Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication Year
- Publication
- Publication Type
Articles 1 - 23 of 23
Full-Text Articles in Social and Behavioral Sciences
Attitudes And Perceptions Towards Privacy And Surveillance In Australia, Aleatha J. Shanley
Attitudes And Perceptions Towards Privacy And Surveillance In Australia, Aleatha J. Shanley
Theses: Doctorates and Masters
Understanding attitudes towards privacy and surveillance technologies used to enhance security objectives is a complex, but crucial aspect for policy makers to consider. Historically, terrorism-related incidents justified the uptake of surveillance practices. More recently however, biosecurity concerns have motivated nation-states to adopt more intrusive surveillance measures. There is a growing body of literature that supports the public’s desire to maintain privacy despite fears of biological or physical threats.
This research set out to explore attitudes towards privacy and surveillance in an Australian context. Throughout the course of this endeavour, the COVID-19 pandemic emerged bringing with it a variety of track …
Governing Smart Cities As Knowledge Commons - Introduction, Chapter 1 & Conclusion, Brett M. Frischmann, Michael J. Madison, Madelyn Sanfilippo
Governing Smart Cities As Knowledge Commons - Introduction, Chapter 1 & Conclusion, Brett M. Frischmann, Michael J. Madison, Madelyn Sanfilippo
Book Chapters
Smart city technology has its value and its place; it isn’t automatically or universally harmful. Urban challenges and opportunities addressed via smart technology demand systematic study, examining general patterns and local variations as smart city practices unfold around the world. Smart cities are complex blends of community governance institutions, social dilemmas that cities face, and dynamic relationships among information and data, technology, and human lives. Some of those blends are more typical and common. Some are more nuanced in specific contexts. This volume uses the Governing Knowledge Commons (GKC) framework to sort out relevant and important distinctions. The framework grounds …
Gauging The Acceptance Of Contact Tracing Technology: An Empirical Study Of Singapore Residents’ Concerns With Sharing Their Information And Willingness To Trust, Ee-Ing Ong, Wee Ling Loo
Gauging The Acceptance Of Contact Tracing Technology: An Empirical Study Of Singapore Residents’ Concerns With Sharing Their Information And Willingness To Trust, Ee-Ing Ong, Wee Ling Loo
Research Collection Yong Pung How School Of Law
In response to the COVID-19 pandemic, governments began implementing various forms of contact tracing technology. Singapore’s implementation of its contact tracing technology, TraceTogether, however, was met with significant concern by its population, with regard to privacy and data security. This concern did not fit with the general perception that Singaporeans have a high level of trust in its government. We explore this disconnect, using responses to our survey (conducted pre-COVID-19) in which we asked participants about their level of concern with the government and business collecting certain categories of personal data. The results show that respondents had less concern with …
Finding Common Ground For Citizen Empowerment In The Smart City, John D. Kelleher, Aphra Kerr
Finding Common Ground For Citizen Empowerment In The Smart City, John D. Kelleher, Aphra Kerr
Articles
Corporate smart city initiatives are just one example of the contemporary culture of surveillance. They rely on extensive information gathering systems and Big Data analysis to predict citizen behaviour and optimise city services. In this paper we argue that many smart city and social media technologies result in a paradox whereby digital inclusion for the purposes of service provision also results in marginalisation and disempowerment of citizens. Drawing upon insights garnered from a digital inclusion workshop conducted in the Galapagos islands, we propose that critically and creatively unpacking the computational techniques embedded in data services is needed as a first …
Irresistible Bargains: Navigating The Surveillance Society, Robert M. Pallitto
Irresistible Bargains: Navigating The Surveillance Society, Robert M. Pallitto
Robert M Pallitto
Establishing Effective And Economical Traffic Surveillance In Tonga, Brian Cusack, George Maeakafa
Establishing Effective And Economical Traffic Surveillance In Tonga, Brian Cusack, George Maeakafa
Australian Digital Forensics Conference
The Pacific Islands are seriously challenged by the growth in wealth and the expansion of international material possessions. On the roads traffic has grown dramatically and the types of vehicles now using Island roads has greatly changed. With the importation of cheap second hand vehicles designed for freeway speeds serious safety issues have grown proportionally with the increasing numbers. In this research we consider the prohibitive costs of traditional traffic controls to economy and propose a light weight highly mobile aerial surveillance system that integrates with ground policing capability. Our research question was: How can road safety and security be …
Evaluating Small Drone Surveillance Capabilities To Enhance Traffic Conformance Intelligence, Brian Cusack, Reza Khaleghparast
Evaluating Small Drone Surveillance Capabilities To Enhance Traffic Conformance Intelligence, Brian Cusack, Reza Khaleghparast
Australian Security and Intelligence Conference
The availability of cheap small physical drones that fly around and have a variety of visual and sensor networks attached invites investigation for work applications. In this research we assess the capability of a set of commercially available drones (VTOL) that cost less than $1000 (Cheap is a relative term and we consider anything less than $5000 relatively cheap). The assessment reviews the capability to provide secure and safe motor vehicle surveillance for conformance intelligence. The evaluation was conducted by initially estimating a set of requirements that would satisfy an ideal surveillance situation and then by comparing a sample of …
Cctv Surveillance: The Differing Aims And Functions Of Cctv Within The Corporate Stratum, Johan Malmenbratt, David J. Brooks
Cctv Surveillance: The Differing Aims And Functions Of Cctv Within The Corporate Stratum, Johan Malmenbratt, David J. Brooks
Australian Security and Intelligence Conference
Closed Circuit Television (CCTV) systems are found in a variety of environments and used for a multitude of purposes, leading to differing views of CCTV within an organisation. In accordance to management theory, organisations contain a stratum of work where each level requires specific skills set. In accordance with this work stratum, the study’s methodology used semi-structured interviews with different levels of security personnel in a Casino complex to extract and undertake a thematic analysis. The study extracted 10 CCTV surveillance features across two themes, being its aims and functions. CCTV features included creating a safe environment, protection, legal compliance …
Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo
Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo
Articles
In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …
Forum Proceedings From “Uavs: Pros Vs Cons Symposium” In Toronto, Canada, June 2013, Katina Michael
Forum Proceedings From “Uavs: Pros Vs Cons Symposium” In Toronto, Canada, June 2013, Katina Michael
Associate Professor Katina Michael
Unmanned Aerial Systems (UAS), widely referred to as drones, are becoming increasingly relevant in civilian as well as military applications. UAS have been used by emergency services to help respond to and map environmental crises, to find missing people, to fight fires, and respond to traffic accidents. Their use in policing and border patrol functions is being trialled in many Western countries. Like other recent technologies (mobile phones etc), as they become cheaper and easier to use, they are likely to become much more prevalent in civilian life across a range of applications.
This conference will examine the current state …
Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke
Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke
Professor Katina Michael
During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …
Glogging Your Every Move, Lisa Wachsmuth, Katina Michael
Glogging Your Every Move, Lisa Wachsmuth, Katina Michael
Professor Katina Michael
"It is one thing to lug technologies around, another thing to wear them, and even more intrusive to bear them... But that's the direction in which we're headed."
"I think we're entering an era of person-view systems which will show things on ground level and will be increasingly relayed to others via social media.
"We've got people wearing recording devices on their fingers, in their caps or sunglasses - there are huge legal and ethical implications here."
Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael
Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael
Associate Professor Katina Michael
This mixed methods study with a sequential explanatory strategy explored qualitatively the statistically significant quantitative findings relative to Indian respondents’ perceptions about RFID (radio frequency identification) transponders implanted into the human body. In the first analysis phase of the study, there was a significant chi-square analysis reported (χ2 = 56.64, df = 3, p = .000) relative to the perception of small business owners (N = 453) that implanted chips are a more secure form of identification and/or access control in organizations and the respondents’ country of residence. Countries under study included Australia, India, the UK and US. The country …
Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael
Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael
Professor Katina Michael
Tracking and monitoring people as they operate within their personal networks benefits service providers and their constituents but involves hidden risks and costs.
Automatic identification technologies, CCTV cameras, pervasive and mobile networks, wearable computing, location-based services and social networks have traditionally served distinct purposes. However, we have observed patterns of integration, convergence and coexistence among all these innovations within the information and communication technology industry.1For example, ‘location-based social networking’ can draw on a smart phone's capacity to identify a user uniquely, locate him within 1–2m and share this information across his social network in real time. The resulting ability to …
Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt
Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt
Professor Katina Michael
Law disciplines technology, though it does so in a partial and incomplete way as reflected in the old adage that technology outstrips the capacity of law to regulate it. The rise of new technologies poses a significant threat to human rights – the pervasive use of CCTV (and now mobile CCTV), telecommunications interception, and low-cost audio-visual recording and tracking devices (some of these discreetly wearable), extend the power of the state and corporations significantly to intrude into the lives of citizens.
Turtle Cam: Live Multimedia Interaction For Engaging Potential Visitor Population To Canaveral National Seashore, Brian Alfred Tortorelli
Turtle Cam: Live Multimedia Interaction For Engaging Potential Visitor Population To Canaveral National Seashore, Brian Alfred Tortorelli
Electronic Theses and Dissertations
This project expands the outreach of the Canaveral National Seashore to its visitors, potential visitors, and virtual visitors through its goals in conservancy and preservation of its natural resources. This paper is involved with the current iteration of a series of digital media projects, the Sea Turtle Nest Camera, also known as, Turtle Cam. It details how and why this project was designed to be an ongoing initiative to assist in those goals.
Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke
Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke
Associate Professor Katina Michael
Location tracking and monitoring applications have proliferated with the arrival of smart phones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smart phone user down to 10 metres of accuracy on average. Innovators have been quick to capitalise on this emerging market by introducing novel pedestrian tracking technologies which can denote the geographic path of a mobile user. At the same time there is contention by law enforcement personnel over the need for a warrant process to track an individual in a public space. This paper considers the future of location …
The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael
The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael
M. G. Michael
No abstract provided.
The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael
The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael
Professor Katina Michael
No abstract provided.
Dynamic Model Pooling Methodology For Improving Aberration Detection Algorithms, Brenton J. Sellati
Dynamic Model Pooling Methodology For Improving Aberration Detection Algorithms, Brenton J. Sellati
Masters Theses 1911 - February 2014
Syndromic surveillance is defined generally as the collection and statistical analysis of data which are believed to be leading indicators for the presence of deleterious activities developing within a system. Conceptually, syndromic surveillance can be applied to any discipline in which it is important to know when external influences manifest themselves in a system by forcing it to depart from its baseline. Comparing syndromic surveillance systems have led to mixed results, where models that dominate in one performance metric are often sorely deficient in another. This results in a zero-sum trade off where one performance metric must be afforded greater …
National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael
National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael
M. G. Michael
This special issue of Prometheus is dedicated to the theme of the Social Implications of National Security Measures on Citizens and Business. National security measures can be defined as those technical and non-technical measures that have been initiated as a means to curb breaches in national security, irrespective of whether these might occur by nationals or aliens in or from outside the sovereign state. National security includes such government priorities as maintaining border control, safeguarding against pandemic outbreaks, preventing acts of terror, and even discovering and eliminating identification fraud. Governments worldwide are beginning to implement information and communication security techniques …
The Emerging Ethics Of Humancentric Gps Tracking And Monitoring, Katina Michael, Andrew Mcnamee, M G. Michael
The Emerging Ethics Of Humancentric Gps Tracking And Monitoring, Katina Michael, Andrew Mcnamee, M G. Michael
Professor Katina Michael
The Global Positioning System (GPS) is increasingly being adopted by private and public enterprise to track and monitor humans for location-based services (LBS). Some of these applications include personal locators for children, the elderly or those suffering from Alzheimer’s or memory loss, and the monitoring of parolees for law enforcement, security or personal protection purposes. The continual miniaturization of the GPS chipset means that receivers can take the form of wristwatches, mini mobiles and bracelets, with the ability to pinpoint the longitude and latitude of a subject 24/7/365. This paper employs usability context analyses to draw out the emerging ethical …
Interview: Joel Slayton, Christine Laffer
Interview: Joel Slayton, Christine Laffer
SWITCH
Interview with Joel Slayton, Professor of Computers in Fine Art at San José State University, and Director of the CADRE Institute. Slayton discusses the history of the Cadre Institute and details his views on the relationship between art and new technology. Slayton describes the role of artists in exploring the possibilities and ethical implications of emerging technologies such as genetic engineering, nano-techology, robotics, and artificial life. He describes installations and in-progress work focused on ubiquitous video surveillance. The interview concludes with a discussion of Slayton’s use of the DoWhatDo model for artistic collaboration and of his piece "Conduits," presented in …