Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Entire DC Network

Exploring The Social Implications Of Location Based Social Networking: An Inquiry Into The Perceived Positive And Negative Impacts Of Using Lbsn Between Friends, Sarah Jean Fusco, K. Michael, M.G. Michael Jun 2010

Exploring The Social Implications Of Location Based Social Networking: An Inquiry Into The Perceived Positive And Negative Impacts Of Using Lbsn Between Friends, Sarah Jean Fusco, K. Michael, M.G. Michael

M. G. Michael

Location based social networking (LBSN) applications are part of a new suite of emerging social networking tools that run on the Web 2.0 platform. LBSN is the convergence between location based services (LBS) and online social networking (OSN). LBSN applications offer users the ability to look up the location of another “friend” remotely using a smart phone, desktop or other device, anytime and anywhere. Users invite their friends to participate in LBSN and there is a process of consent that follows. Friends have the ability to alter their privacy settings to allow their location to be monitored by another at …


The Diffusion Of Rfid Implants For Access Control And Epayments: Case Study On Baja Beach Club In Barcelona, K. Michael, M.G. Michael Jun 2010

The Diffusion Of Rfid Implants For Access Control And Epayments: Case Study On Baja Beach Club In Barcelona, K. Michael, M.G. Michael

M. G. Michael

RFID implants for humans have been used in a variety of contexts since their commercial inception in 2003. The VeriChip product which typically carries a 16 digit number was first marketed as an identification device in the ehealth space (e.g. for emergency response), then as an access control mechanism (e.g. security), and finally as an epayment solution (e.g. the purchase of drinks at clubs). This paper investigates the story behind RFID implants for club patronage access control and epayment. The study uses a two-fold qualitative approach in the collection of data for the single case study of the Baja Beach …


Using A Social Informatics Framework To Study The Effects Of Location-Based Social Networking On Relationships Between People: A Review Of Literature, Sarah Jean Fusco, K. Michael, M.G. Michael Jun 2010

Using A Social Informatics Framework To Study The Effects Of Location-Based Social Networking On Relationships Between People: A Review Of Literature, Sarah Jean Fusco, K. Michael, M.G. Michael

M. G. Michael

This paper is predominantly a review of literature on the emerging mobile application area known as location-based social networking. The study applies the social informatics framework to the exploratory question of what effect location based social networking may have on relationships between people. The classification model used in the paper relates previous research on location based services and online social networking together. Specifically the wider study is concerned with literature which identifies the impact of technology on trust with respect to friendship. This paper attempts to draw out the motivations behind using location based social networking applications and the implications …


Social-Technical Issues Facing The Humancentric Rfid Implantee Sub-Culture Through The Eyes Of Amal Graafstra, Amal Graafstra, K. Michael, M.G. Michael Jun 2010

Social-Technical Issues Facing The Humancentric Rfid Implantee Sub-Culture Through The Eyes Of Amal Graafstra, Amal Graafstra, K. Michael, M.G. Michael

M. G. Michael

Radio-frequency identification (RFID) tags and transponders have traditionally been used to identify domesticated animals so that they can be reunited with their owners in the event that they stray. In the late 1990s, industry started to investigate the benefits of using RFID to identifying non-living things throughout the supply chain toward new efficiencies in business operations. Not long after, people began to consider the possibilities of getting RFID tag or transponder implants for themselves. Mr Amal Graafstra of the United States is one of the first, and probably most well-known ‘do it yourselfer’ (DIY) implantees, who enjoys building customized projects …


Towards A State Of Uberveillance, M.G. Michael, K. Michael Jun 2010

Towards A State Of Uberveillance, M.G. Michael, K. Michael

M. G. Michael

Überveillance is an emerging concept, and neither its application nor its power have yet fully arrived [38]. For some time, Roger Clarke’s [12, p. 498] 1988 dataveillance concept has been prevalent: the “systematic use of personal data systems in the investigation or monitoring of the actions of one or more persons.” Almost twenty years on, technology has developed so much and the national security context has altered so greatly [52], that there is a pressing need to formulate a new term to convey both the resent reality, and the Realpolitik (policy primarily based on power) of our times. However, if …