Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Professor Katina Michael

Selected Works

2010

Privacy

File Type

Articles 1 - 3 of 3

Full-Text Articles in Physical Sciences and Mathematics

The Social Implications Of Covert Policing, Simon Bronitt, Clive Harfield, K. Michael Dec 2010

The Social Implications Of Covert Policing, Simon Bronitt, Clive Harfield, K. Michael

Professor Katina Michael

Police agencies have been accused of suffering from an acute form of technophilia. Rather than representing some dreadful disorder, this assessment reflects the strong imperative, both in police agencies and the wider community, that police must have access to the latest technologies of surveillance and crime detection.

The last decade has witnessed the proliferation of low-cost surveillance technologies, some developed specifically for law enforcement purposes. Technology once the preserve of the military or secret intelligence agencies is now within the reach of ordinary general duties police officers. The new generation of police recruits is highly adept at using new technologies. …


Demonstrating The Potential For Covert Policing In The Community: Five Stakeholder Scenarios, Roba Abbas, Katina Michael, M.G. Michael Dec 2010

Demonstrating The Potential For Covert Policing In The Community: Five Stakeholder Scenarios, Roba Abbas, Katina Michael, M.G. Michael

Professor Katina Michael

This paper presents the real possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non traditional covert policing within a community setting, resulting in community members engaging in covert policing of family, friends, or acquaintances. This paper investigates five stakeholder relationships using scenarios to demonstrate the potential socio-ethical implications that tracking and monitoring people will have on society at large. The five stakeholder types explored in this paper include: (i) husband-wife (partner-partner), (ii) parent-child, (iii) employer-employee, (iv) friend-friend, and (v) stranger-stranger. Mobile technologies such as mobile camera phones, global positioning system data loggers, …


Social-Technical Issues Facing The Humancentric Rfid Implantee Sub-Culture Through The Eyes Of Amal Graafstra, Amal Graafstra, K. Michael, M.G. Michael Jun 2010

Social-Technical Issues Facing The Humancentric Rfid Implantee Sub-Culture Through The Eyes Of Amal Graafstra, Amal Graafstra, K. Michael, M.G. Michael

Professor Katina Michael

Radio-frequency identification (RFID) tags and transponders have traditionally been used to identify domesticated animals so that they can be reunited with their owners in the event that they stray. In the late 1990s, industry started to investigate the benefits of using RFID to identifying non-living things throughout the supply chain toward new efficiencies in business operations. Not long after, people began to consider the possibilities of getting RFID tag or transponder implants for themselves. Mr Amal Graafstra of the United States is one of the first, and probably most well-known ‘do it yourselfer’ (DIY) implantees, who enjoys building customized projects …