Designing the collective intelligence commons
Collective intelligence can, at its simplest, be understood as the enhanced capacity that is created when people work together, often with the help of technology, to mobilise a wider range of information, ideas and insights. This report explores the role that open digital infrastructures such...
Strengthening digital infrastructure: a policy agenda for free and open source software
Much of the discussion around digital infrastructure has focused on broadband availability, but the role of free and open source software (FOSS) has gone under-appreciated. In this paper, the author calls for government investment and regulation to ensure the future health, security, and growth of...
Help-seeking among Australian ransomware victims
Ransomware is malicious software (also known as malware) used to deny a person or organisation access to their IT systems and devices and/or to threaten the release of private data unless a ransom is paid. This study examines the help-seeking behaviour of 321 Australian ransomware...
2016 Debian Project survey: work and volunteers
The Debian survey, held in 2016, marked the first stage of an inquiry into the relationship between volunteer work in free and open source software and broader dimensions of work and employment. This report outlines the key findings from the research.
Ransomware action plan
This document outlines the capabilities and powers that Australia will use to combat ransomware, seeks feedback on other regulatory reforms or voluntary incentives needed to promote the cyber security resilience of our digital economy, and provides information on where victims can go for help.
Exfiltrate, encrypt, extort: the global rise of ransomware and Australia’s policy options
All governments, civil society groups and businesses—large and small—need to know how to manage and mitigate the risk of ransomware, but organisations can’t deal with the attacks on their own. This policy report addresses key areas in Australia where new policies and strategies and improved...
The coproduction of open source software by volunteers and big tech firms
Big tech firms such as Amazon are using cloud computing and 'software as a service' to transform open source software, which is intended to be shared and modified, into closed assets. This report maps how firms are collaborating with communities of unpaid volunteers to produce...
Digital platform services inquiry: interim report no. 2 – app marketplaces
This report provides in-depth consideration of competition and consumer issues associated with the distribution of mobile apps to users of smartphones and other mobile devices. It specifically focuses on the two key app marketplaces used in Australia, the Apple App Store and the Google Play...
Good foundations: why democracies should care about the wiring of the Internet
This paper explains what protocols are - how they work, why they matter and how they are governed. It explores the implications of this approach and urges a closer relationship between the architects of Internet protocols and those responsible for the publics they affect.
Encouraging vulnerability treatment: overview for policy makers
This report aims to raise policy makers’ awareness about the importance of responsible “vulnerability treatment”, namely the discovery, management and handling, as well as co-ordinated disclosure of digital security vulnerabilities in products and information systems.
Planning for the 2021 Census
The objective of this audit was to assess whether the Australian Bureau of Statistics (ABS) is effectively preparing for the 2021 Census.
Sustainability and interoperability: an economic study on BIM implementation by a small civil engineering firm
In the area of civil engineering, due to the local nature of many of the software tools used, interoperability problems are frequent, with few studies addressing the economic impact of this, especially in small engineering firms. The main contribution of this paper is a design...
The road to agile government: driving change to achieve success
This report draws on lessons from agile software development to expand the scope of these lessons across the three key government functions and mission areas: policy development, regulatory development and program and policy implementation. The report describes the role of the Agile Government Center (AGC)...
Malware in spam email: risks and trends in the Australian Spam Intelligence Database
Fighting spam requires a combination of technology and crime prevention strategies. This report suggests that the creation of effective partnerships between law enforcement agencies and stakeholders, such as ISPs and the private sector, is vital.
Development of collaboration in planning: what can construction project management learn from other fields?
This study seeks to examine how collaboration in planning has developed in the fields of urban planning (UP), software design and lean construction and to present what construction project management can learn from these developments.
Writing accessible PDFs using Word
This guide to writing accessible PDFs in Microsoft Word is provided to give users the tools to make their documents accessible to a wider audience.
Criteria for security and trust in telecommunications networks and services
The CSIS Working Group on Trust and Security in 5G Networks has developed this criteria for governments and network owners or operators to use in assessing the trustworthiness of telecommunications equipment suppliers.
Interactive Aotearoa: driving growth and wellbeing through interactive media
This report highlights the significant economic, social, and educational opportunities that interactive media offers New Zealand. The case studies of globally recognised New Zealand studios and creators are examples of how these opportunities can be seized through talent, creativity and dedication.
Conceptual foundations for a new lean BIM-based production system in construction
To prove whether productivity deficiencies in construction can be improved, a new lean BIM-based production system is designed to assess the hypothesis that a true integration of BIM functionalities with the Last Planner System will contribute to a more efficient project delivery. This paper discusses...
APIs in government
Application Programming Interfaces (APIs) could dramatically improve the way governments deliver services and data to citizens while protecting governments from the risks associated with government-led digital projects. This report examines what was learned through two Government of Canada API projects, and how to build on...
Towards open annotation: examples and experiments
This article interrogates how digital text annotation tools and projects facilitate online engagement and virtual communities of practice. With the rise of the Web 2.0 movement and the proliferation of digital resources, annotation has evolved from an isolated practice to a collaborative one.
Care, code and digital libraries: embracing critical practice in digital library communities
This article explores the necessity of articulating an ethics of care in the design, governance, and future evolution of digital library software applications.
Software curation in research libraries: practice and promise
In 2016, the Council on Library and Information Resources (CLIR) began offering postdoctoral fellowships in software curation. Four institutions hosted the initial cohort of software curation fellows. This article describes the work activities and research program of the cohort, highlighting the challenges and benefits of...
Code of best practices in Fair Use for software preservation
This publication provides librarians, archivists, curators, and others who work to preserve software, with a tool to guide their reasoning about when and how to employ fair use—the legal doctrine that allows many value-added uses of copyrighted materials—in the most common situations they currently face.
Mobile EGMs apps – the perfect substitute or the perfect storm?
This report details a program of research devised to address the VRGF questions about free‐to‐play mobile apps that mimic traditional gambling games. Although these products do not involve winning real money, they can involve winning free play‐time and thus replicate a critical element of real...