Peter Coroneos Chief Executive Internet Industry Association (IIA) AVAR Conference Sydney November 7, 2003.

Slides:



Advertisements
Similar presentations
Copyright 2003 McGraw-Hill Australia Pty Ltd PPTs t/a Internet Marketing Intelligence by Edward Forrest 12-1 Internet Marketing Intelligence Chapter 12.
Advertisements

An Anti Spam Action Strategy John Haydon, Australian Communications Authority.
1 Seoul-Melbourne Multilateral MOU on Cooperation in Countering Spam 19 November 2004 Lim, Jae-Myung Spam Response Team Korea Information Security Agency.
Anti-SPAM activities in Malaysia - Current Situation, Regulatory Environment and Future Developments ITU virtual conference on anti-spam regulation and.
Media, Communications and the Internet The Regulatory Framework by John Corker.
GAMBIA COMPETITION COMMISSION GAMBIA COMPETITION COMMISSION Levelling the Field for Development BY : EXECUTIVE SECRETARY 5 TH JUNE 2013.
Association Management System Norman Campbell Director, Information Systems.
Ganguly & Associates July, Ganguly & Associates We add value to your business, practically 2 Ganguly & Associates Agenda  About Us  Service Offerings.
Chapter 9: INTERNETADVERTISING 9.1. Overview of Cyberspace INTERNET BASIC PARTS The Internet The Internet Electronic Mail ( ) Electronic Mail ( )
02/12/00 E-Business Architecture
Helping Students Launch a Successful Career.  You have a certain “body of knowledge”  You have a commitment to professional standards and ethics  You.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Your technology solution partner.™ Security Enterprise Protection Gener C. Tongco Product Manager CT Link Systems Inc.
Untouchable?: A Canadian Perspective on the Anti- Spam Battle Michael Geist Canada Research Chair in Internet & E- commerce Law University of Ottawa, Faculty.
Cagayan Gaming Jurisdiction. Player Protection Probity Checking Software Testing Payment Solution and Business Plan Evaluation.
What is E-Commerce? Section 8.1. What is E-commerce? E-commerce is the exchange of goods, services, information, or other businesses through electronic.
Spam and E-Security Bruce Matthews Manager, Anti-Spam Team International Training Program 11 September 2006.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Greater Arizona eLearning Association GAZEL Overview February 2011 Steve Peters
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
LAW SEMINARS INTERNATIONAL New Developments in Internet Marketing & Selling November 13 & 14, 2006 San Francisco, California Moderator : Maureen A. Young.
Christopher Boam Counsel for Internet & Global Ecommerce MCI, Inc., International Affairs on behalf of WITSA The World Information Technology and Services.
11 – E-Commerce 1. What is Electronic Commerce? 2. What is a contract? 3. Elements of an enforceable contract 4. Standard terms of a contract 5. Form and.
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
Intangible Technology Transfer and Catch-All Controls June 18, 2003 Timothy Clinton Export Policy Analyst U.S. Department of Commerce.
WORKING EFFECTIVELY IN AN INFORMATION TECHNOLOGY ENVIRONMENT
What is internet? The internet is a worldwide collection of computer networks, cooperating with each other to exchange data using a common software standard.
COMP 6125 An Introduction to Electronic Commerce Session 4: E-Commerce In Developing Countries.
PRELIM NOTES. Managing Information Resources & Technologies To serve customers well… companies need to be proficient in half a dozen key areas: reduced.
ASIC Australian Securities & Investments Commission Electronic Enforcement Keith Inman October 2000.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Electronic Business. What is Electronic Business? It is defined as ICT (Information and Communication Technologies) application with support to all business.
© 2012 Cengage Learning. All Rights Reserved. Principles of Business, 8e C H A P T E R 11 SLIDE 1 DEFINE KEY TERMS ●computer system ●hardware ●software.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
L Integrating Web applications l Moving legacy transactions to a Web environment l Setting goals and targets to measure progress l Focus on content and.
Spam Act 2003 Consumer Education and Awareness. About the ACA Independent government regulator Ensures industry compliance with legislation (Telecommunications.
The Business Environment. What is an organisation? An organisation is a structured arrangement of people connected by common procedures and physical resources,
Content Control. Extreme Regimes Myanmay (Burma) - Possession of modem without permission punishable by years gaol Cuba - Internet access only through.
The Digital Revolution and The Global E-Marketplace Chapter 25 Matakuliah: J0474 International Marketing Tahun: 2009.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
Introduction to Business © Thomson South-Western ChapterChapter Business and Technology Computer Systems Business Applications of Technology.
Electronic Commerce Semester 1 Term 1 Lecture 6. Predicting the Future of the IAP Market In the future, four organisational and technology trends will.
SCAMS and SPAM John Corker Senior Associate. Oz NetLaw  National Internet legal practice of the Communications Law Centre.  Website at oznetlaw.net.
Software Industry Issues Mark Lange Microsoft EMEA March 1, 2005.
G:\99Q3\9220\PD\AJD2.PPT 1 Harriet P. Pearson Chief Privacy Officer IBM February 7, 2003 IBM.
Mobile Computing and Commerce Mata kuliah: M Konsep E-Business Tahun: 2010.
International Telecommunication Union National Online Child Protection Focal Point: Safety, Awareness and Abuse Incident Reporting “Integrated aspects.
Get Safe Online Expert advice for everyone In association with.
CHAPTER 17 INTERNATIONAL MARKETING IN E-COMMERCE.
Security Awareness – Essential Part of Security Management Ilze Murane.
AVAR 2004, Japan, Tokyo Today’s Threats and the Evolution of the Computer Underground Today’s Threats and the Evolution of the Computer Underground Eugene.
David A. Olive General Manager, Fujitsu Limited WITSA Public Policy Chairman WITSA Public Policy Meeting Athens, Greece May 15, 2005 Global Public Policy.
APEC ANTI-SPAM INITIATIVES Tom Dale Department of Communications, IT & the Arts Australia.
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
Work Effectively in an I.T. Environment. What is I.T.? Information Technology means the collection of products and services that turn data into useful,
Global Digital Advertisement Market with Focus on Online Classifieds ( ) Tel:
Global One internet, worldwide Uncitral WTO Some laws: –Communications Decency Act –Child Online Protectioon Act –Children’s Internet Protection Act.
London Action Plan Wout de Natris OPTA Strasbourg, 12 June 2007.
CHAPTER FOUR OVERVIEW SECTION ETHICS
Prepared by: Dr. Faustino Reyes II
Ken Baker ISA President October 2006
The Challenge of Spam Spam is a harmful, costly, and evolving threat to Internet users. A collaborative approach is needed to provide the best spam-mitigation.
Cybercrime and Canadian Businesses
CHAPTER FOUR OVERVIEW SECTION ETHICS
Management Suite v2.0 DoubleCheck Manager Management Suite v2.0.
Prof. Dietmar Hoscher, ECA Vice-Chair
Standard 6: Educational Leaders understand the social, legal, and ethical issues related to technology and model responsible decision-making related to.
Presentation transcript:

Peter Coroneos Chief Executive Internet Industry Association (IIA) AVAR Conference Sydney November 7, 2003

 Australia’s national internet industry organisation (est.1995)  Over 300 members include... - telecommunications carriers - web and software developers - content creators and publishers - internet service providers - educational & training firms - local government agencies - law firms - portal sites - internet research analysts- hardware vendors - banks & insurance companies- online advertisers - systems integrators- internet security providers - and businesses doing, or helping others to do e-commerce About the IIA

 As a voice for the industry, the IIA provides policy input to government and advocacy on a range of business and regulatory issues, to promote laws and initiatives which enhance access, equity, reliability and growth of the medium within Australia. Our mission

Malicious Code  Hybridisation  Crossing the device threshold  The sociopathology of malicious code writers - focus on prevention by addressing motivation and deterence  Who bears the responsibility in a culture of security?

Initiatives  IIA SME Security portal  IIA Cybercrime Code  IIA National Spam Initiative  Spam Legislation  Global Spam Campaign

Spam: the cause and its effect are economic  More than 50% of all is now junk (8% in 2001)  US$8.9 billion cost to US corporations in 2002  cost to Australian business A$915 per employee pa  cost to spammers per plus per address  70% is illegal under current laws  US$3.2 billion pa revenues from porn spam

Spam: the extent of the problem (2)  Nigerian advance scam will gross US$2 bill. In 2003  28% of users reply to spam  8% have purchased from spam  4.5 seconds per spam wasted corporate time  16% change addresses due to spam  1 in 145 spams carry viruses  only 8% believe the media exaggerates spam problem

The global solution has four elements  legislation  industry action  end user empowerment  international cooperation

Australian legislation will pass this year  opt in regime with few exceptions  infringement notices issued by ACA; enforced by FCA  heavy penalties  limited exemptions  anti harvesting provisions  strong information requirements

Users are most concerned about...  computer viruses  spam  privacy  security of transactions  response times  cost of access  cost of upgrading hardware % Source: ACNielsen.consult Australian Online User Study #10 (n = 34,643)