009, January 15). DATA CLASSIFICATION AND HANDLING PROCEDURES GUIDE. KU Policy Library. Retrieved from https://policy.ku.edu/IT/data-classification-handling-procedures
  4. Benson, V., Saridakis, G., & Tennakoon, H. (2015, August 3). Information disclosure of social media users: Does control over personal information, user awareness and security notices matter? Information Technology & People, 28(3), 426-441. doi:https://doi.org/10.1108/ITP-10-2014-0232
  5. Nakagawa, Y., Matsuda, Y., & Ogi, T. (2013). Framework for handling personal data proposed system of the self-control on buying information. 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013). doi:10.1109/ICITST.2013.6750172
  1. Optus. (2022). Latest updates & support on our cyber response. cyber Response. Optus. Retrieved from https://www.optus.com.au/support/cyberattack?gclid=Cj0KCQjw-fmZBhDtARIsAH6H8qj81jkVEdv2ulLFarg0Coxf2O0paLktHG3kGb9-IpchnBaPQ0zSU4IaArHREALw_wcB&gclsrc=aw.ds
  2. ACS. (2014, April). ACS Code of Professional Conduct. Retrieved from https://learn-ap-southeast-2-prod-fleet01-xythos.content.blackboardcdn.com/5c1c4db3261aa/1545153?X-Blackboard-Expiration=1618725600000&X-Blackboard-Signature=cJiiWtL8JKLcSqUy7EIpTgNLmx%2BQ5eEa1DaMvblDJYI%3D&X-Blackboard-Client-Id=116148&response-cache-con
  3. OAIC. (n.d.). Right and Responsibilities. Retrieved from oic.gov.au: https://www.oaic.gov.au/privacy/the-privacy-act/rights-and-responsibilities/
  4. Commision, F. T. (n.d.). Fair Credit Reporting Act. Retrieved from Federal Trade Commision: https://www.ftc.gov/legal-library/browse/statutes/fair-credit-reporting-act
  5. Roeber, B., Rehse, O., Knorrek, R., & Benjamin, T. (2015, February 07). Personal data: how context shapes consumers’ data sharing with organizations from various sectors. Springer Link, 95-108. Retrieved from https://link.springer.com/article/10.1007/s12525-015-0183-0
  6. Gressin, S. (2017, Septembre 8). The Equifax Data Breach: What to Do. Attorney, Division of Consumer & Business Education, FTC. Retrieved from https://www.penncommunitybank.com/wp-content/uploads/2019/12/The-Equifax-Data-Breach_-What-to-Do-_-Consumer-Information.pdf
  7. Newman, L. H. (2017, 03 10). 6 Fresh Horrors From the Equifax CEO’s Congressional Hearing. Wired. Retrieved from https://www.wired.com/story/equifax-ceo-congress-testimony/
  8. FALK, A. (2022, October 04). Privacy Commissioner wnats to know what security Optus had in place before data breach. (SARA, Interviewer) Retrieved from https://www.youtube.com/watch?v=j5Bp-V5lynw

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *