References
- ASIC. (2022). Guidance for consumers impacted by the Optus data breach. Retrieved from ASIC: https://asic.gov.au/about-asic/news-centre/news-items/guidance-for-consumers-impacted-by-the-optus-data-breach/
- OAIC. (n.d.). The Privacy Act / Rights and responsibilities. Retrieved from OAIC: https://www.oaic.gov.au/privacy/the-privacy- act/rights-and-responsibilities
- Chen, R.-R., Lin, Y.-H., Chiang, S.-C., & Chang, H.-K. (2010, June 29). Management of personal health information sharing for long term care services. 2010 7th International Conference on Service Systems and Service Management. doi:10.1109/ICSSSM.2010.5530130
- Ball, K. S. (2001, December 1). Surveillance Society: Monitoring Everyday Life. Information Technology & People, 14, 406-419. doi: https://doi.org/10.1108/itp.2001.14.4.406.5
- Bélanger, F., & Crossler, R. E. (2011, December). Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems. 35, 1017-1041. doi:https://doi.org/10.2307/41409971
- Conger, S., Pratt, J. H., & Loch, K. D. (2012, June 01). Personal information privacy and emerging technologies. Information System Journal. doi: https://doi.org/10.1111/j.1365-2575.2012.00402.x
- KU. (2009, January 15). DATA CLASSIFICATION AND HANDLING PROCEDURES GUIDE. KU Policy Library. Retrieved from https://policy.ku.edu/IT/data-classification-handling-procedures
- Benson, V., Saridakis, G., & Tennakoon, H. (2015, August 3). Information disclosure of social media users: Does control over personal information, user awareness and security notices matter? Information Technology & People, 28(3), 426-441. doi:https://doi.org/10.1108/ITP-10-2014-0232
- Nakagawa, Y., Matsuda, Y., & Ogi, T. (2013). Framework for handling personal data proposed system of the self-control on buying information. 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013). doi:10.1109/ICITST.2013.6750172
- Optus. (2022). Latest updates & support on our cyber response. cyber Response. Optus. Retrieved from https://www.optus.com.au/support/cyberattack?gclid=Cj0KCQjw-fmZBhDtARIsAH6H8qj81jkVEdv2ulLFarg0Coxf2O0paLktHG3kGb9-IpchnBaPQ0zSU4IaArHREALw_wcB&gclsrc=aw.ds
- ACS. (2014, April). ACS Code of Professional Conduct. Retrieved from https://learn-ap-southeast-2-prod-fleet01-xythos.content.blackboardcdn.com/5c1c4db3261aa/1545153?X-Blackboard-Expiration=1618725600000&X-Blackboard-Signature=cJiiWtL8JKLcSqUy7EIpTgNLmx%2BQ5eEa1DaMvblDJYI%3D&X-Blackboard-Client-Id=116148&response-cache-con
- OAIC. (n.d.). Right and Responsibilities. Retrieved from oic.gov.au: https://www.oaic.gov.au/privacy/the-privacy-act/rights-and-responsibilities/
- Commision, F. T. (n.d.). Fair Credit Reporting Act. Retrieved from Federal Trade Commision: https://www.ftc.gov/legal-library/browse/statutes/fair-credit-reporting-act
- Roeber, B., Rehse, O., Knorrek, R., & Benjamin, T. (2015, February 07). Personal data: how context shapes consumers’ data sharing with organizations from various sectors. Springer Link, 95-108. Retrieved from https://link.springer.com/article/10.1007/s12525-015-0183-0
- Gressin, S. (2017, Septembre 8). The Equifax Data Breach: What to Do. Attorney, Division of Consumer & Business Education, FTC. Retrieved from https://www.penncommunitybank.com/wp-content/uploads/2019/12/The-Equifax-Data-Breach_-What-to-Do-_-Consumer-Information.pdf
- Newman, L. H. (2017, 03 10). 6 Fresh Horrors From the Equifax CEO’s Congressional Hearing. Wired. Retrieved from https://www.wired.com/story/equifax-ceo-congress-testimony/
- FALK, A. (2022, October 04). Privacy Commissioner wnats to know what security Optus had in place before data breach. (SARA, Interviewer) Retrieved from https://www.youtube.com/watch?v=j5Bp-V5lynw