Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Social and Behavioral Sciences

Cloud Computing Data Breaches: A Socio-Technical Review Of Literature, David Kolevski, Katina Michael Oct 2015

Cloud Computing Data Breaches: A Socio-Technical Review Of Literature, David Kolevski, Katina Michael

Professor Katina Michael

As more and more personal, enterprise and government data, services and infrastructure moves to the cloud for storage and processing, the potential for data breaches increases. Already major corporations that have outsourced some of their IT requirements to the cloud have become victims of cyber attacks. Who is responsible and how to respond to these data breaches are just two pertinent questions facing cloud computing stakeholders who have entered an agreement on cloud services. This paper reviews literature in the domain of cloud computing data breaches using a socio-technical approach. Socio-technical theory encapsulates three major dimensions- the social, the technical, …


Perceived Barriers For Implanting Microchips In Humans: A Transnational Study, Christine Perakslis, Katina Michael, M.G. Michael, Robert Gable Jun 2014

Perceived Barriers For Implanting Microchips In Humans: A Transnational Study, Christine Perakslis, Katina Michael, M.G. Michael, Robert Gable

Professor Katina Michael

This quantitative, descriptive study investigated if there was a relationship between countries of residence of small business owners (N = 453) within four countries (Australia, India, UK, and the USA) with respect to perceived barriers to RFID (radio frequency identification) transponders being implanted into humans for employee ID. Participants were asked what they believed were the greatest barriers in instituting chip implants for access control in organizations. Participants had six options from which to select. There were significant chi-square analyses reported relative to respondents’ countries and: 1) a perceived barrier of technological issues (χ2 = 11.86, df = 3, p …


The Dark Side Of Online Gaming, Katherine Albrecht, Katina Michael, M.G. Michael Jun 2014

The Dark Side Of Online Gaming, Katherine Albrecht, Katina Michael, M.G. Michael

Professor Katina Michael

Horror stories in the media abound in relation to online gaming addiction- of parents disregarding their kids to the point of starvation spouses quarreling or divorcing, students flunking out of school, young men and women dying from heart attacks, even kids poisoning their parents to get online in order to play their favorite game spending copious time away from their family responsibilities. We shake our heads at these previously unimaginable stories of excess, but lately they've begun hitting closer to home. How many readers have seen close friends, even family members seduced away from their meaningful relationships by the promise …


We Got To Do Better, Katherine Albrecht, Katina Michael Mar 2014

We Got To Do Better, Katherine Albrecht, Katina Michael

Professor Katina Michael

Each year, thousands of film buffs gather at the Sundance International Film Festival in park City, UT, U.S.A., to see the offerings of the world’s brightest filmmakers. If it’s true that movies reflect the preoccupations and obsessions of the larger culture, it’s eye opening that three of the twelve contenders for international documentary film this year address the dark side of screen technology.

Love Child, looks at the tragic 2010 death by neglect of a three-month-old baby named “Sarang” (“Love” in Korean), when her parents spent up to twelve hours a day playing the game Prius, caring for their avatar …


No Limits To Watching?, Katina Michael, M.G. Michael Nov 2013

No Limits To Watching?, Katina Michael, M.G. Michael

Professor Katina Michael

Little by little, the introduction of new body-worn technologies is transforming the way people interact with their environment and one another, and perhaps even with themselves. Social and environmental psychology studies of human-technology interaction pose as many questions as answers. We are learning as we go: 'learning by doing' through interaction and 'learning by being'. Steve Mann calls this practice existential learning; wearers become photoborgs, a type of cyborg (cybernetic organism) whose primary intent is image capture from the domains of the natural and artificial. This approach elides the distinction between the technology and the human; they coalesce into one.


Panel 2- Regulation, Policy Recommendations And Responses, Jonathan Clough, Scott Mellis, Simon Brown, Graham Ingram, Alana Maurushat, Katina Michael, Jason Ryning Nov 2013

Panel 2- Regulation, Policy Recommendations And Responses, Jonathan Clough, Scott Mellis, Simon Brown, Graham Ingram, Alana Maurushat, Katina Michael, Jason Ryning

Professor Katina Michael

A roundtable to be held on cybercrime at ANU. Panel 1 to be on the changing nature of cybercrime: threat and trend update. Panel 2 on regulation, policy recommendations and responses. Panel 3 on technical measures to combat cybercrime. Panel 4 on the investigation of cybercrime and victimisation. Panel 2 to be keynoted by Keith Besgrove (DBCD) and chaired by Jonathan Clough.


Wie Featured Person Of The Month Highlights (Katina Michael), Keyana Tenant, Katina Michael Jan 2013

Wie Featured Person Of The Month Highlights (Katina Michael), Keyana Tenant, Katina Michael

Professor Katina Michael

The WIE Featured Person of the Month is Katina Michael, editor-in-chief of IEEE Technology and Society Magazine. After working at OTIS Elevator Company and Andersen Consulting, Katina was offered and exciting graduate engineering position at Nortel in 1996; and her career has been fast track from there. Read Katina’s story on Page 7.


Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael Dec 2012

Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael

Professor Katina Michael

This special section is dedicated to privacy in the information age. Since the rise of mobile social media in particular and the advent of cloud computing few can dispute that the times have changed. Privacy is now understood in context, and within a framework that is completely different to what it once was. The right to be let alone physically seemingly has been replaced by the right to give away as much information as you want virtually. What safeguards can be introduced into such a society? We cannot claim to wish for privacy as a right if we ourselves do …


Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom Dec 2012

Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom

Professor Katina Michael

Mobile Government Briefing: Provide services anywhere any time: - Transact to enable in-field data collection, request processing, order management, approvals, edits, updates and execute actions. - What are the implications for the incorporation of rich multimedia content on devices to better serve staff and citizens? - Addressing the security challenges of various risks around data access, data transmission, and data storage for BI architecture and mobile devices


Ieee T&S Magazine: Undergoing Transformation, Katina Michael Nov 2012

Ieee T&S Magazine: Undergoing Transformation, Katina Michael

Professor Katina Michael

Our Magazine is in a transformative period, not only because we are ‘Going Green’ in 2013 but because we are experiencing tremendous growth in quality international submissions. This means that we are increasingly appealing to an international audience with transdisciplinary interests. This has not gone unnoticed by the media, nor by our SSIT readership or wider engineering community.


Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael Jun 2012

Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael

Professor Katina Michael

Hacking: The Next Generation demonstrates just how hackers continue to exploit “back doors”. New ways of working and new ways of communicating have meant that the number of attack vectors continue to rise rapidly. This provides hackers with a greater number of opportunities to penetrate systems using blended approaches while organizations struggle to come up to speed with the latest technology developments and commensurate security capabilities. Dealing with anticipated threats is a lot harder than dealing with known threats.


Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael Jun 2012

Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael

Professor Katina Michael

Tracking and monitoring people as they operate within their personal networks benefits service providers and their constituents but involves hidden risks and costs.

Automatic identification technologies, CCTV cameras, pervasive and mobile networks, wearable computing, location-based services and social networks have traditionally served distinct purposes. However, we have observed patterns of integration, convergence and coexistence among all these innovations within the information and communication technology industry.1For example, ‘location-based social networking’ can draw on a smart phone's capacity to identify a user uniquely, locate him within 1–2m and share this information across his social network in real time. The resulting ability to …


Editorial: The Idio-Technopolis, Katina Michael May 2012

Editorial: The Idio-Technopolis, Katina Michael

Professor Katina Michael

The rapid rise of social media has brought with it an emphasis on the distinct dimensions of the whole person. Social media recognises that the individual has a personal network of extensions- a home life, a work life, a social life, a study life, a hobbyist life, and much more- some of these identities even hidden from full view. Each of these online value networks are now accessible by big business, where opinion leaders and early adopters are easily distinguishable, and where brand commentary between consumers matters manifold more than any form of targeted advertising.


Editorial: "You Talkin' To Me?", Katina Michael Feb 2012

Editorial: "You Talkin' To Me?", Katina Michael

Professor Katina Michael

Advancing knowledge through robust research is an honourable aim- being scientific, finding the right methodology, executing project phases meticulously, and reporting on the outcomes as objectively and accurately as possible. But may I begin my inaugural editorial by saying that an even higher ideal to advancing knowledge is critiquing it as it happens. Reflective practice is not just something to be done by academics in their teaching- reflective practice is what we should all be doing as we go about undertaking our various day-to-day work tasks. For the engineer engaged in research and development, whether in industry or government, reflective …


The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael Aug 2011

The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael

Professor Katina Michael

No abstract provided.


The Social Implications Of Emerging Technologies, Katina Michael Jun 2010

The Social Implications Of Emerging Technologies, Katina Michael

Professor Katina Michael

As the Program Committee Chair, I would like to first and foremost thank the forty person strong international program committee for their support, feedback and contributions from the outset. The Committee itself was made up of researchers from 11 countries, covering diverse disciplines and expertise. In their own right members of the program committee are renowned researchers, cited in many of the papers appearing in this year’s ISTAS full proceedings, and over the years appearing in associated publications such as IEEE Technology and Society Magazine. It was such an honour to work with persons possessing a truly collaborative spirit, some …


The Social Implications Of Information Security Measures On Citizens And Business, K. Michael, M. G. Michael May 2006

The Social Implications Of Information Security Measures On Citizens And Business, K. Michael, M. G. Michael

Professor Katina Michael

The 2006 Workshop on the Social Implications of Information Security Measures on Citizens and Business was organised by the Research Network for a Secure Australia (RNSA) funded by the Australian Research Council. The Workshop will become a biennial event bringing together both researchers and practitioners in the fields relating to the national research priority entitled Safeguarding Australia.

In 2006, the workshop was held on the 29th May, at the Function Centre at the University of Wollongong between 8.30 am and 5.00 pm.

The Workshop was organised by RNSA members of the Centre for eBusiness Applications Research at the University of …