Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

PDF

Faculty of Informatics - Papers (Archive)

Privacy

Articles 1 - 12 of 12

Full-Text Articles in Entire DC Network

Location Privacy Under Dire Threat As 'Uberveillance' Stalks The Streets, Katina Michael, Roger Clarke Jan 2012

Location Privacy Under Dire Threat As 'Uberveillance' Stalks The Streets, Katina Michael, Roger Clarke

Faculty of Informatics - Papers (Archive)

Citizen consent and issues surrounding location-based people-tracking - location-tracking - smart phones - covert tracking - CCTV cameras - mobile phones - warrantless tracking - Australian Mobile Telecommunications Association (AMTA) new industry guidelines - compliance with privacy legislation - need for a location privacy protection act or GPS act.


Privacy Enhanced Data Outsourcing In The Cloud, Miao Zhou, Yi Mu, Willy Susilo, Jun Yan, Liju Dong Jan 2012

Privacy Enhanced Data Outsourcing In The Cloud, Miao Zhou, Yi Mu, Willy Susilo, Jun Yan, Liju Dong

Faculty of Informatics - Papers (Archive)

How to secure outsourcing data in cloud computing is a challenging problem, since a cloud environment cannot been considered to be trusted. The situation becomes even more challenging when outsourced data sources in a cloud environment are managed by multiple outsourcers who hold different access rights. In this paper, we introduce an efficient and novel tree-based key management scheme that allows a data source to be accessed by multiple parties who hold different rights. We ensure that the database remains secure, while some selected data sources can be securely shared with other authorized parties.


Data Security And Information Privacy For Pda Accessible Clinical-Log For Medical Education In Problem-Based Learning (Pbl) Approach, Rattiporn Luanrattana, Khin Than Win, John A. Fulcher Jan 2010

Data Security And Information Privacy For Pda Accessible Clinical-Log For Medical Education In Problem-Based Learning (Pbl) Approach, Rattiporn Luanrattana, Khin Than Win, John A. Fulcher

Faculty of Informatics - Papers (Archive)

Data security and information privacy are the important aspects to consider for the use of mobile technology for recording clinical experience and encounter in medical education. Objective: This study aims to address the qualitative findings of the appropriate data security and information privacy for PDA accessible clinical-log in problem-based learning (PBL) approach in medical education. Method: The semi-structured interviews were conducted with the medical faculty members, honorary clinical academics and medical education technology specialists. Results: Data security and information access plan were determined for managing clinical-log data. The results directed the guideline for the future development and implementation of clinical-log …


The Rfid Value Proposition, Benjamin D. Renegar, Katina Michael Jun 2008

The Rfid Value Proposition, Benjamin D. Renegar, Katina Michael

Faculty of Informatics - Papers (Archive)

Radio Frequency Identification (RFID) has the potential to revolutionize the retail industry, yet the linking of this automatic identification (auto-ID) technology to consumer goods has resulted in widespread concern over the potential privacy threats, primarily due to the aspect of traceability it could impose on consumers. As a consequence, privacy has come to be perceived as a barrier stopping RFID adoption in retail in its tracks. When investigating other complex information and communication technologies (ICT), it becomes apparent that consumers often sacrifice privacy in order to take advantage of some form of value afforded by the technology. This interplay between …


Microchip Implants For Humans As Unique Identifiers: A Case Study On Verichip, Katina Michael, M G. Michael, Rodney Ip Apr 2008

Microchip Implants For Humans As Unique Identifiers: A Case Study On Verichip, Katina Michael, M G. Michael, Rodney Ip

Faculty of Informatics - Papers (Archive)

Microchip implants for humans are not new. The installation of pacemakers in humans and a great number of other medical innovations for prosthesis are now considered straightforward procedures. Today we have even realised the potential for microchip implants to be embedded inside the body of humans for the purpose of acting as unique lifetime identifiers (ULI). Tiny radiofrequency identification (RFID) devices are now being utilised to store a unique 16-digit identification number.


Privacy, Value And Control Issues In Four Mobile Business Applications, Benjamin D. Renegar, Katina Michael, M G. Michael Apr 2008

Privacy, Value And Control Issues In Four Mobile Business Applications, Benjamin D. Renegar, Katina Michael, M G. Michael

Faculty of Informatics - Papers (Archive)

This paper presents four case studies that explore the adoption and acceptance of mobile technologies and services within the context of the privacy-value-control (PVC) trichotomy. The technologies studied include: the mobile phone, electronic toll payment tags, e-passports, and loyalty card programs. The study shows that despite the potential barriers to adoption in each of the depicted cases, the applications were embraced with great success soon after their introduction. An understanding of why these mobile innovations succeeded in spite of the concerns surrounding them will serve to help practitioners understand other issues currently plaguing emerging technologies like radio-frequency identification (RFID) tags …


Human Tracking Technology In Mutual Legal Assistance And Police Inter-State Cooperation In International Crimes, Katina Michael, G. L. Rose Jan 2007

Human Tracking Technology In Mutual Legal Assistance And Police Inter-State Cooperation In International Crimes, Katina Michael, G. L. Rose

Faculty of Informatics - Papers (Archive)

The objective of this paper is to explore the role of human tracking technology, primarily the use of global positioning systems (GPS) in locating individuals for the purposes of mutual legal assistance (MLA), and providing location intelligence for use in inter-state police cooperation within the context of transnational crime. GPS allows for the 24/7 continuous real-time tracking of an individual, and is considered manifold more powerful than the traditional visual surveillance often exercised by the police. As the use of GPS for human tracking grows in the law enforcement sector, federal and state laws in many countries are to a …


The Importance Of Scenarios In Evaluating The Socio-Ethical Implications Of Location-Based Services, L. Perusco, Katina Michael Dec 2006

The Importance Of Scenarios In Evaluating The Socio-Ethical Implications Of Location-Based Services, L. Perusco, Katina Michael

Faculty of Informatics - Papers (Archive)

Location-based services (LBS) are those applications that utilize the position of an end-user, animal or thing based on a given device (handheld, wearable, interwoven into fabric or implanted), executed for a particular purpose. LBS applications range from those that are mission-critical to those that are used for convenience, from those that are mandatory to those that are voluntary, from those that are targeted at the mass market to those that cater for the needs of a niche market. Location services can be implemented using a variety of access mediums including global positioning systems and radio-frequency identification, rendering approximate or precise …


National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael Dec 2006

National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael

Faculty of Informatics - Papers (Archive)

This special issue of Prometheus is dedicated to the theme of the Social Implications of National Security Measures on Citizens and Business. National security measures can be defined as those technical and non-technical measures that have been initiated as a means to curb breaches in national security, irrespective of whether these might occur by nationals or aliens in or from outside the sovereign state. National security includes such government priorities as maintaining border control, safeguarding against pandemic outbreaks, preventing acts of terror, and even discovering and eliminating identification fraud. Governments worldwide are beginning to implement information and communication security techniques …


Location-Based Services And The Privacy-Security Dichotomy, Katina Michael, L. Perusco, M G. Michael Oct 2006

Location-Based Services And The Privacy-Security Dichotomy, Katina Michael, L. Perusco, M G. Michael

Faculty of Informatics - Papers (Archive)

Location-based services (LBS) rely on knowledge of a user’s location to provide tailored services or information by means of a wireless device. LBS applications have wide-ranging implications for society, particularly in the context of tracking and monitoring groups of individuals such as children, invalids, and parolees. Despite a great deal of attention paid to technical and commercial aspects of LBS technologies, consideration of the legal, ethical, social and technology momentum issues involved has been wanting. This paper examines some of the more pressing issues that are expected to arise from the widespread use of LBS. The outcome of this paper …


Protecting Privacy With The Mpeg-21 Ipmp Framework, N. P. Sheppard, R. Safavi-Naini Jun 2006

Protecting Privacy With The Mpeg-21 Ipmp Framework, N. P. Sheppard, R. Safavi-Naini

Faculty of Informatics - Papers (Archive)

A number of authors have observed a duality between privacy protection and copyright protection, and, in particular, observed how digital rights management technology may be used as the basis of a privacy protection system. In this paper, we describe our experiences in implementing a privacy protection system based on the Intellectual Property Management and Protection ("IPMP") components of the MPEG-21 Multimedia Framework. Our approach allows individuals to express their privacy preferences in a way enabling automatic enforcement by data users' computers. This required the design of an extension to the MPEG Rights Expression Language to cater for privacy applications, and …


The Emerging Ethics Of Humancentric Gps Tracking And Monitoring, Katina Michael, Andrew Mcnamee, M G. Michael Jun 2006

The Emerging Ethics Of Humancentric Gps Tracking And Monitoring, Katina Michael, Andrew Mcnamee, M G. Michael

Faculty of Informatics - Papers (Archive)

The Global Positioning System (GPS) is increasingly being adopted by private and public enterprise to track and monitor humans for location-based services (LBS). Some of these applications include personal locators for children, the elderly or those suffering from Alzheimer’s or memory loss, and the monitoring of parolees for law enforcement, security or personal protection purposes. The continual miniaturization of the GPS chipset means that receivers can take the form of wristwatches, mini mobiles and bracelets, with the ability to pinpoint the longitude and latitude of a subject 24/7/365. This paper employs usability context analyses to draw out the emerging ethical …