Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Business

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael Dec 2012

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael

Associate Professor Katina Michael

The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …


Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael Oct 2012

Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael

Associate Professor Katina Michael

This mixed methods study with a sequential explanatory strategy explored qualitatively the statistically significant quantitative findings relative to Indian respondents’ perceptions about RFID (radio frequency identification) transponders implanted into the human body. In the first analysis phase of the study, there was a significant chi-square analysis reported (χ2 = 56.64, df = 3, p = .000) relative to the perception of small business owners (N = 453) that implanted chips are a more secure form of identification and/or access control in organizations and the respondents’ country of residence. Countries under study included Australia, India, the UK and US. The country …


The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei Jul 2012

The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei

Associate Professor Katina Michael

The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …


Commentary On: Mann, Steve (2012): Wearable Computing, Katina Michael, M.G. Michael Apr 2012

Commentary On: Mann, Steve (2012): Wearable Computing, Katina Michael, M.G. Michael

Associate Professor Katina Michael

In Professor Steve Mann- inventor, physicist, engineer, mathematician, scientist, designer, developer, project director, filmmaker, artist, instrumentalist, author, photographer, actor, activist- we see so much of the paradigmatic classical Greek philosopher. I recall asking Steve if technology shaped society or society shaped technology. He replied along the lines that the question was superfluous. Steve instead pointed to praxis, from which all theory, lessons or skills stem, are practiced, embodied and realized. Steve has always been preoccupied by the application of his ideas into form. In this way too, he can be considered a modern day Leonardo Da Vinci.


Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael Apr 2012

Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael

Associate Professor Katina Michael

With so much buzz around Cloud Computing, books like this one written by Winkler are much in demand. Winkler’s experience in the computing business shines through and as readers we are spoiled with a great deal of useful strategic information- a jam packed almost 300 page volume on securing the cloud.


In Memoriam: Associate Professor Dr Elaine Lawrence, Katina Michael Apr 2012

In Memoriam: Associate Professor Dr Elaine Lawrence, Katina Michael

Associate Professor Katina Michael

Despite being a graduate of the rigorous Bachelor of Information Technology at the University of Technology, Sydney (UTS) in 1996, I was unfortunate in that I missed being taught by Associate Professor Elaine Lawrence who began working at UTS in 1990 as a Lecturer in Computing Science. Dr Lawrence became a senior lecturer in 2000, and subsequently an associate professor in 2006. Our paths crossed in 2002 when I was tasked to deliver a new course entitled “eBusiness Principles” in my first year of lecturing at the University of Wollongong, and after an initial scurry to find an adequate textbook, …


Sousveillance And The Social Implications Of Point Of View Technologies In The Law Enforcement Sector, Katina Michael, M.G. Michael Feb 2012

Sousveillance And The Social Implications Of Point Of View Technologies In The Law Enforcement Sector, Katina Michael, M.G. Michael

Associate Professor Katina Michael

Policing today has become a high-tech affair; especially in the provision of incident event tracking and reporting systems increasingly being used to provide evidence in a court of law. These in-car video (ICV) and body worn recording systems are said to increase convictions and eliminate false claims made by defendants, providing documentary support to police officers and their associated actions in an incident. But today, new technologies such as smart phones equipped with cameras and global positioning system chipsets can also be found in the hands of the everyday citizen, used to capture everyday happenings and distributed to social networks …


Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael Jan 2012

Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael

Associate Professor Katina Michael

In an age of outsourcing tasks that are not considered to be a core competency of the business, organisations have often relied on external consultants for matters pertaining to security. In actual fact, most companies could have utilized existing skill-sets in-house to produce a security risk management program, if only they knew what steps to take, and how to go about it all. Evan Wheeler in his book on information security risk management does just that- he equips professionals tasked with security, with the thinking required to create a program that is more preoccupied with the complex strategic-level questions than …


Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke Jan 2012

Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke

Associate Professor Katina Michael

Location tracking and monitoring applications have proliferated with the arrival of smart phones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smart phone user down to 10 metres of accuracy on average. Innovators have been quick to capitalise on this emerging market by introducing novel pedestrian tracking technologies which can denote the geographic path of a mobile user. At the same time there is contention by law enforcement personnel over the need for a warrant process to track an individual in a public space. This paper considers the future of location …


The Social And Behavioral Implications Of Location-Based Services, Katina Michael, M.G. Michael Nov 2011

The Social And Behavioral Implications Of Location-Based Services, Katina Michael, M.G. Michael

Associate Professor Katina Michael

The social and behavioral implications of location-based services (LBS) are only now beginning to come to light in advanced markets where the services have been adopted by just a little over half the market (Microsoft 2011). Depending on one’s definition of what constitutes location-based services, statistics on the level of adoption differ considerably. While it is helpful to provide as broad a list of applications as possible in what constitutes LBS (e.g. everything from in-vehicle navigation systems to downloading a map using a computer), it can also cloud the real picture forming behind this emerging technology. Emerging not in the …


E-Government Challenge In Disaster Evacuation Response: The Role Of Rfid Technology In Building Safe And Secure Local Communities, A. Chatfield, S. F. Wamba, T. Hirokazu Jan 2010

E-Government Challenge In Disaster Evacuation Response: The Role Of Rfid Technology In Building Safe And Secure Local Communities, A. Chatfield, S. F. Wamba, T. Hirokazu

Faculty of Informatics - Papers (Archive)

While geographic information systems (GIS) can provide information on the static locations of critical infrastructure and evacuation routes, they do not provide the dynamically changing locations of things and people on the move. In contrast, radio frequency identification (RFID) wireless network technology can automatically identify and track the movement of assets (i.e., fire engines, ambulances, and rescue workers) and vulnerable citizens on the move (i.e., the elderly and the disabled), and hence providing local governments and communities with real-time information and enhanced decision-making capabilities, during chaotic disaster response operations (i.e., evacuation). Although the potential high impact and strategic value of …


Rfid-Enabled Warehouse Process Optimization In The Tpl Industry, S. F. Wamba, A. T. Chatfield Jan 2010

Rfid-Enabled Warehouse Process Optimization In The Tpl Industry, S. F. Wamba, A. T. Chatfield

Faculty of Informatics - Papers (Archive)

Using the value chain model and a longitudinal real-world case study of a third-party logistics (TPL) supply chain, this study provides support for the enabling role of RFID technology in effecting warehouse process optimization. Furthermore, the findings of our study reveal the RFID technology implementation costs as the key inhibitors factor of RFID widespread adoption and usage among suppliers.


Rfid-Enabled Warehouse Optimization: Lessons From Early Adopters In The 3pl Industry, S. F. Wamba, T. R. Coltman, Katina Michael Dec 2008

Rfid-Enabled Warehouse Optimization: Lessons From Early Adopters In The 3pl Industry, S. F. Wamba, T. R. Coltman, Katina Michael

Faculty of Informatics - Papers (Archive)

This paper presents the impact of RFID technology on the picking and shipping processes of one RFID-enabled warehouse in the 3PL industry. The findings from our study confirm initial results from many studies where RFID implementation has been shown to enable business process redesign, improve data quality, real-time data collection and synchronization and enhance system integration. In this study we show that the full potential of RFID technology is dependent upon the involvement of all supply chain members involved in implementation. Moreover, firms considering implementing RFID technology need to take into account their investment in complementary assets such as employee …


An Information System Design Theory For And Rfid University-Based Laboratory, S. F. Wamba, Katina Michael Oct 2008

An Information System Design Theory For And Rfid University-Based Laboratory, S. F. Wamba, Katina Michael

Faculty of Informatics - Papers (Archive)

RFID technology is defined as a wireless automatic identification and data capture (AIDC) technology and is considered as “the next big thing” in the management and “the next revolution in supply chain”. Recently, the topic has attracted the interest of the industrial community as well as the scientific community. Following this tendency, this paper applies an Information Systems Design Theory (ISDT) for an RFID-based University Laboratory. For practitioners, the paper provides some insights into the set-up and use of RFID laboratory in university settings, and at the same time, it offers a set of hypotheses that can be empirically tested.


Understanding The Impact Of Emerging Technologies On Process Optimization: The Case Of Rfid Technology, S. F. Wamba, Y. Bendavid Jul 2008

Understanding The Impact Of Emerging Technologies On Process Optimization: The Case Of Rfid Technology, S. F. Wamba, Y. Bendavid

Faculty of Informatics - Papers (Archive)

This paper examines the case of one supply chain in the electricity sector where RFID technology integrated with firm’s information systems acts as an enabler of process optimization. Using a business process approach and laboratory simulation, we explain how the implementation of RFID technology can increase the visibility of information at various layers of the supply chain, allowing members to gather precise information on real demand and improve replenishment processes. On the other hand, while RFID technology has the potential to automate some processes, human intervention is still required. Therefore, use case scenarios and sensitivity analysis should be carefully considered …


From Automatic Identification And Data Capture (Aidc) To “Smart Business Process”: Preparing For A Pilot Integrating Rfid, S. F. Wamba, E. Lefebvre, Y. Bendavid, L.. A. Lefebvre Jan 2008

From Automatic Identification And Data Capture (Aidc) To “Smart Business Process”: Preparing For A Pilot Integrating Rfid, S. F. Wamba, E. Lefebvre, Y. Bendavid, L.. A. Lefebvre

Faculty of Informatics - Papers (Archive)

This paper examines the underlying logic behind the rules configured in a RFID middleware to support “smart business processes” in one retail supply chain. Through a detailed investigation of the underlying business processes, we will demonstrate how businesses rules can be defined, configured and refined in a RFID middleware. The results confirm that RFID technology is not a “Plug and Play” solution. RFID middleware configuration will require a high level of customization. Finally, this study allows the improvement of our understanding of the real potential of RFID technology in the supply chain context.


The Politics Of Discourse: Marketization Of The New Zealand Science And Innovation System, S. R. Leitch, S. Davenport Jan 2005

The Politics Of Discourse: Marketization Of The New Zealand Science And Innovation System, S. R. Leitch, S. Davenport

Faculty of Commerce - Papers (Archive)

The politics of change are both played out within the arena of discourse and dedicated to transforming that arena. In this article, we bring together critical discourse theory and political process theory in order to highlight the ways in which a process of discourse transformation can be deployed by organisations to effect political and economic change. In the process we examine the discursive interplay between the actors as well as the discursive constraints on action. The context for our analysis was the attempt by a national science funding body to transform the New Zealand discourse of science and innovation in …


Determinants Of The Adoption Of Customer-Oriented Mobile Commerce Initiatives, Léger Pierre-Majorique, Luc Cassivi, S. F. Wamba Apr 2004

Determinants Of The Adoption Of Customer-Oriented Mobile Commerce Initiatives, Léger Pierre-Majorique, Luc Cassivi, S. F. Wamba

Faculty of Informatics - Papers (Archive)

This paper investigates organizations implementing mobile commerce initiatives. Mobile commerce (m-commerce) is defined as the wireless B2B and B2C exchange of operational and financial data within a supply chain. Based on a survey conducted with 159 Canadian and Scandinavian executive managers, this paper tests several theoretical determinants of customer-oriented m-commerce initiatives. Results indicate that i) the adoption of electronic commerce is a strong determinant for the adoption of m-commerce initiatives, ii) software firms are more inclined to adopt m-commerce initiatives, iii) firm size does not influence the adoption of mobile commerce, and iv) contrary to expectations, firms focusing on B2C …