Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Social and Behavioral Sciences

National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael May 2008

National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael

M. G. Michael

This special issue of Prometheus is dedicated to the theme of the Social Implications of National Security Measures on Citizens and Business. National security measures can be defined as those technical and non-technical measures that have been initiated as a means to curb breaches in national security, irrespective of whether these might occur by nationals or aliens in or from outside the sovereign state. National security includes such government priorities as maintaining border control, safeguarding against pandemic outbreaks, preventing acts of terror, and even discovering and eliminating identification fraud. Governments worldwide are beginning to implement information and communication security techniques …


Privacy, Value And Control Issues In Four Mobile Business Applications, Benjamin D. Renegar, Katina Michael, M G. Michael May 2008

Privacy, Value And Control Issues In Four Mobile Business Applications, Benjamin D. Renegar, Katina Michael, M G. Michael

M. G. Michael

This paper presents four case studies that explore the adoption and acceptance of mobile technologies and services within the context of the privacy-value-control (PVC) trichotomy. The technologies studied include: the mobile phone, electronic toll payment tags, e-passports, and loyalty card programs. The study shows that despite the potential barriers to adoption in each of the depicted cases, the applications were embraced with great success soon after their introduction. An understanding of why these mobile innovations succeeded in spite of the concerns surrounding them will serve to help practitioners understand other issues currently plaguing emerging technologies like radio-frequency identification (RFID) tags …


Participatory Privacy In Urban Sensing, Katie Shilton, Jeffrey A. Burke, Deborah Estrin, Mark Hansen, Mani B. Srivastava Apr 2008

Participatory Privacy In Urban Sensing, Katie Shilton, Jeffrey A. Burke, Deborah Estrin, Mark Hansen, Mani B. Srivastava

Ethics in Science and Engineering National Clearinghouse

Urban sensing systems that use mobile phones enable individuals and communities to collect and share data with unprecedented speed, accuracy and granularity. But employing mobile handsets as sensor nodes poses new challenges for privacy, data security, and ethics. To address these challenges, CENS is developing design principles based upon understanding privacy regulation as a participatory process. This paper briefly reviews related literature and introduces the concept of participatory privacy regulation. PPR reframes negotiations of social context as an important part of participation in sensing-supported research. It engages participants in ethical decision-making and the meaningful negotiation of personal boundaries and …


Research In The Biotech Age: Can Informational Privacy Compete?, Wilhelm Peekhaus Jan 2008

Research In The Biotech Age: Can Informational Privacy Compete?, Wilhelm Peekhaus

Wilhelm Peekhaus

This paper examines the privacy of personal medical information in the health research context. Arguing that biomedical research in Canada has been caught up in the government’s broader neo-liberal policy agenda that has positioned biotechnology as a strategic driver of economic growth, the author discusses the tension between informational privacy and the need for medical information for research purposes. Consideration is given to the debate about whether privacy for medical information serves or hinders the ‘public good’ in respect of medical research, and to discussions of informed consent as an element of ‘fair information practices’ designed to safeguard the privacy …


Formal Security Definition And Efficient Construction For Roaming With A Privacy-Preserving Extension, Guomin Yang, Duncan S. Wong, Xiaotie Deng Jan 2008

Formal Security Definition And Efficient Construction For Roaming With A Privacy-Preserving Extension, Guomin Yang, Duncan S. Wong, Xiaotie Deng

Faculty of Engineering and Information Sciences - Papers: Part A

In a secure roaming scenario, a user U travels to a foreign network and communicates with a foreign server V securely so that no one other than U and V can obtain the messages exchanged between them. U may also want to travel anonymously so that no one including V can find out its identity or trace its whereabouts except its home server H. There have been many key establishment protocols proposed for secure roaming. A typical application of these protocols is the mobile roaming service which may be deployed to interconnected WLAN and 3G networks. Despite the importance of …