Rouhshi Low
Queensland University of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Rouhshi Low.
international symposium on technology and society | 2010
Rouhshi Low; Mark Burdon; Sharon A. Christensen; William D. Duncan; Paul H. Barnes; Ernest Foo
The traditional model for information dissemination in disaster response is unidirectional from official channels to the public. However recent crises in the US, such as Hurricane Katrina and the Californian Bushfires show that civilians are now turning to Web 2.0 technologies as a means of sharing disaster related information. These technologies present enormous potential benefits to disaster response authorities that cannot be overlooked. In Australia, the Victorian Bushfires Royal Commission has recently recommended that Australian disaster response authorities utilize information technologies to improve the dissemination of disaster related, bushfire information. However, whilst the use of these technologies has many positive attributes, potential legal liabilities for disaster response authorities arise. This paper identifies some potential legal liabilities arising from the use of Web 2.0 technologies in disaster response situations thereby enhancing crisis related information sharing by highlighting legal concerns that need to be addressed.
international symposium on technology and society | 2010
Mark Burdon; Rouhshi Low; Jason F. Reid
US state-based data breach notification laws have unveiled serious corporate and government failures regarding the security of personal information. These laws require organisations to notify persons who may be affected by an unauthorized acquisition of their personal information. Safe harbours to notification exist if personal information is encrypted. Three types of safe harbour have been identified in the literature: exemptions, rebuttable presumptions and factors. The underlying assumption of exemptions is that encrypted personal information is secure and therefore unauthorized access does not pose a risk. However, the viability of this assumption is questionable when examined against data breaches involving encrypted information and the demanding practical requirements of effective encryption management. Recent recommendations by the Australian Law Reform Commission (ALRC) would amend the Privacy Act 1988 (Cth) to implement a data breach scheme that includes a different type of safe harbour, factor based analysis. The authors examine the potential capability of the ALRCs proposed encryption safe harbour in relation to the US experience at the state legislature level.
The International Journal of Digital Accounting Research | 2013
Ogan Yigitbasioglu; Kim MacKenzie; Rouhshi Low
Computer Law & Security Review | 2010
Mark Burdon; Jason F. Reid; Rouhshi Low
The Bond Law Review | 2009
Rouhshi Low
Faculty of Law | 2003
Sharon A. Christensen; William D. Duncan; Rouhshi Low
Faculty of Law | 2002
Sharon A. Christensen; William D. Duncan; Rouhshi Low
Faculty of Law | 2005
Rouhshi Low
Faculty of Law | 2006
Rouhshi Low
Faculty of Law | 2003
Sharon A. Christensen; William D. Duncan; Rouhshi Low