Suelette Dreyfus

From Wikipedia, the free encyclopedia

Suelette Dreyfus
NationalityAustralian
OccupationResearcher, journalist, writer
Notable work
Underground

Suelette Dreyfus is a technology researcher, journalist, and writer. Her fields of research include information systems,[1][2][3] digital security and privacy, the impact of technology on whistleblowing,[4][5] health informatics[6] and e-Education. Her work examines digital whistleblowing as a form of freedom of expression and the right of dissent from corruption.[7] She is a researcher and lecturer in the Department of Computing and Information Systems at the University of Melbourne, as well as the Principal Researcher on an international research project on the impact of digital technologies on whistleblowing.[8]

Career[]

Dreyfus' work in e-Health[9][10] has focused on the patient information experience in the health system and the role of technology in error incident reporting in hospital settings.[11][12] She has co-invented innovative prototypes in information design for pathology reports with the aim of transforming them from simple lab information outputs, into multi-layered information tools, which would allow doctors to improve communication with patients and families regarding the status of their diseases in progressive and chronic illnesses such as diabetes.[13][14]

Her research in e-Education has focused on using social media to teach foreign language to English-speaking primary school students, particularly for difficult languages that require more hours of practice such as Asian languages.[15]

Dreyfus has written on the importance of protecting Freedom of Information access (FOI), the problems of information asymmetry and ‘tool asymmetry’ between the individual citizen and the state, and the trend of ‘security clearance creep’. [16]

Underground[]

German cover from Underground (2011)

She is the author of the 1997 book Underground: Hacking, Madness and Obsession on the Electronic Frontier. The book describes the exploits of a group of Australian, American, and British hackers during the late 1980s and early 1990s, among them Julian Assange who is credited as a researcher for the book.[17]

The book was first published under the Mandarin imprint (Random House Australia). The author subsequently released it in e-version in 2001 for free. She also donated the e-book to Project Gutenberg’s library so it would be available in perpetuity to the public, in various text formats, for free, partly so that the book would be easily accessible by the vision-impaired.

Underground has been translated into seven other languages, including French, German, Spanish, Japanese, Chinese (simplified), Chinese (traditional) and Russian. The German edition incorporated a QR reader code into the front cover design which took the reader to a secret recorded audio message about the book, echoing the hacker discovery experiences described in the work.

Dreyfus was an Associate Producer and interview subject for the documentary In the Realm of the Hackers, inspired by Underground, in 2003.[18] Underground was also the basis for a 2012 film by Australian screenwriter and director Robert Connolly.

Journalism[]

She has been a contributor to The Sydney Morning Herald, The Australian, The Independent, and The Age, as well as to radio programs including the Australian Broadcasting Corporation's Late Night Live with Philip Adams.[citation needed] She trained and worked as a staff reporter for a daily newspaper in Australia.[citation needed]

In 2015 and 2016, Dreyfus has run training for journalists in a major media organisation and in a journalism school on digital and physical methods of protecting sources and data. She also runs information security workshops for journalism students in The University of Melbourne with Andrew Clausen and Yung Ju Chua.[citation needed]

Her essays have also appeared in The Conversation, discussing the importance of protecting public access to strong encryption, the need for legal protections for whistleblowers, and the security paradox of legislation enforcing retention of metadata for two years for everyone in Australia.[19][20][21]

References[]

  1. ^ Lederman RM, Dreyfus S, Matchan J E, Knott JC, Milton S. Electronic error-reporting systems: A case study into the impact on nurse reporting of medical errors. Nursing Outlook. Mosby. 2013, Vol. 61, Issue 6, pp. 417 - 426.
  2. ^ Pang, F. R Sharma, R Lederman, S Dreyfus (2011). "Organisational Culture and Organisational Impacts of Information Systems: A Review of the Empirical Literature". Proceedings of 21st Australasian Conference on Information Systems, Brisbane, Australia.CS1 maint: multiple names: authors list (link)
  3. ^ Peng F, Kurnia S, Lederman RM, Dreyfus S. Information Systems and Hospital Work: A structuralist investigation. Proceedings of the 16TH PACIFIC ASIA CONFERENCE ON INFORMATION SYSTEMS. Association for Information Systems. 2012.
  4. ^ Miceli MP, Dreyfus S, Near JP. Outsider 'whistleblowers': Conceptualizing and distinguishing 'bell-ringing' behavior. International Handbook on Whistleblowing Research. Edward Elgar Publishing Ltd. 2014. Editors: Brown AJ, Lewis D, Moberly RE, Vandekerckhove W.
  5. ^ Bosua R, Milton S, Dreyfus S, Lederman R. Going public: Researching external whistleblowing in a new media age. International Handbook on Whistleblowing Research. Edward Elgar Publishing Ltd. 2014. Editors: Brown AJ, Lewis D, Moberly RE, Vandekerckhove W.
  6. ^ Lederman R, Kurnia S, Peng F, Dreyfus S (2015). "Tick a box, any box: A case study on the unintended consequences of system misuse in a hospital emergency department". Journal of Information Technology Teaching Cases. 5 (2).
  7. ^ Brown, AJ, Vanderkerckhov, W, Dreyfus, S (2014). ‘The relationship between transparency, whistleblowing and public trust’. Research Handbook on Transparency, Edward Elgar, Cheltenham UK
  8. ^ "Suelette Dreyfus: School of Computing and Information Systems, The University of Melbourne". cis.unimelb.edu.au. Retrieved 13 November 2019.
  9. ^ Kee, K., Knott, J.C., Dreyfus, S., Lederman, R., Milton, S, Joe, K. 2012. "One hundred tasks an hour: An observational study of emergency department consultant activities". Emergency Medicine Australasia, Vol 24 (3) pp 294–302. Retrieved 11 June 2012
  10. ^ Lederman R, Dreyfus S. Managing Health Information Delivery Processes for Better Medical Decision Making. DSS 2.0 - Supporting Decision Making with New Technologies. IOS Press. 2014, Vol. 261.
  11. ^ Smith S, Lederman R, Monagle P, Alzougool BM, Naish L, Dreyfus S. Individually tailored client-focused reports for ubiquitous devices: An experimental analysis. 23rd Australasian Conference on Information Systems. Australasian Conference on Information Systems ACIS. 2012.
  12. ^ Lederman RM, Dreyfus S, Matchan J E, Knott JC, Milton S. Electronic error-reporting systems: A case study into the impact on nurse reporting of medical errors. Nursing Outlook. Mosby. 2013, Vol. 61, Issue 6, pp. 417 - 426.
  13. ^ Lederman, R and Dreyfus, S. (2014). ‘Tailoring Patient Information To Encourage Patient Engagement’. ECIS e-Health Workshop Tel Aviv University
  14. ^ Dreyfus, S., Lederman, R., Smith P., Monagle, P. (2011) "Customising pathology report design for patient use". Electronic Journal of Health Informatics. Vol 6, No. 2.
  15. ^ Slaughter, Y, Hajek, J, Smith, W, Chang, S, Dreyfus, S. (2015). ‘The online delivery of language programs: Bridging the divide in languages education.’ AFMLTA 20th National Languages Conference. Melbourne
  16. ^ "Resurrect FOI & end security clearance creep to restore trust". The Mandarin. 21 August 2015. Retrieved 13 November 2019.
  17. ^ "Suelette Dreyfus speaks on Julian Assange e Wikileaks". Cyber Security 360. 19 June 2018. Retrieved 13 November 2019.
  18. ^ "Suelette Dreyfus". IMDb.
  19. ^ Dreyfus, S and Chang, S (2016). ‘FBI vs Apple: giving up security and privacy could hurt us all’. The Conversation. 24 Feb.
  20. ^ Dreyfus, S (2016). ‘Governments undermining encryption will do more harm than good’. The Conversation. 13 Jan.
  21. ^ Dreyfus, S (2015). ‘The security paradox: individual privacy versus digital driftnets’. The Conversation. 30 March.

External links[]

Retrieved from ""