Follow
Alana Maurushat
Alana Maurushat
Professor of Cybersecurity and Behaviour
Verified email at westernsydney.edu.au
Title
Cited by
Cited by
Year
Opening up government data for Big Data analysis and public benefit
K Hardy, A Maurushat
Computer law & security review 33 (1), 30-37, 2017
1402017
Technical protection measures: tilting at copyright's windmill
IR Kerr, A Maurushat, CS Tacit
Ottawa L. Rev. 34, 7, 2002
89*2002
The role of user behaviour in improving cyber security management
AA Moustafa, A Bello, A Maurushat
Frontiers in Psychology 12, 561011, 2021
602021
Fragmented Copyright, Fragmented Management: Proposals to Defrag Copyright Management
D Gervais, A Maurushat
Canadian Journal of Law and Technology 2 (1), 2003
382003
Disclosure of security vulnerabilities: Legal and ethical issues
A Maurushat
Springer, 2013
332013
Ethical hacking
A Maurushat
University of Ottawa Press/Les Presses de l’Université d’Ottawa, 2019
262019
Addressing identity crime in crime management information systems: Definitions, classification, and empirics
R Jamiesona, LPW Landa, D Winchestera, G Stephensa, A Steelb, ...
Transnational Financial Crime, 399-414, 2017
262017
Factors affecting reputational damage to organisations due to cyberattacks
S Perera, X Jin, A Maurushat, DGJ Opoku
Informatics 9 (1), 28, 2022
242022
Incorporating psychology into cyber security education: a pedagogical approach
J Taylor-Jackson, J McAlaney, JL Foster, A Bello, A Maurushat, J Dale
Financial Cryptography and Data Security: FC 2020 International Workshops …, 2020
242020
Australia’s accession to the cybercrime convention: is the convention still relevant in combating cybercrime in the era of botnets and obfuscation crime tools?
A Maurushat
TheUNIVERSITY OF NEW SOUTH WALES LAW JOURNAL 33 (2), 431-473, 2010
202010
" Good" worms and human rights
J Aycock, A Maurushat
Acm Sigcas Computers and Society 38 (1), 28-39, 2008
192008
Exploring the limits of computer code as a protected form of expression: a suggested approach to encryption, computer viruses, and technological protection measures
A Colangelo, A Maurushat
McGill LJ 51, 47, 2005
172005
Using'big'metadata for criminal intelligence: understanding limitations and appropriate safeguards
A Maurushat, L Bennett-Moses, D Vaile
Proceedings of the 15th International Conference on Artificial Intelligence …, 2015
162015
The Impact of Social Networks and Mobile Technologies on the Revolutions in the Arab World—A Study of Egypt and Tunisia
A Maurushat, M Chawki, H Al-Alosi, Y Shazly
Laws 3 (4), 674-692, 2014
162014
Technical and behavioural training and awareness solutions for mitigating ransomware attacks
A Bello, A Maurushat
Applied Informatics and Cybernetics in Intelligent Systems: Proceedings of …, 2020
142020
Future threats
J Aycock, A Maurushat
UNSW Law Research Paper, 2009
132009
Data Breach Notification Law Across the World from California to Australia
A Maurushat
Privacy Law and Business International, February, 2009
102009
Fragmented Copyright, Fragmented Management: Proposals to Defrag Copyright Management’(2003)
D Gervais, A Maurushat
Canadian Journal of Law and Technology 2, 15, 0
10
Multi-lateral recognition of PKI certification authorities in the Asian region: Transborder data flow and information privacy issues
A Maurushat
Hong Kong LJ 35, 569, 2005
92005
‘Waltzing Matilda’or ‘Advance Australia Fair’? User-generated content and fair dealing in Australian copyright law
S Christou, A Maurushat
Media and Arts Law Review 14 (1), 46, 2009
82009
The system can't perform the operation now. Try again later.
Articles 1–20