Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Rouhshi Low is active.

Publication


Featured researches published by Rouhshi Low.


international symposium on technology and society | 2010

Protecting the protectors: Legal liabilities from the use of Web 2.0 for Australian disaster response

Rouhshi Low; Mark Burdon; Sharon A. Christensen; William D. Duncan; Paul H. Barnes; Ernest Foo

The traditional model for information dissemination in disaster response is unidirectional from official channels to the public. However recent crises in the US, such as Hurricane Katrina and the Californian Bushfires show that civilians are now turning to Web 2.0 technologies as a means of sharing disaster related information. These technologies present enormous potential benefits to disaster response authorities that cannot be overlooked. In Australia, the Victorian Bushfires Royal Commission has recently recommended that Australian disaster response authorities utilize information technologies to improve the dissemination of disaster related, bushfire information. However, whilst the use of these technologies has many positive attributes, potential legal liabilities for disaster response authorities arise. This paper identifies some potential legal liabilities arising from the use of Web 2.0 technologies in disaster response situations thereby enhancing crisis related information sharing by highlighting legal concerns that need to be addressed.


international symposium on technology and society | 2010

If it's encrypted its secure! The viability of US state-based encryption exemptions

Mark Burdon; Rouhshi Low; Jason F. Reid

US state-based data breach notification laws have unveiled serious corporate and government failures regarding the security of personal information. These laws require organisations to notify persons who may be affected by an unauthorized acquisition of their personal information. Safe harbours to notification exist if personal information is encrypted. Three types of safe harbour have been identified in the literature: exemptions, rebuttable presumptions and factors. The underlying assumption of exemptions is that encrypted personal information is secure and therefore unauthorized access does not pose a risk. However, the viability of this assumption is questionable when examined against data breaches involving encrypted information and the demanding practical requirements of effective encryption management. Recent recommendations by the Australian Law Reform Commission (ALRC) would amend the Privacy Act 1988 (Cth) to implement a data breach scheme that includes a different type of safe harbour, factor based analysis. The authors examine the potential capability of the ALRCs proposed encryption safe harbour in relation to the US experience at the state legislature level.


The International Journal of Digital Accounting Research | 2013

Cloud Computing: how does it differ from IT outsourcing and what are the implications for practice and research?

Ogan Yigitbasioglu; Kim MacKenzie; Rouhshi Low


Computer Law & Security Review | 2010

Encryption Safe Harbours and Data Breach Notification Laws

Mark Burdon; Jason F. Reid; Rouhshi Low


The Bond Law Review | 2009

From Paper to Electronic: Exploring the Fraud Risks Stemming From the Use of Technology to Automate the Australian Torrens System

Rouhshi Low


Faculty of Law | 2003

The Statute of Frauds in the Digital Age - Maintaining the Integrity of Signatures

Sharon A. Christensen; William D. Duncan; Rouhshi Low


Faculty of Law | 2002

Moving Queensland Property Transactions To The Digital Age: Can Writing And Signature Requirements Be Fulfilled Electronically?

Sharon A. Christensen; William D. Duncan; Rouhshi Low


Faculty of Law | 2005

Maintaining the integrity of the Torrens System in a digital environment: A comparative overview of the safeguards used within the electronic land systems in Canada, New Zealand, United Kingdom and Singapore

Rouhshi Low


Faculty of Law | 2006

Opportunities for fraud in the proposed Australian National Electronic Conveyancing System: Fact or Fiction?

Rouhshi Low


Faculty of Law | 2003

The Requirements of Writing for Electronic Land Contracts: The Queensland Experience Compared with Other Jurisdictions

Sharon A. Christensen; William D. Duncan; Rouhshi Low

Collaboration


Dive into the Rouhshi Low's collaboration.

Top Co-Authors

Avatar

Ld Griggs

University of Tasmania

View shared research outputs
Top Co-Authors

Avatar

Sharon A. Christensen

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Mark Burdon

University of Queensland

View shared research outputs
Top Co-Authors

Avatar

William D. Duncan

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Jason F. Reid

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Ernest Foo

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Kim MacKenzie

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Ogan Yigitbasioglu

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Paul H. Barnes

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge