Computer software

NARROWER TERMS
Strategy

Ransomware action plan

This document outlines the capabilities and powers that Australia will use to combat ransomware, seeks feedback on other regulatory reforms or voluntary incentives needed to promote the cyber security resilience of our digital economy, and provides information on where victims can go for help.​
Policy report

Exfiltrate, encrypt, extort: the global rise of ransomware and Australia’s policy options

All governments, civil society groups and businesses—large and small—need to know how to manage and mitigate the risk of ransomware, but organisations can’t deal with the attacks on their own. This policy report addresses key areas in Australia where new policies and strategies and improved...
Report

The coproduction of open source software by volunteers and big tech firms

Big tech firms such as Amazon are using cloud computing and 'software as a service' to transform open source software, which is intended to be shared and modified, into closed assets. This report maps how firms are collaborating with communities of unpaid volunteers to produce...
Report

Digital platform services inquiry: interim report no. 2 – app marketplaces

This report provides in-depth consideration of competition and consumer issues associated with the distribution of mobile apps to users of smartphones and other mobile devices. It specifically focuses on the two key app marketplaces used in Australia, the Apple App Store and the Google Play...
Report

Good foundations: why democracies should care about the wiring of the Internet

This paper explains what protocols are - how they work, why they matter and how they are governed. It explores the implications of this approach and urges a closer relationship between the architects of Internet protocols and those responsible for the publics they affect.
Report

Encouraging vulnerability treatment: overview for policy makers

This report aims to raise policy makers’ awareness about the importance of responsible “vulnerability treatment”, namely the discovery, management and handling, as well as co-ordinated disclosure of digital security vulnerabilities in products and information systems.
Conference paper

Development of collaboration in planning: what can construction project management learn from other fields?

This study seeks to examine how collaboration in planning has developed in the fields of urban planning (UP), software design and lean construction and to present what construction project management can learn from these developments.
Journal article

Sustainability and interoperability: an economic study on BIM implementation by a small civil engineering firm

In the area of civil engineering, due to the local nature of many of the software tools used, interoperability problems are frequent, with few studies addressing the economic impact of this, especially in small engineering firms. The main contribution of this paper is a design...
Report

Planning for the 2021 Census

The objective of this audit was to assess whether the Australian Bureau of Statistics (ABS) is effectively preparing for the 2021 Census.
Guide

Writing accessible PDFs using Word

This guide to writing accessible PDFs in Microsoft Word is provided to give users the tools to make their documents accessible to a wider audience.