{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,3,9]],"date-time":"2023-03-09T05:45:27Z","timestamp":1678340727405},"reference-count":30,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2018,5,3]],"date-time":"2018-05-03T00:00:00Z","timestamp":1525305600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JICES"],"published-print":{"date-parts":[[2019,3,8]]},"abstract":"\nPurpose<\/jats:title>\nThe information society has developed rapidly since the end of the twentieth century. Many countries (including Australia) have been looking at ways to protect their citizens against the variety of risks associated with the continued evolution of the internet. The Australian Federal Government in 2013 proposed data retention as one possible method of protecting Australian society and aiding law enforcement agencies to investigate and prosecute cyber-crime.<\/jats:p>\n<\/jats:sec>\n\nDesign\/methodology\/approach<\/jats:title>\nThe aim of this paper is to consider the issue of data retention from a stakeholder\u2019s perspective by analysing the public submissions garnered by the Australian Federal Government and identify the key issues and concerns that were raised by these stakeholders. The paper used a qualitative approach to undertake theme analysis.<\/jats:p>\n<\/jats:sec>\n\nFindings<\/jats:title>\nThe paper shows the concerns and wishes that different stakes holders have regarding data retention within Australia.<\/jats:p>\n<\/jats:sec>\n\nOriginality\/value<\/jats:title>\nThis is a unique study into implementation of data retention at a national level, in terms of the paper focussing on Australia.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/jices-12-2017-0073","type":"journal-article","created":{"date-parts":[[2023,3,8]],"date-time":"2023-03-08T16:19:21Z","timestamp":1678292361000},"page":"98-112","source":"Crossref","is-referenced-by-count":0,"title":["Data retention: an assessment of a proposed national scheme"],"prefix":"10.1108","volume":"17","author":[{"given":"Matthew","family":"Warren","sequence":"first","affiliation":[]},{"given":"Shona","family":"Leitch","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2018,5,3]]},"reference":[{"key":"key2023030815340114600_ref001","unstructured":"Anonymous (2012), \u201c40GB of Data leaked using Australian government monitoring technology\u201d, available at: http:\/\/anonpr.net\/aapt-805 (accessed 9 January 2013)."},{"key":"key2023030815340114600_ref002","unstructured":"Australian Broadcasting Company (ABC) (2015), \u201cData retention laws pass Federal Parliament as Coalition and Labor vote together\u201d, available at: www.abc.net.au\/news\/2015-03-26\/data-retention-laws-pass-federal-parliament\/6351278 (accessed 8 March 2015)."},{"key":"key2023030815340114600_ref003","unstructured":"Australian Government (2012), \u201cEquipping Australia against emerging and evolving threats attorney general department\u201d, available at: www.aph.gov.au\/Parliamentary_Business\/Committees\/House_of_Representatives_Committees?url=pjcis\/nsl2012\/additional\/discussion%20paper.pdf (accessed 9 January 2015)."},{"key":"key2023030815340114600_ref004","unstructured":"Australian Government (2013), \u201cReport of the inquiry into potential reforms of Australia\u2019s national security legislation\u201d, available at: www.aph.gov.au\/Parliamentary_Business\/Committees\/House_of_Representatives_Committees?url=pjcis\/nsl2012\/report.htm#chapters (accessed 9 January 2015)."},{"key":"key2023030815340114600_ref005","unstructured":"BBC (2004), \u201cMadrid bombings: a country in mourning\u201d, available at: http:\/\/news.bbc.co.uk\/2\/hi\/programmes\/breakfast\/3504124.stm (accessed 11 August 2015)."},{"key":"key2023030815340114600_ref006","unstructured":"BBC (2005), Call for public inquiry into 7\/7, URL, http:\/\/news.bbc.co.uk\/2\/hi\/uk_news\/6948174.stm (accessed 11 August 2015)."},{"key":"key2023030815340114600_ref007","volume-title":"Data Retention after the Judgement of the Court of Justice of the European Union, Institute for Information","year":"2014"},{"key":"key2023030815340114600_ref008","volume-title":"Comparative Law Paper on Data Retention Regulation in Asample of EU Member States, Surveillance: Ethical Issues, Legal Limitations, and Efficiency Collaborative EU Research Project","year":"2013"},{"key":"key2023030815340114600_ref009","unstructured":"Court of Justice of the European Union (2014), The Court of Justice declares the Data Retention Directive to be invalid, Press Release Nos 54\/14, 8th April."},{"key":"key2023030815340114600_ref010","volume-title":"Qualitative Research Methods in Public Relations and Marketing Communications","year":"2011","edition":"2nd ed."},{"key":"key2023030815340114600_ref012","volume-title":"The Handbook of Qualitative Research","year":"1994","edition":"1st ed."},{"key":"key2023030815340114600_ref013","volume-title":"The Disciples and Practice of Qualitative Research, Published as Part of the \u201cthe Sage Handbook of Qualitative Research","year":"2005","edition":"3rd ed."},{"key":"key2023030815340114600_ref011","volume-title":"The Research Act","year":"1989","edition":"3rd ed."},{"key":"key2023030815340114600_ref014","unstructured":"European Commission (2012), Data retention: Commission takes Germany to Court requesting that fines be imposed, available at: http:\/\/europa.eu\/rapid\/press-release_IP-12-530_en.htm (accessed 11 August 2015)."},{"key":"key2023030815340114600_ref015","unstructured":"European Digital Rights (2008), Bulgarian Court Annuls A Vague Article of The Data Retention Law, available at: http:\/\/history.edri.org\/edri-gram\/number6.24\/bulgarian-administrative-case-data-retention (accessed 11 August 2015)."},{"key":"key2023030815340114600_ref016","unstructured":"European Union (2006), Directive 2006\/24\/EC of the European Parliament and of the Council of the 15th March, Official Journal of the European Union, available at: http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=OJ:L:2006:105:0054:0063:EN:PDF (accessed 15 January 2013)."},{"key":"key2023030815340114600_ref017","unstructured":"European Union (2013), European Commission Home Affairs \u2013 Data Retention, available at: http:\/\/ec.europa.eu\/dgs\/home-affairs\/what-we-do\/policies\/police-cooperation\/data-retention\/index_en.htm (accessed 15 January 2013)."},{"key":"key2023030815340114600_ref018","volume-title":"The Court of Justice Declares the Data Retention Directive to Be Invalid","author":"European Union","year":"2014"},{"key":"key2023030815340114600_ref019","unstructured":"Gizmodo (2012), AAPT Confirms Data Breach, But Was Anonymous Involved?, available at: www.gizmodo.com.au\/2012\/07\/aapt-confirms-data-breach-but-was-anonymous-involved\/ (accessed 18 January 2013)."},{"issue":"3","key":"key2023030815340114600_ref020","article-title":"The legality of the data retention directive in light of the fundamental rights to privacy and data protection","volume":"1","year":"2010","journal-title":"European Journal of Law and Technology"},{"key":"key2023030815340114600_ref021","unstructured":"House of Representatives (2012), Inquiry into potential reforms of National Security Legislation, available at: www.aph.gov.au\/Parliamentary_Business\/Committees\/House_of_Representatives_Committees?url=pjcis\/nsl2012\/hearings.htm (accessed 22 January 2013)."},{"issue":"3","key":"key2023030815340114600_ref022","article-title":"The way to Luxemburg: national court decisions on the compatibility of the data retention directive with the rights to privacy and data protection","volume":"10","year":"2013","journal-title":"SCIPTed"},{"key":"key2023030815340114600_ref023","volume-title":"Case Study of the EU Data Retention Directive, SECILE \u2013 Securing Europe through Counter-Terrorism (SECILE)","year":"2013"},{"key":"key2023030815340114600_ref024","volume-title":"Research Methods","year":"2005","edition":"3rd ed."},{"key":"key2023030815340114600_ref025","volume-title":"Using Documents in Social Research, Appeared in Qualitative Research","year":"2011","edition":"3rd ed."},{"key":"key2023030815340114600_ref026","unstructured":"Roxon, N. (2012), \u201cCorrespondence with the Joint committee on Intelligence and Security\u201d, available at: www.aph.gov.au\/Parliamentary_Business\/Committees\/House_of_Representatives_Committees?url=pjcis\/nsl2012\/additional\/letter%20from%20ag%20to%20pjcis%20clarifying%20tor.pdf (accessed 2 February 2013)."},{"key":"key2023030815340114600_ref027","unstructured":"The Australian (2012a), \u201cAnonymous hackers dump stolen data belonging to Australian telco AAPT\u201d, available at: www.theaustralian.com.au\/australian-it\/telecommunications\/anonymous-hackers-dump-stolen-data-belonging-to-australian-firm-aapt\/story-fn4iyzsr-1226437681976 (accessed 3 March 2013)."},{"key":"key2023030815340114600_ref028","unstructured":"The Australian (2012b), \u201cAAPT hack by Anonymous poses crime data leak fears for AFP and ACC\u201d, available at: www.theaustralian.com.au\/australian-it\/government\/aapt-hack-by-anonymous-poses-crime-data-leak-fears-for-afp-and-acc\/story-fn4htb9o-1226439504262 (accessed 15 January 2013)."},{"key":"key2023030815340114600_ref029","unstructured":"The Australian (2012c), \u201cAssurance sought on data retention plan\u201d, available at: www.theaustralian.com.au\/australian-it\/government\/assurance-sought-on-data-retention-plan\/story-fn4htb9o-1226509198948 (accessed 15 January 2013)."},{"key":"key2023030815340114600_ref030","article-title":"Australia and data retention","year":"2013"}],"container-title":["Journal of Information, Communication and Ethics in Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JICES-12-2017-0073\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JICES-12-2017-0073\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,8]],"date-time":"2023-03-08T19:15:59Z","timestamp":1678302959000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JICES-12-2017-0073\/full\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,3]]},"references-count":30,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2018,5,3]]},"published-print":{"date-parts":[[2019,3,8]]}},"alternative-id":["10.1108\/JICES-12-2017-0073"],"URL":"https:\/\/doi.org\/10.1108\/jices-12-2017-0073","relation":{},"ISSN":["1477-996X"],"issn-type":[{"value":"1477-996X","type":"print"}],"subject":[],"published":{"date-parts":[[2018,5,3]]}}}