Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Entire DC Network

Supply System’S Technology Configuration As A Contributor To End-User Vulnerability, Lindsay Robertson, Katina Michael, Albert Munoz Nov 2015

Supply System’S Technology Configuration As A Contributor To End-User Vulnerability, Lindsay Robertson, Katina Michael, Albert Munoz

Professor Katina Michael

Individuals requiring goods and services essential to their mode of living, are increasingly vulnerable to failures of the complex, interlinked, and inhomogeneous technological systems that supply those needs. Extant analysis techniques do not adequately quantify, from an end-user’s perspective, the vulnerability that is contributed by such technological systems. This study explores the significance of inherent weaknesses of inhomogeneous technological systems and proposes an approach for measuring vulnerability as the individual end-user ‘exposure level’ for each service. The measure of "exposure" that is developed, is mapped directly from the configuration of a technological system. This measure of exposure allows quantitative evaluation …


Cloud Computing Data Breaches: A Socio-Technical Review Of Literature, David Kolevski, Katina Michael Oct 2015

Cloud Computing Data Breaches: A Socio-Technical Review Of Literature, David Kolevski, Katina Michael

Professor Katina Michael

As more and more personal, enterprise and government data, services and infrastructure moves to the cloud for storage and processing, the potential for data breaches increases. Already major corporations that have outsourced some of their IT requirements to the cloud have become victims of cyber attacks. Who is responsible and how to respond to these data breaches are just two pertinent questions facing cloud computing stakeholders who have entered an agreement on cloud services. This paper reviews literature in the domain of cloud computing data breaches using a socio-technical approach. Socio-technical theory encapsulates three major dimensions- the social, the technical, …


Keynote: Justifying Uberveillance- The Internet Of Things And The Flawed Sustainability Premise, Katina Michael Oct 2015

Keynote: Justifying Uberveillance- The Internet Of Things And The Flawed Sustainability Premise, Katina Michael

Professor Katina Michael

Imagine a world where everything was numbered. Not just homes with street addresses, or cars with number plates, or smart phones with telephone numbers, or email addresses with passwords, but absolutely everything you could see and touch and even that which you could not. Well, that world is here, right now. This vast expanse we call “Earth” is currently being quantified and photographed, inch by inch, by satellites, street cameras, drones and high altitude balloons. Longitude and latitude coordinates provide us with the precise degrees, minutes and seconds of the physical space, and unique time stamps tell us where a …


Could Biometrics Give Us A World Without Passwords?, Katina Michael, Natasha Mitchell Sep 2015

Could Biometrics Give Us A World Without Passwords?, Katina Michael, Natasha Mitchell

Professor Katina Michael

What's your strategy for keeping all the passwords in your life both readily available and secure? Do you replace letters with numbers in words you won't forget? Do you cycle through days of the week? Months of the year? Seasons? Pets you once had? What if it was possible to live in a world without passwords? There are many new ways to verify your identity that don't require passwords: wearables, tokens, epidermal electronic, implantables and biometrics. So what might our lives look like without passwords? And is that reality even desirable?


Social And Economic Sustainability, Jason Sargent, Khanjan Mehta, Katina Michael Feb 2015

Social And Economic Sustainability, Jason Sargent, Khanjan Mehta, Katina Michael

Professor Katina Michael

But what about long-term stability in developing nations? For example, as we strive to mainstream alternate energy sources and make them accessible in resource poor communities [ ], how do we think beyond the technological and economic dimensions and ensure respect for social, political and environmental imperatives? Computers, including the tiny but powerful ones on cell phones can be game-changers, but they will not save lives directly. They cannot be eaten by a starving population. And then, they need to be serviced and maintained. Jason, along with Katina’s husband Michael, visited and taught Karen refugee students in camps and remote …