Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 31

Full-Text Articles in Physical Sciences and Mathematics

Forum Proceedings From “Uavs: Pros Vs Cons Symposium” In Toronto, Canada, June 2013, Katina Michael Feb 2014

Forum Proceedings From “Uavs: Pros Vs Cons Symposium” In Toronto, Canada, June 2013, Katina Michael

Associate Professor Katina Michael

Unmanned Aerial Systems (UAS), widely referred to as drones, are becoming increasingly relevant in civilian as well as military applications. UAS have been used by emergency services to help respond to and map environmental crises, to find missing people, to fight fires, and respond to traffic accidents. Their use in policing and border patrol functions is being trialled in many Western countries. Like other recent technologies (mobile phones etc), as they become cheaper and easier to use, they are likely to become much more prevalent in civilian life across a range of applications.

This conference will examine the current state …


Big Data: New Opportunities And New Challenges, Katina Michael, Keith Miller Jun 2013

Big Data: New Opportunities And New Challenges, Katina Michael, Keith Miller

Associate Professor Katina Michael

We can live with many of the uncertainties of big data for now, with the hope that its benefits will outweigh its harms, but we shouldn't blind ourselves to the possible irreversibility of changes—whether good or bad—to society.

It's no secret that both private enterprise and government seek greater insights into people's behaviors and sentiments. Organizations use various analytical techniques—from crowdsourcing to genetic algorithms to neural networks to sentiment analysis—to study both structured and unstructured forms of data that can aid product and process discovery, productivity, and policy-making. This data is collected from numerous sources including sensor networks, government data …


Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael Dec 2012

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael

Associate Professor Katina Michael

The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …


Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael Oct 2012

Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael

Associate Professor Katina Michael

This mixed methods study with a sequential explanatory strategy explored qualitatively the statistically significant quantitative findings relative to Indian respondents’ perceptions about RFID (radio frequency identification) transponders implanted into the human body. In the first analysis phase of the study, there was a significant chi-square analysis reported (χ2 = 56.64, df = 3, p = .000) relative to the perception of small business owners (N = 453) that implanted chips are a more secure form of identification and/or access control in organizations and the respondents’ country of residence. Countries under study included Australia, India, the UK and US. The country …


The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei Jul 2012

The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei

Associate Professor Katina Michael

The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …


Commentary On: Mann, Steve (2012): Wearable Computing, Katina Michael, M.G. Michael Apr 2012

Commentary On: Mann, Steve (2012): Wearable Computing, Katina Michael, M.G. Michael

Associate Professor Katina Michael

In Professor Steve Mann- inventor, physicist, engineer, mathematician, scientist, designer, developer, project director, filmmaker, artist, instrumentalist, author, photographer, actor, activist- we see so much of the paradigmatic classical Greek philosopher. I recall asking Steve if technology shaped society or society shaped technology. He replied along the lines that the question was superfluous. Steve instead pointed to praxis, from which all theory, lessons or skills stem, are practiced, embodied and realized. Steve has always been preoccupied by the application of his ideas into form. In this way too, he can be considered a modern day Leonardo Da Vinci.


Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael Apr 2012

Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael

Associate Professor Katina Michael

With so much buzz around Cloud Computing, books like this one written by Winkler are much in demand. Winkler’s experience in the computing business shines through and as readers we are spoiled with a great deal of useful strategic information- a jam packed almost 300 page volume on securing the cloud.


In Memoriam: Associate Professor Dr Elaine Lawrence, Katina Michael Apr 2012

In Memoriam: Associate Professor Dr Elaine Lawrence, Katina Michael

Associate Professor Katina Michael

Despite being a graduate of the rigorous Bachelor of Information Technology at the University of Technology, Sydney (UTS) in 1996, I was unfortunate in that I missed being taught by Associate Professor Elaine Lawrence who began working at UTS in 1990 as a Lecturer in Computing Science. Dr Lawrence became a senior lecturer in 2000, and subsequently an associate professor in 2006. Our paths crossed in 2002 when I was tasked to deliver a new course entitled “eBusiness Principles” in my first year of lecturing at the University of Wollongong, and after an initial scurry to find an adequate textbook, …


Sousveillance And The Social Implications Of Point Of View Technologies In The Law Enforcement Sector, Katina Michael, M.G. Michael Feb 2012

Sousveillance And The Social Implications Of Point Of View Technologies In The Law Enforcement Sector, Katina Michael, M.G. Michael

Associate Professor Katina Michael

Policing today has become a high-tech affair; especially in the provision of incident event tracking and reporting systems increasingly being used to provide evidence in a court of law. These in-car video (ICV) and body worn recording systems are said to increase convictions and eliminate false claims made by defendants, providing documentary support to police officers and their associated actions in an incident. But today, new technologies such as smart phones equipped with cameras and global positioning system chipsets can also be found in the hands of the everyday citizen, used to capture everyday happenings and distributed to social networks …


Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael Jan 2012

Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael

Associate Professor Katina Michael

In an age of outsourcing tasks that are not considered to be a core competency of the business, organisations have often relied on external consultants for matters pertaining to security. In actual fact, most companies could have utilized existing skill-sets in-house to produce a security risk management program, if only they knew what steps to take, and how to go about it all. Evan Wheeler in his book on information security risk management does just that- he equips professionals tasked with security, with the thinking required to create a program that is more preoccupied with the complex strategic-level questions than …


Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke Jan 2012

Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke

Associate Professor Katina Michael

Location tracking and monitoring applications have proliferated with the arrival of smart phones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smart phone user down to 10 metres of accuracy on average. Innovators have been quick to capitalise on this emerging market by introducing novel pedestrian tracking technologies which can denote the geographic path of a mobile user. At the same time there is contention by law enforcement personnel over the need for a warrant process to track an individual in a public space. This paper considers the future of location …


Implementing Namebers Using Microchip Implants: The Black Box Beneath The Skin, Katina Michael, M.G. Michael Dec 2011

Implementing Namebers Using Microchip Implants: The Black Box Beneath The Skin, Katina Michael, M.G. Michael

Associate Professor Katina Michael

The use of electronic-based physical access cards to secure premises such as government buildings and large corporate offices has been in operation since the inception of bar code and magnetic-stripe cards in the 1970s. Over time, for secure access control, these first generation card technologies based on optical character recognition (OCR) and magnetic ink character recognition (MICR) were replaced by more sophisticated technologies such as smart cards and biometrics, containing encrypted data and techniques which were more difficult to dupe or to replicate \cite{michael2003a}.

An employee today wanting to gain access to their place of work, typically carries a photo …


The Social And Behavioral Implications Of Location-Based Services, Katina Michael, M.G. Michael Nov 2011

The Social And Behavioral Implications Of Location-Based Services, Katina Michael, M.G. Michael

Associate Professor Katina Michael

The social and behavioral implications of location-based services (LBS) are only now beginning to come to light in advanced markets where the services have been adopted by just a little over half the market (Microsoft 2011). Depending on one’s definition of what constitutes location-based services, statistics on the level of adoption differ considerably. While it is helpful to provide as broad a list of applications as possible in what constitutes LBS (e.g. everything from in-vehicle navigation systems to downloading a map using a computer), it can also cloud the real picture forming behind this emerging technology. Emerging not in the …


Monitoring People Using Location-Based Social Networking And Its Negative Impact On Trust: An Exploratory Contextual Analysis Of Five Types Of “Friend” Relationships, Sarah Fusco, Katina Michael, Anas Aloudat, Roba Abbas May 2011

Monitoring People Using Location-Based Social Networking And Its Negative Impact On Trust: An Exploratory Contextual Analysis Of Five Types Of “Friend” Relationships, Sarah Fusco, Katina Michael, Anas Aloudat, Roba Abbas

Associate Professor Katina Michael

Location based social networking (LBSN) applications are part of a new suite of social networking tools. LBSN is the convergence between location based services (LBS) and online social networking (OSN). LBSN applications offer users the ability to look up the location of another “friend” remotely using a smart phone, desktop or other device, anytime and anywhere. Users invite their friends to participate in LBSN and there is a process of consent that follows. This paper explores the potential impact of LBSN upon trust in society. It looks at the willingness of individuals to share their location data with family, friends, …


An Interview With Mr Peter Mahy Of Howells Llp Who Represented S And Marper At The European Court Of Human Rights, Katina Michael, Peter Mahy Dec 2010

An Interview With Mr Peter Mahy Of Howells Llp Who Represented S And Marper At The European Court Of Human Rights, Katina Michael, Peter Mahy

Associate Professor Katina Michael

Mr Peter Mahy, Partner at Howells LLP and the lawyer who represented S & Marper in front of the Grand Chamber at the European Court of Human Rights was interviewed by Katina Michael on the 10th of October 2009 while she was studying towards a Masters of Transnational Crime Prevention in the Faculty of Law at the University of Wollongong. In 2010 Peter Mahy received the Legal Aid Lawyer of the Year award for his contribution to the field. Mahy received his honours law degree from Sheffield University and a Masters in Criminology from the University of Cambridge. He did …


The European Court Of Human Rights Ruling Against The Policy Of Keeping Fingerprints And Dna Samples Of Criminal Suspects In Britain, Wales And Northern Ireland: The Case Of S. And Marper V United Kingdom, Katina Michael Dec 2010

The European Court Of Human Rights Ruling Against The Policy Of Keeping Fingerprints And Dna Samples Of Criminal Suspects In Britain, Wales And Northern Ireland: The Case Of S. And Marper V United Kingdom, Katina Michael

Associate Professor Katina Michael

In England, Wales and Northern Ireland, the Police and Criminal Evidence Act 1984 (the PACE) contained powers for the taking of fingerprints, and samples in the form of deoxyribonucleic acid (DNA). In 2001, Section 64(1A) of the PACE was substituted with Section 82 of the Criminal Justice and Police Act. The change to legislation meant that a suspect of a crime would have their fingerprints and samples permanently stored on the police national computer (PNC) even after having been acquitted. This paper critically analyses the circumstances of the landmark case of S. AND MARPER V. THE UNITED KINGDOM in two …


The Socio-Ethical Considerations Surrounding Government Mandated Location-Based Services During Emergencies: An Australian Case Study, Anas Aloudat, K. Michael Sep 2010

The Socio-Ethical Considerations Surrounding Government Mandated Location-Based Services During Emergencies: An Australian Case Study, Anas Aloudat, K. Michael

Associate Professor Katina Michael

The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility to their citizens to safeguard them against both natural and human-made …


Towards A State Of Uberveillance, M.G. Michael, K. Michael Jun 2010

Towards A State Of Uberveillance, M.G. Michael, K. Michael

Associate Professor Katina Michael

Überveillance is an emerging concept, and neither its application nor its power have yet fully arrived [38]. For some time, Roger Clarke’s [12, p. 498] 1988 dataveillance concept has been prevalent: the “systematic use of personal data systems in the investigation or monitoring of the actions of one or more persons.” Almost twenty years on, technology has developed so much and the national security context has altered so greatly [52], that there is a pressing need to formulate a new term to convey both the resent reality, and the Realpolitik (policy primarily based on power) of our times. However, if …


The Legal, Social And Ethical Controversy Of The Collection And Storage Of Fingerprint Profiles And Dna Samples In Forensic Science, K. Michael Jun 2010

The Legal, Social And Ethical Controversy Of The Collection And Storage Of Fingerprint Profiles And Dna Samples In Forensic Science, K. Michael

Associate Professor Katina Michael

The collection and storage of fingerprint profiles and DNA samples in the field of forensic science for non-violent crimes is highly controversial. While biometric techniques such as fingerprinting have been used in law enforcement since the early 1900s, DNA presents a more invasive and contentious technique as most sampling is of an intimate nature (e.g. buccal swab). A fingerprint is a pattern residing on the surface of the skin while a DNA sample needs to be extracted in the vast majority of cases (e.g. at times extraction even implying the breaking of the skin). This paper aims to balance the …


Social-Technical Issues Facing The Humancentric Rfid Implantee Sub-Culture Through The Eyes Of Amal Graafstra, Amal Graafstra, K. Michael, M.G. Michael Jun 2010

Social-Technical Issues Facing The Humancentric Rfid Implantee Sub-Culture Through The Eyes Of Amal Graafstra, Amal Graafstra, K. Michael, M.G. Michael

Associate Professor Katina Michael

Radio-frequency identification (RFID) tags and transponders have traditionally been used to identify domesticated animals so that they can be reunited with their owners in the event that they stray. In the late 1990s, industry started to investigate the benefits of using RFID to identifying non-living things throughout the supply chain toward new efficiencies in business operations. Not long after, people began to consider the possibilities of getting RFID tag or transponder implants for themselves. Mr Amal Graafstra of the United States is one of the first, and probably most well-known ‘do it yourselfer’ (DIY) implantees, who enjoys building customized projects …


Controlling Technology, K. Michael, M. Michael Sep 2009

Controlling Technology, K. Michael, M. Michael

Associate Professor Katina Michael

No abstract provided.


The Prüm Treaty And The Implications Of The European Court Of Human Rights’ Ruling Against The Uk’S Policy Of Keeping Fingerprints And Dna Samples Of Criminal Suspects, K. Michael Aug 2009

The Prüm Treaty And The Implications Of The European Court Of Human Rights’ Ruling Against The Uk’S Policy Of Keeping Fingerprints And Dna Samples Of Criminal Suspects, K. Michael

Associate Professor Katina Michael

See CTCP release at http://ctcp.uow.edu.au/news/UOW065026.html


Location-Based Services For Emergency Management: A Multi-Stakeholder Perspective, Anas Aloudat, K. Michael, Roba Abbas Jun 2009

Location-Based Services For Emergency Management: A Multi-Stakeholder Perspective, Anas Aloudat, K. Michael, Roba Abbas

Associate Professor Katina Michael

This paper investigates the deployment of locationbased services for nationwide emergency management by focusing on the perspectives of two stakeholders, government and end-users, in the cellular mobile phone value chain. The data collected for the study came from a single in-depth interview and open comments in a preliminary end-user survey. The themes presented have been categorised using a qualitative analysis. The findings indicate that although governments and end-users believe that location-based services have the potential to aid people in emergencies, there are several major disagreements over the proposed deployment. This paper is an attempt to help determine the underlying motivations …


The Current State Of Commercial Location-Based Service Offerings In Australia, Roba Abbas, K. Michael, M.G. Michael, Anas Aloudat Jun 2009

The Current State Of Commercial Location-Based Service Offerings In Australia, Roba Abbas, K. Michael, M.G. Michael, Anas Aloudat

Associate Professor Katina Michael

Location-based services (LBS) provide geographic data for a variety of purposes, and through numerous devices such as mobile phones, GPS navigation systems, palm pilots and increasingly desktop computers. Presently, there is scant information relating to the current state of the LBS market, specifically location-based service applications in Australia. This study makes use of usability context analyses to examine Australia’s three leading telecommunications operators- Telstra, Optus and Vodafone- with a view to providing an overview of the types of services and solutions presently offered and targeted at the consumer, business and emergency segments. There are two units of analysis (i) the …


Location And Interactive Services Not Only At Your Fingertips But Under Your Skin, Rodney Ip, K. Michael, M.G. Michael May 2009

Location And Interactive Services Not Only At Your Fingertips But Under Your Skin, Rodney Ip, K. Michael, M.G. Michael

Associate Professor Katina Michael

This paper explores the work of Professor Kevin Warwick, a researcher in the Department of Cybernetics at the University of Reading in the United Kingdom, who has played a major role in propelling the science of humancentric chip implantation. On the 24th of August 1998, just over a decade ago, Professor Warwick became the first man to officially implant a radio-frequency identification (RFID) transponder under his skin. This paper explores Warwick’s achievements, motivations, and chipping experience, offering a unique insight into the ethical dilemmas and controversy surrounding implantable devices for identification purposes, interactive environments and the potential for location-based services. …


Predicting The Socioethical Implications Of Implanting People With Microchips, K. Michael, M.G. Michael Apr 2009

Predicting The Socioethical Implications Of Implanting People With Microchips, K. Michael, M.G. Michael

Associate Professor Katina Michael

Privacy, security, trust, control and human rights are all concerns that need to be addressed before widespread diffusion of advanced identification technologies.


Keeping Track Of Things, John Purvis, K. Michael Apr 2009

Keeping Track Of Things, John Purvis, K. Michael

Associate Professor Katina Michael

No abstract provided.


Überveillance: 24/7 X 365 People Tracking & Monitoring, Mg. Michael, K. Michael Jul 2008

Überveillance: 24/7 X 365 People Tracking & Monitoring, Mg. Michael, K. Michael

Associate Professor Katina Michael

No abstract provided.


The Paradigm Shift In Transnational Organised Crime, K. Michael Jul 2008

The Paradigm Shift In Transnational Organised Crime, K. Michael

Associate Professor Katina Michael

The definition of “organized crime” remains contentious because it has meant different things to different stakeholders over time. Does “organized crime” refer to illegal activities, relations between illegal organizations, how actors work together to engage in crimes, the infrastructure supporting crimes, or to the bricks and mortar of an illegal organization? Depending on the definition embraced by a stakeholder, their unit of analysis (eg crime group under investigation), and the particular time the study was conducted, an analyst may well be led to believe that some organized crime is really “disorganized” in nature. The two typologies of “organized” versus “disorganized” …


Total Curriculum Management (Tcm): An Integrated Curriculum Using Distributed Content, K. Michael Sep 2007

Total Curriculum Management (Tcm): An Integrated Curriculum Using Distributed Content, K. Michael

Associate Professor Katina Michael

This paper is concerned with practice, specifically, the implementation of a content management system (CMS) for the design of an integrated curriculum. The paper focuses on continuous assessment and how the notion of distributed content can be leveraged to help students become active learners, better integrate their knowledge, and develop critical thinking and professional skills throughout their candidature. Central to the paper is the idea of online resource sharing, reusable content chunks, metatagging, and customised workflows to aid in the coordination of tasks between stakeholders in achieving an integrated curriculum. In developing robust practices in accordance with overarching university and …