Select Publications
Books
2008, Preface
,1994, Information Technology: Weapon of authoritarianism of tool of democracy?
,Book Chapters
2020, 'Asimov’s laws of robotics: Implications for information technology: Part 1', in Machine Ethics and Robot Ethics, pp. 33 - 41, http://dx.doi.org/10.4324/9781003074991-3
,2020, 'Asimov’s laws of robotics: Implications for information technology: Part 2', in Machine Ethics and Robot Ethics, pp. 43 - 52, http://dx.doi.org/10.4324/9781003074991-4
,2017, 'Big Data Prophylactics', in Lehmann A; Whitehouse D; Fischer-Hübner S; Fritsch L; Raab C (ed.), Privacy and Identity Management. Facing up to Next Steps 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers, Springer, pp. 3 - 3, https://link.springer.com/book/10.1007/978-3-319-55783-0
,2016, ''Privacy and Consumer Risks in Cloud Computing', Computer Law and Security Review, 26, pp. 391-97', in Privacy in the Information Society: Volume II, pp. 355 - 361
,2016, 'Information technology and dataveillance', in Security and Privacy: Volume III, pp. 291 - 305
,2016, 'The digital persona and its application to data surveillance', in Security and Privacy: Volume III, pp. 19 - 34
,2013, 'A Framework for Risk Analysis in Smart Grid', in Luiijf E; Hartel P (ed.), Critical Information Infrastructures Security, Springer International Publishing, Amsterdam, The Netherlands, pp. 84 - 95, http://dx.doi.org/10.1007/978-3-319-03964-0
,2012, 'PIAs in Australia: A Work-In-Progress Report', in Law, Governance and Technology Series, pp. 119 - 148, http://dx.doi.org/10.1007/978-94-007-2543-0_5
,2012, 'PIAs in Australia: A Work-In-Progress Report', in Wright D; de Hert P (ed.), Privacy Impact Assessment, Springer, pp. 119 - 148, http://www.springer.com/law/international/book/978-94-007-2542-3
,2011, 'Asimov’s laws of robotics: Implications for information technology', in Machine Ethics, pp. 254 - 284, http://dx.doi.org/10.1017/CBO9780511978036.016
,2011, 'The Effectiveness of Privacy Policy Statements', in Kerr D; Gammack J; Bryant K (ed.), Digital Business Security Development: Management Technologies, IGI Global, pp. 84 - 111, http://www.igi-global.com/book/digital-business-security-development/266
,2008, 'Business cases for privacy-enhancing technologies', in Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions, pp. 135 - 155, http://dx.doi.org/10.4018/978-1-59904-804-8.ch007
,2003, 'If E-Business is Different, then SO is Research in E-Business', in IFIP Advances in Information and Communication Technology, Springer US, pp. 3 - 19, http://dx.doi.org/10.1007/978-0-387-35692-1_1
,Journal articles
2023, 'The Re-Conception of AI: Beyond Artificial, and Beyond Intelligence', IEEE Transactions on Technology and Society, 4, pp. 24 - 33, http://dx.doi.org/10.1109/tts.2023.3234051
,2022, 'Research opportunities in the regulatory aspects of electronic markets', Electronic Markets, 32, pp. 179 - 200, http://dx.doi.org/10.1007/s12525-021-00469-0
,2022, 'Responsible application of artificial intelligence to surveillance: What prospects?', Information Polity, 27, pp. 175 - 191, http://dx.doi.org/10.3233/IP-211532
,2021, 'Is your television spying on you? The Internet of Things needs more than self-regulation', Computers and Law: Journal for the Australian and New Zealand Societies for Computers and the Law, 93, pp. 31 - 36, http://www8.austlii.edu.au/cgi-bin/viewdoc/au/journals/ANZCompuLawJl/2021/9.html.
,2020, 'Researcher perspective in the IS discipline: an empirical study of articles in the basket of 8 journals', Information Technology and People, 33, pp. 1515 - 1541, http://dx.doi.org/10.1108/ITP-04-2019-0189
,2020, 'Researcher perspectives in Electronic Markets', Electronic Markets, 30, pp. 15 - 27, http://dx.doi.org/10.1007/s12525-020-00408-5
,2020, 'A Post Publication Review of The challenges involved in establishing a research technique', Australasian Journal of Information Systems, 24, pp. 1 - 6, http://dx.doi.org/10.3127/AJIS.V24I0.3103
,2020, 'Research perspectives: Through whose eyes? the critical concept of researcher perspective', Journal of the Association for Information Systems, 21, pp. 483 - 501, http://dx.doi.org/10.17705/1jais.00609
,2020, 'The challenges involved in establishing a research technique', Australasian Journal of Information Systems, 24, http://dx.doi.org/10.3127/ajis.v24i0.2515
,2019, 'Principles and business processes for responsible AI', Computer Law and Security Review, 35, pp. 410 - 422, http://dx.doi.org/10.1016/j.clsr.2019.04.007
,2019, 'Regulatory alternatives for AI', Computer Law and Security Review, 35, pp. 398 - 409, http://dx.doi.org/10.1016/j.clsr.2019.04.008
,2019, 'Why the world wants controls over Artificial Intelligence', Computer Law and Security Review, 35, pp. 423 - 433, http://dx.doi.org/10.1016/j.clsr.2019.04.006
,2019, 'Future-oriented research agendas and competing ideologies: Responses to commentaries on 'The digital surveillance economy'', JOURNAL OF INFORMATION TECHNOLOGY, 34, pp. 96 - 100, http://dx.doi.org/10.1177/0268396218815564
,2019, 'Risks inherent in the digital surveillance economy: A research agenda', Journal of Information Technology, 34, pp. 59 - 80, http://dx.doi.org/10.1177/0268396218815559
,2018, 'The information infrastructures of 1985 and 2018: The sociotechnical context of computer law & security', Computer Law and Security Review, 34, pp. 677 - 700, http://dx.doi.org/10.1016/j.clsr.2018.05.006
,2018, 'Guidelines for the responsible application of data analytics', Computer Law and Security Review, 34, pp. 467 - 476, http://dx.doi.org/10.1016/j.clsr.2017.11.002
,2017, 'Can small users recover from the cloud?', Computer Law and Security Review, 33, pp. 754 - 767, http://dx.doi.org/10.1016/j.clsr.2017.08.004
,2017, 'Dataveillance regulation: A research framework', Journal of Law, Information and Science, 25, pp. 104 - 122, http://dx.doi.org/10.2139/ssrn.3073492
,2017, 'IS research and policy: Notes from the 2015 ICIS senior scholar’s forum', Communications of the Association for Information Systems, 40, pp. 82 - 92, http://dx.doi.org/10.17705/1cais.04005
,2017, ''Cyberspace, the Law, and our Future' Preface for a Thematic Issue on 'Cyberspace and the Law'', UNSW Law Journal, 40, pp. 1493 - 1506
,2016, 'Privacy impact assessments as a control mechanism for Australian counter-terrorism initiatives', Computer Law and Security Review, 32, pp. 403 - 418, http://dx.doi.org/10.1016/j.clsr.2016.01.009
,2016, 'Appropriate regulatory responses to the drone epidemic', Computer Law and Security Review, 32, pp. 152 - 155, http://dx.doi.org/10.1016/j.clsr.2015.12.010
,2016, 'Big data, big risks', Information Systems Journal, 26, pp. 77 - 90, http://dx.doi.org/10.1111/isj.12088
,2016, 'Practicable backup arrangements for small organisations and individuals', Australasian Journal of Information Systems, 20, pp. 1 - 25, http://dx.doi.org/10.3127/AJIS.V20I0.1250
,2016, 'Privacy impact assessments as a control mechanism for Australian counter-terrorism initiatives', Computer Law and Security Review, http://dx.doi.org/10.1016/j.clsr.2016.01.009
,2015, 'Does SaaS Backup Pass the Fitness-for-Purpose Test?', IEEE Cloud Computing, 2, pp. 58 - 63, http://dx.doi.org/10.1109/MCC.2015.121
,2015, 'Surfing the third wave of computing: a framework for research into eObjects', Computer Law & Security Review, 31, pp. 586 - 603, http://dx.doi.org/10.1016/j.clsr.2015.07.001
,2015, 'Data retention as mass surveillance: the need for an evaluative framework', International Data Privacy Law, 5, pp. 121 - 132, http://dx.doi.org/10.1093/idpl/ipu036
,2015, 'The Prospects of Consumer-Oriented Social Media', Organizacija, pp. 219 - 230
,2015, 'The prospects of easier security for small organisations and consumers', Computer Law & Security Review, 31, pp. 538 - 552, http://dx.doi.org/10.1016/j.clsr.2015.05.004
,2014, 'Persona missing, feared drowned: the digital persona concept, two decades later', Information Technology and People, 27, pp. 182 - 207, http://dx.doi.org/10.1108/ITP-04-2013-0073
,2014, 'Surveillance by the Australian media, and its regulation', Surveillance and Society, 12, pp. 89 - 107, http://dx.doi.org/10.24908/ss.v12i1.4442
,2014, 'The regulation of civilian drones' impacts on public safety', Computer Law and Security Review, 30, pp. 263 - 285, http://dx.doi.org/10.1016/j.clsr.2014.03.007
,2014, 'The regulation of point of view surveillance: A review of Australian law', IEEE Technology and Society Magazine, 33, pp. 40 - 46, http://dx.doi.org/10.1109/MTS.2014.2319971
,2014, 'Privacy and Social Media: An Analytical Framework', Journal of Law, Information and Science, 23, pp. 169 - 191, http://search.informit.com.au/documentSummary;dn=347980554852750;res=IELAPA
,