Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Social Implications of ICT (4)
- Privacy (3)
- Automatic Identification (2)
- Civic Infrastructure (2)
- Cloud Computing (2)
-
- Emerging Technologies (2)
- Environment (2)
- Information Security (2)
- Location-Based Services (2)
- Microchip Implants (2)
- RFID (2)
- Radio-frequency Identification (2)
- Risk Management (2)
- Surveillance (2)
- Sustainability (2)
- Authentication (1)
- Behavioural actions (1)
- Big Data (1)
- Biometrics (1)
- Breaches (1)
- Cloud computing (1)
- Connectivity (1)
- Cons (1)
- Contactless cards (1)
- Data (1)
- Data availability (1)
- Design (1)
- Development (1)
- Digital inclusion (1)
- Economic (1)
Articles 1 - 5 of 5
Full-Text Articles in Entire DC Network
Supply System’S Technology Configuration As A Contributor To End-User Vulnerability, Lindsay Robertson, Katina Michael, Albert Munoz
Supply System’S Technology Configuration As A Contributor To End-User Vulnerability, Lindsay Robertson, Katina Michael, Albert Munoz
Professor Katina Michael
Individuals requiring goods and services essential to their mode of living, are increasingly vulnerable to failures of the complex, interlinked, and inhomogeneous technological systems that supply those needs. Extant analysis techniques do not adequately quantify, from an end-user’s perspective, the vulnerability that is contributed by such technological systems. This study explores the significance of inherent weaknesses of inhomogeneous technological systems and proposes an approach for measuring vulnerability as the individual end-user ‘exposure level’ for each service. The measure of "exposure" that is developed, is mapped directly from the configuration of a technological system. This measure of exposure allows quantitative evaluation …
Cloud Computing Data Breaches: A Socio-Technical Review Of Literature, David Kolevski, Katina Michael
Cloud Computing Data Breaches: A Socio-Technical Review Of Literature, David Kolevski, Katina Michael
Professor Katina Michael
As more and more personal, enterprise and government data, services and infrastructure moves to the cloud for storage and processing, the potential for data breaches increases. Already major corporations that have outsourced some of their IT requirements to the cloud have become victims of cyber attacks. Who is responsible and how to respond to these data breaches are just two pertinent questions facing cloud computing stakeholders who have entered an agreement on cloud services. This paper reviews literature in the domain of cloud computing data breaches using a socio-technical approach. Socio-technical theory encapsulates three major dimensions- the social, the technical, …
Keynote: Justifying Uberveillance- The Internet Of Things And The Flawed Sustainability Premise, Katina Michael
Keynote: Justifying Uberveillance- The Internet Of Things And The Flawed Sustainability Premise, Katina Michael
Professor Katina Michael
Imagine a world where everything was numbered. Not just homes with street addresses, or cars with number plates, or smart phones with telephone numbers, or email addresses with passwords, but absolutely everything you could see and touch and even that which you could not. Well, that world is here, right now. This vast expanse we call “Earth” is currently being quantified and photographed, inch by inch, by satellites, street cameras, drones and high altitude balloons. Longitude and latitude coordinates provide us with the precise degrees, minutes and seconds of the physical space, and unique time stamps tell us where a …
Could Biometrics Give Us A World Without Passwords?, Katina Michael, Natasha Mitchell
Could Biometrics Give Us A World Without Passwords?, Katina Michael, Natasha Mitchell
Professor Katina Michael
What's your strategy for keeping all the passwords in your life both readily available and secure? Do you replace letters with numbers in words you won't forget? Do you cycle through days of the week? Months of the year? Seasons? Pets you once had? What if it was possible to live in a world without passwords? There are many new ways to verify your identity that don't require passwords: wearables, tokens, epidermal electronic, implantables and biometrics. So what might our lives look like without passwords? And is that reality even desirable?
Social And Economic Sustainability, Jason Sargent, Khanjan Mehta, Katina Michael
Social And Economic Sustainability, Jason Sargent, Khanjan Mehta, Katina Michael
Professor Katina Michael
But what about long-term stability in developing nations? For example, as we strive to mainstream alternate energy sources and make them accessible in resource poor communities [ ], how do we think beyond the technological and economic dimensions and ensure respect for social, political and environmental imperatives? Computers, including the tiny but powerful ones on cell phones can be game-changers, but they will not save lives directly. They cannot be eaten by a starving population. And then, they need to be serviced and maintained. Jason, along with Katina’s husband Michael, visited and taught Karen refugee students in camps and remote …