Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 26 of 26

Full-Text Articles in Entire DC Network

Location Data, Purpose Binding And Contextual Integrity: What's The Message, Mireille Hildebrandt Jan 2014

Location Data, Purpose Binding And Contextual Integrity: What's The Message, Mireille Hildebrandt

Mireille Hildebrandt

This chapter investigates the issue of the proliferation of location data in the light of the ethical concept of contextual integrity and the legal concept of purpose binding. This involves an investigation of both concepts as side constraints on the free flow of information, entailing a balancing act between the civil liberties of individual citizens and the free flow of information. To tackle the issue the chapter starts from Floridi’s proposition that ‘communication means exchanging messages. So even the most elementary act of communication involves four elements: a sender, a receiver, a message, and a referent of the message’ and …


The Social Implications Of Covert Policing, Simon Bronitt, Clive Harfield, K. Michael Feb 2013

The Social Implications Of Covert Policing, Simon Bronitt, Clive Harfield, K. Michael

Clive Harfield

Police agencies have been accused of suffering from an acute form of technophilia. Rather than representing some dreadful disorder, this assessment reflects the strong imperative, both in police agencies and the wider community, that police must have access to the latest technologies of surveillance and crime detection.

The last decade has witnessed the proliferation of low-cost surveillance technologies, some developed specifically for law enforcement purposes. Technology once the preserve of the military or secret intelligence agencies is now within the reach of ordinary general duties police officers. The new generation of police recruits is highly adept at using new technologies. …


Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke Dec 2012

Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke

Professor Katina Michael

During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …


The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael Dec 2012

The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael

Professor Katina Michael

Microchip implants for humans are not new. Placing heart pacemakers in humans for prosthesis is now considered a straightforward procedure. In more recent times we have begun to use brain pacemakers for therapeutic purposes to combat illnesses such as epilepsy, Parkinson’s Disease, and severe depression. Microchips are even being placed inside prosthetic knees and hips during restorative procedures to help in the gathering of post-operative analytics that can aid rehabilitation further. While medical innovations that utilise microchips abound, over the last decade we have begun to see the potential use of microchip implants for non-medical devices in humans, namely for …


Glogging Your Every Move, Lisa Wachsmuth, Katina Michael Nov 2012

Glogging Your Every Move, Lisa Wachsmuth, Katina Michael

Professor Katina Michael

"It is one thing to lug technologies around, another thing to wear them, and even more intrusive to bear them... But that's the direction in which we're headed."

"I think we're entering an era of person-view systems which will show things on ground level and will be increasingly relayed to others via social media.

"We've got people wearing recording devices on their fingers, in their caps or sunglasses - there are huge legal and ethical implications here."


Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta Apr 2012

Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta

Professor Katina Michael

The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in these trends. …


Ontologies Of The Future And Interfaces For All: Archaeological Databases For The 21st Century, Angela Labrador Dec 2011

Ontologies Of The Future And Interfaces For All: Archaeological Databases For The 21st Century, Angela Labrador

Angela M Labrador

Archaeological database management systems serve the basic and important functions of ordering, archiving, and disseminating archaeological data. The increased availability of computers and data storage over the past two decades has enabled the exponential growth of archaeological databases and data models. Despite their importance and ubiquity, archaeological database systems are rarely the subject of theoretical analysis within the discipline due to their ‘‘black box’’ nature and the perceived objectivity of computerized systems. Inspired by H. Martin Wobst’s meditations on materiality and disciplinary ethics, in this paper I explore how archaeological database systems structure archaeological interpretation and disciplinary practice. In turn, …


Implementing Namebers Using Microchip Implants: The Black Box Beneath The Skin, Katina Michael, M.G. Michael Dec 2011

Implementing Namebers Using Microchip Implants: The Black Box Beneath The Skin, Katina Michael, M.G. Michael

Associate Professor Katina Michael

The use of electronic-based physical access cards to secure premises such as government buildings and large corporate offices has been in operation since the inception of bar code and magnetic-stripe cards in the 1970s. Over time, for secure access control, these first generation card technologies based on optical character recognition (OCR) and magnetic ink character recognition (MICR) were replaced by more sophisticated technologies such as smart cards and biometrics, containing encrypted data and techniques which were more difficult to dupe or to replicate \cite{michael2003a}.

An employee today wanting to gain access to their place of work, typically carries a photo …


Emerging Forms Of Covert Surveillance Using Gps-Enabled Devices, Roba Abbas, Katina Michael, M.G. Michael, Anas Aloudat Jun 2011

Emerging Forms Of Covert Surveillance Using Gps-Enabled Devices, Roba Abbas, Katina Michael, M.G. Michael, Anas Aloudat

Professor Katina Michael

This paper presents the real possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non-traditional covert surveillance within a community setting, resulting in community members engaging in the covert observation of family, friends, or acquaintances. This paper investigates five stakeholder relationships using scenarios to demonstrate the potential socio-ethical implications that tracking and monitoring people will have on society at large. The five stakeholder types explored in this paper include: (i) husband-wife (partner-partner), (ii) parent-child, (iii) employer-employee, (iv) friend-friend, and (v) stranger-stranger. Mobile technologies such as mobile camera phones, global positioning system data loggers, …


An Interview With Mr Peter Mahy Of Howells Llp Who Represented S And Marper At The European Court Of Human Rights, Katina Michael, Peter Mahy Dec 2010

An Interview With Mr Peter Mahy Of Howells Llp Who Represented S And Marper At The European Court Of Human Rights, Katina Michael, Peter Mahy

Associate Professor Katina Michael

Mr Peter Mahy, Partner at Howells LLP and the lawyer who represented S & Marper in front of the Grand Chamber at the European Court of Human Rights was interviewed by Katina Michael on the 10th of October 2009 while she was studying towards a Masters of Transnational Crime Prevention in the Faculty of Law at the University of Wollongong. In 2010 Peter Mahy received the Legal Aid Lawyer of the Year award for his contribution to the field. Mahy received his honours law degree from Sheffield University and a Masters in Criminology from the University of Cambridge. He did …


The European Court Of Human Rights Ruling Against The Policy Of Keeping Fingerprints And Dna Samples Of Criminal Suspects In Britain, Wales And Northern Ireland: The Case Of S. And Marper V United Kingdom, Katina Michael Dec 2010

The European Court Of Human Rights Ruling Against The Policy Of Keeping Fingerprints And Dna Samples Of Criminal Suspects In Britain, Wales And Northern Ireland: The Case Of S. And Marper V United Kingdom, Katina Michael

Associate Professor Katina Michael

In England, Wales and Northern Ireland, the Police and Criminal Evidence Act 1984 (the PACE) contained powers for the taking of fingerprints, and samples in the form of deoxyribonucleic acid (DNA). In 2001, Section 64(1A) of the PACE was substituted with Section 82 of the Criminal Justice and Police Act. The change to legislation meant that a suspect of a crime would have their fingerprints and samples permanently stored on the police national computer (PNC) even after having been acquitted. This paper critically analyses the circumstances of the landmark case of S. AND MARPER V. THE UNITED KINGDOM in two …


The Social Implications Of Covert Policing, Simon Bronitt, Clive Harfield, K. Michael Dec 2010

The Social Implications Of Covert Policing, Simon Bronitt, Clive Harfield, K. Michael

Professor Katina Michael

Police agencies have been accused of suffering from an acute form of technophilia. Rather than representing some dreadful disorder, this assessment reflects the strong imperative, both in police agencies and the wider community, that police must have access to the latest technologies of surveillance and crime detection.

The last decade has witnessed the proliferation of low-cost surveillance technologies, some developed specifically for law enforcement purposes. Technology once the preserve of the military or secret intelligence agencies is now within the reach of ordinary general duties police officers. The new generation of police recruits is highly adept at using new technologies. …


Demonstrating The Potential For Covert Policing In The Community: Five Stakeholder Scenarios, Roba Abbas, Katina Michael, M.G. Michael Dec 2010

Demonstrating The Potential For Covert Policing In The Community: Five Stakeholder Scenarios, Roba Abbas, Katina Michael, M.G. Michael

Professor Katina Michael

This paper presents the real possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non traditional covert policing within a community setting, resulting in community members engaging in covert policing of family, friends, or acquaintances. This paper investigates five stakeholder relationships using scenarios to demonstrate the potential socio-ethical implications that tracking and monitoring people will have on society at large. The five stakeholder types explored in this paper include: (i) husband-wife (partner-partner), (ii) parent-child, (iii) employer-employee, (iv) friend-friend, and (v) stranger-stranger. Mobile technologies such as mobile camera phones, global positioning system data loggers, …


The Socio-Ethical Considerations Surrounding Government Mandated Location-Based Services During Emergencies: An Australian Case Study, Anas Aloudat, K. Michael Sep 2010

The Socio-Ethical Considerations Surrounding Government Mandated Location-Based Services During Emergencies: An Australian Case Study, Anas Aloudat, K. Michael

Associate Professor Katina Michael

The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility to their citizens to safeguard them against both natural and human-made …


Towards A State Of Uberveillance, M.G. Michael, K. Michael Jun 2010

Towards A State Of Uberveillance, M.G. Michael, K. Michael

Associate Professor Katina Michael

Überveillance is an emerging concept, and neither its application nor its power have yet fully arrived [38]. For some time, Roger Clarke’s [12, p. 498] 1988 dataveillance concept has been prevalent: the “systematic use of personal data systems in the investigation or monitoring of the actions of one or more persons.” Almost twenty years on, technology has developed so much and the national security context has altered so greatly [52], that there is a pressing need to formulate a new term to convey both the resent reality, and the Realpolitik (policy primarily based on power) of our times. However, if …


Towards A State Of Uberveillance, M.G. Michael, K. Michael Jun 2010

Towards A State Of Uberveillance, M.G. Michael, K. Michael

M. G. Michael

Überveillance is an emerging concept, and neither its application nor its power have yet fully arrived [38]. For some time, Roger Clarke’s [12, p. 498] 1988 dataveillance concept has been prevalent: the “systematic use of personal data systems in the investigation or monitoring of the actions of one or more persons.” Almost twenty years on, technology has developed so much and the national security context has altered so greatly [52], that there is a pressing need to formulate a new term to convey both the resent reality, and the Realpolitik (policy primarily based on power) of our times. However, if …


Ethically Notable Videogames: Moral Dilemmas And Gameplay, Jose Zagal Dec 2008

Ethically Notable Videogames: Moral Dilemmas And Gameplay, Jose Zagal

Jose P Zagal

In what ways can we use games to make moral demands of players and encouraging them to reflect on ethical issues? In this article we propose an ethically notable game as one that provides opportunities for encouraging ethical reasoning and reflection. Our analysis of the videogames Ultima IV, Manhunt, and Fire Emblem: Radiant Dawn highlights the central role that moral dilemmas can play towards creating ethically notable games. We discuss the different ways that these are implemented, such as placing players in situations in which their understanding of an ethical system is challenged, or by creating moral tension between the …


Überveillance: 24/7 X 365 People Tracking & Monitoring, Mg. Michael, K. Michael Jul 2008

Überveillance: 24/7 X 365 People Tracking & Monitoring, Mg. Michael, K. Michael

Associate Professor Katina Michael

No abstract provided.


Überveillance: 24/7 X 365 People Tracking & Monitoring, Mg. Michael, K. Michael Jul 2008

Überveillance: 24/7 X 365 People Tracking & Monitoring, Mg. Michael, K. Michael

M. G. Michael

No abstract provided.


The Social Implications Of Humancentric Chip Implants: A Scenario - ‘Thy Chipdom Come, Thy Will Be Done’, Rodney Ip, Katina Michael, M G. Michael May 2008

The Social Implications Of Humancentric Chip Implants: A Scenario - ‘Thy Chipdom Come, Thy Will Be Done’, Rodney Ip, Katina Michael, M G. Michael

Professor Katina Michael

Radio frequency identification (RFID) chip implants for humans are no longer the tales of science fiction. Already preliminary findings have shown that the number of people willing to get chipped has increased since the technology’s commercial arrival in 2002, despite the fact that adoption rates have been very low. This investigation presents three case studies of the main users/ innovators of humancentric chip implants. The first case is of a British researcher in an academic institution who has conducted several implant experiments; the second case, is of a hobbyist and entrepreneur who has focused on the use of RFID implants …


A Research Note On Ethics In The Emerging Age Of Überveillance, M. G. Michael, Sarah Jean Fusco, Katina Michael May 2008

A Research Note On Ethics In The Emerging Age Of Überveillance, M. G. Michael, Sarah Jean Fusco, Katina Michael

Professor Katina Michael

Advanced location-based services (A-LBS) for humancentric tracking and monitoring are now emerging as operators and service providers begin to leverage their existing infrastructure and invest in new technologies, toward increasingly innovative location application solutions. We can now point to humancentric tracking and monitoring services where the person (i.e. subject) has become an active node in the network. For example, in health applications through the use of embedded technologies such as radio-frequency identification (RFID) or in campus applications through the use of electronic monitoring techniques in the form of global positioning systems (GPS). These technologies, for the greater part, have been …


Microchip Implants For Humans As Unique Identifiers: A Case Study On Verichip, Katina Michael, M G. Michael, Rodney Ip May 2008

Microchip Implants For Humans As Unique Identifiers: A Case Study On Verichip, Katina Michael, M G. Michael, Rodney Ip

Professor Katina Michael

Microchip implants for humans are not new. The installation of pacemakers in humans and a great number of other medical innovations for prosthesis are now considered straightforward procedures. Today we have even realised the potential for microchip implants to be embedded inside the body of humans for the purpose of acting as unique lifetime identifiers (ULI). Tiny radiofrequency identification (RFID) devices are now being utilised to store a unique 16-digit identification number.


Location-Based Services And The Privacy-Security Dichotomy, Katina Michael, L. Perusco, M G. Michael May 2008

Location-Based Services And The Privacy-Security Dichotomy, Katina Michael, L. Perusco, M G. Michael

Professor Katina Michael

Location-based services (LBS) rely on knowledge of a user’s location to provide tailored services or information by means of a wireless device. LBS applications have wide-ranging implications for society, particularly in the context of tracking and monitoring groups of individuals such as children, invalids, and parolees. Despite a great deal of attention paid to technical and commercial aspects of LBS technologies, consideration of the legal, ethical, social and technology momentum issues involved has been wanting. This paper examines some of the more pressing issues that are expected to arise from the widespread use of LBS. The outcome of this paper …


The Emerging Ethics Of Humancentric Gps Tracking And Monitoring, Katina Michael, Andrew Mcnamee, M G. Michael May 2008

The Emerging Ethics Of Humancentric Gps Tracking And Monitoring, Katina Michael, Andrew Mcnamee, M G. Michael

Professor Katina Michael

The Global Positioning System (GPS) is increasingly being adopted by private and public enterprise to track and monitor humans for location-based services (LBS). Some of these applications include personal locators for children, the elderly or those suffering from Alzheimer’s or memory loss, and the monitoring of parolees for law enforcement, security or personal protection purposes. The continual miniaturization of the GPS chipset means that receivers can take the form of wristwatches, mini mobiles and bracelets, with the ability to pinpoint the longitude and latitude of a subject 24/7/365. This paper employs usability context analyses to draw out the emerging ethical …


Location-Based Intelligence – Modeling Behavior In Humans Using Gps, Katina Michael, Andrew Mcnamee, M G. Michael, Holly Tootell May 2008

Location-Based Intelligence – Modeling Behavior In Humans Using Gps, Katina Michael, Andrew Mcnamee, M G. Michael, Holly Tootell

Professor Katina Michael

This paper introduces the notion of location-based intelligence by tracking the spatial properties and behavior of a single civilian participant over a two-week study period using a global positioning system (GPS) receiver, and displaying them on a geographic information system (GIS). The paper clearly shows the power of combining speed (S), distance (D), time (T) and elevation (E) data with the exact longitude and latitude position of the user. The issues drawn from the observation and the civilian’s personal diary are useful in understanding the social implications of tracking and monitoring objects and subjects using GPS. The findings show that …


Australia's National Security: An Interview With Dr Katina Michael, G. Messaris, K. Michael May 2006

Australia's National Security: An Interview With Dr Katina Michael, G. Messaris, K. Michael

Professor Katina Michael

No abstract provided.