Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mark Burdon is active.

Publication


Featured researches published by Mark Burdon.


Television & New Media | 2015

Defining the Sensor Society

Mark Andrejevic; Mark Burdon

The proliferation of embedded and distributed sensors marks the increasing passive-ication of interactivity. Devices such as smart phones, cameras, drones, and a growing array of environmental sensors (both fixed and mobile) and interactive online platforms have come to permeate daily life in technologically equipped societies. Consequently, we are witnessing a shift from targeted, purposeful, and discrete forms of information collection to always-on, ubiquitous, opportunistic ever-expanding forms of data capture. The increased use of sensors marks important changes to our understandings of surveillance, information processing, and privacy. In this article, we explore the transformations associated with the emerging sensing environment. The notion of a sensor society provides a conceptual basis for understanding the characteristics of emerging forms of monitoring and control.


IEEE Technology and Society Magazine | 2009

Commercializing public sector information privacy and security concerns

Mark Burdon

The enhanced development of information and communication technologies in government has created new opportunities for agencies to collect, share and re-use data. At the same time, the commercial worth of governmental data sets and value-added information products/services have increased. Government agencies are finding that data they have routinely collected to fulfil their statutory and business functions can now more easily be re-used for commercial purposes. The prospect of increasing revenue through the commercial re-use of public sector information (PSI) is clearly appealing for governments and their agencies. Examples of PSI that have been re-used commercially include residential property transaction details, land title information, ordanance survey data and street address registers. This article examines those shifting boundaries, particularly in light of information privacy and national security concerns arising from governmental commercialization of PSI that includes personal information. I seek to show that information privacy laws can be subverted in the face of overt commercialization by government agencies; that commercialization can have a negative impact on individuals; and can also give rise to societal concerns relating to privacy, security, and the open governance of the information society.


international symposium on technology and society | 2010

Protecting the protectors: Legal liabilities from the use of Web 2.0 for Australian disaster response

Rouhshi Low; Mark Burdon; Sharon A. Christensen; William D. Duncan; Paul H. Barnes; Ernest Foo

The traditional model for information dissemination in disaster response is unidirectional from official channels to the public. However recent crises in the US, such as Hurricane Katrina and the Californian Bushfires show that civilians are now turning to Web 2.0 technologies as a means of sharing disaster related information. These technologies present enormous potential benefits to disaster response authorities that cannot be overlooked. In Australia, the Victorian Bushfires Royal Commission has recently recommended that Australian disaster response authorities utilize information technologies to improve the dissemination of disaster related, bushfire information. However, whilst the use of these technologies has many positive attributes, potential legal liabilities for disaster response authorities arise. This paper identifies some potential legal liabilities arising from the use of Web 2.0 technologies in disaster response situations thereby enhancing crisis related information sharing by highlighting legal concerns that need to be addressed.


international symposium on technology and society | 2010

If it's encrypted its secure! The viability of US state-based encryption exemptions

Mark Burdon; Rouhshi Low; Jason F. Reid

US state-based data breach notification laws have unveiled serious corporate and government failures regarding the security of personal information. These laws require organisations to notify persons who may be affected by an unauthorized acquisition of their personal information. Safe harbours to notification exist if personal information is encrypted. Three types of safe harbour have been identified in the literature: exemptions, rebuttable presumptions and factors. The underlying assumption of exemptions is that encrypted personal information is secure and therefore unauthorized access does not pose a risk. However, the viability of this assumption is questionable when examined against data breaches involving encrypted information and the demanding practical requirements of effective encryption management. Recent recommendations by the Australian Law Reform Commission (ALRC) would amend the Privacy Act 1988 (Cth) to implement a data breach scheme that includes a different type of safe harbour, factor based analysis. The authors examine the potential capability of the ALRCs proposed encryption safe harbour in relation to the US experience at the state legislature level.


electronic government | 2007

Access control in federated databases: how legal issues shape security

Mark Burdon; Juan Manuel González Nieto; Sharon A. Christensen; Ed Dawson; William D. Duncan; Bill Lane

This paper will examine how legal considerations arising from the aggregation of data impact upon technical access control mechanisms. Research findings are based on a multi-disciplinary investigation of security issues regarding the aggregation of data in a governmental federated database system. The researchers conclude that the development of a federated architecture must consider technical security concerns within the context of legal risk management issues. As such, a holistic approach to the investigation of information security is required that incorporates the disciplines of information technology and law.


Faculty of Law; Information Security Institute | 2006

Ensuring the integrity of the E-court process

Roslyn M. Macdonald; Mark Burdon; Sheryl Jackson


Computer Law & Security Review | 2012

'Data Breach Notification Law in the EU and Australia – Where to Now?

Mark Burdon; Bill Lane; Paul von Nessen


Computer Law & Security Review | 2010

Encryption Safe Harbours and Data Breach Notification Laws

Mark Burdon; Jason F. Reid; Rouhshi Low


University of New South Wales law journal | 2014

Re-Conceptualising Privacy and Discrimination in an Age of Talent Analytics

Mark Burdon; Paul Harpur


Computer Law & Security Review | 2010

The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments

Mark Burdon; Bill Lane; Paul von Nessen

Collaboration


Dive into the Mark Burdon's collaboration.

Top Co-Authors

Avatar

Bill Lane

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Jason F. Reid

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Rouhshi Low

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Sharon A. Christensen

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

William D. Duncan

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

David Ireland

University of Queensland

View shared research outputs
Top Co-Authors

Avatar

Ed Dawson

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Evonne Miller

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Jacki Liddle

University of Queensland

View shared research outputs
Researchain Logo
Decentralizing Knowledge