Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 281

Full-Text Articles in Physical Sciences and Mathematics

Identity-Based Traitor Tracing With Short Private Key And Short Ciphertext, Fuchun Guo, Yi Mu, Willy Susilo Dec 2012

Identity-Based Traitor Tracing With Short Private Key And Short Ciphertext, Fuchun Guo, Yi Mu, Willy Susilo

Faculty of Informatics - Papers (Archive)

Identity-based traitor tracing (IBTT) scheme can be utilized to identify a private (decryption) key of any identity that is illegally used in an identity-based broadcast encryption scheme. In PKC'07, Abdalla et al. proposed the first IBTT construction with short private key. In CCS'08, Boneh and Naor proposed a public-key traitor tracing, which can be extended to IBTT with short ciphertext. With a further exploration, in this paper, we propose the first IBTT with short private key and short ciphertext. Private key and ciphertext are both order of O(l 1+l 2), where l 1 is the bit length of codeword of …


Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael Dec 2012

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael

Associate Professor Katina Michael

The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …


Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael Oct 2012

Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael

Associate Professor Katina Michael

This mixed methods study with a sequential explanatory strategy explored qualitatively the statistically significant quantitative findings relative to Indian respondents’ perceptions about RFID (radio frequency identification) transponders implanted into the human body. In the first analysis phase of the study, there was a significant chi-square analysis reported (χ2 = 56.64, df = 3, p = .000) relative to the perception of small business owners (N = 453) that implanted chips are a more secure form of identification and/or access control in organizations and the respondents’ country of residence. Countries under study included Australia, India, the UK and US. The country …


Bryophyte Species Composition Over Moisture Gradients In The Windmill Islands, East Antarctica: Development Of A Baseline For Monitoring Climate Change Impacts, J Wasley, S A. Robinson, J D. Turnbull, D H. King, W Wanek, M Popp Oct 2012

Bryophyte Species Composition Over Moisture Gradients In The Windmill Islands, East Antarctica: Development Of A Baseline For Monitoring Climate Change Impacts, J Wasley, S A. Robinson, J D. Turnbull, D H. King, W Wanek, M Popp

Faculty of Science - Papers (Archive)

Extreme environmental conditions prevail on the Antarctic continent and limit plant diversity to cryptogamic communities, dominated by bryophytes and lichens. Even small abiotic shifts, associated with climate change, are likely to have pronounced impacts on these communities that currently exist at their physiological limit of survival. Changes to moisture availability, due to precipitation shifts or alterations to permanent snow reserves, will most likely cause greatest impact. In order to establish a baseline for determining the effect of climate change on continental Antarctic terrestrial communities and to better understand bryophyte species distributions in relation to moisture in a floristically important Antarctic …


Implementing Vertical And Horizontal Engineering Students' Integration And Assessment Of Consequence Academic Achievement, Sarim Al-Zubaidy, Nidhal Abdulaziz, Reza Dashtpour Jul 2012

Implementing Vertical And Horizontal Engineering Students' Integration And Assessment Of Consequence Academic Achievement, Sarim Al-Zubaidy, Nidhal Abdulaziz, Reza Dashtpour

Faculty of Informatics - Papers (Archive)

Recent scholarship references indicate that integration of the student body can result in an enhanced learning experience for students and also greater satisfaction. This paper reports the results of a case study whereby mechanical engineering students studying at a newly established branch campus in Dubai of a British university were exposed to vertical and horizontal integration. Different activities have been embedded to ensure that students integrated and worked together with their peers and colleagues at different levels. The implemented processes and practices led to improved academic achievements, which were better than those of a similar cohort of students where no …


The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei Jul 2012

The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei

Associate Professor Katina Michael

The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …


The Isolation Of Bioactive Flavonoids From Jacaranda Obtusifolia H. B. K. Ssp. Rhombifolia (G. F. W. Meijer) Gentry, Sorachai Khamsan, Saisunee Liawruangrath, Aphiwat Teerawutkulrag, Stephen G. Pyne, Mary J. Garson, Boonsom Liawruangrath Jun 2012

The Isolation Of Bioactive Flavonoids From Jacaranda Obtusifolia H. B. K. Ssp. Rhombifolia (G. F. W. Meijer) Gentry, Sorachai Khamsan, Saisunee Liawruangrath, Aphiwat Teerawutkulrag, Stephen G. Pyne, Mary J. Garson, Boonsom Liawruangrath

Faculty of Science - Papers (Archive)

The paper describes the bioassay-guided isolation, structure elucidation and anticancer evaluation of five flavonoids (-)-liquiritigenin (1), (-)-neoliquiritin (2), isoliquiritigenin (3), isoliquiritin (4) and formononetin (5) from the twigs of Jacaranda obtusifolia H. B. K. ssp. rhombifolia (G. F. W. Meijer) Gentry. The structures were elucidated based on 1H, 13C NMR, comprehensive 2D NMR, MS analyses and comparison with previously reported spectral data. Compounds 1 and 3 were demonstrated to be inhibitory in vitro against NCI-H187 (small cell lung cancer) with IC50 values of 30.1 and 16.6 μg mL-1, respectively. The isolates were non-cytotoxic to Vero cells (African green monkey kidney).


Translocation Of The Eastern Bristlebird 1: Radio-Tracking Of Post-Release Movements, David Bain, Kris French, Jack Baker, Jean Clarke May 2012

Translocation Of The Eastern Bristlebird 1: Radio-Tracking Of Post-Release Movements, David Bain, Kris French, Jack Baker, Jean Clarke

Faculty of Science - Papers (Archive)

Translocating birds to a new area of habitat to restore or supplement depleted populations may pose a significant threat to the translocated individuals. While for many species, translocated individuals appear to move larger distances than resident animals, species with poor dispersal capacity may be restricted in movements and translocation methods may need to accommodate differences in movements to ensure success. In this study, designed to provide insights to inform our broader programme of translocations in New South Wales, Australia, we investigated post-release movements in the endangered, semi-flightless Eastern Bristlebird (Dasyornis brachypterus). We predicted that movements would be minimal, with few …


Manufacturing On The Move? Beyond The High Dollar In The Debate About Making Things In Australia - The Case Of The Australian Surfboard Industry - Ausccer Discussion Paper No. 2012/2, Andrew Warren, Chris Gibson May 2012

Manufacturing On The Move? Beyond The High Dollar In The Debate About Making Things In Australia - The Case Of The Australian Surfboard Industry - Ausccer Discussion Paper No. 2012/2, Andrew Warren, Chris Gibson

Faculty of Science - Papers (Archive)

In October 2011 surfboard manufacturer BASE abruptly closed its factory on the Gold Coast resulting in the direct loss of 50 jobs. A few days later, nearby D’Arcy Surfboards also announced it was shedding workers and downsizing from a state-of-the art purpose built factory into a backyard workshop. Each business exported surfboards internationally and employed some of Australia’s best known surfboard-makers. The troubles facing these workshops added to those brewing at the very same in Australia’s steel, aluminium, automotive and garment industries. With renewed public debate and media commentary on the future of manufacturing, we now face a crisis in …


Commentary On: Mann, Steve (2012): Wearable Computing, Katina Michael, M.G. Michael Apr 2012

Commentary On: Mann, Steve (2012): Wearable Computing, Katina Michael, M.G. Michael

Associate Professor Katina Michael

In Professor Steve Mann- inventor, physicist, engineer, mathematician, scientist, designer, developer, project director, filmmaker, artist, instrumentalist, author, photographer, actor, activist- we see so much of the paradigmatic classical Greek philosopher. I recall asking Steve if technology shaped society or society shaped technology. He replied along the lines that the question was superfluous. Steve instead pointed to praxis, from which all theory, lessons or skills stem, are practiced, embodied and realized. Steve has always been preoccupied by the application of his ideas into form. In this way too, he can be considered a modern day Leonardo Da Vinci.


Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael Apr 2012

Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael

Associate Professor Katina Michael

With so much buzz around Cloud Computing, books like this one written by Winkler are much in demand. Winkler’s experience in the computing business shines through and as readers we are spoiled with a great deal of useful strategic information- a jam packed almost 300 page volume on securing the cloud.


In Memoriam: Associate Professor Dr Elaine Lawrence, Katina Michael Apr 2012

In Memoriam: Associate Professor Dr Elaine Lawrence, Katina Michael

Associate Professor Katina Michael

Despite being a graduate of the rigorous Bachelor of Information Technology at the University of Technology, Sydney (UTS) in 1996, I was unfortunate in that I missed being taught by Associate Professor Elaine Lawrence who began working at UTS in 1990 as a Lecturer in Computing Science. Dr Lawrence became a senior lecturer in 2000, and subsequently an associate professor in 2006. Our paths crossed in 2002 when I was tasked to deliver a new course entitled “eBusiness Principles” in my first year of lecturing at the University of Wollongong, and after an initial scurry to find an adequate textbook, …


Process-Evaluation Of Tropospheric Humidity Simulated By General Circulation Models Using Water Vapor Isotopologues: 1. Comparison Between Models And Observations, Camille Risi, David Noone, John Worden, Christian Frankenberg, Gabriele Stiller, Michael Kiefer, Bernd Funke, Kaley Walker, Peter Bernath, Matthias Schneider, Debra Wunch, Vanessa Sherlock, Nicholas M. Deutscher, David W. Griffith, Paul O. Wennberg, Kimberly Strong, Dan Smale, Emmanuel Mahieu, Sabine Barthlott, Frank Hase, Omar Garcia, Justus Notholt, Thorsten Warneke, Geoffrey Toon, David Sayres, Sandrine Bony, Jeonghoon Lee, Derek Brown, Ryu Uemura, Christophe Sturm Mar 2012

Process-Evaluation Of Tropospheric Humidity Simulated By General Circulation Models Using Water Vapor Isotopologues: 1. Comparison Between Models And Observations, Camille Risi, David Noone, John Worden, Christian Frankenberg, Gabriele Stiller, Michael Kiefer, Bernd Funke, Kaley Walker, Peter Bernath, Matthias Schneider, Debra Wunch, Vanessa Sherlock, Nicholas M. Deutscher, David W. Griffith, Paul O. Wennberg, Kimberly Strong, Dan Smale, Emmanuel Mahieu, Sabine Barthlott, Frank Hase, Omar Garcia, Justus Notholt, Thorsten Warneke, Geoffrey Toon, David Sayres, Sandrine Bony, Jeonghoon Lee, Derek Brown, Ryu Uemura, Christophe Sturm

Faculty of Science - Papers (Archive)

[1] The goal of this study is to determine how H2O and HDO measurements in water vapor can be used to detect and diagnose biases in the representation of processes controlling tropospheric humidity in atmospheric general circulation models (GCMs). We analyze a large number of isotopic data sets (four satellite, sixteen ground-based remote-sensing, five surface in situ and three aircraft data sets) that are sensitive to different altitudes throughout the free troposphere. Despite significant differences between data sets, we identify some observed HDO/H2O characteristics that are robust across data sets and that can be used to evaluate models. We evaluate …


The Role Of Streptokinase As A Virulence Determinant Of Streptococcus Pyogenes - Potential For Therapeutic Targeting, Jason D. Mcarthur, Simon M. Cook, Carola Venturini, Mark J. Walker Mar 2012

The Role Of Streptokinase As A Virulence Determinant Of Streptococcus Pyogenes - Potential For Therapeutic Targeting, Jason D. Mcarthur, Simon M. Cook, Carola Venturini, Mark J. Walker

Faculty of Science - Papers (Archive)

Streptococcus pyogenes is a major human pathogen responsible for numerous diseases ranging from uncomplicated skin and throat infections to severe, life threatening invasive disease such as necrotising fasciitis and streptococcal toxic shock syndrome. These severe invasive infections progress rapidly and produce high rates of morbidity and mortality despite the implementation of aggressive treatment plans. The activation of plasminogen and the acquisition of plasmin activity at the bacterial cell surface is critical for the invasive pathogenesis of this organism. To facilitate this process, S. pyogenes secrete streptokinase, a potent plasminogen activating protein. Here, we describe the role of streptokinase in invasive …


Seed Bank Persistence And Climate Change, Mark K. J Ooi Feb 2012

Seed Bank Persistence And Climate Change, Mark K. J Ooi

Faculty of Science - Papers (Archive)

"The strong mechanistic relationship between climatic factors and seed dormancy and germination suggests that forecast climatic changes will significantly affect seed bank persistence. This review focuses on the potential impact of changing temperature, rainfall and fire regimes on the longevity of long-term persistent seed-banks. Currently, there are few studies investigating the mechanistic responses of demographic processes, such as seed-bank dynamics, to forecast climate change. However, from the work that has been published, several key points have been highlighted. First, increased air temperatures will produce significantly higher soil temperatures in open and sparsely vegetated habitats. Some evidence shows that this could …


Sousveillance And The Social Implications Of Point Of View Technologies In The Law Enforcement Sector, Katina Michael, M.G. Michael Feb 2012

Sousveillance And The Social Implications Of Point Of View Technologies In The Law Enforcement Sector, Katina Michael, M.G. Michael

Associate Professor Katina Michael

Policing today has become a high-tech affair; especially in the provision of incident event tracking and reporting systems increasingly being used to provide evidence in a court of law. These in-car video (ICV) and body worn recording systems are said to increase convictions and eliminate false claims made by defendants, providing documentary support to police officers and their associated actions in an incident. But today, new technologies such as smart phones equipped with cameras and global positioning system chipsets can also be found in the hands of the everyday citizen, used to capture everyday happenings and distributed to social networks …


Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael Jan 2012

Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael

Associate Professor Katina Michael

In an age of outsourcing tasks that are not considered to be a core competency of the business, organisations have often relied on external consultants for matters pertaining to security. In actual fact, most companies could have utilized existing skill-sets in-house to produce a security risk management program, if only they knew what steps to take, and how to go about it all. Evan Wheeler in his book on information security risk management does just that- he equips professionals tasked with security, with the thinking required to create a program that is more preoccupied with the complex strategic-level questions than …


Determinants Of Rfid Technology Adoption Intention In The Saudi Retail Industry: An Empirical Study, Salem Alqahtani, S. F. Wamba Jan 2012

Determinants Of Rfid Technology Adoption Intention In The Saudi Retail Industry: An Empirical Study, Salem Alqahtani, S. F. Wamba

Faculty of Informatics - Papers (Archive)

Drawing both on innovation diffusion theory and Radio frequency identification (RFID) technology, this paper assesses the influence of a set of determinants on the intention of Saudi Arabian retail firms to adopt RFID technology. In this study, a two-phase, multi-method approach was used. In the first phase, an interview-based case study was used, while in the second phase, we conducted a survey to gather data from 7 large retailers in Saudi Arabia. Our findings indicate that while the RFID relative advantage, the top management support and information intensity do not have any influence on the intention of Saudi Arabia retail …


Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke Jan 2012

Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke

Associate Professor Katina Michael

Location tracking and monitoring applications have proliferated with the arrival of smart phones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smart phone user down to 10 metres of accuracy on average. Innovators have been quick to capitalise on this emerging market by introducing novel pedestrian tracking technologies which can denote the geographic path of a mobile user. At the same time there is contention by law enforcement personnel over the need for a warrant process to track an individual in a public space. This paper considers the future of location …


Aged Care It In Australia-The Past, Present And Future, Ping Yu Jan 2012

Aged Care It In Australia-The Past, Present And Future, Ping Yu

Faculty of Informatics - Papers (Archive)

This paper reviews the development of aged care IT innovations in Australia in the past decade. It starts with a brief description of the establishment of the Aged Care eConnect project by the Commonwealth Department of Health and Ageing to promote aged care IT. This is followed by a snapshot of the aged care associations' and research groups' promotional activities. The roles of government, industry peak bodies, aged care providers, aged care IT application providers and researchers for the diffusion of aged care IT innovations are analysed.


Combining Outputs From The North American Regional Climate Change Assessment Program By Using A Bayesian Hierarchical Model, Emily L. Kang, Noel Cressie, Stephan R. Sain Jan 2012

Combining Outputs From The North American Regional Climate Change Assessment Program By Using A Bayesian Hierarchical Model, Emily L. Kang, Noel Cressie, Stephan R. Sain

Faculty of Informatics - Papers (Archive)

We investigate the 20-year-average boreal winter temperatures generated by an ensemble of six regional climate models (RCMs) in phase I of the North American Regional Climate Change Assessment Program. We use the long-run average (20-year integration) to smooth out variability and to capture the climate properties from the RCM outputs. We find that, although the RCMs capture the large-scale climate variation from coast to coast and from south to north similarly, their outputs can differ substantially in some regions. We propose a Bayesian hierarchical model to synthesize information from the ensemble of RCMs, and we construct a consensus climate signal …


New Constructions Of Osbe Schemes And Their Applications In Oblivious Access Control, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan Jan 2012

New Constructions Of Osbe Schemes And Their Applications In Oblivious Access Control, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan

Faculty of Informatics - Papers (Archive)

Oblivious signature-based envelope (OSBE) schemes have demonstrated their potential applications in the protection of users privacy and rights. In an OSBE protocol, an encrypted message can only be decrypted by the receiver who holds a valid signature on a public message, while the sender (encrypter) does not know whether the receiver has the signature or not. Our major contributions in this work lie in the following aspects. We improve the notion of OSBE so that a valid credential holder cannot share his/her credential with other users (i. e., all-or-nothing non-transferability). We clarify the relationship between one-round OSBE and identity-based encryption …


Grounding Locations Assessment Of Practical Power System, Nadheer Shalash, Ahmed M. Haidar, Abdul Sattar Jan 2012

Grounding Locations Assessment Of Practical Power System, Nadheer Shalash, Ahmed M. Haidar, Abdul Sattar

Faculty of Informatics - Papers (Archive)

Grounding Points (GPs) are installed in electrical power system to drive protective devices and accomplish the person- nel safety. The general grounding problem is to find the optimal locations of these points so that the security and reli- ability of power system can be improved. This paper presents a practical approach to find the optimal location of GPs based on the ratios of zero sequence reactance with positive sequence reactance (X0/X1), zero sequence resistance with positive sequence reactance (R0/X1) and Ground Fault Factor (GFF). The optimal values of these indicators were deter- mined by considering several scenarios of fault disturbances …


Perfect Ambiguous Optimistic Fair Exchange, Yang Wang, Man Ho Allen Au, Willy Susilo Jan 2012

Perfect Ambiguous Optimistic Fair Exchange, Yang Wang, Man Ho Allen Au, Willy Susilo

Faculty of Informatics - Papers (Archive)

Protocol for fair exchange of digital signatures is essential in many applications including contract signing, electronic commerce, or even peer-to-peer file sharing. In such a protocol, two parties, Alice and Bob, would like to exchange digital signatures on some messages in a fair way. It is known that a trusted arbitrator is necessary in the realization of such a protocol. We identify that in some scenarios, it is required that prior to the completion of the protocol, no observer should be able to tell whether Alice and Bob are conducting such an exchange. Consider the following scenario in which Apple …


An Experimental Determination Of Perceived Liveability In Sydney, Mohammad-Reza Namazi-Rad, Pascal Perez, Matthew Berryman, Francois Lamy Jan 2012

An Experimental Determination Of Perceived Liveability In Sydney, Mohammad-Reza Namazi-Rad, Pascal Perez, Matthew Berryman, Francois Lamy

Faculty of Informatics - Papers (Archive)

The term liveability is used to evaluate the quality of life in a region based on the surrounding physical environment and different location-based social elements. Having a reliable measurement of general well-being of individuals and societies can help the government and non-government organizations planning for better infrastructure. However, a variety of factors can impact the social perception of local environmental conditions, many of which are difficult to measure. This makes different liveability concepts quite challenging to be evaluated. In collaboration with the IRIS Research, we have conducted a Computer Assisted Telephone Interviewing (CATI) survey on perceived liveability. This measures the …


Intelligent Load Management In Microgrids, J Kennedy, Philip Ciufo, Ashish Agalgaonkar Jan 2012

Intelligent Load Management In Microgrids, J Kennedy, Philip Ciufo, Ashish Agalgaonkar

Faculty of Informatics - Papers (Archive)

The increased levels of distributed generator (DG) penetration and the customer demand for high levels of reliability have attributed to the formation of the Microgrid concept. The Microgrid concept contains a variety of technical challenges, including load management and anti-islanding protection discrimination strategies. This paper provides a novel scheme in which loads and DG are able to detect the conditions where the load of the island cannot be sufficiently supplied. In these instances, a load shedding algorithm systematically removes loads from the system until an island can be maintained within satisfactory operating limits utilising the local DG. The concept of …


Efficient Fair Conditional Payments For Outsourcing Computations, Xiaofeng Chen, Jin Li, Willy Susilo Jan 2012

Efficient Fair Conditional Payments For Outsourcing Computations, Xiaofeng Chen, Jin Li, Willy Susilo

Faculty of Informatics - Papers (Archive)

The outsourcing computations in distributed environments suffer from the trust problems between the outsourcer and the workers. All existing solutions only assume the rational lazybut- honest workers. In this paper, we first introduce the rational lazy-and-partially-dishonest workers in the outsourcing computation model. In addition, we propose a new fair conditional payment scheme for outsourcing computation that is only based on traditional electronic cash systems. The proposed construction uses a semitrusted third party T to achieve the fairness and efficiency. However, is only involved in the protocol in the exceptional case, namely in the case of disputes. Moreover, since neither the …


Location Privacy Under Dire Threat As 'Uberveillance' Stalks The Streets, Katina Michael, Roger Clarke Jan 2012

Location Privacy Under Dire Threat As 'Uberveillance' Stalks The Streets, Katina Michael, Roger Clarke

Faculty of Informatics - Papers (Archive)

Citizen consent and issues surrounding location-based people-tracking - location-tracking - smart phones - covert tracking - CCTV cameras - mobile phones - warrantless tracking - Australian Mobile Telecommunications Association (AMTA) new industry guidelines - compliance with privacy legislation - need for a location privacy protection act or GPS act.


Editorial: Social Implications Of Technology: "Il Buono, Il Brutto, Il Cattivo", Katina Michael Jan 2012

Editorial: Social Implications Of Technology: "Il Buono, Il Brutto, Il Cattivo", Katina Michael

Faculty of Informatics - Papers (Archive)

Late last year, IEEE SSIT was invited to put together a paper for the centennial edition of the Proceedings of the IEEE for publication in May 2012 [1]. The article, "Social Implications of Technology: Past, Present, and Future," brought together five members of SSIT with varying backgrounds, and involved two intense months of collaboration and exchange of ideas. I personally felt privileged to be working with Karl D. Stephan, Emily Anesta, Laura Jacobs, and M.G. Michael on this project.


Human Rights, Regulation, And National Security (Introduction), Simon Bronitt, Katina Michael Jan 2012

Human Rights, Regulation, And National Security (Introduction), Simon Bronitt, Katina Michael

Faculty of Informatics - Papers (Archive)

Law disciplines technology, though it does so in a partial and incomplete way. This fact is refl ected in the old adage that technology outstrips the capacity of law to regulate it. The rise of new technologies poses a signifi cant threat to human rights. The pervasive use of closedcircuit television (CCTV), as well as mobile CCTV, telecommunications interception, and low-cost audiovisual recording and tracking devices (some of these discreetly wearable), extend the power of the state and corporations to signifi cantly intrude into the lives of citizens.