Security Managers

Total Page:16

File Type:pdf, Size:1020Kb

Security Managers Point of View Security Managers: Your Livelihood Is at Stake Increasing Business Relevance While Improving Security Effectiveness By Chuck Adams, Business Resiliency Practice, and Joanne Bethlahmy, Retail Practice, Cisco IBSG When the economy turns south, so does the professional well-being of security experts—if they aren’t able to reinvent themselves. In these times of economic uncertainty, it is imperative that everyone deliver maximum value against organizational objectives. Security personnel (physical and cyber) are no exception. Even though security spending is expected to remain strong due to evolving threats and anticipated compliance challenges,1 security organizations continue to be viewed solely as protection or loss-prevention mechanisms. Often they are considered a “necessary evil” with little value to the organization beyond security.2 This is especially true when they struggle to keep pace with industry trends and business strategies. These continuing perceptions put security resources at risk. Additionally, leadership seldom consults with the security team for new market opportunities or insights on increasing organizational efficiency. Recent developments in the security realm, however, begin to paint some interesting possibilities. Trends of particular interest are the migration from analog to digital for video surveillance, the innovation explosion in video analytics, and the convergence of traditionally isolated security functions onto a consolidated, connected platform. More interesting than any of these single-dimensional trends, however, is what they represent when converged into a consolidated risk-management function. This possibility is far beyond merely protecting and preserving assets. There are numerous applications for intelligence that can be garnered from the next-generation unified risk-management function. The possibilities are enormous and have the potential to extend throughout the value chain for every business, operation, and industry across the globe. This paper illustrates some of these possibilities. Security Market Is Fragmented and Confusing First, it is important to understand that the security industry has existed as long as “distrust.” Some say the industry had its beginnings in the days of Judas.3 Although the vast majority of people claim to know very little about this industry, those same people employ security mechanisms hundreds of times a day. Everything ranging from seat belts and airbags to bicycle helmets and business contracts are mechanisms that relieve some level of risk. Cisco Internet Business Solutions Group (IBSG) Cisco IBSG Copyright © 2009 Cisco Systems, Inc. All rights reserved. 05/09 Point of View Equally, cyber security was not created when Al Gore “invented the Internet.”4 The Internet and associated technologies are simply another communication medium that must also be secured. Security technologies are simply those that offer advantages of task and control automation for protecting information. It is the use of the information within the systems, however, that is often the cause of security issues. Initially, security will always be valued as supplemental to the information required by core functions. But as security practices become accepted, it is reasonable to expect they will be absorbed into the core functions themselves. By contrast, both cyber and physical security industry organizations continue to be myopic in making security investment decisions. Buying decisions are seemingly made in a disjointed manner with little consideration for interoperation or alignment with overall organizational objectives or risk-management strategies. These decisions tend to be emotional and reactionary, following a process that often is referred to as “management by magazine.”5 This occurs when a CIO or CEO happens to review the claims of the latest security product in an airplane magazine and subsequently gives the article to his security leader. Next thing you know, another disparate product is deployed, more money is spent, and the protections are no more effective at combating the real risks. Even most industry analysts—objective experts at tracking market trends—tend to follow only select segments of the security marketplace. Analysts define cyber and physical security as separate industries, and cover them as such. This is ironic for two reasons: (1) the industries have more similarities than differences, and (2) when combined, these industries represent one of the most interesting investment opportunities, with one of the best growth records.6 In effect, the analysts’ segmented focus continually pits various security and risk- management organizations against one another. They are essentially competing for the same dollars and, in some cases, duplicating resources. These disparities result in even more market fragmentation and confusion about who is doing what to protect the organization. Libraries of methods and best practices to protect and preserve physical and cyber assets already exist. The overall physical security market was estimated at roughly US$170 billion7 in 2007. The same report estimates that services make up about 45 percent of this market. This means the global spend on services such as assessments, patrol guards, viewing of video surveillance monitors, intelligence collection, integration, evidence analysis, and investigations support totals about $75 billion, with products and technologies representing the remaining $95 billion. This spending, however, seems to have had little effect. Global cyber security expenditures have topped US$20 billion8 yearly, yet losses associated with cyber security attacks exceeded US$1 trillion in 2008.9 For a physical security analog, simply look at the September 11th experiences. Although U.S. spending exceeded $329 billion10 for national defense in 2001, the country remained vulnerable to situations that resulted in thousands of casualties and untold economic losses. In addition to causing concerns about professional well-being, economic uncertainty also creates a need for organizations to make timely, high-impact decisions. These decision- making processes are often emotionally charged and seldom based on ideal information. For most technology-enabled organizations, this information probably exists in some form Cisco IBSG Copyright © 2009 Cisco Systems, Inc. All rights reserved. Page 2 Point of View within their technologies. But for some reason, it is not produced in a manner that enables this decision-making process. While much innovation is occurring in the areas of data analytics, the inability to collect and analyze data is the root cause for many of the challenges organizations face today. These dynamics lead to the conclusion that we are doing something fundamentally wrong in security; our investments are of questionable value, and the traditional security framework must change. If it doesn’t, confidence in the security industry will surely wane, placing all security resources in a position of professional vulnerability. Security Organizations Are Skilled in Data Collection and Analysis As described, the security industry is both complex and confusing. There are no magic wands—just a lot of hard work that requires vested leadership, focus, and strong convictions. It is solely up to security leadership to determine the right strategy, define objectives, and choose which products and services are most important to accomplish their objectives. They must also continuously manage inaccurate perceptions between the current security posture and worst-case scenarios, while continuing to justify investments and build credibility for security. Security technologies continue to evolve to fill gaps in the existing “problem-scape.” But the security group’s ability to use them to benefit the business remains the key. When security issues occur and resources are impacted, organizations lose productivity, resource availability, and, potentially, brand value. These issues—physical or logical—have the potential to detrimentally affect the resources on which an organization relies to deliver against its objectives. Therefore, all risks to the organization must be evaluated in a manner that assures a level of resilience aligned with organizational objectives. Mature security organizations thrive when challenged to find the proverbial “needle in a haystack.” Their data collection and analysis methods, when oriented to problems being considered by leadership, can deliver considerable value. Additionally, the digitization and networked ability of next-generation video surveillance technologies create the opportunity to enhance the quality and volume of information available for analysis. This approach also introduces potential enhancements and efficiencies that can be achieved by consolidating security resources across physical and logical functions. With the advent of IP video, physical security can surely benefit from traditional cyber security analysis methods, and vice versa. Organizations must work closely together, share models, and integrate their functionality to complete the overall risk-management picture. But the most significant opportunity for security is somewhat hidden in the implications of these technology trends. Keep in mind the estimated annual size (about US$75 billion) of the services portion of the overall security market as it begins to define the opportunity for thinking a little differently about the security organization. The most interesting and closely related technology trend is the migration
Recommended publications
  • Jobsite Cameras Past, Present, Future
    Jobsite Cameras Past, Present, Future How jobsite cameras are evolving in use and capability By David Gaw, Founder, CEO – Sensera Systems Jobsite cameras have become an essential tool for the modern connected jobsite. Understanding these systems and how they support construction best practices is important in today’s ever-expanding jobsite technology array. In this article, we’ll take a look at the evolution of jobsite cameras and how they are impacting the construction industry. WHAT IS A ‘JOBSITE CAMERA’? A jobsite camera is simply a camera that is used on a construction site to provide automated capture of imagery and/or video. Most would also agree that a jobsite camera is one that is network connected to allow for remote viewing and image retrieval. However, there are some more basic devices used on jobsites that record images and video to local storage for periodic manual retrieval by the user. For the purposes of our discussion here we will consider only network-connected cameras, since non-connected cameras are typically not suitable for commercial construction project applications. In addition to the camera hardware itself, a ‘jobsite camera’ typically also incorporates software that provides the following basic functions (at minimum): • Remote configuration of the camera operation • Viewing of images and video • Remote long-term storage of images and video (e.g., cloud-based storage) • Creation of time-lapse videos from individual still images collected at specified intervals BACK IN THE DAY The initial jobsite cameras grew out of early ‘webcam’ applications. A webcam is a camera that is connected to the Internet (or the Web), to allow for remote real-time viewing.
    [Show full text]
  • Nikon Report2017
    Nikon 100th Anniversary Special Feature A Look Back at Nikon’s 100-Year History of Value Creation Nikon celebrated the 100th anniversary of its founding on July 25, 2017. Nikon has evolved together with light-related technologies over the course of the past century. Driven by our abundant sense of curiosity and inquisitiveness, we have continued to unlock new possibilities that have shined light on the path to a brighter future, creating revolutionary new products along the way. We pride ourselves on the contributions we have made to changing society. Seeking to make our hopes and dreams a reality, the Nikon Group will boldly pursue innovation over the next 100 years, striving to transform the impossible of yesterday into the normal of tomorrow. We will take a look back at Nikon’s 100-year history of value creation. 1917 Three of Japan’s leading optical 1946 Pointal ophthalmic lens manufacturers merge to form is marketed a comprehensive, fully integrated Nikon’s fi rst ophthalmic lens optical company known as Nikon brand name is adopted for Nippon Kogaku K.K. small-sized cameras Pointal Oi Dai-ichi Plant (now Oi Plant) Tilting Level E and Transit G 1918 is completed 1947 surveying instruments are marketed Nikon’s fi rst surveying instruments after World War II MIKRON 4x and 6x 1921 ultra-small-prism binoculars are marketed Nikon Model I small-sized 1948 camera is marketed The fi rst binoculars developed, designed and manufactured The fi rst Nikon camera and the by Nikon fi rst product to bear the MIKRON 6x “Nikon” name Nikon Model I Model
    [Show full text]
  • A Field Guide to Bulkhead Connectors for Aquatica Digital Camera Housing: a Field Guide to Aquatica’S Strobe Connectors
    A field guide to bulkhead connectors for Aquatica digital camera housing: A Field Guide to Aquatica’s strobe connectors This comprehensive guide is to help Aquatica users in selecting the proper strobe connectors for their housing it is divided in sec- tions addressing the various generation and brand for which we have manufactured housing for over the years. Please make sure to visit our website www.aquatica.ca for updated version of this document. Section 1: The classic Nikon type. These are found in the following legacy Aquatica housings for these cameras; Fuji S2 Pro Fuji S5 (same as Nikon D200) Nikon D2x Nikon D3 / D3x (not the D3s version) Nikon D40 / D40x / D60 Nikon D70 /D70s Nikon D80 Nikon D100 Nikon D200 Nikon D300 (not the D300s) Section 2: The newer Nikon type. These modular connectors have an internal switchboard and separate hot shoe and are found in the following new generation Aquatica housings for these cameras; Nikon D3s (not the older D3/D3x version) Nikon D90 Nikon D300s Nikon D700 Section 3: The Classic Canon type. These are found in the following legacy Aquatica housings for these cameras; Canon 1Ds Mk III & 1D Mk IV Canon 5D (not 5D Mk II) Canon 30D Canon 40D / 50D Canon Digital Rebel / 300D Section 4: The newer Canon type. These modular connectors have an internal switchboard and separate hot shoe and are found in the following new generation Aquatica housings for these cameras; Canon 5D Mk II (not the original 5D) Canon 7D Canon Digital Rebel T2i / 550D Section 5: The optical type.
    [Show full text]
  • Digital Camera Fully Compatible, Newly Developed S-TTL System
    Digital Camera Fully Compatible, Newly Developed S-TTL System "S-TTL" enables TTL auto shooting by an external strobe for a digital SLR camera as well as for a point & shoot digital camera. INON S-TTL auto strobe supports any manufactures' model providing highly accurate exposure control. Film camera era without strobe selection problem TTL stands for "Through The Lens" and TTL auto strobe system controls flash amount to provide correct exposure based on calculation by camera's internal sensor metering reflecting strobe light from a subject through the lens. This TTL system meters actual light amount reflecting from a subject providing accurate exposure. When we start with the history of underwater TTL auto strobe, underwater camera "NIKONOS V" released in 1984 was the first to provide automatic TTL flash control for underwater strobe SB-102, SB-103 succeeded by NIKONOS V compatible underwater strobes form other manufactures. The 5 pin electrical sync connector for NIKONOS V is most popular and widely adopted to connect an underwater strobe and underwater film camera (underwater camera / housing). A film SLR camera has flexibility to select an underwater strobe. As far as housing has NIKONOS type electrical sync connector and properly NIKONOS type 5 pin electrical wired, automatic TTL flash control is usable with any TTL auto strobe sync connector and NIKONOS V like Nikon SB-105, INON Z-220, Z-22 connected via electrical sync with INON Z-22 strobe cable. Film camera compatible strobe is not usable for a digital camera!? Underwater TTL strobe circumstances have been drastically altered with the spread of digital camera among divers.
    [Show full text]
  • Professional and Honor Program - Descriptions with Prerequisite Requirements
    Professional and Honor Program - Descriptions with Prerequisite Requirements Professional Career Programs - Full Residence Honor Programs The Professional Career Programs provide broad training for students seeking Short Residence with Self Study Prep rewarding, full-time employment in the recreational diving industry. Both The Institute's Honor programs are shortened versions of our full residence full-residence individual skill and combination skill programs are available. “Professional” Instructor, Divemaster /Dive Control Specialist and Rescue Areas covered in professional programs are: skin and scuba diving instruc- training modules. We designed the “Honor” Programs to give credit for tion, divemaster supervision and dive control specialist, boatmaster, under- certain types of previous training from diver to divemaster and for using our water digital photography and videography with computer editing, promo- self study package to help prepare before attendance. tional diving video-DVD-CD and photo production, detailed dive business, store and resort operations, diving business sales and persuasion, diving Honor program entry requirements are a lot stiffer than our longer full equipment overhaul and repair technology, deep and technical diving residence “Professional” programs. They also do not include the broad instruction, semi-closed or closed circuit rebreather instruction, diving variety of training and practice available in our more extensive "Professional" specialties instruction, submersibles and underwater communication tech- programs. nology, air station and technical gas blending operations, professional CPR- People attending shorter Honor Programs, need to be self-motivated with First Aid, and diving accident response technology and instruction. excellent reading and math skills. Most Honor Programs have physical and Making a good living in the recreational diving industry generally requires written attendance qualification exams to test your preparedness before you more abilities than just teaching.
    [Show full text]
  • Privacy Risk Assessment on Online Photos
    Privacy Risk Assessment on Online Photos B Haitao Xu1,2( ), Haining Wang1, and Angelos Stavrou3 1 University of Delaware, Newark, DE 19716, USA {hxu,hnw}@udel.edu 2 College of William and Mary, Williamsburg, VA 23187, USA 3 George Mason University, Fairfax, VA 22030, USA [email protected] Abstract. With the rising popularity of cameras and people’s increas- ing desire to share photos, an overwhelming number of photos have been posted all over the Web. A digital photo usually contains much infor- mation in its metadata. Once published online, a photo could disclose much more information beyond what is visually depicted in the photo and what the owner expects to share. The metadata contained in digital pho- tos could pose significant privacy threats to their owners. Our work aims to raise public awareness of privacy risks resulting from sharing photos online and subsequent photo handling conducted by contemporary media sites. To this end, we investigated the prevalence of metadata informa- tion among digital photos and assessed the potential privacy risks arising from the metadata information. We also studied the policies adopted by online media sites on handling the metadata information embedded in the photos they host. We examined nearly 100,000 photos collected from over 600 top-ranked websites in seven categories and found that the photo handling policy adopted by a site largely varies depending on the cat- egory of the site. We demonstrated that some trivial looking metadata information suffices to mount real-world attacks against photo owners. 1 Introduction With the proliferation of cameras, especially smartphone cameras, it is now very convenient for people to take photos whenever and wherever possible.
    [Show full text]
  • HERE Camera Set-Up Procedures That Follow
    VT716301 OLYMPUS AMERICA INC. Olympus Europa GmbH QuickStart Guide Two Corporate Center Drive, Melville, Wendenstrasse 14-18, http://www.olympus.com/ NY 11747-3157, U.S.A. 20097 Hamburg, Germany C-60 ZOOM http://www.olympusamerica.com/support http://www.olympus-europa.com UNPACKING THE BOX CONTENTS Gather your digital camera and the parts as shown in the illustration. You’ll need these to complete the steps for the START HERE camera set-up procedures that follow. It is strongly recommended that you follow these Strap CAMEDIA Master CD-ROM/ xD-Picture Card/Instructions step-by-step numbered instructions to set up and Digital camera Basic Manual Software installation guide quickly begin using your new Digital Camera. Lithium ion battery charger (LI-10C) USB cable For more detailed instructions on advanced features, please refer Lithium-ion battery (LI-12B) AV cable to the printed Basic Manual included in your package, or the The following items are also included in this package: warranty card, registration card (not pvovided in some areas), and safety precautions booklet. Reference Manual on the CD-ROM. PREPARE THE CAMERA FOR USE b.Insert the xD-Picture Card Before you begin using your Olympus digital camera… The xD-Picture Card is where the camera stores your pictures and is available in a variety of memory capacities. The pictures you take with the camera remain on the xD-Picture Fully charge the battery on the provided charger before first use. Card even when the camera is turned off and/or the battery is removed. • Insert the xD-Picture Card into the battery/card compartment as shown in Battery/card compartment the illustration.
    [Show full text]
  • Ecological Changes Over 90 Years at Low Isles on the Great Barrier Reef
    ARTICLE https://doi.org/10.1038/s41467-019-12431-y OPEN Ecological changes over 90 years at Low Isles on the Great Barrier Reef Maoz Fine 1,2*, Ove Hoegh-Guldberg 3,4, Efrat Meroz-Fine 2 & Sophie Dove3,4 Coral reefs are under increasing stress from local and global factors. Long-term perspectives are becoming increasingly important for understanding ecosystem responses. Here, we provide insights from a 91-year study of the Low Isles on the northern Great Barrier Reef 1234567890():,; (GBR) that begins with the pioneering Great Barrier Reef Expedition (1928-29). We show that intertidal communities have experienced major phase-shifts since 1928, with few signs of a return to the initial state. Coral communities demolished by cyclones 50 years ago and exposed to multiple stressors have yet to recover. Richness and diversity of these commu- nities systematically declined for corals and other invertebrates. Specifically, massive corals have replaced branching corals, and soft corals have become much more numerous. The long-term perspective of this study illustrates the importance of considering multiple factors in reef decline, and potential recovery, of coral reefs, and the importance of tracking changes in community structure as well as coral abundance over long periods. 1 The Mina and Everard Goodman Faculty of Life Sciences, Bar-Ilan University, 52900 Ramat-Gan, Israel. 2 The Interuniversity Institute for Marine Science, P. O. Box 4698810300 Eilat, Israel. 3 School of Biological Sciences, The University of Queensland, St. Lucia, QLD 4072, Australia. 4 Global Change Institute, University of Queensland, St. Lucia, QLD 4072, Australia. *email: maoz.fi[email protected] NATURE COMMUNICATIONS | (2019) 10:4409 | https://doi.org/10.1038/s41467-019-12431-y | www.nature.com/naturecommunications 1 ARTICLE NATURE COMMUNICATIONS | https://doi.org/10.1038/s41467-019-12431-y oral reefs are under rapid decline, putting the food and twice a day in 1928–29 (Fig.
    [Show full text]
  • Comparison of Video Camera Sled with Diver Surveys for Queen Conch <I>
    Bull Mar Sci. 96(4):641–654. 2020 research paper https://doi.org/10.5343/bms.2019.0087 Comparison of video camera sled with diver surveys for queen conch Lobatus gigas density estimates in the west coast of Puerto Rico 1 * 1 University of Maryland Eastern Wilmelie Cruz-Marrero Shore, Carver Hall, Department Chelsea A Harms-Tuohy 2 of Natural Science, 11868 College 3 Backbone Rd, Princess Anne, Richard S Appeldoorn Maryland 21853 Bradley G Stevens 1 2 Isla Mar Research Expeditions, PO Box 828, Rincón, Puerto Rico 00677 3 University of Puerto Rico, Laboratorio de Ciencias Marinas, ABSTRACT.—Queen conch Lobatus gigas is one the PO Box 9000, Mayagüez, Puerto most important fishery species in the Caribbean. Currently, Rico 00681 queen conch harvest is prohibited in the Exclusive Economic * Corresponding author email: Zone (EEZ) in Puerto Rico. Since 1996, abundance estimates <[email protected]> in Puerto Rico have been conducted by scuba divers at intervals of 5 yrs. Yet diver surveys are limited by depth and time. In contrast, underwater video or camera surveys are not constrained by these factors and also provide a permanent photo record of observations. We conducted a survey of queen conch density on the western shelf of Puerto Rico in 2016 using two different methods: divers and a camera sled. Divers surveyed eight transects of 2–3 km using diver propulsion vehicles and standardized, historical methods. The camera sled was fitted with a digital camera, synchronized strobe lights, and paired lasers, and was towed along the dive transects several days later. Conch densities (conch ha−1) estimated with the camera sled were significantly higher than those estimated by diver survey methods, while mean length was smaller.
    [Show full text]
  • Role of Mitochondrial Metabolism in the Control of Early Lineage Progression and Aging Phenotypes in Adult Hippocampal Neurogenesis
    Article Role of Mitochondrial Metabolism in the Control of Early Lineage Progression and Aging Phenotypes in Adult Hippocampal Neurogenesis Highlights Authors d Expression of mitochondrial complexes increases at the Ruth Beckervordersandforth, transition from NSC to IPC Birgit Ebert, Iris Schaffner,€ ..., Sebastian Jessberger, Hongjun Song, d Genetic inhibition of mitochondrial function inhibits D. Chichung Lie neurogenesis at IPC stage Correspondence d Mitochondrial dysfunction and aging produce similar neurogenesis phenotypes [email protected] (R.B.), [email protected] (D.C.L.) d Enhancing mitochondrial function ameliorates age-related neurogenesis deficits In Brief Beckervordersandforth, Ebert et al. demonstrate that mitochondrial complex function functionally demarcates an early developmental step in adult hippocampal neurogenesis and identify mitochondrial dysfunction as a candidate target to counter age-associated neurogenesis deficits. Beckervordersandforth et al., 2017, Neuron 93, 560–573 February 8, 2017 ª 2016 Elsevier Inc. http://dx.doi.org/10.1016/j.neuron.2016.12.017 Neuron Article Role of Mitochondrial Metabolism in the Control of Early Lineage Progression and Aging Phenotypes in Adult Hippocampal Neurogenesis Ruth Beckervordersandforth,1,10,* Birgit Ebert,1,2,10 Iris Schaffner,€ 1 Jonathan Moss,3 Christian Fiebig,1 Jaehoon Shin,4 Darcie L. Moore,5 Laboni Ghosh,5 Mariela F. Trinchero,6 Carola Stockburger,7 Kristina Friedland,7 Kathrin Steib,2 Julia von Wittgenstein,1 Silke Keiner,8 Christoph Redecker,8 Sabine
    [Show full text]
  • BRAVO! Summer Employee Institute 2012 How to Buy a Digital Camera
    BRAVO! Summer Employee Institute 2012 How to Buy a Digital Camera What is a Digital Camera? A digital camera is a camera that captures both still images and video as well. A digital camera is different from conventional film cameras because still images and videos are recorded onto an electronic image sensor. Both conventional and digital cameras operate in a similar manner, they differ because unlike film cameras, digital cameras can immediately produce an image that can be displayed on the devices screen. The images the digital cameras record can also be stored or deleted from memory. Digital cameras also possess the ability to record moving images or videos and also capture sound. The first digital camera was invented in 1975 at the Eastman Kodak company, by an engineer named Steve Sasson. Steps to Buying a Digital Camera 1. What do you need from a Digital Camera: Determine the main purpose you will be buying the digital camera for. If you are going on vacation and will be using it for family photos, then you do not need a $2,000 digital camera. 2. Do you need a DSLR: A Digital Single Lens Reflex camera is a more expensive digital camera. Used for more professional photography sessions that also gives the photographer more creative control of the shoots. 3. Shutter Speed: The speed between captures is very important depending on the activity being captured. Some cameras lag in the time between captures, while others do not. 4. Image Stabilization: Automatically stabilizes the capture from a person’s shaky hands. Lower end digital may not have this feature, it is something the purchaser must look into.
    [Show full text]
  • Copyright Future Copyright Freedom: Marking the 40 Year Anniversary of the Commencement of Australia's Copyright Act 1968
    COPYRIGHT FUTURE COPYRIGHT FREEDOM Marking the 40th Anniversary of the Commencement of Australia’s Copyright Act 1968 Edited by Brian Fitzgerald and Benedict Atkinson Queensland University of Technology COPYRIGHT Published 2011 by SYDNEY UNIVERSITY PRESS University of Sydney NSW 2006 Australia sydney.edu.au/sup Publication date: March 2011 © Individual authors 2011 © Sydney University Press 2011 ISBN 978–1–920899–71–4 National Library of Australia Cataloguing-in-Publication entry Title: Copyright future copyright freedom: marking the 40th anniversary of the commencement of Australia’s Copyright Act 1968 / edited by Brian Fitzgerald and Benedict Atkinson. ISBN: 9781920899714 (pbk.) Notes: Includes bibliographical references and index. Subjects: Australia. Copyright Act 1968. Copyright--Australia. Intellectual property--Australia. Other Authors/Contributors: Fitzgerald, Brian F. Atkinson, Benedict. Dewey Number: 346.940482 The digital version of this book is also available electronically through the Sydney eScholarship Repository at: ses.library.usyd.edu.au and The Queensland University of Technology ePrints Repository at: eprints.qut.edu.au. Printed in Australia iv ACKNOWLEDGEMENTS Cover image and design by Elliott Bledsoe. Cover Image credits: ‘USB Flash Drive’ by Ambuj Saxena, flic.kr/ambuj/ 345356294; ‘cassette para post’ by gabriel “gab” pinto, flic.kr/gabreal/ 2522599543; untitled by ‘Playingwithbrushes’, flic.krcom/playingwithpsp/ 3025911763; ‘iPod’s’ by Yeray Hernández, flic.kr/yerahg/498315719; ‘Presen- tation: Free Content for
    [Show full text]