Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Privacy (17)
- Emerging Technologies (15)
- Law and Technology (13)
- Social Implications of ICT (13)
- Economics (11)
-
- Location-Based Services (11)
- National Security (11)
- Copyright (9)
- Science and Technology (9)
- Uberveillance (9)
- Libraries (8)
- Surveillance (8)
- Emergency Management (7)
- Global Positioning Systems (7)
- Law and Economics (7)
- Technology (7)
- Ethics (6)
- Fair Use (6)
- Intellectual Property Law (6)
- Policing (6)
- Security (6)
- Commercial Law (5)
- Internet (5)
- Internet Law (5)
- Law and Society (5)
- Legislation (5)
- Administrative Law (4)
- Communications Law (4)
- First Amendment (4)
- Information Security (4)
- Publication Year
- Publication
-
- Professor Katina Michael (25)
- Associate Professor Katina Michael (10)
- Laura Quilter (8)
- Ira Steven Nathenson (2)
- Warren Bartholomew Chik (2)
-
- Adam Lamparello (1)
- Akiva A Miller (1)
- Alexander Hayes Mr. (1)
- Chris Jay Hoofnagle (1)
- Dillon A Redding (1)
- Donald J. Kochan (1)
- Donna M. Hughes (1)
- Dr. Mutaz M. Al-Debei (1)
- Eliza Mik (1)
- Evan R. Youngstrom (1)
- Giancarlo Francesco Frosio (1)
- Greg Lastowka (1)
- Jennifer M. Urban (1)
- John M. Newman (1)
- Jonathan I. Ezor (1)
- Layne S. Keele (1)
- Lorrie F Cranor (1)
- M. G. Michael (1)
- Mark Fenster (1)
- Nehal A. Patel (1)
- Philip F Wu (1)
- Raleigh Muns (1)
- Reza Rajabiun (1)
- Richard Cameron Gower (1)
- Ronald Leenes (1)
Articles 61 - 83 of 83
Full-Text Articles in Social and Behavioral Sciences
Proposed Anti-Spam Legislation Model In Singapore - Are We Losing The War Before Even Starting The Battle?, Warren B. Chik
Proposed Anti-Spam Legislation Model In Singapore - Are We Losing The War Before Even Starting The Battle?, Warren B. Chik
Warren Bartholomew CHIK
Unsolicited messages have grown into an intractable parasite on the underbelly of an otherwise effectual and vibrant electronic communications regime. There has been a sudden surge in the enactment of anti-spam laws globally within the last couple of years. On 25 May 2004, the Infocomm Development Authority of Singapore and the Attorney-General’s Chambers of Singapore jointly released a Consultation Paper on a Proposed Legislative Framework for the Control of E-mail Spam in Singapore. It is timely to consider the proposed anti-spam legislation model for Singapore in the light of such existing laws in other countries and their levels of effectiveness …
Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael
Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael
Associate Professor Katina Michael
In an age of outsourcing tasks that are not considered to be a core competency of the business, organisations have often relied on external consultants for matters pertaining to security. In actual fact, most companies could have utilized existing skill-sets in-house to produce a security risk management program, if only they knew what steps to take, and how to go about it all. Evan Wheeler in his book on information security risk management does just that- he equips professionals tasked with security, with the thinking required to create a program that is more preoccupied with the complex strategic-level questions than …
Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke
Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke
Associate Professor Katina Michael
Location tracking and monitoring applications have proliferated with the arrival of smart phones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smart phone user down to 10 metres of accuracy on average. Innovators have been quick to capitalise on this emerging market by introducing novel pedestrian tracking technologies which can denote the geographic path of a mobile user. At the same time there is contention by law enforcement personnel over the need for a warrant process to track an individual in a public space. This paper considers the future of location …
Minecraft As Web 2.0: Amateur Creativity In Digital Games, Greg Lastowka
Minecraft As Web 2.0: Amateur Creativity In Digital Games, Greg Lastowka
Greg Lastowka
This book chapter considers how the digital game Minecraft has both enabled and benefited from various Web 2.0 practices. I begin with an explanation of the concept of Web 2.0 and then consider how that concept applies to the space of digital games.
Privacy And Data Protection In Business: Laws And Practices (Sample Chapters), Jonathan I. Ezor
Privacy And Data Protection In Business: Laws And Practices (Sample Chapters), Jonathan I. Ezor
Jonathan I. Ezor
In the fields of digital privacy and data protection in the business world, effective compliance and risk management require not only knowledge of applicable laws and regulations, but at least a basic understanding of relevant technologies and the processes of the company or other organization that is collecting and/or using the personal information or monitoring behavior. This book is structured to provide a framework for law and other students to both learn the law and place it in the necessary technological and practical context, divided into topic areas such as children’s privacy, health information, governmental requirements, employee data and more. …
The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz M. Al-Debei
The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz M. Al-Debei
Dr. Mutaz M. Al-Debei
The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …
The Social And Behavioral Implications Of Location-Based Services, Katina Michael, M.G. Michael
The Social And Behavioral Implications Of Location-Based Services, Katina Michael, M.G. Michael
Associate Professor Katina Michael
The social and behavioral implications of location-based services (LBS) are only now beginning to come to light in advanced markets where the services have been adopted by just a little over half the market (Microsoft 2011). Depending on one’s definition of what constitutes location-based services, statistics on the level of adoption differ considerably. While it is helpful to provide as broad a list of applications as possible in what constitutes LBS (e.g. everything from in-vehicle navigation systems to downloading a map using a computer), it can also cloud the real picture forming behind this emerging technology. Emerging not in the …
Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas
Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas
Professor Katina Michael
Mobile alerts, notifications and location-based emergency warning systems are now an established part of mobile government strategies in an increasing number of countries worldwide. In Australia the national emergency warning system (NEWS) was instituted after the tragic Black Saturday Victorian Bushfires of February 2009. In the first phase, NEWS has enabled the provision of public information from the government to the citizen during emergencies anywhere and any time. Moving on from traditional short message service (SMS) notifications and cell broadcasting to more advanced location-based services, this paper provides executive-level recommendations about the viability of location-based mobile phone services in NEWS …
The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael
The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael
M. G. Michael
No abstract provided.
The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael
The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael
Professor Katina Michael
No abstract provided.
Commons / Commodity: Peer Production Caught In The Web Of The Commercial Market, Bingchun Meng, Fei Wu
Commons / Commodity: Peer Production Caught In The Web Of The Commercial Market, Bingchun Meng, Fei Wu
Philip F Wu
The development of digital technology and computer networks has enabled many kinds of online collaboration. This article examines Zimuzu, a Chinese case of online peer production, which provides an opportunity to extend our understanding of how the tensions between the commodity and commons production models are being articulated in an online setting. Using empirical evidence collected from face-to-face interviews, online posts and online ethnographic observation, our analysis demonstrates that there is constant negotiation over which aspects of the two seemingly opposing models will be adopted by the community. We argue that it is important to conceptualize the peer production process …
Context Is Everything: Sociality And Privacy In Online Social Network Sites, Ronald Leenes
Context Is Everything: Sociality And Privacy In Online Social Network Sites, Ronald Leenes
Ronald Leenes
Social Network Sites (SNSs) pose many privacy issues. Apart from the fact that privacy in an online social network site may sound like an oxymo- ron, significant privacy issues are caused by the way social structures are currently handled in SNSs. Conceptually different social groups are generally conflated into the singular notion of ‘friend’. This chapter argues that attention should be paid to the social dynamics of SNSs and the way people handle social contexts. It shows that SNS technology can be designed to support audience segregation, which should mitigate at least some of the privacy issues in Social Network …
The Google Book Search Settlement And The View From The Public Interest World, Laura Quilter
The Google Book Search Settlement And The View From The Public Interest World, Laura Quilter
Laura Quilter
No abstract provided.
Hack Your Blog (Lightning Talk), Laura Quilter
Hack Your Blog (Lightning Talk), Laura Quilter
Laura Quilter
A short 101-level lightning talk on "hacking your blog" for Software Freedom Day, Boston, 2009.
Looking For Fair Use In The Dmca's Safety Dance, Ira Nathenson
Looking For Fair Use In The Dmca's Safety Dance, Ira Nathenson
Ira Steven Nathenson
Like a ballet, the notice-and-take-down provisions of the Digital Millennium Copyright Act ("DMCA") provide complex procedures to obtain take-downs of online infringement. Copyright owners send notices of infringement to service providers, who in turn remove claimed infringement in exchange for a statutory safe harbor from copyright liability. But like a dance meant for two, the DMCA is less effective in protecting the "third wheel," the users of internet services. Even Senator John McCain - who in 1998 voted for the DMCA - wrote in exasperation to YouTube after some of his presidential campaign videos were removed due to take-downs. McCain …
Diabolical Frivolity Of Neoliberal Fundamentalism, Sefik Tatlic
Diabolical Frivolity Of Neoliberal Fundamentalism, Sefik Tatlic
Sefik Tatlic
Today, we cannot talk just about plain control, but we must talk about the nature of the interaction of the one who is being controlled and the one who controls, an interaction where the one that is “controlled” is asking for more control over himself/herself while expecting to be compensated by a surplus of freedom to satisfy trivial needs and wishes. Such a liberty for the fulfillment of trivial needs is being declared as freedom. But this implies as well the freedom to choose not to be engaged in any kind of socially sensible or politically articulated struggle.
Google Booksearch And Library Digitization, Laura Quilter, Jack Lerner
Google Booksearch And Library Digitization, Laura Quilter, Jack Lerner
Laura Quilter
No abstract provided.
The Blogosphere And The New Pamphleteers, Donald J. Kochan
The Blogosphere And The New Pamphleteers, Donald J. Kochan
Donald J. Kochan
The future of the free dissemination of information lies in the blog, some may say. The internet has entirely transformed how we receive and consume information. It’s the newest incarnation of information dissemination. From the insights of Alexis de Tocqueville, “Feelings and opinions are recruited, the heart is enlarged, and the human mind is developed only by the reciprocal influence of men upon one another.” Bloggers are a powerful force in the distribution of information and ideas and the creation of communities of conversation. Throughout history, the dissemination of information, news, opinions, and ideas has continuously transformed. In the 18th …
Tattoos On Our Digital Skin: Anonymity, Privacy, And Accountability In Cyberspace, Sam Grey
Tattoos On Our Digital Skin: Anonymity, Privacy, And Accountability In Cyberspace, Sam Grey
Sam Grey
While it may be oddly flattering that Chapters, Amazon or HMV knew you would like the new Johnny Cash compilation album, you may be less than thrilled to discover that they also knew about your prescription drug addiction, your crabs, your bankruptcy, or your having skipped out on the rent one month back in 1993. When you add the possibility of your favourite e-retailer sharing your personal information- for a profit- to the frank probability of their having known it in the first place, what you initially found flattering may begin to appear more offensive and ominous. Simply put, there …
Radio Frequency Id And Privacy With Information Goods, Laura Quilter, Nathan Good, John Han, Elizabeth Miles, David Molnar, Deirdre Mulligan, Jennifer M. Urban, David Wagner
Radio Frequency Id And Privacy With Information Goods, Laura Quilter, Nathan Good, John Han, Elizabeth Miles, David Molnar, Deirdre Mulligan, Jennifer M. Urban, David Wagner
Laura Quilter
No abstract provided.
Radio Frequency Id And Privacy With Information Goods, Laura Quilter, Nathan Good, John Han, Elizabeth Miles, David Molnar, Deirdre Mulligan, Jennifer M. Urban, David Wagner
Radio Frequency Id And Privacy With Information Goods, Laura Quilter, Nathan Good, John Han, Elizabeth Miles, David Molnar, Deirdre Mulligan, Jennifer M. Urban, David Wagner
Jennifer M. Urban
No abstract provided.
Internet Infoglut And Invisible Ink: Spamdexing Search Engines With Meta Tags, Ira Nathenson
Internet Infoglut And Invisible Ink: Spamdexing Search Engines With Meta Tags, Ira Nathenson
Ira Steven Nathenson
This Article addresses 'spamdexing,' namely, the practice of stuffing invisible keywords into webpages in order to try to get more favorable listings with search engines. For instance, some website owners will stuff the trademarks of competitors into a webpage’s code, particularly by using 'meta tags,' indexing keywords that can be hidden in a webpage’s source code. Although meta tags are not typically viewed by users, the code can be read by search engines, with the result that webpages may be improperly boosted in search engine rankings. Such practices can confuse the public and have also spurred trademark lawsuits. But the …
Encryption/Decryption Dickwads Of Cipherspace, Raleigh Muns