References
- Allen, A. 1999. “Coercing Privacy.” William and Mary Law Review 40 (3): 723.
- Australian Law Reform Commission. 2008. For Your Information: Australian Privacy Law and Practice, Report No. 108.
- Australian Office of the Information Commissioner. 2015. Australian Privacy Principles Guidelines, Chapter 11: Australian Privacy Principle 11 – Security of Personal Information, 2015.
- Australian Productivity Commission. 2016. Data Availability and Use, November 2016.
- Bamberger, K. B. 2010. “Technologies of Compliance: Risk and Regulation in a Digital Age.” Texas Law Review 88 (4): 669.
- Burdon, M., J. Reid, and R. Low. 2010. “Encryption Safe Harbours and Data Breach Notification Laws.” Computer Law & Security Review 26 (5): 520. doi: 10.1016/j.clsr.2010.07.002
- Garcia, F. 2007. “Data Protection, Breach Notification, and the Interplay Between State and Federal Law: The Experiments Need More Time.” Fordham Intellectual Property Media and Entertainment Law Journal 17: 693.
- Hardesty, L. 2013. “How Hard Is It to ‘De-anonymize’ Cellphone Data?” MIT News Office, March 27.
- Heimes, R. 2016. Top 10 Operational Impacts of the GDPR: Part 1 – Data Security and Breach Notification. Portsmouth: Westin Research Center.
- IBM. 2016. What is Big Data? Accessed March 26, 2017. https://www-01.ibm.com/software/data/bigdata/what-is-big-data.html
- Kang, J. 1998. “Information Privacy in Cyberspace Transactions.” Stanford Law Review 50 (4): 1193. doi: 10.2307/1229286
- Leonard, P. 2016. A Mandatory Data Breach Notification Scheme for AUSTRALIA? Gilbert + Tobin.
- Lindsay, D. 2005. “An Exploration of the Conceptual Basis of Privacy and the Implications for the Future of Australian Privacy Law.” Melbourne University Law Review 29: 131.
- Moor, J. 1997. “Towards a Theory of Privacy in the Information age.” Computers and Society 27 (3): 27. doi: 10.1145/270858.270866
- Needles, S. 2010. “The Data Game: Learning to Love the State-based Approach to Data Breach Notification Law.” North Carolina Law Review 88: 267.
- Paterson, M. 2004. “HealthConnect and Privacy: A Policy Conundrum.” Journal of Law and Medicine 12: 80.
- Pavolotsky, P. 2013. “Privacy in the Age of Big Data.” The Business Lawyer 69: 217.
- PJCIS (Parliamentary Joint Committee on Intelligence and Security, Australian Attorney-General's Department). 2015. Inquiry into Potential Reforms of National Security Legislation.
- Ponemon Institute LLC. 2014. “Ponemon Institute Research Report.” Exposing the Cybersecurity Cracks: A Global Perspective Part 1, April 2014.
- Protiviti Inc. 2015. IT Security and Privacy Survey. The Battle Continues: Working to Bridge the Data Security Chasm, September 2015.
- PwC, Turnaround and Transformation in Cybersecurity: Key Findings from the Global State of Information Security Survey 2016.
- Reidenberg, J. 2001. “Resolving Conflicting International Data Privacy Rules in Cyberspace.” Stanford Law Review 52: 1315. doi: 10.2307/1229516
- Rosen, J. 2000. The Unwanted Gaze: The Destruction of Privacy in America. New York: Random House.
- Selvadurai, N. 2013. “Protecting Online Information Privacy in a Converged Digital Environment – The Merits of the New Australian Privacy Principles.” Journal Information and Communications Technology Law 22 (3): 299. doi: 10.1080/13600834.2013.856125
- Sicular, S. 2013. “Gartner’s Big Data Definition Consists of Three Parts, Not to Be Confused with Three V’s.” Forbes, March 27.
- Smyth, S. 2012. “Does Australia Really Need Mandatory Data Breach Notification Laws – and If So, What Kind?” Journal of Law, Information & Science 22 (2): 159.
- Smyth, S., and J. K. Winn. 2009. “Are Better Security Breach Notification Laws Possible?” Berkley Technology Law Journal 24 (3): 1133.
- Solove, D. 2002. “Conceptualizing Privacy.” California Law Review 90 (4): 1099–1116. doi: 10.2307/3481326
- Telstra Corporation Limited. 2014. Telstra Cyber Security Report.
- Wu, X. 2014. “Data Mining with big Data.” IEEE Transactions on Knowledge and Data Engineering 26 (1): 27–29.