Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Physical Sciences and Mathematics

Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael Jun 2012

Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael

Professor Katina Michael

Tracking and monitoring people as they operate within their personal networks benefits service providers and their constituents but involves hidden risks and costs.

Automatic identification technologies, CCTV cameras, pervasive and mobile networks, wearable computing, location-based services and social networks have traditionally served distinct purposes. However, we have observed patterns of integration, convergence and coexistence among all these innovations within the information and communication technology industry.1For example, ‘location-based social networking’ can draw on a smart phone's capacity to identify a user uniquely, locate him within 1–2m and share this information across his social network in real time. The resulting ability to …


Emerging Forms Of Covert Surveillance Using Gps-Enabled Devices, Roba Abbas, Katina Michael, M.G. Michael, Anas Aloudat Jun 2011

Emerging Forms Of Covert Surveillance Using Gps-Enabled Devices, Roba Abbas, Katina Michael, M.G. Michael, Anas Aloudat

Professor Katina Michael

This paper presents the real possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non-traditional covert surveillance within a community setting, resulting in community members engaging in the covert observation of family, friends, or acquaintances. This paper investigates five stakeholder relationships using scenarios to demonstrate the potential socio-ethical implications that tracking and monitoring people will have on society at large. The five stakeholder types explored in this paper include: (i) husband-wife (partner-partner), (ii) parent-child, (iii) employer-employee, (iv) friend-friend, and (v) stranger-stranger. Mobile technologies such as mobile camera phones, global positioning system data loggers, …


Emerging Forms Of Covert Surveillance Using Gps-Enabled Devices, Roba Abbas, Katina Michael, M.G. Michael, Anas Aloudat Jun 2011

Emerging Forms Of Covert Surveillance Using Gps-Enabled Devices, Roba Abbas, Katina Michael, M.G. Michael, Anas Aloudat

Professor Katina Michael

This paper presents the real possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non-traditional covert surveillance within a community setting, resulting in community members engaging in the covert observation of family, friends, or acquaintances. This paper investigates five stakeholder relationships using scenarios to demonstrate the potential socio-ethical implications that tracking and monitoring people will have on society at large. The five stakeholder types explored in this paper include: (i) husband-wife (partner-partner), (ii) parent-child, (iii) employer-employee, (iv) friend-friend, and (v) stranger-stranger. Mobile technologies such as mobile camera phones, global positioning system data loggers, …


Demonstrating The Potential For Covert Policing In The Community: Five Stakeholder Scenarios, Roba Abbas, Katina Michael, M.G. Michael Dec 2010

Demonstrating The Potential For Covert Policing In The Community: Five Stakeholder Scenarios, Roba Abbas, Katina Michael, M.G. Michael

Professor Katina Michael

This paper presents the real possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non traditional covert policing within a community setting, resulting in community members engaging in covert policing of family, friends, or acquaintances. This paper investigates five stakeholder relationships using scenarios to demonstrate the potential socio-ethical implications that tracking and monitoring people will have on society at large. The five stakeholder types explored in this paper include: (i) husband-wife (partner-partner), (ii) parent-child, (iii) employer-employee, (iv) friend-friend, and (v) stranger-stranger. Mobile technologies such as mobile camera phones, global positioning system data loggers, …


With Words That Last, Sean Nicholls, Leesha Mckenny, M.G. Michael, K. Michael Dec 2009

With Words That Last, Sean Nicholls, Leesha Mckenny, M.G. Michael, K. Michael

Professor Katina Michael

No abstract provided.


M.G. Michael And K. Michael (2009). "Uberveillance: Definition" In Ed. S. Butler, Fifth Edition Of The Macquarie Dictionary (Australia's National Dictionary, Sydney University), P. 1094, Susan Butler, M.G. Michael, K. Michael Oct 2009

M.G. Michael And K. Michael (2009). "Uberveillance: Definition" In Ed. S. Butler, Fifth Edition Of The Macquarie Dictionary (Australia's National Dictionary, Sydney University), P. 1094, Susan Butler, M.G. Michael, K. Michael

Professor Katina Michael

No abstract provided.


From Dataveillance To Überveillance (Uberveillance) And The Realpolitik Of The Transparent Society, K. Michael, M. G. Michael Oct 2007

From Dataveillance To Überveillance (Uberveillance) And The Realpolitik Of The Transparent Society, K. Michael, M. G. Michael

Professor Katina Michael

The 2007 Workshop on the Social Implications of National Security: from Dataveillance to Überveillance and the Realpolitik of the Transparent Society was organised by the Research Network for a Secure Australia (RNSA) funded by the Australian Research Council. The Workshop will become a biennial event bringing together both researchers and practitioners in the fields relating to the national research priority entitled Safeguarding Australia. In 2007, the workshop was held on the 29th October, at the Function Centre at the University of Wollongong between 8.30 am and 5.00 pm.

The Workshop was organised by RNSA members from the IP Location-Based Services …