{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T22:33:34Z","timestamp":1726094014181},"publisher-location":"Cham","reference-count":48,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030574031"},{"type":"electronic","value":"9783030574048"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-57404-8_1","type":"book-chapter","created":{"date-parts":[[2020,8,20]],"date-time":"2020-08-20T23:20:00Z","timestamp":1597965600000},"page":"3-15","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Australian Attitudes Towards Privacy of Information: Will COVID-19 Make a Difference?"],"prefix":"10.1007","author":[{"given":"Leah","family":"Shanley","sequence":"first","affiliation":[]},{"given":"Michael N.","family":"Johnstone","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Crowley","sequence":"additional","affiliation":[]},{"given":"Patryk","family":"Szewczyk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,21]]},"reference":[{"key":"1_CR1","unstructured":"ABC News. Easing coronavirus restrictions depends on the uptake of the Government\u2019s tracing app, so has your MP downloaded it? ABC News (2020). https:\/\/www.abc.net.au\/news\/2020-05-07\/has-your-mp-downloaded-the-coronavirus-tracing-app\/12215092?nw=0"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Ahmed, N., Michelin, R.A., Xue, W., Ruj, S., Malaney, R., Kanhere, S.S., Seneviratne, A., Hu, W., Janicke, H., Jha, S.: A Survey of COVID-19 Contact Tracing Apps. Ithaca: Cornell University Library, arXiv.org (2020)","DOI":"10.1109\/ACCESS.2020.3010226"},{"key":"1_CR3","unstructured":"ANZCTC. Australia\u2019s Strategy for Protecting Crowded Places from Terrorism. Commonwealth of Australia (2017). https:\/\/www.nationalsecurity.gov.au\/Media-and-publications\/Publications\/Documents\/Australias-Strategy-Protecting-Crowded-Places-Terrorism.pdf"},{"key":"1_CR4","unstructured":"Australian Government. Biosecurity (Human Biosecurity Emergency) (Human Coronavirus with Pandemic Potential) (Emergency Requirements\u2014Public Health Contact Information) Determination 2020 (2020). https:\/\/www.legislation.gov.au\/Details\/F2020L00480"},{"key":"1_CR5","unstructured":"Australian Law Reform Commission. Australian Privacy Law and Practice, vol. 3 (2008)"},{"key":"1_CR6","unstructured":"Australian Law Reform Commission. Serious Invasions of Privacy in the Digital Era (2014)"},{"key":"1_CR7","unstructured":"Barnes, G.: New ASIO law one more step towards a totalitarian state. Sydney Morning Herald, 13 May 2020. https:\/\/www.smh.com.au\/national\/new-asio-law-one-more-step-towards-a-totalitarian-state-20200513-p54smi.html"},{"key":"1_CR8","unstructured":"Bogle, A.: Will the Government\u2019s coronavirus app COVIDSafe keep your data secure Here\u2019s what the experts say. ABC News, 27 April 2020. https:\/\/www.abc.net.au\/news\/science\/2020-04-27\/covidsafe-contact-tracing-app-coronavirus-privacy-security\/12186044"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Van den Broek, T., Ooms, M., Friedewald, M., Lieshout, M.V., Rung, S.: Privacy and Security: Citizens\u2019 Desires for an Equal Footing Surveillance, Privacy and Security: Citizens\u2019 Perspectives. Taylor and Francis (2017)","DOI":"10.4324\/9781315619309-2"},{"key":"1_CR10","doi-asserted-by":"publisher","unstructured":"Brown, A.J., Vandekerckhove, W., Dreyfus, S.: The relationship between transparency, whistleblowing, and public trust (2014). https:\/\/doi.org\/10.4337\/9781781007945.00008","DOI":"10.4337\/9781781007945.00008"},{"key":"1_CR11","unstructured":"Clark, R.: What\u2019s \u2018Privacy\u2019? (2006)"},{"key":"1_CR12","unstructured":"Dentons. New tougher penalties to apply in Australia for breach of privacy (2019). https:\/\/www.dentons.com\/en\/insights\/alerts\/2019\/march\/28\/new-tougher-penalties-to-apply-in-australia-for-breach-of-privacy"},{"key":"1_CR13","unstructured":"Department of Health. COVIDSafe app [Press release] (2020). https:\/\/www.health.gov.au\/resources\/apps-and-tools\/covidsafe-app"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Friedewald, M., Lieshout, M.V., Rung, S., Ooms, M., Ypma, J.: Privacy and Security Perceptions of European Citizens: A Test of the Trade-Off Model. Springer, New York (2015). WorldCat.org database","DOI":"10.1007\/978-3-319-18621-4_4"},{"key":"1_CR15","series-title":"Law, Governance and Technology Series","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-94-017-7376-8_3","volume-title":"Data Protection on the Move","author":"M Friedewald","year":"2016","unstructured":"Friedewald, M., van Lieshout, M., Rung, S., Ooms, M.: The context-dependence of citizens\u2019 attitudes and preferences regarding privacy and security. In: Gutwirth, S., Leenes, R., De Hert, P. (eds.) Data Protection on the Move. LGTS, vol. 24, pp. 51\u201374. Springer, Dordrecht (2016). https:\/\/doi.org\/10.1007\/978-94-017-7376-8_3"},{"key":"1_CR16","unstructured":"Goggin, G., et al.: Digital Rights in Australia (2017)"},{"key":"1_CR17","unstructured":"Hanson, F.: Preventing another Australia Card fail. Australian Strategic Policy Institute (2018)"},{"key":"1_CR18","unstructured":"Heathcote, S.: Australia and Timor Leste in The Hague. The Conversation (2013)"},{"key":"1_CR19","unstructured":"Hendry, J.: WA prepares for national face matching database upload. IT News, 27 March 2020 (2020a). https:\/\/www.itnews.com.au\/news\/wa-prepares-for-national-face-matching-database-upload-539863"},{"key":"1_CR20","unstructured":"Hendry, J.: WA to electronically track COVID-19 patients who defy isolation orders. IT News (2020b). https:\/\/www.itnews.com.au\/news\/wa-to-electronically-track-covid-19-patients-who-defy-isolation-orders-546224?eid=65&edate=20200414&utm_source=20200414&utm_medium=newsletter&utm_campaign=sc_weekly"},{"key":"1_CR21","unstructured":"Kelio, L.: Coronavirus: Contact-tracing apps face further hitches (2020). https:\/\/www.bbc.com\/nes\/technology-53051783"},{"key":"1_CR22","unstructured":"Knaus, C.: Witness K and the outrageous spy scandal that failed to shame Australia. The Guardian (2019). https:\/\/www.theguardian.com\/australia-news\/2019\/aug\/10\/witness-k-and-the-outrageous-spy-scandal-that-failed-to-shame-australia"},{"key":"1_CR23","unstructured":"Korolov, M.: Study: Encryption use increase largest in 11 years. CSO (2016). https:\/\/www.csoonline.com\/article\/3088916\/study-encryption-use-increase-largest-in-11-years.html"},{"issue":"1","key":"1_CR24","first-page":"121","volume":"40","author":"M Mann","year":"2017","unstructured":"Mann, M., Smith, M.: Automated facial recognition technology: recent developments and approaches to oversight. Univ. New South Wales Law J. 40(1), 121\u2013145 (2017)","journal-title":"Univ. New South Wales Law J."},{"key":"1_CR25","volume-title":"Australia Under Survelliance","author":"F Moorhouse","year":"2014","unstructured":"Moorhouse, F.: Australia Under Survelliance. Random House, Sydney (2014)"},{"key":"1_CR26","unstructured":"OAIC. Australian Community Attitudes to Privacy. Office of the Australian Information Commissioner (2017). https:\/\/www.oaic.gov.au\/resources\/engage-with-us\/community-attitudes\/acaps-2017\/acaps-2017-report.pdf"},{"key":"1_CR27","unstructured":"OAIC. (n.d). Government Agencies. Office of the Australian Information Commissioner. https:\/\/www.oaic.gov.au\/privacy\/your-privacy-rights\/government-agencies\/"},{"key":"1_CR28","unstructured":"Ng, A.: Location data used for tracking COVID-19 has its limits, ACLU warns. CNET (2020). http:\/\/www.cnet.com\/news\/location-data-used-for-tracking-covid-19-has-its-limits-aclu-warns\/"},{"key":"1_CR29","unstructured":"Parliament of Australia. Identity-matching Services Bill 2019 (2019). http:\/\/www.aph.gov.au\/Parliamentary_Business\/Bills_Legislation\/Bills_Search_Results\/Result?bId=r6387"},{"key":"1_CR30","unstructured":"Telecommunications Legislation Amendment (International Production Orders) Bill 2020 (2020)"},{"key":"1_CR31","doi-asserted-by":"crossref","unstructured":"Patil, S., et al.: Public Perception of Security and Privacy: Results of the comprehensive analysis of PACT\u2019s pan-European Survey. PACT Project Consortium (2015)","DOI":"10.7249\/RR704"},{"key":"1_CR32","doi-asserted-by":"crossref","unstructured":"Patil, V., Shyamasundar, R.K.: Is privacy a myth for Facebook users? In: Proceedings of the 16th International Joint Conference on e-Business and Telecommunications (ICETE 2019), pp. 510\u2013516 (2019)","DOI":"10.5220\/0008018805100516"},{"key":"1_CR33","unstructured":"Price, J.: Quiet Australians, it\u2019s time to ask Centrelink for your money back - loudly. The Sydney Morning Herald (2019). http:\/\/www.smh.com.au\/national\/quiet-australians-it-s-time-to-ask-centrelink-for-your-money-back-loudly-20191128-p53f1i.html"},{"key":"1_CR34","unstructured":"Ruiz, K., Moore, C.: Missing the pub this arvo? Well download the COVIDSafe app and we\u2019ll open them up, Scott Morrison says. Daily Mail Australia (2020). https:\/\/www.dailymail.co.uk\/news\/article-8276671\/Australians-told-return-normal-life-soon-download-Covid-19-app.html"},{"key":"1_CR35","unstructured":"Ryall, J.: Federal police raid home of Australian journalist who revealed government\u2019s proposal to spy on the public. Business Insider (2019). http:\/\/www.businessinsider.com.au\/federal-police-raid-home-of-australian-journalist-who-revealed-governments-plan-to-spy-on-the-public-2019-6"},{"key":"1_CR36","unstructured":"Sky News. Drones Deployed to police social distancing in WA [Press release] (2020). http:\/\/www.skynews.com.au\/details\/_6145829434001"},{"key":"1_CR37","unstructured":"Taylor, J.: Questions remain over whether data collected by Covidsafe app could be accessed by US law enforcement (2020). https:\/\/www.theguardian.com\/law\/2020\/may\/14\/questions-remain-over-whether-data-collected-by-covidsafe-app-could-be-accessed-by-us-law-enforcement"},{"key":"1_CR38","unstructured":"The Parliament of the Commonwealth of Australia. Australian Security Intelligence Organisation Legislation Amendment Bill 1999 (1999). https:\/\/www.legislation.gov.au\/Details\/C2004B00436\/Revised%20Explanatory%20Memorandum\/Text"},{"key":"1_CR39","unstructured":"The Parliament of the Commonwealth of Australia. Telecommunications and Other Legislation Amendment (Assistance and Access) Bill 2018 - Explanatory Memorandum (2018). https:\/\/parlinfo.aph.gov.au\/parlInfo\/download\/legislation\/ems\/r6195_ems_1139bfde-17f3-4538-b2b2-5875f5881239\/upload_pdf\/685255.pdf;fileType=application\/pdf"},{"key":"1_CR40","unstructured":"The Parliament of the Commonwealth of Australia. Explanatory Memorandum: Telecommunications Legislation Amendment (International Productions Orders) Bill 2020 T (2020a). https:\/\/parlinfo.aph.gov.au\/parlInfo\/download\/legislation\/ems\/r6511_ems_0ac5ae09-3e3e-400b-ae5e-680a68af4e45\/upload_pdf\/733176.pdf;fileType=application%2Fpdf"},{"key":"1_CR41","unstructured":"The Parliament of the Commonwealth of Australia. Privacy Amendment (Pubic Health Contact Information) (2020b). http:\/\/www.ag.gov.au\/RightsAndProtections\/Privacy\/Documents\/exposure-draft-privacy-amendment-public-health-contact-information.pdf"},{"key":"1_CR42","unstructured":"Tillett, A.: Top bureaucrats deny report cyber agency wants to spy on Australians. Financial Review (2018). http:\/\/www.afr.com\/politics\/top-bureaucrats-deny-report-cyber-agency-wants-to-spy-on-australians-20180429-h0ze7a"},{"key":"1_CR43","doi-asserted-by":"crossref","unstructured":"Turner, J.C.: Explaining the nature of power: a three-process theory. Eur. J. Soc. Psychol. 35:1, 1\u201322 (2005)","DOI":"10.1002\/ejsp.244"},{"key":"1_CR44","unstructured":"Universal Declaration of Human Rights (1948)"},{"issue":"1\u20132","key":"1_CR45","first-page":"119","volume":"26","author":"M van Lieshout","year":"2013","unstructured":"van Lieshout, M., Friedewald, M., Wright, D., Gutwirth, S.: Reconciling privacy and security. Innovation 26(1\u20132), 119 (2013)","journal-title":"Innovation"},{"key":"1_CR46","unstructured":"White, N.: Australia\u2019s leading coronavirus expert at the World Health Organisation REFUSES to download the COVIDSafe app - despite Scott Morrison saying it\u2019s our key to lifting lockdowns, News. Daily Mail Australia (2020). http:\/\/www.dailymail.co.uk\/news\/article-8281393\/Australian-Infection-expert-REFUSES-download-COVIDSafe-app.html"},{"issue":"4","key":"1_CR47","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1016\/j.clsr.2010.05.007","volume":"26","author":"D Wright","year":"2010","unstructured":"Wright, D., et al.: Sorting out smart surveillance. Comput. Law Secur. Rev. 26(4), 343\u2013354 (2010). https:\/\/doi.org\/10.1016\/j.clsr.2010.05.007","journal-title":"Comput. Law Secur. Rev."},{"key":"1_CR48","doi-asserted-by":"crossref","unstructured":"Zedner, L.: Security Key Ideas in Criminology, 3. WorldCat.org database (2009). http:\/\/public.eblib.com\/choice\/publicfullrecord.aspx?p=425617","DOI":"10.4324\/9780203871133"}],"container-title":["IFIP Advances in Information and Communication Technology","Human Aspects of Information Security and Assurance"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57404-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T12:38:03Z","timestamp":1724330283000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-57404-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030574031","9783030574048"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57404-8_1","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"21 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Human Aspects of Information Security and Assurance","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mytilene, Lesbos","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"haisa2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.haisa.org\/?page=home","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"63% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.79","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The symposium was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}