Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Nebraska - Lincoln (90)
- Selected Works (13)
- University of Wollongong (10)
- World Maritime University (4)
- Purdue University (2)
-
- American University in Cairo (1)
- California Polytechnic State University, San Luis Obispo (1)
- California State University, San Bernardino (1)
- Chinese Academy of Sciences (1)
- Embry-Riddle Aeronautical University (1)
- San Jose State University (1)
- SelectedWorks (1)
- University of Southern Maine (1)
- University of Tennessee, Knoxville (1)
- Keyword
-
- Emerging Technologies (9)
- National Security (8)
- Social Implications of ICT (8)
- Location-Based Services (7)
- Privacy (7)
-
- Uberveillance (7)
- Security (5)
- Surveillance (5)
- Ethics (4)
- Policing (4)
- Technology (4)
- Emergency Management (3)
- Information Security (3)
- LBS (3)
- Law (3)
- Location-based services (3)
- M-Business (3)
- Monitoring (3)
- Risk (3)
- Tracking (3)
- Emergencies (2)
- Emergency alert (2)
- Emergency service organisations (2)
- GPS (2)
- Global Positioning Systems (2)
- History (2)
- Implants (2)
- Interception (2)
- Location (2)
- People (2)
- Publication Year
- Publication
-
- Department of Defense Military Intelligence (88)
- Professor Katina Michael (12)
- Associate Professor Katina Michael (10)
- Maritime Safety & Environment Management Dissertations (Dalian) (3)
- Articles (1)
-
- Bulletin of Chinese Academy of Sciences (Chinese Version) (1)
- Department of Civil and Environmental Engineering: Faculty Publications (1)
- Dr. Mutaz M. Al-Debei (1)
- Durham School of Architectural Engineering and Construction: Faculty Publications (1)
- Faculty Publications (1)
- Faculty Publications and Other Works -- Chemical and Biomolecular Engineering (1)
- International Bulletin of Political Psychology (1)
- Journal of International Technology and Information Management (1)
- Libraries Faculty and Staff Scholarship and Research (1)
- M. G. Michael (1)
- Maine Collection (1)
- Master's Theses (1)
- Purdue Polytechnic Doctoral Dissertations (1)
- Theses and Dissertations (1)
- Publication Type
Articles 1 - 30 of 128
Full-Text Articles in Other Engineering
Incentivizing Electric Vehicle Adoption Through State And Federal Policies: Reviewing Influential Policies, Joshua Sabata, Subhaditya Shom, Ahmad Almaghrebi, Anne Mccollister, Mahmoud Alahmad
Incentivizing Electric Vehicle Adoption Through State And Federal Policies: Reviewing Influential Policies, Joshua Sabata, Subhaditya Shom, Ahmad Almaghrebi, Anne Mccollister, Mahmoud Alahmad
Durham School of Architectural Engineering and Construction: Faculty Publications
All-electric vehicles (EVs), battery-powered EVs (BEVs), and plug-in hybrid EVs (PHEVS) are gaining market share and increasing in popularity with the buying public because the battery range (longer) and cost (lower) have reached sweet spots, the charging infrastructure is more robust, and concern with global climate change is high. In 2013, only 100,000 EVs were sold in the United States, but by 2022, approximately 800,000 have been purchased. A similar growth is seen in EV supply equipment (EVSE), i.e., EV charging stations, with 19,742 documented EV charging station locations in the United States in 2013 to 50,054 documented EV charging …
Critical Infrastructures For Developing Uavs’ Applications And Low-Altitude Public Air-Route Network Planning, Xiaohan Liao, Chenchen Xu, Huping Ye, Xiang Tan, Shifeng Fang, Yaohuan Huang, Jing Lin
Critical Infrastructures For Developing Uavs’ Applications And Low-Altitude Public Air-Route Network Planning, Xiaohan Liao, Chenchen Xu, Huping Ye, Xiang Tan, Shifeng Fang, Yaohuan Huang, Jing Lin
Bulletin of Chinese Academy of Sciences (Chinese Version)
Contemporary unmanned aerial vehicles (UAVs) are characterized by huge numbers, wide applications, frequent activities, and massive end-users. High standards of reliability and robustness of the software and hardware systems on board UAVs become imminent for safe operations. UAVs' operations are largely dependent on new technologies and external high-technology infrastructures. Among them, the low-altitude public air-route network is a key new type of infrastructure to ensure the safe and efficient operation of UAVs. A further research and promotion of the low-altitude "sky road" infrastructures as the core is conducive to the development of the urban air traffic network and the promotion …
Research On Navigation Efficiency Of Lng Carriers In Caofeidian Port Area, Zhongming Xiao
Research On Navigation Efficiency Of Lng Carriers In Caofeidian Port Area, Zhongming Xiao
Maritime Safety & Environment Management Dissertations (Dalian)
No abstract provided.
Maritime Robotics And Autonomous Systems Operations: Exploring Pathways For Overcoming International Techno-Regulatory Data Barriers, Tafsir Martin Johansson, Dimitrios Dalaklis, Aspasia Pastra
Maritime Robotics And Autonomous Systems Operations: Exploring Pathways For Overcoming International Techno-Regulatory Data Barriers, Tafsir Martin Johansson, Dimitrios Dalaklis, Aspasia Pastra
Articles
The current regulatory landscape that applies to maritime service robotics, aptly termed as robotics and autonomous systems (RAS), is quite complex. When it comes to patents, there are multifarious considerations in relation to vessel survey, inspection, and maintenance processes under national and international law. Adherence is challenging, given that the traditional delivery methods are viewed as unsafe, strenuous, and laborious. Service robotics, namely micro aerial vehicles (MAVs) or drones, magnetic-wheeled crawlers (crawlers), and remotely operated vehicles (ROVs), function by relying on the architecture of the Internet of Robotic Things. The aforementioned are being introduced as time-saving apparatuses, accompanied by the …
Research On The Collision Risk Of Ships In Chengshanjiao Water Based On Svm, Ziming Li
Research On The Collision Risk Of Ships In Chengshanjiao Water Based On Svm, Ziming Li
Maritime Safety & Environment Management Dissertations (Dalian)
No abstract provided.
The Cost Of Jaywalking On Traffic Congestion In An Intersection In Greater Cairo: A Case Study, Hussein Gawdat
The Cost Of Jaywalking On Traffic Congestion In An Intersection In Greater Cairo: A Case Study, Hussein Gawdat
Theses and Dissertations
There have been many studies focusing on different types of traffic delays, pedestrians’ interaction at signalized intersections and economic losses as a result of these delays. However, there is a huge gap in the current literature, regionally and globally, in studying the traffic delays associated with jaywalking. In Egypt, jaywalking is considered a common phenomenon, however, population increased drastically over the past decades in Greater Cairo leading to more congested streets. This research provides a case study that investigates the economic effect of jaywalking on traffic flow in Mashaal, a sample location in Greater Cairo, due to traffic congestion. The …
Examining Accident Reports Involving Autonomous Vehicles In California, Francesca Favaro, Nazanin Nader, Sky Eurich, Michelle Tripp, Naresh Varadaraju
Examining Accident Reports Involving Autonomous Vehicles In California, Francesca Favaro, Nazanin Nader, Sky Eurich, Michelle Tripp, Naresh Varadaraju
Faculty Publications
Autonomous Vehicle technology is quickly expanding its market and has found in Silicon Valley, California, a strong foothold for preliminary testing on public roads. In an effort to promote safety and transparency to consumers, the California Department of Motor Vehicles has mandated that reports of accidents involving autonomous vehicles be drafted and made available to the public. The present work shows an in-depth analysis of the accident reports filed by different manufacturers that are testing autonomous vehicles in California (testing data from September 2014 to March 2017). The data provides important information on autonomous vehicles accidents’ dynamics, related to the …
Technology From The Perspective Of Society And Public Interest, Chanwoon Park
Technology From The Perspective Of Society And Public Interest, Chanwoon Park
Purdue Polytechnic Doctoral Dissertations
The ultimate goals of this study were to determine ways to reconcile technology with public interest and to understand the relationship between what we know and how we feel about technology. To achieve the goals, related literatures were reviewed; the mechanism of technology development was described with empirical data; and human perception of technology was tested with a survey. The duality of technology that implied technological inherencies of technical reason and social meanings was the principle assumption of the study. Neutrality of technology becomes a myth with the presence of social meanings embodied in technology. Given the huge impact of …
Emergent Ai, Social Robots And The Law: Security, Privacy And Policy Issues, Ramesh Subramanian
Emergent Ai, Social Robots And The Law: Security, Privacy And Policy Issues, Ramesh Subramanian
Journal of International Technology and Information Management
The rapid growth of AI systems has implications on a wide variety of fields. It can prove to be a boon to disparate fields such as healthcare, education, global logistics and transportation, to name a few. However, these systems will also bring forth far-reaching changes in employment, economy and security. As AI systems gain acceptance and become more commonplace, certain critical questions arise: What are the legal and security ramifications of the use of these new technologies? Who can use them, and under what circumstances? What is the safety of these systems? Should their commercialization be regulated? What are the …
Improvement Of Wrecks Removal Mechanism In Inland Waters Of China : A Case Study On The Yangtze River, Chichao Jiang
Improvement Of Wrecks Removal Mechanism In Inland Waters Of China : A Case Study On The Yangtze River, Chichao Jiang
Maritime Safety & Environment Management Dissertations (Dalian)
No abstract provided.
A Simple Method For Estimation Of Queue Length, S. P. Anusha, Lelitha Devi Vanajakshi, Anuj Sharma
A Simple Method For Estimation Of Queue Length, S. P. Anusha, Lelitha Devi Vanajakshi, Anuj Sharma
Department of Civil and Environmental Engineering: Faculty Publications
Urban arterials are characterized by frequent intersections. Queue length and delay are the two primary measures of performance of intersection. These measures play a primary role in determining the arterial performance. This article presents a methodology to determine the number of vehicles in queue at a signalized intersection for under saturated traffic conditions. The results obtained were validated using actual values that are manually extracted. The root-mean-square error is of the range 1.3 vehicles for estimation of number of vehicles in queue. The various aspects that have to be considered in accurate estimation of performance measures are also discussed.
Pstat: Promoting Sustainable Transportation Among Teens, Jordan Bryner, Yi Ying Chin, Candice Patton, Rebekah Patton, Christopher Stanfill, Rick Wheeler, Jeffrey Keith Clark Ii, Paul Frymier, Chris Cherry, David Irick, Leon Tolbert
Pstat: Promoting Sustainable Transportation Among Teens, Jordan Bryner, Yi Ying Chin, Candice Patton, Rebekah Patton, Christopher Stanfill, Rick Wheeler, Jeffrey Keith Clark Ii, Paul Frymier, Chris Cherry, David Irick, Leon Tolbert
Faculty Publications and Other Works -- Chemical and Biomolecular Engineering
Can an innovative, team-based, hands-on design and construction project involving high school students change their attitudes and personal preferences for transportation to favor lower impact modes? This was the main question PSTAT (Promoting Sustainable Transportation Among Teens) sought to answer. Since the last decade, global climate change has fuelled increased development of alternative transportation modes that have lesser impact on the environment. However, society is not embracing the change with open arms. Therefore, there is a critical need for a paradigm shift, which could be especially timely for teen-aged students starting to adopt their own personal transportation preferences. By exposing …
Oil Industry, Bert Chapman
Oil Industry, Bert Chapman
Libraries Faculty and Staff Scholarship and Research
Provides an overview of the historical and contemporary development of the American oil industry and how it has impacted U.S. natural resources policies in the American west.
Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke
Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke
Professor Katina Michael
During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …
Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael
Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael
Professor Katina Michael
This paper investigates the introduction of location-based services by government as part of an all-hazards approach to modern emergency management solutions. Its main contribution is in exploring the determinants of an individual’s acceptance or rejection of location services. The authors put forward a conceptual model to better predict why an individual would accept or reject such services, especially with respect to emergencies. While it may be posited by government agencies that individuals would unanimously wish to accept life-saving and life-sustaining location services for their well-being, this view remains untested. The theorised determinants include: visibility of the service solution, perceived service …
The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael
The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael
Professor Katina Michael
Microchip implants for humans are not new. Placing heart pacemakers in humans for prosthesis is now considered a straightforward procedure. In more recent times we have begun to use brain pacemakers for therapeutic purposes to combat illnesses such as epilepsy, Parkinson’s Disease, and severe depression. Microchips are even being placed inside prosthetic knees and hips during restorative procedures to help in the gathering of post-operative analytics that can aid rehabilitation further. While medical innovations that utilise microchips abound, over the last decade we have begun to see the potential use of microchip implants for non-medical devices in humans, namely for …
Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael
Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael
Associate Professor Katina Michael
The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …
Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael
Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael
Associate Professor Katina Michael
This mixed methods study with a sequential explanatory strategy explored qualitatively the statistically significant quantitative findings relative to Indian respondents’ perceptions about RFID (radio frequency identification) transponders implanted into the human body. In the first analysis phase of the study, there was a significant chi-square analysis reported (χ2 = 56.64, df = 3, p = .000) relative to the perception of small business owners (N = 453) that implanted chips are a more secure form of identification and/or access control in organizations and the respondents’ country of residence. Countries under study included Australia, India, the UK and US. The country …
Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael
Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael
Professor Katina Michael
Late last year, IEEE SSIT was invited to put together a paper for the centennial edition of Proceedings of the IEEE that was published in May 2012. The paper titled, “Social Implications of Technology: The Past, the Present, and the Future,” brought together five members of SSIT with varying backgrounds, and two intense months of collaboration and exchange of ideas. I personally felt privileged to be working with Karl D. Stephan, Emily Anesta, Laura Jacobs and M.G. Michael on this project.
Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael
Professor Katina Michael
This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.
The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei
The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei
Associate Professor Katina Michael
The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …
Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat
Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat
Professor Katina Michael
Location based social networking (LBSN) applications are part of a new suite of social networking tools. LBSN is the convergence between location based services (LBS) and online social networking (OSN). LBSN applications offer users the ability to look up the location of another “friend” remotely using a smart phone, desktop or other device, anytime and anywhere. Users invite their friends to participate in LBSN and there is a process of consent that follows. This paper explores the potential impact of LBSN upon trust in society. It looks at the willingness of individuals to share their location data with family, friends, …
Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta
Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta
Professor Katina Michael
The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in these trends. …
Commentary On: Mann, Steve (2012): Wearable Computing, Katina Michael, M.G. Michael
Commentary On: Mann, Steve (2012): Wearable Computing, Katina Michael, M.G. Michael
Associate Professor Katina Michael
In Professor Steve Mann- inventor, physicist, engineer, mathematician, scientist, designer, developer, project director, filmmaker, artist, instrumentalist, author, photographer, actor, activist- we see so much of the paradigmatic classical Greek philosopher. I recall asking Steve if technology shaped society or society shaped technology. He replied along the lines that the question was superfluous. Steve instead pointed to praxis, from which all theory, lessons or skills stem, are practiced, embodied and realized. Steve has always been preoccupied by the application of his ideas into form. In this way too, he can be considered a modern day Leonardo Da Vinci.
Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael
Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael
Associate Professor Katina Michael
With so much buzz around Cloud Computing, books like this one written by Winkler are much in demand. Winkler’s experience in the computing business shines through and as readers we are spoiled with a great deal of useful strategic information- a jam packed almost 300 page volume on securing the cloud.
Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael
Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael
Professor Katina Michael
Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.
In Memoriam: Associate Professor Dr Elaine Lawrence, Katina Michael
In Memoriam: Associate Professor Dr Elaine Lawrence, Katina Michael
Associate Professor Katina Michael
Despite being a graduate of the rigorous Bachelor of Information Technology at the University of Technology, Sydney (UTS) in 1996, I was unfortunate in that I missed being taught by Associate Professor Elaine Lawrence who began working at UTS in 1990 as a Lecturer in Computing Science. Dr Lawrence became a senior lecturer in 2000, and subsequently an associate professor in 2006. Our paths crossed in 2002 when I was tasked to deliver a new course entitled “eBusiness Principles” in my first year of lecturing at the University of Wollongong, and after an initial scurry to find an adequate textbook, …
The Technological Trajectory Of The Automatic Identification Industry: The Application Of The Systems Of Innovation (Si) Framework For The Characterisation And Prediction Of The Auto-Id Industry, Katina Michael
Professor Katina Michael
Traditionally the approach used to analyse technological innovation focused on the application of the techno-economic paradigm with the production function as its foundation. This thesis explores the rise of the evolutionary paradigm as a more suitable conceptual approach to investigating complex innovations like automatic identification (auto-ID) devices. Collecting and analysing data for five auto-ID case studies, (bar codes, magnetic-stripe cards, smart cards, biometrics and RF/ID transponders), it became evident that a process of migration, integration and convergence is happening within the auto-ID technology system (TS). The evolution of auto-ID is characterised by a new cluster of innovations, primarily emerging through …
Integrating Value-Driven Feedback And Recommendation Mechanisms Into Business Intelligence Systems, Byron Keating, Tim Coltman, Michael Katina, Valeria Baker
Integrating Value-Driven Feedback And Recommendation Mechanisms Into Business Intelligence Systems, Byron Keating, Tim Coltman, Michael Katina, Valeria Baker
Professor Katina Michael
Most leading organizations, in all sectors of industry, commerce and government are dependent upon
ERP for their organizational survival. Yet despite the importance of the decision to adopt ERP and its
impact on the entire firm’s performance the IT literature has been in the large part silent on the nature
of the ERP investment decision. This study is the first of its kind to determine the preference structure
of senior managers around the organizational benefits and risks of adopting ERP. We present the
results which provide interesting insights into how managers’ perceive the benefit and risk factors
salient to the …
Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt
Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt
Professor Katina Michael
Law disciplines technology, though it does so in a partial and incomplete way as reflected in the old adage that technology outstrips the capacity of law to regulate it. The rise of new technologies poses a significant threat to human rights – the pervasive use of CCTV (and now mobile CCTV), telecommunications interception, and low-cost audio-visual recording and tracking devices (some of these discreetly wearable), extend the power of the state and corporations significantly to intrude into the lives of citizens.