Australia and the New Technologies: Towards Evidence Based Policy in Public Administration 2008

  • Screen Shot 2014-12-03 at 4.41.12 pm

    Program Day 1
    9.15 Welcome
    Katina Michael
    9.25 Technology in foreign policy and national security: a factor, a tool, and a mediator
    Lucy Resnyansky
    Defence Science and Technology Organisation
    9.45 You are where you have been
    Roger Clarke and Marcus Wigan
    XamaX Consultancy Pty Ltd; University of Melbourne
    10.20 National Security and the misology-misanthropy paradox of technology
    George Mickhail
    School of Accounting and Finance, University of Wollongong
    11.00 Morning Break
    11.20 The risk intelligence conundrum and its impact on governance
    Mark Loves
    Centre for Transnational Crime Prevention, University of Wollongong
    11.50 Policy implications of convergence in the new security environment: An investigation into the symbiosis between risk management and intelligence
    Katina Michael and Mark Loves
    School of Information Systems and Technology and
    Centre for Transnational Crime Prevention, University of Wollongong
    12.10 Could terrorist acquire and detonate nuclear weapons? A scenario
    Nick O’Brien
    Graduate School of Policing, Faculty of Arts, Charles Sturt University
    12.40 Lunch
    1.40 Special Track: Policy Track of Safeguarding Australia Conference sponsored by the Research Network for a Secure Australia
    3.10 Afternoon Break
    3.30 Using a RFID-University-based laboratory for homeland security applications testing
    Samuel Fosso Wamba
    School of Information Systems and Technology, University of Wollongong
    4.00 Biometric data management: Challenges, policies and best practices
    Suzanne Lockhart
    Biometric Consulting Group
    4.30 What is trust online?
    Nigel Phair
    eSecurity Consulting
    5.00 Close
    Program Day 2
    9.15 Opening Comments
    Katina Michael
    9.20 The enthusiasm for evidence: exploring the relationship between politics, policy and knowledge
    Robert Watts and Greg Marston
    School of Global Studies, Social Science and Planning, RMIT University;
    School of Social Work and Hman Service, University of Queensland
    10.00 Using the tools of evidence-based policy under a national security framework
    Chris Del Mar
    Faculty of Health Sciences and Medicine, Bond University
    10.50 Governance and evidence based policy under a national security framework
    Marcus Wigan
    GAMUT, University of Melbourne
    11.10 Morning Break
    11.30 Profiting from personal information: Power, information privacy and evidence based policy
    Mark Burdon
    Faculty of Law/Information Security Institute, Queensland University of Technology
    12.00 Questioning national security powers
    David Vaile
    Cyberspace Law and Policy Centre, University of New South Wales
    12.40 Lunch
    1.40 Special Track: Policy Track of Safeguarding Australia Conference sponsored by the Research Network for a Secure Australia
    2.30 The Future of the Social Implications of National Security Workshops: What We’ve Achieved and Where We are Headed
    Katina Michael
    3.00 Privacy and national identity cards: A legal and technical study
    Steven R Clark
    Centre for Regulation and Market Analysis, University of South Australia
    3.30 Afternoon Break
    3.30 User acceptance of location-based services for emergency management in Australia
    Anas Aloudat
    School of Informaiton Systems and Technology, University of Wollongong
    4.00 Close & Networking Opportunity