Placeholder Content Image

Why do organisations still struggle to protect our data? We asked 50 professionals on the privacy front line

<div class="theconversation-article-body"> <p><em><a href="https://theconversation.com/profiles/jane-andrew-10314">Jane Andrew</a>, <a href="https://theconversation.com/institutions/university-of-sydney-841">University of Sydney</a>; <a href="https://theconversation.com/profiles/dr-penelope-bowyer-pont-1550191">Dr Penelope Bowyer-Pont</a>, <a href="https://theconversation.com/institutions/university-of-sydney-841">University of Sydney</a>, and <a href="https://theconversation.com/profiles/max-baker-25553">Max Baker</a>, <a href="https://theconversation.com/institutions/university-of-sydney-841">University of Sydney</a></em></p> <p>More of our personal data is now collected and stored online than ever before in history. The rise of data breaches should unsettle us all.</p> <p>At an individual level, data breaches can compromise our privacy, cause harm to our finances and mental health, and even enable identity theft.</p> <p>For organisations, the repercussions can be equally severe, often resulting in major financial losses and brand damage.</p> <p>Despite the increasing importance of protecting our personal information, doing so remains fraught with challenges.</p> <p>As part of a <a href="http://www.doi.org/10.25910/psq3-q365">comprehensive study</a> of data breach notification practices, we interviewed 50 senior personnel working in information security and privacy. Here’s what they told us about the multifaceted challenges they face.</p> <h2>What does the law actually say?</h2> <p>Data breaches occur whenever personal information is accessed or disclosed without authorisation, or even lost altogether. <a href="https://www.abc.net.au/news/2024-06-20/optus-hack/104002682">Optus</a>, <a href="https://www.abc.net.au/news/2022-11-09/medibank-data-release-dark-web-hackers/101632088">Medibank</a> and <a href="https://www.afr.com/technology/canva-criticised-after-data-breach-exposed-139m-user-details-20190526-p51r8i">Canva</a> have all experienced high-profile incidents in recent years.</p> <p>Under Australia’s <a href="https://www8.austlii.edu.au/cgi-bin/viewdb/au/legis/cth/consol_act/pa1988108/">privacy laws</a>, organisations aren’t allowed to sweep major cyber attacks under the rug.</p> <p>They have to notify both the regulator – the Office of the Australian Information Commissioner (OAIC) – and any affected individuals of breaches that are likely to result in “<a href="https://www8.austlii.edu.au/cgi-bin/viewdb/au/legis/cth/consol_act/pa1988108/#:%7E:text=Whether%20access%20or%20disclosure%20would%20be%20likely%2C%20or%20would%20not%20be%20likely%2C%20to%20result%20in%20serious%20harm%2D%2Drelevant%20matters%20%C2%A0">serious harm</a>”.</p> <p>But according to the organisational leaders we interviewed, this poses a tricky question. How do you define serious harm?</p> <p>Interpretations of what “serious harm” actually means – and how likely it is to occur – vary significantly. This inconsistency can make it impossible to predict the specific impact of a data breach on an individual.</p> <p>Victims of domestic violence, for example, may be at increased risk when personal information is exposed, creating harms that are difficult to foresee or mitigate.</p> <h2>Enforcing the rules</h2> <p>Interviewees also had concerns about how well the regulator could provide guidance and enforce data protection measures.</p> <p>Many expressed a belief the OAIC is underfunded and lacks the authority to impose and enforce fines properly. The consensus was that the challenge of protecting our data has now outgrown the power and resources of the regulator.</p> <p>As one chief information security officer at a publicly listed company put it:</p> <blockquote> <p>What’s the point of having speeding signs and cameras if you don’t give anyone a ticket?</p> </blockquote> <p>A lack of enforcement can undermine the incentive for organisations to invest in robust data protection.</p> <h2>Only the tip of the iceberg</h2> <p>Data breaches are also underreported, particularly in the corporate sector.</p> <p>One senior cybersecurity consultant from a major multinational company told us there is a strong incentive for companies to minimise or cover up breaches, to avoid embarrassment.</p> <p>This culture means many breaches that should be reported simply aren’t. One senior public servant estimated only about 10% of reportable breaches end up actually being disclosed.</p> <p>Without this basic transparency, the regulator and affected individuals can’t take necessary steps to protect themselves.</p> <h2>Third-party breaches</h2> <p>Sometimes, when we give our personal information to one organisation, it can end up in the hands of another one we might not expect. This is because key tasks – especially managing databases – are often outsourced to third parties.</p> <p>Outsourcing tasks might be a more efficient option for an organisation, but it can make protecting personal data even more complicated.</p> <p>Interviewees told us breaches were more likely when engaging third-party providers, because it limited the control they had over security measures.</p> <p>Between July and December 2023 in Australia, there was an increase of <a href="https://www.oaic.gov.au/privacy/notifiable-data-breaches/notifiable-data-breaches-publications/notifiable-data-breaches-report-july-to-december-2023">more than 300%</a> in third-party data breaches compared to the six months prior.</p> <p>There have been some highly publicised examples.</p> <p>In May this year, many Clubs NSW customers had their personal information potentially <a href="https://www.rimpa.com.au/resource/more-than-a-million-australian-data-records-potentially-exposed-in-nsw-club-and-pub-data-breach.html#:%7E:text=Outabox%2C%20the%20IT%20services%20provider,and%20has%20notified%20law%20enforcement">breached</a> through an attack on third-party software provider Outabox.</p> <p>Bunnings suffered a <a href="https://australiancybersecuritymagazine.com.au/bunnings-customer-data-compromised/">similar breach</a> in late 2021, via an attack on scheduling software provider FlexBooker.</p> <h2>Getting the basics right</h2> <p>Some organisations are still struggling with the basics. Our research found many data breaches occur because outdated or “legacy” data systems are still in use.</p> <p>These systems are old or inactive databases, often containing huge amounts of personal information about all the individuals who’ve previously interacted with them.</p> <p>Organisations tend to hold onto personal data longer than is legally required. This can come down to confusion about data-retention requirements, but also the high cost and complexity of safely decommissioning old systems.</p> <p>One chief privacy officer of a large financial services institution told us:</p> <blockquote> <p>In an organisation like ours where we have over 2,000 legacy systems […] the systems don’t speak to each other. They don’t come with big red delete buttons.</p> </blockquote> <p>Other interviewees flagged that risky data testing practices are widespread.</p> <p>Software developers and tech teams often use “production data” – real customer data – to test new products. This is often quicker and cheaper than creating test datasets.</p> <p>However, this practice exposes real customer information to insecure testing environments, making it more vulnerable. A senior cybersecurity specialist told us:</p> <blockquote> <p>I’ve seen it so much in every industry […] It’s literally live, real information going into systems that are not live and real and have low security.</p> </blockquote> <h2>What needs to be done?</h2> <p>Drawing insights from professionals at the coalface, our study highlights just how complex data protection has become in Australia, and how quickly the landscape is evolving.</p> <p>Addressing these issues will require a multi-pronged approach, including clearer legislative guidelines, better enforcement, greater transparency and robust security practices for the use of third-party providers.</p> <p>As the digital world continues to evolve, so too must our strategies for protecting ourselves and our data.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/236681/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><em><a href="https://theconversation.com/profiles/jane-andrew-10314">Jane Andrew</a>, Professor, Head of the Discipline of Accounting, Governance and Regulation, University of Sydney Business School, <a href="https://theconversation.com/institutions/university-of-sydney-841">University of Sydney</a>; <a href="https://theconversation.com/profiles/dr-penelope-bowyer-pont-1550191">Dr Penelope Bowyer-Pont</a>, Researcher, <a href="https://theconversation.com/institutions/university-of-sydney-841">University of Sydney</a>, and <a href="https://theconversation.com/profiles/max-baker-25553">Max Baker</a>, Associate professor, <a href="https://theconversation.com/institutions/university-of-sydney-841">University of Sydney</a></em></p> <p><em>Image credits: Shutterstock </em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/why-do-organisations-still-struggle-to-protect-our-data-we-asked-50-professionals-on-the-privacy-front-line-236681">original article</a>.</em></p> </div>

Legal

Placeholder Content Image

Do mobile phones cause brain cancer? Science makes definitive call

<p>The question of whether mobile phones - specifically the electromagnetic radiation or radio waves emitted by these devices - cause cancer has been debated and researched for a long time, and now scientists have made a definitive call. </p> <p>A new comprehensive review commissioned by the World Health Organization has found that mobile phones are NOT linked to brain and head cancers. </p> <p>The systematic review, led by the Australian Radiation Protection and Nuclear Safety Agency (Arpansa), examined over 5,000 studies, which included 63 observational studies on humans published between 1994 and 2022 and is "the most comprehensive review to date" according to review lead author, associate prof Ken Karipidis. </p> <p>“We concluded the evidence does not show a link between mobile phones and brain cancer or other head and neck cancers," he said. </p> <p>The review, which was published on Wednesday, focused on cancers of the nervous system, salivary gland and brain tumours. </p> <p>They found no overall association between mobile phone use and cancer, even if people have used it for a long time (over 10 years) or spend a lot of time on their phones. </p> <p>“I’m quite confident with our conclusion. And what makes us quite confident is … even though mobile phone use has skyrocketed, brain tumour rates have remained stable,” Karipidis continued. </p> <p>Despite emitting electromagnetic radiation, also known as radio waves, the exposure is relatively low. </p> <p>Karipidis said people hear the word radiation and assume it is similar to nuclear radiation, “and because we use a mobile phone close to the head when we’re making calls, there is a lot of concern.”</p> <p>He clarified that “radiation is basically energy that travels from one point to another. There are many different types, for example, ultraviolet radiation from the sun." </p> <p>“We’re always exposed to low-level radio waves in the everyday environment.”</p> <p>While exposure from mobile phones is still low, it is much higher than exposure from any other wireless technology sources since they are used close to the head, Karipidis said. </p> <p>The association between mobile phones and cancers came about from early studies comparing differences between those with and without brain tumours and asking about their exposure history. </p> <p>According to Karipidis, who is also the vice-chair of the International Commission on Non-Ionizing Radiation Protection, the results from these kind of studies tend to be biased, as the group with the tumour tend to overreport their exposure. </p> <p>Based on these early studies WHO’s International Agency for Research on Cancer (IARC) designated radio-frequency fields like those from mobile phones as a possible cancer risk, but Karipidis said "this classification doesn’t mean all that much”.</p> <p>This is because the IARC has different classifications of cancer risk, with some substances classified as  a “definite” carcinogen (such as smoking), and others as “probable” or “possible” carcinogens.</p> <p>Tim Driscoll, a professor at the University of Sydney and chair of the Australian Cancer Council’s occupational and environmental cancers committee, also backed the systematic review. </p> <p>“I think people should feel reassured by this study … but it’s worthwhile just remembering that the studies aren’t perfect, but the weight of evidence certainly is that mobile phones should be considered safe to use in terms of any concerns about increased risk of cancer,” Driscoll said.</p> <p><em>Images: Shutterstock</em></p> <p> </p>

Body

Placeholder Content Image

Australia to introduce new "gold standard" in ID verification

<p>The Australian government is set to introduce a new "gold standard" in ID verification that will protect valuable information from potential data leaks. </p> <p>Government Services Minister Bill Shorten will is set to use his address to the National Press Club on Tuesday to announce the national Trust Exchange, or TEx program, which is currently at the “proof-of-concept stage”, and is slated to be rolled out at the end of the year. </p> <p>The program will connect to a user's MyGov Wallet or digital ID without the need to hand over any documents, allowing businesses to verify your identity using a government-issued QR code.</p> <p>The QR codes could be used for job applications, hotel bookings, or entry into a pub or RSL clubs, eliminating the need to hand over physical driver's licenses or passports.</p> <p>The technology will store information such as someone’s date-of-birth, address, citizenship, visa status, qualifications, occupational licences or working with children check, and other information already held by the government.</p> <p>"Services Australia is partnering with other government systems to develop TEx which would give Australians the ability to verify their identity and credentials based on official information already held by the Australian Government," Shorten is set to say in his National Press Club speech.</p> <p>"That means sharing only the personal information to get the job done, and in some cases, not handing over any personal information at all."</p> <p>“You control what details are exchanged. You then have in your wallet a record of sharing, say, your passport and trade certificate with your employer.”</p> <p>Shorten will say codes "digitally shake hands with your myGov wallet," leaving you with a record in your account of what you shared, and who you shared it with.</p> <p>"All that has been exchanged has been a digital 'thumbs up' from the Government that you are who you say you are," Shorten will say.</p> <p><em>Image credits: Shutterstock </em></p>

Legal

Placeholder Content Image

Telstra giving free phones to elderly and remote

<p>With the 3G network set to shut down completely on August 31, Telstra announced that it will be giving 12,000 mobile phones away for free in a bid to help the most vulnerable customers switch to 4G. </p> <p>Starting from Tuesday, the telecommunications company will be issuing complimentary phones to customers who are elderly, live rurally or are facing difficult situations. </p> <p>These include those facing financial issues, recovering from natural disasters, or those who have a life-threatening medical condition and therefore rely on a working phone. </p> <p>Telstra have also identified those who live regionally or are over 80 years old and may require extra transition support, as they may have difficulty accessing a physical store to make the switch. </p> <p>Those who are flagged as eligible will be contacted by the telco company, and they are encouraging customers who receive the message to follow the instructions given to make the switch. </p> <p>Major Brendan Nottle from The Salvation Army has praised this initiative for helping the "most vulnerable members of our community."</p> <p>“Connection is one of the most important things to maintain in our society, whether it is with friends and family or with housing and support services,” he said.</p> <p>“Ensuring that every Australian, from any background or level of income, can take part in our modern digital society is crucial.</p> <p>“A phone can be a gateway to social inclusion, community connection and support, and with the upcoming closure of 3G networks in Australia it is important for us to reach out and ensure that this can continue for everyone.”</p> <p>Customers who are yet to upgrade are also told to make the switch sooner than later. </p> <p>Other devices that will be affected by the shutdown include certain smart watches, tablets, medical alarms, EFTPOS terminals and security monitors.</p> <p><em>Images: Shutterstock</em></p>

Money & Banking

Placeholder Content Image

Worried your address, birth date or health data is being sold? You should be – and the law isn’t protecting you

<div class="theconversation-article-body"><em><a href="https://theconversation.com/profiles/katharine-kemp-402096">Katharine Kemp</a>, <a href="https://theconversation.com/institutions/unsw-sydney-1414">UNSW Sydney</a></em></p> <p>Australians don’t know and can’t control how data brokers are spreading their personal information. This is the core finding of a newly <a href="https://www.accc.gov.au/system/files/Digital-platform-services-inquiry-March-2024-interim-report.pdf">released report</a> from the Australian Competition and Consumer Commission (ACCC).</p> <p>Consumers wanting to rent a property, get an insurance quote or shop online are not given real choices about whether their personal data is shared for other purposes. This exposes Australians to scams, fraud, manipulation and discrimination.</p> <p>In fact, <a href="https://www.accc.gov.au/media-release/consumers-lack-visibility-and-choice-over-data-collection-practices">many don’t even know</a> what kind of data has been collected about them and shared or sold by data firms and other third parties.</p> <p>Our privacy laws are due for reform. But Australia’s privacy commissioner <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4224653">should also enforce</a> an existing rule: with very limited exceptions, businesses must not collect information about you from third parties.</p> <h2>What are data brokers?</h2> <p><a href="https://cprc.org.au/wp-content/uploads/2024/02/CPRC-Singled-Out-Final-Feb-2024.pdf">Data brokers</a> generally make their profits by collecting information about individuals from various sources and sharing this personal data with their many business clients. This can include detailed profiles of a person’s family, health, finances and movements.</p> <p>Data brokers often have no connection with the individual – you may not even recognise the name of a firm that holds vast amounts of information on you. Some of these data brokers are large multinational companies with billions of dollars in revenue.</p> <p>Consumer and privacy advocates provided the ACCC with evidence of highly concerning data broker practices. <a href="https://www.accc.gov.au/system/files/Salinger%20Privacy.pdf">One woman</a> tried to find out how data brokers had got hold of her information after receiving targeted medical advertising.</p> <p>Although she never discovered how they obtained her data, she found out it included her name, date of birth and contact details. It also included inferences about her, such as her retiree status, having no children, not having “high affluence” and being likely to donate to a charity.</p> <p>ACCC found another data broker was reportedly creating lists of individuals who may be experiencing vulnerability. The categories included:</p> <ul> <li>children, teenage girls and teenage boys</li> <li>“financially unsavvy” people</li> <li>elderly people living alone</li> <li>new migrants</li> <li>religious minorities</li> <li>unemployed people</li> <li>people in financial distress</li> <li>new migrants</li> <li>people experiencing pain or who have visited certain medical facilities.</li> </ul> <p>These are all potential vulnerabilities that could be exploited, for example, by scammers or unscrupulous advertisers.</p> <h2>How do they get this information?</h2> <p>The ACCC notes <a href="https://cprc.org.au/wp-content/uploads/2023/03/CPRC-working-paper-Not-a-fair-trade-March-2025.pdf">74% of Australians are uncomfortable</a> with their personal information being shared or sold.</p> <p>Nonetheless, data brokers sell and share Australian consumers’ personal information every day. Businesses we deal with – for example, when we buy a car or search for natural remedies on an online marketplace – both buy data about us from data brokers and provide them with more.</p> <p>The ACCC acknowledges consumers haven’t been given a choice about this.</p> <p>Attempting to read every privacy term is near impossible. The ACCC referred to a recent study which found it would take consumers <a href="https://www.mi-3.com.au/06-11-2023/aussies-face-10-hour-privacy-policy-marathon-finds-study">over 46 hours a month</a> to read every privacy policy they encounter.</p> <figure class="align-center zoomable"><a href="https://images.theconversation.com/files/595623/original/file-20240522-23-2zkuc.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip"><img src="https://images.theconversation.com/files/595623/original/file-20240522-23-2zkuc.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/595623/original/file-20240522-23-2zkuc.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=131&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/595623/original/file-20240522-23-2zkuc.png?ixlib=rb-4.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=131&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/595623/original/file-20240522-23-2zkuc.png?ixlib=rb-4.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=131&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/595623/original/file-20240522-23-2zkuc.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=165&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/595623/original/file-20240522-23-2zkuc.png?ixlib=rb-4.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=165&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/595623/original/file-20240522-23-2zkuc.png?ixlib=rb-4.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=165&amp;fit=crop&amp;dpr=3 2262w" alt="" /></a><figcaption><span class="caption">The approximate length and time it would take to read an average privacy policy in Australia per month.</span> <span class="attribution"><a class="source" href="https://www.accc.gov.au/about-us/publications/serial-publications/digital-platform-services-inquiry-2020-25-reports/digital-platform-services-inquiry-interim-report-march-2024">ACCC Digital Platform Services Inquiry interim report</a></span></figcaption></figure> <p>Even if you could read every term, you still wouldn’t get a clear picture. Businesses use <a href="https://cprc.org.au/wp-content/uploads/2024/02/CPRC-Singled-Out-Final-Feb-2024.pdf">vague wording</a> and data descriptions which <a href="https://theconversation.com/70-of-australians-dont-feel-in-control-of-their-data-as-companies-hide-behind-meaningless-privacy-terms-224072">confuse consumers</a> and have no fixed meaning. These include “pseudonymised information”, “hashed email addresses”, “aggregated information” and “advertising ID”.</p> <p>Privacy terms are also presented on a “take it or leave it” basis, even for transactions like applying for a rental property or buying insurance.</p> <p>The ACCC pointed out 41% of Australians feel they have been <a href="https://www.choice.com.au/consumers-and-data/data-collection-and-use/how-your-data-is-used/articles/choice-renttech-report-release">pressured to use “rent tech” platforms</a>. These platforms collect an increasing range of information with questionable connection to renting.</p> <h2>A first for Australian consumers</h2> <p>This is the first time an Australian regulator has made an in-depth report on the consumer data practices of data brokers, which are generally hidden from consumers. It comes <a href="https://www.ftc.gov/system/files/documents/reports/data-brokers-call-transparency-accountability-report-federal-trade-commission-may-2014/140527databrokerreport.pdf">ten years after</a> the United States Federal Trade Commission (FTC) conducted a similar inquiry into data brokers in the US.</p> <p>The ACCC report examined the data practices of nine data brokers and other “data firms” operating in Australia. (It added the term “data firms” because some companies sharing data about people argue that they are not data brokers.)</p> <p>A big difference between the Australian and the US reports is that the FTC is both the consumer watchdog and the <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2312913">privacy regulator</a>. As our competition and consumer watchdog, the ACCC is meant to focus on competition and consumer issues.</p> <p>We also need our privacy regulator, the Office of the Australian Information Commissioner (OAIC), to pay attention to these findings.</p> <h2>There’s a law against that</h2> <p>The ACCC report shows many examples of businesses collecting personal information about us from third parties. For example, you may be a customer of a business that only has your name and email address. But that business can purchase “<a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4224653">data enrichment</a>” services from a data broker to find out your age range, income range and family situation.</p> <p>The <a href="https://www.legislation.gov.au/C2004A03712/latest/text">current Privacy Act</a> includes <a href="https://www.oaic.gov.au/privacy/australian-privacy-principles/read-the-australian-privacy-principles">a principle</a> that organisations must collect personal information only from the individual (you) unless it is unreasonable or impracticable to do so. “Impracticable” means practically impossible. This is the direct collection rule.</p> <p>Yet there is no reported case of the privacy commissioner enforcing the direct collection rule against a data broker or its business customers. Nor has the OAIC issued any specific guidance in this respect. It should do both.</p> <h2>Time to update our privacy laws</h2> <p>Our privacy law was drafted in 1988, long before this complex web of digital data practices emerged. Privacy laws in places such as California and the European Union provide much stronger protections.</p> <p>The government has <a href="https://ministers.ag.gov.au/media-centre/speeches/privacy-design-awards-2024-02-05-2024">announced</a> it plans to introduce a privacy law reform bill this August.</p> <p>The ACCC report reinforces the need for vital amendments, including a direct right of action for individuals and a rule requiring dealings in personal information to be “fair and reasonable”.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/230540/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><em><a href="https://theconversation.com/profiles/katharine-kemp-402096">Katharine Kemp</a>, Associate Professor, Faculty of Law &amp; Justice, <a href="https://theconversation.com/institutions/unsw-sydney-1414">UNSW Sydney</a></em></p> <p><em>Image credits: Shutterstock</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/worried-your-address-birth-date-or-health-data-is-being-sold-you-should-be-and-the-law-isnt-protecting-you-230540">original article</a>.</em></p> </div>

Legal

Placeholder Content Image

REVIEW: Portable laptop monitor

<p>In an era where mobility is paramount, the evolution of technology continues to shape the way we work, play and even travel. Among the many innovations out there aimed at enhancing our digital nomadic lifestyle, the Mobile Pixels DUEX range of portable laptop monitors stands out as a true game-changer.</p> <p>Gone are the days of being tethered to a single screen. With Mobile Pixels' DUEX Series, you can extend your workspace effortlessly, transforming your laptop into a dual-screen powerhouse anywhere, any time. It's such an easy way to seamlessly blend convenience with functionality, redefining the possibilities of productivity while you travel. </p> <p>Travelling for work is one thing, but as often as not it's all about embracing new experiences and enjoying moments of leisure. With a DUEX, your entertainment options are no longer confined to a small laptop screen; you can immerse yourself in your favourite movies, play games, or catch up on the latest episodes of your favourite TV shows in stunning clarity and detail. The vivid display and immersive audio of the DUEX screens also ensure that every moment of downtime is a delight.</p> <p>Designed with the modern traveller in mind, a DUEX laptop screen strikes the perfect balance between portability and functionality. Its sleek, lightweight design makes it the ideal companion for any journey, fitting seamlessly into your backpack or carry-on luggage. It unfolds effortlessly, instantly expanding your workspace wherever you go. Whether you're working from a bustling cafe, a tranquil park or a cramped airplane seat, a DUEX portable laptop screen adapts to your environment with ease.</p> <p>So whether you're a digital nomad, a frequent traveller, or simply seeking to optimise your productivity, the Mobile Pixels DUEX range of portable laptop monitors are a must-have companion for the modern adventurer. Embrace the freedom to work, play and explore on your own terms, wherever your journey may take you.</p> <p>The range comes in the DUEX Lite, Plus or Max varieties. The DUEX Lite is the most affordable option, weighing in at under 600g and boasting a 12.5” screen for $499. The DUEX Plus has a 13.3” screen and retails for $549. The DUEX Max is the premium option with a 14” screen, retailing for $599. All versions are available in Grey and Navy, and can be found at <span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen, Ubuntu, Cantarell, 'Open Sans', 'Helvetica Neue', sans-serif;">JB Hi-Fi, Officeworks, Harvey Norman, Amazon, Mwave and Rosman Computers.</span><span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen, Ubuntu, Cantarell, 'Open Sans', 'Helvetica Neue', sans-serif;"> </span></p> <p><span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen, Ubuntu, Cantarell, 'Open Sans', 'Helvetica Neue', sans-serif;">For more information, check out the full <a href="https://www.mobilepixels.com.au/duex" target="_blank" rel="noopener">Mobile Pixels DUEX range here</a>.</span></p> <p><em>Image: Mobile Pixels</em>   </p>

Travel Tips

Placeholder Content Image

How Samantha Murphy's digital data could be a crucial clue

<p>Last Friday, Victoria Police revisited the Mount Clear area after extracting information from her mobile phone data, as they continue to investigate the Ballarat mum's disappearance. </p> <p>Now, Former Australia Federal Police officer and professor of cybersecurity, Nigel Phair believes an "anomaly" or "change in the behaviour" of Murphy's data pattern may have prompted authorities to return to the area. </p> <p>Detectives have previously said that Murphy departed her residence and ran approximately 7km through Woowookarung Regional Park with data tracking her last location as Mount Clear. </p> <p>Phair who formerly headed investigations at the Australian High Tech Crime Centre (AHTCC), said that data from her iPhone and Apple Watch is particularly important as both devices constantly log her GPS coordinates, heart rate, altitude and can even detect falls among other biometric information. </p> <p>"From the second that she walked out of her door, when out on the street, they would be able to see where she was moving and how she was moving," Phair told told Liz Hayes on Channel 9's series <em>Under Investigation</em>. </p> <p>Additionally, her iPhone can be precisely located using triangulation from nearby cell phone towers. </p> <p>Phair said that this type of data is extremely reliable and accurate, and he believes that the disturbance in this data the 7km mark, where it stopped tracking the information, reveals some form of sophistication. </p> <p>"That means someone's done something active against those two devices and you have to know what you are doing to think I'm going to completely take these out," he said. </p> <p>"It's not just turning them off, it's destroying them and then getting rid of that piece of evidence."</p> <p>He added that tampering with these devices are particularly hard, because even if they may attempt to change SIM cards, mobile phones that are still on can still be traced. </p> <p>"A device has two signifiers. It has a phone number, which you can change, call that the software signifier," he said.</p> <p>"Then it has a hardware identifier, which is the IMEI number." </p> <p>He said that police would be notified if the IMEI number was still operational. </p> <p>"Regardless if you swap SIMs or don't use a SIM at all and just use it as a Wi-Fi-only device in a Wi-Fi area, it will always broadcast that IME number onto the network," he said. </p> <p>Phair said that it is "highly likely" that police have the data on potential predators and are tracking them, as they can see whether someone else was using a device in the Mount Clear area the day Murphy disappeared. </p> <p>Former Victorian detective Damian Marrett told Hayes the he believes Murphy's disappearance is the result of foul play, as changes in her digital data could suggest it was a "targeted attack". </p> <p>He also added that if anyone else had access to her Find My iPhone app or any of her other data, they could easily track her using this information. </p> <p>"Somebody who intimately knew the tracks that she takes or had access to be able to track her runs," he said.</p> <p>"So she could have been tracked without those people having to physically surveil her."</p> <p><em>Images: Under Investigation/ Facebook</em></p> <p> </p>

Legal

Placeholder Content Image

"Stuff youse": Pensioner who's never owned a phone fights mobile detection camera fine

<p>A pensioner from New South Wales has disputed a fine he was issued for using his phone while driving, despite never owning a phone. </p> <p>Frank Singh, 77, was captured on a mobile phone detection camera while driving on the Pacific Motorway last September, and was issued a fine for $362. </p> <p>Mr Singh has refused to pay the fine, claiming that he was holding his wallet when the image was captured. </p> <p>He also claims to have never owned a mobile phone or a computer in his life, wondering how the camera made such a mistake. </p> <p>The senior man decided to appeal and take Revenue NSW to court, despite the risk of paying thousands in legal fees if he lost the case.</p> <p>"Looks like I'm guilty on it, but I'm not," he told <em>A Current Affair</em>. </p> <p>"I thought, what the bloody hell is this all about, I don't own a mobile phone. I've never used a mobile phone. What a load of s***."</p> <p>When questioned what the item could be, he said, "I think it could be my wallet."</p> <p>While Mr Singh admitted he can't specifically remember what he was doing at the time, he believes he was possibly placing his wallet on the passenger seat after paying for fuel. </p> <p>Unfortunately, the review of the fine was rejected and Frank was ordered to pay the $362, but he has not given up. </p> <p>"Then I thought stuff youse, I'm not guilty, I don't own a bloody phone," he said.</p> <p>While preparing to appeal the fine once more, Revenue NSW revoked the fine after issuing a letter to Mr Singh saying he would not be required in court following an investigation by the government body. </p> <p>"We have decided to cancel the fine," the letter read. </p> <p>"You little bloody beauty, how good's that," Mr Singh said on hearing the news, before planning to celebrate the win with a beer at his local pub. </p> <p><em>Image credits: A Current Affair </em></p>

Legal

Placeholder Content Image

Are Australia’s roads becoming more dangerous? Here’s what the data says

<p><a href="https://theconversation.com/profiles/mark-stevenson-330220">Mark Stevenson</a>, <em><a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a></em> and <a href="https://theconversation.com/profiles/jason-thompson-96100">Jason Thompson</a>, <em><a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a></em></p> <p>In 2022, there were nearly <a href="https://www.bitre.gov.au/sites/default/files/documents/road_trauma_2022.pdf">1,200 road crash deaths</a> in Australia – a figure that has remained largely the same over the past decade. However, some states and territories have seen dramatic increases in just the last five years, such as the ACT (100%), Tasmania (59.4%) and Queensland (21.2%).</p> <p>Serious injuries from road crashes have also been <a href="https://app.powerbi.com/view?r=eyJrIjoiMGVlZDM0YzQtNWI3Mi00YzAyLWI5YjUtZGQyYzc3YjJmMmY3IiwidCI6ImFhMjFiNjQwLWJhYzItNDU2ZC04NTA1LWYyY2MwN2Y1MTc4NCJ9">on the rise</a>, from 35,000 in 2013 to 39,866 in 2019.</p> <p>These statistics highlight the need for an urgent rethink of road safety policies if we are to achieve Australia’s <a href="https://www.sbs.com.au/news/article/australias-road-deaths-rise-despite-push-to-halve-fatalities-by-2030/vcl7yj50g">target</a> of a 50% decrease in fatalities and a 30% decrease in serious injuries by 2030. We are clearly not on track to meet these targets.</p> <p>People are worth more than statistics, though. And it is not surprising we haven’t seen decreases in road deaths when we rely on strategies first implemented three to four decades ago. Change is needed to prevent the ongoing trauma caused by road crashes to Australian families.</p> <p><iframe id="DTp1X" class="tc-infographic-datawrapper" style="border: none;" src="https://datawrapper.dwcdn.net/DTp1X/1/" width="100%" height="400px" frameborder="0"></iframe></p> <h2>Why have road trauma rates not declined?</h2> <p>Australia has long had an international reputation for pioneering road safety measures, such as seat belt restraints, speed management strategies (including speed cameras) and drink-driving laws, among others. In fact, Australia was the <a href="https://link.springer.com/article/10.1007/BF00137361">first country</a> in the world to introduce laws for compulsory seat belt use.</p> <p>These initiatives have been highly successful in reducing road deaths from their peak in 1970, when <a href="https://www.abs.gov.au/ausstats/abs@.nsf/Previousproducts/1301.0Feature%20Article412001?opendocument&amp;tabname=Summary&amp;prodno=1301.0&amp;issue=2001&amp;num=&amp;view=">3,798</a> were recorded. But in the past two decades, further progress has stalled. We must ask ourselves why.</p> <p>One theory to explain why road deaths may have increased in many states in the past couple of years is the pandemic. The previously empty roads are now congested again, which may have led to impatience and speeding. Or perhaps, some people have seemingly forgotten how to drive safely. However, there is another, perhaps simpler explanation.</p> <p>This chart shows how closely road deaths have tracked with domestic fuel sales in Australia – measured in millions of litres of fuel – since 2019. In simple terms, when driving rates decreased at the beginning of the pandemic, deaths and injuries went down. When driving rates increased again in early 2021, deaths and injuries went up.</p> <p>In fact, there is scant evidence to suggest people’s driving behaviours changed during this time. Our recent unpublished research followed approximately 800 drivers from January 2020 to March 2023 using monitoring systems inside their cars to measure their behaviour. We found no differences in driver behaviours during this time.</p> <p>Rather, there’s a more likely reason why road deaths and injuries continue to be so high: the amount of time we spend driving continues to increase, while our strategies to target the risks associated with driving haven’t changed.</p> <p>Unfortunately, government agencies continue to rely on strategies implemented over the past 20-30 years, which were effective when they were first introduced, but are now subject to the law of diminishing marginal returns. This means continually throwing more resources at existing speed management strategies, for example, will likely only see marginal benefits.</p> <h2>A new approach not focused on cars</h2> <p>There is increasing urgency to investigate and implement new road safety strategies based on emerging technologies and a redesign of our cities instead.</p> <p>For example, a <a href="https://www.sciencedirect.com/science/article/abs/pii/S0001457521003092">recent Australian trial</a> using new driving monitoring technology showed promise in reducing risky driving behaviours that could cause crashes. The monitoring systems provided feedback to the driver (via a smartphone app) and encouraged safer driving using financial incentives akin to insurance premiums. This new strategy is being explored further in three states: New South Wales, Queensland and Western Australia.</p> <p>Encouraging people to transition from private car trips to public transport is another road safety strategy that has seldom been considered by governments. Rather, the driver, car and road remain the focus.</p> <p>This <a href="https://www.roadsafety.gov.au/nrss/fact-sheets/vision-zero-safe-system">“safe system” approach</a> puts an emphasis on building safe road infrastructure for cars, while ignoring urban design changes that de-emphasise the need for cars. We should be encouraging more people to commute by rail, tram and bus (all lower-risk modes per kilometre travelled), while at the same time delivering safe infrastructure for sustainable transport such as bicycles/e-bicycles or walking.</p> <p>If we continue to tinker with strategies implemented many decades ago, we will never get close to achieving the lofty government targets on road deaths and injuries by 2030.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/213240/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><a href="https://theconversation.com/profiles/mark-stevenson-330220"><em>Mark Stevenson</em></a><em>, Professor of Urban Transport and Public Health, <a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a> and <a href="https://theconversation.com/profiles/jason-thompson-96100">Jason Thompson</a>, Associate Professor, Faculty of Medicine and Melbourne School of Design, <a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a></em></p> <p><em>Image credits: Getty Images</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/are-australias-roads-becoming-more-dangerous-heres-what-the-data-says-213240">original article</a>.</em></p>

Domestic Travel

Placeholder Content Image

The $500 million ATO fraud highlights flaws in the myGov ID system. Here’s how to keep your data safe

<p><em><a href="https://theconversation.com/profiles/rob-nicholls-91073">Rob Nicholls</a>, <a href="https://theconversation.com/institutions/unsw-sydney-1414">UNSW Sydney</a></em></p> <p>The Australian Tax Office (ATO) paid out more than half a billion dollars to cyber criminals between July 2021 and February 2023, according to an <a href="https://www.abc.net.au/news/2023-07-26/ato-reveals-cost-of-mygov-tax-identity-crime-fraud/102632572">ABC report</a>.</p> <p>Most of the payments were for small amounts (less than A$5,000) and were not flagged by the ATO’s own monitoring systems.</p> <p>The fraudsters exploited a weakness in the identification system used by the myGov online portal to redirect other people’s tax refunds to their own bank accounts.</p> <p>The good news is there’s plenty the federal government can do to crack down on this kind of fraud – and that you can do to keep your own payments secure.</p> <h2>How these scams work</h2> <p>Setting up a myGov account or a myGov ID requires proof of identity in the form of “<a href="https://www.afp.gov.au/sites/default/files/PDF/NPC-100PointChecklist-18042019.pdf">100 points of ID</a>”. It usually means either a passport and a driver’s licence or a driver’s licence, a Medicare card, and a bank statement.</p> <p>Once a myGov account is created, linking it to your tax records requires two of the following: an ATO assessment, bank account details, a payslip, a Centrelink payment, or a super account.</p> <p>These documents were precisely the ones targeted in three large data breaches in the past year: at <a href="https://theconversation.com/what-does-the-optus-data-breach-mean-for-you-and-how-can-you-protect-yourself-a-step-by-step-guide-191332">Optus</a>, at <a href="https://theconversation.com/medibank-hackers-are-now-releasing-stolen-data-on-the-dark-web-if-youre-affected-heres-what-you-need-to-know-194340">Medibank</a>, and at <a href="https://asic.gov.au/about-asic/news-centre/news-items/guidance-for-consumers-impacted-by-the-latitude-financial-services-data-breach/">Latitude Financial</a>.</p> <p>In this scam, the cyber criminal creates a fake myGov account using the stolen documents. If they can also get enough information to link to the ATO or your Tax File Number, they can then change bank account details to have your tax rebate paid to their account.</p> <p>It is a sadly simple scam.</p> <h2>How government can improve</h2> <p>One of the issues here is quite astounding. The ATO knows where salaries are paid, via the “<a href="https://www.ato.gov.au/business/single-touch-payroll/what-is-stp-/">single touch</a>” payroll system. This ensures salaries, tax and superannuation contributions are all paid at once.</p> <p>Most people who have received a tax refund will have provided bank account details where that payment can be made. Indeed, many people use precisely those bank account details to identify themselves to myGov.</p> <p>At present, those bank details can be changed within myGov without any further ado. If the ATO simply checked with the individual via another channel when bank account details are changed, this fraud could be prevented. It might be sensible to check with the individual’s employer as well.</p> <p>Part of the problem is the ATO has not been very transparent about the risks. If these risks were clearly set out, then calls for changes to ATO procedures would have been loud and clear from the cyber security community.</p> <p>The ATO is usually good at identifying when a cyber security incident may lead to fraud. For example, when the recruitment software company <a href="https://www.abc.net.au/news/2018-06-06/australian-data-may-be-compromised-in-pageup-security-breach/9840048?itm_campaign=newsapp">PageUp was hacked in 2018</a>, the ATO required people who may have been affected to reconfirm their identities. This was done without public commentary and represents sound practice.</p> <p>Sadly, the millions of records stolen in the Optus, Medibank and Latitude Financial breaches have not led to a similar level of vigilance.</p> <p>Another action the ATO could take would be to check when a single set of bank account details is associated with more than one myGov account.</p> <p>A national digital identity would also help. However, this system has been in development for years, is not universally popular, and may well be <a href="https://www.themandarin.com.au/226280-gallagher-warns-community-support-for-digital-identity-not-ubiquitous/">delayed</a> until after the federal election due in 2024.</p> <h2>Protecting yourself</h2> <p>The most important thing to do is make sure the ATO does not use a bank account number other than yours. As long as the ATO only has your bank account number to transfer your tax rebate, this scam does not work.</p> <p>It also helps to protect your Tax File Number. There are only four groups that ever need this number.</p> <p>The first is the ATO itself. The second is your employer. However, remember you do not need to give your TFN to a prospective employer, and your employer only needs your TFN <em>after</em> you have started work.</p> <p>Your super fund and your bank may ask for your TFN. However, providing your TFN to your super fund or bank is optional – it just makes things easier, as otherwise they will withhold tax which you will need to claim back later.</p> <p>Of course, all the usual data safety issues still apply. Don’t share your driver’s licence details without good reason. Take similar care with your passport. Your Medicare card is for health services and does not need to be shared widely.</p> <p>Don’t open emails from people you do not know. Never click links in messages unless you are sure they are safe. Most importantly, know your bank will not send you emails containing links, nor will the ATO.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/210459/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><em><a href="https://theconversation.com/profiles/rob-nicholls-91073">Rob Nicholls</a>, Associate professor of regulation and governance, <a href="https://theconversation.com/institutions/unsw-sydney-1414">UNSW Sydney</a></em></p> <p><em>Image </em><em>credits: Shutterstock</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/the-500-million-ato-fraud-highlights-flaws-in-the-mygov-id-system-heres-how-to-keep-your-data-safe-210459">original article</a>.</em></p>

Technology

Placeholder Content Image

“Turn your phone off”: The simple reason behind Albanese’s warning

<p>Prime Minister Anthony Albanese has issued a clear warning to the public, advising them to "turn their phones off" as a safety measure to avoid potential dangers.</p> <p>Albanese delivered this cautionary message last week while announcing the appointment of Australia's first national cybersecurity coordinator, Air Commander Darren Goldie of the Royal Australian Air Force.</p> <p>Goldie was quick to echo the Prime Minister's sentiments, emphasising the importance of mobilising both the private sector and consumers in the fight against cyber threats.</p> <p>"We all bear responsibility in this matter. Simple actions, such as turning off your phone every night for five minutes, can make a significant difference.</p> <p>"I encourage everyone watching to adopt this practice once every 24 hours, perhaps while engaging in daily routines like brushing your teeth," stated Albanese during the press conference.</p> <p>While rebooting your device on a daily basis may seem like a basic precaution, it can greatly enhance your protection against cybercriminals. Often, various applications and processes continue running in the background of your phone or computer, even when you're not actively using them.</p> <p>If unauthorised individuals gain access to these apps and processes, they can monitor your activities and collect your data, including financial information and identification documents, and even hijack your webcam or phone camera.</p> <p>By rebooting your phone, you force the closure of all background applications and processes, effectively evicting anyone attempting to track your virtual movements.</p> <p>Priyadarsi Nanda, a cybersecurity expert at the University of Technology Sydney, supported Albanese's advice, emphasising the importance of periodically turning off one's phone.</p> <p>"Considering how extensively we use smartphones in our daily lives, there have been cases where individuals haven't turned off their phones for an entire year," Dr. Nanda told <em>The Guardian</em>.</p> <p>"If there is a malicious process running, switching off the phone breaks the chain. While it may only provide protection while the phone is off, it undoubtedly frustrates potential hackers. Although not foolproof, rebooting can make it more challenging for hackers to compromise your device."</p> <p>It is crucial to note that this measure does not safeguard against all forms of cybercrime. If your password has been stolen or you are being repeatedly and strategically targeted, for example, a simple reboot is unlikely to deter the most persistent hackers.</p> <p><em>Image: Wikimedia / Australian Government</em></p>

Technology

Placeholder Content Image

How to avoid mobile phone bill horror stories when travelling

<p>"I'm sorry, calls to this number are not allowed, please try again later". This. Again. At 1am standing outside what I thought was our Galway Airbnb, but instead was a popular alley for Irish revellers to relieve themselves. Brilliant.</p> <p>After begging a convenience store manager, borrowing a phone and stealing some local wi-fi, we made it to bed before 3am (one-star rating for the Airbnb host, naturally). Such was the power of the phone company when you're on holiday, I still got pinged far-too-high amounts for calls and data used to attempt a check-in at the Irish abode.</p> <p>A reader recently contacted me wanting to avoid such a conundrum by asking for the best SIM cards available in Europe. Thankfully, EU law has recently shielded travellers from harsh cross-border roaming charges by ruling that providers cannot charge excessively for access to rival networks in fellow EU nations.</p> <p>You'll see the kiosks hawking pre-paid SIM packages at many major airports. If you want the dependability a SIM provides, assess your needs and shop around. </p> <p>Better yet, get to know your smartphone better and use the whole range of mobile apps that will soon make international call and text roaming redundant. Organising hotels, taxis, tours, dinner reservations as well as calling home and making your friends and colleagues jealous with holiday snaps can all be done with a wi-fi connections, which are readily available and far cheaper (if not free).</p> <p><strong>Avoid phone bill shock when you're away</strong></p> <ul> <li>Contact your mobile phone company rep about your destination and length of stay to see what add-ons and spending caps may be best.</li> <li>Only purchase local SIMs if you're in the country more than a week, have an unplanned itinerary or will have no free wi-fi at your accommodation.</li> <li>If you're on a per-day bundle, choose a few days to be on-the-grid and turn off your mobile data on other days.</li> <li>Go wi-fi only, in North American, Asian and European cities it's readily available.</li> <li>Embrace apps like Uber, Gett, WhatsApp, OpenTable and TripAdvisor to book taxis, call home and book restaurants and tours using hotel wi-fi and thus limiting calls.</li> </ul> <p><em>Image credit: Shutterstock</em></p> <p><em>Written by Josh Martin. Republished with permission of <a href="http://www.stuff.co.nz/" target="_blank" rel="noopener"><strong><span style="text-decoration: underline;">Stuff.co.nz</span></strong></a>.</em></p>

Travel Tips

Placeholder Content Image

Tips for safe mobile banking

<p>As we increasingly turn to our mobile devices for online transactions, it’s crucial to keep security in mind. We’ve all misplaced our mobile phone at some stage and the last thing you want is for some random stranger to get direct access to your bank accounts and other personal details.</p> <p><strong>1. Use a strong password –</strong> This goes without saying.While it might not be as critical with your library pass, someone who cracks or guesses your online banking password can drain your account dry. If you memorise just one strong password, make it your online banking password.</p> <p><strong>2. Never store passwords on your smartphone –</strong> Many people still try to hide passwords or PIN numbers within the body of text or phone numbers. However, despite how cleverly you may think you've concealed them, criminals know what to look for and where. It's always best to commit these security details to memory and not record them anywhere. This includes not ticking "save password" on website and applications that offer to remember your login details. Also make sure you limit other personal information. Criminals are interested in more than just your internet banking details. Any kind of personal information can be used to steal your identity, which criminals can then use to apply for credit cards, personal loans, even mortgages.</p> <p><strong>3. Use a password manager –</strong> Okay, in the real world you probably have more than one online financial account. Rather than strain your brain memorising hard-to-crack passwords for each of them, look at enlisting the help of a password manager. There are plenty of apps available and the best ones not only store your passwords securely but also help you work through your collection of passwords and replace weak ones and duplicates.</p> <p><strong>4. Activate smartphone security settings and password protection –</strong> All smartphones have built-in security features such as auto-locking and password protection. While it may seem like a bit of an inconvenience at times, these physical security measures are your first line of defense in keeping your smartphone and your personal details safe. You can also install smartphone security software as well as remote data wiping software if you lose your phone or it gets stolen.</p> <p><strong>5. Connect through your data plan –</strong> If you're banking online on a mobile device, you have a degree of in-built protection available when you turn off wi-fi tethering and bluetooth and connect using your mobile data plan. It's a lot harder for criminals to sniff your mobile data stream than to snag passwords from network traffic. If you’re on wi-fi only use reputable hot spots that are password protected. If you connect to a shared wi-fi hotspot you are completely dependent on the security of the host network.</p> <p><strong>6. Don't be tempted to jailbreak your smartphone –</strong> If you crack the manufacturer's security on your smartphone, you not only make your warranty invalid but you make it much more vulnerable to attacks by cybercriminals.</p> <p><strong>7. Clear your phone when you replace it –</strong> If you sell or discard your smartphone, it's crucial you delete all personal information first. This includes SMS messages, emails, photographs, contact details and internet links. </p> <p><em>Image credit: Shutterstock</em></p>

Money & Banking

Placeholder Content Image

Australia's most trusted brands revealed for 2023

<p>When it comes to big brands, there are certain names that Aussies go back to time and time again for their reliability and trustworthy reputations. </p> <p>This year, according to recent data collated by <a href="https://www.trustedbrands.com.au" target="_blank" rel="noopener">Reader's Digest</a>, consumers are interacting differently with big name brands after recovering from the pandemic, but now being faced with the cost of living crisis. </p> <p>The survey, now in its 24th year, was carried out by independent market research company Catalyst Consultancy & Research and asked thousands of consumers of a mixed demographic to name the brands they trusted across more than 70 categories. </p> <p>The data suggests that our most trusted brands have "not only changed the way they interact with us during the past three years of the pandemic", but current "cost-of-living pressures mean the most successful organisations are making even further refinements".</p> <p>"With inflation putting price pressure on everyone at the moment, trust remains a hard-earned and vitally important commodity," Reader's Digest Australia Editor-in-Chief Louise Waterson said. </p> <p>"Many leading companies are rebranding their image, or reshaping their services, to hold on to existing customers and seek out new ones."</p> <p><em><strong>Check out the list below of Australia's top 20 most trusted brands, and <a href="https://www.trustedbrands.com.au/" target="_blank" rel="noopener">head here for the full 2023 results</a>.</strong></em></p> <p>20. Woolworths</p> <p>19. Sanitarium</p> <p>18. Bridgestone</p> <p>17. Ryobi</p> <p>16. Dairy Farmers</p> <p>15. Cancer Council Australia</p> <p>14. Dyson</p> <p>13. Bega </p> <p>12. Selleys</p> <p>11. Specsavers</p> <p>10. Glen20</p> <p>9. Dulux</p> <p>8. Royal Flying Doctor Service</p> <p>7. Band-Aid</p> <p>6. Victa</p> <p>5. Panadol</p> <p>4. Bunnings Warehouse</p> <p>3. Cadbury</p> <p>2. Weber</p> <p>1. Dettol</p> <p><em>Image credits: Trusted Brands</em></p>

News

Placeholder Content Image

What the “father of the cell phone” wants you to know

<p dir="ltr">The inventor of the mobile phone has shared his candid opinion about the obsession with smart devices. </p> <p dir="ltr">Martin Cooper, an American engineer dubbed the “father of the cell phone”, invented the very first mobile phone 50 years ago in 1973. </p> <p dir="ltr">Back then, the weighty block of wires and circuits were only used to make calls, a far cry from having the world at your fingertips with smartphones today. </p> <p dir="ltr">Cooper believes that despite all the good that can come from modern technology, the world has become a little obsessed with smart devices. </p> <p dir="ltr">“I am devastated when I see somebody crossing the street and looking at their cell phone. They are out of their minds,” the 94-year-old told AFP from his office in Del Mar, California.</p> <p dir="ltr">“But after a few people get run over by cars, they’ll figure it out,” he joked.</p> <p dir="ltr">Mr Cooper also indulges in the latest gadgets, as he wears an Apple Watch and uses a top-end iPhone, flicking intuitively between his email, photos, YouTube and the controls for his hearing aid.</p> <p dir="ltr">Despite keeping up with all the latest apps, updates and upgrades, he confessed that sometimes it can all seem a little overwhelming. </p> <p dir="ltr">“I will never, ever understand how to use the cell phone the way my grandchildren and great grandchildren do,” he said.</p> <p dir="ltr">“Each generation is going to be smarter … they will learn how to use the cell phone more effectively,” he said.</p> <p dir="ltr">“Humans sooner or later figure it out.”</p> <p dir="ltr"><em>Image credits: Getty Images</em></p>

Technology

Placeholder Content Image

Can big data really predict what makes a song popular?

<p>Music is part of our lives in different ways. We listen to it on our commutes and it resounds through shopping centres. Some of us seek live music at concerts, festivals and shows or rely on music to set the tone and mood of our days.</p> <p>While we might understand the genres or songs we appreciate, it’s not clear precisely why a certain song is more appealing or popular. Perhaps the lyrics speak to an experience? Perhaps the energy makes it appealing? These questions are important to answer for music industry professionals, and <a href="https://theconversation.com/how-data-is-transforming-the-music-industry-70940">analyzing data</a> is a key part of this.</p> <p>At Carleton University, a group of data science researchers sought to answer the question: “What descriptive features of a song make it popular on music/online platforms?”</p> <h2>Revenue in the music industry</h2> <p>Revenue in the music industry <a href="https://doi.org/10.1509/jm.14.0473">is derived from two sources that are affected by different factors: live music and recorded music</a>. During the pandemic, although live music income dropped due to the cancellation of in-person performances, the <a href="https://doi.org/10.1371/journal.pone.0267640">income from streaming</a> rose.</p> <p>As digital platforms like Spotify and TikTok have grown, <a href="https://doi.org/10.5753/sbcm.2019.10436">the majority of music revenue has come to be contributed by digital media, mostly music streaming</a>. How and whether this <a href="https://theconversation.com/artists-spotify-criticisms-point-to-larger-ways-musicians-lose-with-streaming-heres-3-changes-to-help-in-canada-176526">revenue reaches singers and songwriters at large</a> is another matter. </p> <h2>Popularity on digital platforms</h2> <p>The popularity of a song on digital platforms is considered a measure of the revenue the song may generate.</p> <p>As such, producers seek to answer questions like “<a href="https://doi.org/10.1098/rsos.171274">How can we make the song more popular?</a>” and “<a href="https://doi.org/10.1109/ICMLA.2019.00149">What are the characteristics of songs that make it the top charts?</a>” </p> <p>With collaborators <a href="https://www.linkedin.com/in/laura-colley/">Laura Colley</a>, <a href="https://www.linkedin.com/in/andrew-dybka/">Andrew Dybka</a>, Adam Gauthier, Jacob Laboissonniere, Alexandre Mougeot and Nayeeb Mowla, we produced a systematic study that collected data from YouTube, Twitter, TikTok, Spotify and Billboard (<a href="https://www.billboard.com/charts/hot-100">Billboard Hot-100</a>, sometimes also denoted by data researchers as “<a href="https://data.world/bigml/association-discovery">Billboard hot top</a>” or in our work and others’ work, “Billboard Top-100”).</p> <p>We linked the datasets from the different platforms with Spotify’s acoustic descriptive metric or “descriptive features” for songs. These features have been derived <a href="https://www.billboard.com/music/music-news/echo-nest-columbia-university-launch-million-song-dataset-1178990/">from a dataset which yielded categories for measuring and analyzing qualities of songs</a>. Spotify’s <a href="https://www.theguardian.com/technology/2014/mar/06/spotify-echo-nest-streaming-music-deal">metrics capture</a> <a href="https://doi.org/10.1098/rsos.171274">descriptive features such as</a>acousticness, energy, danceability and instrumentalness (the collection of instruments and voices in a given piece). </p> <p>We sought to find trends and analyze the relationship between songs’ descriptive features and their popularity.</p> <p>The rankings on the weekly <a href="https://www.billboard.com/charts/hot-100/">Billboard Hot-100</a> are based on sales, online streams and radio plays in the United States.</p> <p>The analysis we performed by looking at Spotify and Billboard revealed insights that are useful for the music industry.</p> <h2>What predicts a Billboard hit?</h2> <p>To perform <a href="https://ieeexplore.ieee.org/document/9842568">this study</a>, we used two different data sets pertaining to songs that <a href="https://www.npr.org/sections/therecord/2013/08/16/207879695/how-the-hot-100-became-americas-hit-barometer">were Billboard hits</a> <a href="https://data.world/kcmillersean/billboard-hot-100-1958-2017">from the early 1940s to 2020</a> and Spotify data related to over 600,000 tracks and over one million artists.</p> <p>Interestingly, we found no substantial correlations between the number of weeks a song remained on the charts, as a measure of popularity, and the acoustic features included in the study.</p> <p>Our analysis determined that newer songs tend to last longer on the charts and that a song’s popularity affects how long it stays on the charts. </p> <p>In a related study, researchers collected data for Billboard’s Hot 100 from 1958 to 2013 and found that <a href="https://doi.org/10.1007/978-3-319-13734-6_36">songs with a higher tempo and danceability often get a higher peak position on the Billboard charts</a>. </p> <h2>Predicting Spotify song popularity</h2> <p>We also used the songs’ features to generate machine learning models to predict Spotify song popularity. Preliminary results concluded that features are not linearly correlated, with some expected exceptions including songs’ energy. </p> <p>This indicated that the Spotify metrics we studied — including acousticness, danceability, duration, energy, explicitness, instrumentalness, liveness, speechiness (a measure of the presence of spoken words in a song), tempo and release year — were not strong predictors of the song’s popularity.</p> <p>The majority of songs in the Spotify dataset were not listed as explicit, tended to have low instrumentalness and speechiness, and were typically recent songs. </p> <p>Although one may think that some features that are innate to certain songs make them more popular, our study revealed that popularity can not be attributed solely to quantifiable acoustic elements. </p> <p>This means that song makers and consumers must consider other contextual factors beyond the musical features, as captured by Spotify’s measurables, that may contribute to the song’s success. </p> <h2>Elements affecting popularity shift</h2> <p>Our study reinforces that elements affecting the popularity of songs change over time and should be continuously explored. </p> <p>For example, <a href="https://doi.org/10.1098%2Frsos.171274">in songs produced between 1985 and 2015 in the United Kingdom, songs produced by female artists were more successful</a>.</p> <p>Other aspects may substantially contribute to the success of a song. Data scientists have proposed <a href="https://doi.org/10.1371/journal.pone.0244576">simplicity of the lyrics</a>, the advertising and <a href="https://www.ipr.edu/blogs/audio-production/what-are-the-elements-of-popular-music/">distribution plans</a> as potential predictors of songs’ popularity.</p> <h2>Attached listeners</h2> <p>Many musicians and producers make use of popular events and marketing strategies to advertise songs. Such events create social engagements and <a href="https://doi.org/10.3389/fpsyg.2018.02682">audience involvement</a> which attaches the listener to the song being performed. </p> <p>For the public, <a href="https://www.osheaga.com/en">live music events</a>, following long lockdowns, have been opportune for reuniting friends, and <a href="https://ottawabluesfest.ca/">enjoying live artistry and</a> entertainment.</p> <p>While attending a music event or listening to a song, we invite you to reflect on what it is about the song that makes you enjoy it.</p> <p><em>Image credits: Getty Images</em></p> <p><em>This arctic originally appeared on <a href="https://theconversation.com/can-big-data-really-predict-what-makes-a-song-popular-189052" target="_blank" rel="noopener">The Conversation</a>. </em></p>

Music

Placeholder Content Image

Could mobile phones revolutionise chronic wound treatment?

<p>Australian researchers are developing a contactless, thermal imaging system that uses artificial intelligence to help nurses determine the best way to treat leg ulcers without waiting to see if the wound is going to heal properly.</p> <p>It’s estimated that 450,000 thousand Australians currently live with a chronic wound.</p> <p>Being able to predict early on which wounds will become chronic could improve outcomes by enabling nurses to start specialised therapy as soon as possible. But current techniques rely on physically monitoring the wound area over several weeks.</p> <p>New research from RMIT in Melbourne paired thermal imaging with AI.</p> <p>The software was able to accurately identify unhealing ulcers 78% of the time, and healing ulcers 60% of the time, according to the new study <a href="https://www.nature.com/articles/s41598-022-20835-y" target="_blank" rel="noreferrer noopener">published</a> in <em>Scientific Reports</em>.</p> <p>“Our new work that identifies chronic leg wounds during the first visit is a world-first achievement,” says lead researcher Professor Dinesh Kumar, from RMIT’s School of Engineering.</p> <p>“This means specialised treatment for slow-healing leg ulcers can begin up to four weeks earlier than the current gold standard.”</p> <p><strong>How do you normally assess wound healing?</strong></p> <p>The work builds on <a href="https://www.nature.com/articles/s41598-021-92828-2.epdf?sharing_token=7SIEmbOksKOou2TGQ5qPWdRgN0jAjWel9jnR3ZoTv0NntGTf8gfSMhoDjLAz58SefUeGL0aP2A-0mDVnZaiZTcBjNNpA4cvP9FgK6-aoPzyk4oQ0OSbPh83HNS_AwGDQVMg43K4WmG60QDoQohtsdkaRv70YSxfPg4Dn0qa_CUs%3D" target="_blank" rel="noreferrer noopener">previous research</a> by the same team, which found that this method could be used to predict wound healing by week 3 after initial assessment. But they wanted to know whether healing could be predicted from the first wound assessment only, reducing any delay in treatment.</p> <p>If a wound is healing normally it’s area would reduce by 50% within four weeks, but more than 20% of ulcers don’t heal in this expected trajectory and may need specialist interventions.</p> <p>Venous leg ulcers (VLUs) are the <a href="https://treasury.gov.au/sites/default/files/2022-03/258735_wounds_australia.pdf" target="_blank" rel="noreferrer noopener">most common</a> chronic wound seen in Australia and currently, the gold standard for predicting their healing– conventional digital planimetry – requires physical contact. Regular wound photography is also less accurate because there can be variations between images due to lighting, image quality, and differences in camera angle.</p> <p>But a non-contact method like thermal imaging could overcome this.</p> <p>The thermal profile of wounds changes over the healing trajectory, with higher temperatures signalling potential inflammation or infection and lower temperatures indicating a slower healing rate due to decreased oxygen in the region. So, taking thermal images of wounds can provide important information for predicting how they will heal.</p> <p><strong>What did they do?</strong></p> <p>The study collected VLU data from 56 older participants collected over 12 weeks, including thermal images of their wounds at initial assessment and information on their status at the 12<sup>th</sup> week follow-up.</p> <p>“Our innovation is not sensitive to changes in ambient temperature and light, so it is effective for nurses to use during their regular visits to people’s homes,” says co-author Dr Quoc Cuong Ngo, from RMIT’s School of Engineering.</p> <p>“It is also effective in tropical environments, not just here in Melbourne.”</p> <p>“Clinical care is provided in many different locations, including specialist clinics, general practices and in people’s homes,” says co-author Dr Rajna Ogrin, a Senior Research Fellow at Bolton Clarke Research Institute.</p> <p>“This method provides a quick, objective, non-invasive way to determine the wound-healing potential of chronic leg wounds that can be used by healthcare providers, irrespective of the setting.”</p> <p><strong><strong>So, what’s next?</strong></strong></p> <p>There are a few limitations to this study. First, the number of healed wounds in the dataset was relatively small compared to unhealed wounds, and the study only investigated older people.</p> <p>The authors recommend that “future research should focus on improving the predictive accuracy and customising this method to incorporate this assessment into clinical practice on a wider pool of participants and in a variety of settings.”</p> <p>Kumar says that they are hoping to adapt the method for use with mobile phones.</p> <p>“With the funding we have received from the Medical Research Future Fund, we are now working towards that,” he says. “We are keen to work with prospective partners with different expertise to help us achieve this goal within the next few years.”</p> <p><!-- Start of tracking content syndication. Please do not remove this section as it allows us to keep track of republished articles --></p> <p><img id="cosmos-post-tracker" style="opacity: 0; height: 1px!important; width: 1px!important; border: 0!important; position: absolute!important; z-index: -1!important;" src="https://syndication.cosmosmagazine.com/?id=222978&amp;title=Could+mobile+phones+revolutionise+chronic+wound+treatment%3F" width="1" height="1" /></p> <p><!-- End of tracking content syndication --></p> <div id="contributors"> <p><em><a href="https://cosmosmagazine.com/health/revolutionise-chronic-wounds-treatment/" target="_blank" rel="noopener">This article</a> was originally published on Cosmos Magazine and was written by Imma Perfetto.</em></p> <p><em>Image: RMIT University</em></p> </div>

Technology

Placeholder Content Image

Man beats mobile phone driving charge in “unusual” ruling

<p dir="ltr">A Queensland man has had his charge of using a mobile phone successfully overturned in court - but the ruling could see state legislation changed to close any existing “loophole” that exists.</p> <p dir="ltr">Konrad Gordon Gallaher appeared in the Southport Magistrates Court last week to fight the charge from the transport department after he was photographed holding an electronic device while driving by traffic cameras.</p> <p dir="ltr">Mr Gallaher provided evidence that he was actually handling an Apple iPod, highlighting the fact that his mobile phone could be seen mounted on the dashboard in the photo.</p> <p dir="ltr">Showing the device in question to the court, he said it had “no phone functionality”.</p> <p dir="ltr">His evidence was accepted by magistrate Dzenita Balic, who also clarified that it was up to the prosecution to prove beyond unreasonable doubt that Mr Gallaher was using a mobile phone.</p> <p dir="ltr">While she found that the device in question was actually an iPhone, Mr Gallaher had testified that the device didn’t have a SIM card and was unable to make calls.</p> <p dir="ltr">“I could not find, and I do not, that he was dishonest in his description of the device as a portable music player,” she said in <a href="https://archive.sclqld.org.au/qjudgment/2022/QMC22-002.pdf" target="_blank" rel="noopener">her verdict</a> delivered on Friday.</p> <p dir="ltr">“Although to my mind he is clearly wrong about the device being an iPod, his other assertions as to the limited musical functionality of the device remained unchallenged.</p> <p dir="ltr">“I should add that to me, the use of this device by Mr Gallaher was just as dangerous as the use of a mobile phone.</p> <p dir="ltr">“(But) a mobile phone therefore must take on its natural meaning. It is a device capable of communication.</p> <p dir="ltr">“My view is that, at the time of the driving, I cannot be satisfied, considering the evidence by Mr Gallaher, which I have now discussed from different angles, that this was indeed a mobile phone at the relevant time.”</p> <p dir="ltr">In Queensland, rules about driver distractions are under the <em>Transport Operations (Road Use Management-Road Rules) Regulation 2009</em>, which states that it’s an offence for a person to hold a phone or rest it on any part of their body while the car is moving or stationary but not parked outside of limited circumstances, such as using it to pay in a drive-through or to provide their digital documents to police.</p> <p dir="ltr">These laws specifically refer to mobile phones rather than any kind of electronic device.</p> <p dir="ltr">Queensland Transport Minister Mark Bailey told <em><a href="https://7news.com.au/news/qld/queensland-man-beats-mobile-phone-driving-charge-in-ruling-set-to-have-major-implications-c-8841473" target="_blank" rel="noopener">7News</a></em> that Balic’s ruling was “unusual” and that he would be seeking advice on the matter.</p> <p dir="ltr">“Clearly the driver was still distracted, which is the intent of the legislation,” he said.</p> <p dir="ltr">“So I’ll be getting advice on this matter.</p> <p dir="ltr">“If there is any loophole that exists, we’ll be seeking to close it.”</p> <p><span id="docs-internal-guid-6c31715d-7fff-53a3-a4d7-80f6fb053f9c"></span></p> <p dir="ltr"><em>Image: Getty Images</em></p>

Legal

Our Partners