Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (10)
- Law (10)
- Physical Sciences and Mathematics (9)
- Business (8)
- Computer Sciences (8)
-
- Public Affairs, Public Policy and Public Administration (8)
- Science and Technology Studies (8)
- Sociology (8)
- Computer Law (6)
- Criminology (6)
- Internet Law (6)
- Law and Society (6)
- Other Engineering (6)
- Public Policy (6)
- Social Policy (6)
- Technology and Innovation (6)
- Arts and Humanities (5)
- Communication (5)
- Communication Technology and New Media (3)
- Criminal Law (2)
- Fourth Amendment (2)
- Law and Politics (2)
- Legal Studies (2)
- Medicine and Health Sciences (2)
- National Security Law (2)
- Social Influence and Political Communication (2)
- Administrative Law (1)
- American Studies (1)
- Civil Rights and Discrimination (1)
- Publication
- File Type
Articles 1 - 27 of 27
Full-Text Articles in Social and Behavioral Sciences
Americans, Marketers, And The Internet: 1999-2012, Joseph Turow, Amy Bleakley, John Bracken, Michael X. Delli Carpini, Nora A. Draper, Lauren Feldman, Nathaniel Good, Jens Grossklags, Michael Hennessy, Chris Jay Hoofnagle, Rowan Howard-Williams, Jennifer King, Su Li, Kimberly Meltzer, Deirdre K. Mulligan, Lilach Nir
Americans, Marketers, And The Internet: 1999-2012, Joseph Turow, Amy Bleakley, John Bracken, Michael X. Delli Carpini, Nora A. Draper, Lauren Feldman, Nathaniel Good, Jens Grossklags, Michael Hennessy, Chris Jay Hoofnagle, Rowan Howard-Williams, Jennifer King, Su Li, Kimberly Meltzer, Deirdre K. Mulligan, Lilach Nir
Chris Jay Hoofnagle
This is a collection of the reports on the Annenberg national surveys that explored Americans' knowledge and opinions about the new digital-marketing world that was becoming part of their lives. So far we’ve released seven reports on the subject, in 1999, 2000, 2003, 2005, 2009, 2010, and 2012. The reports raised or deepened a range of provocative topics that have become part of public, policy, and industry discourse. In addition to these reports, I’ve included three journal articles — from I/S, New Media & Society and the Journal of Consumer Affairs — that synthesize some of the findings and place …
Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller
Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller
Teresa A. Miller
In prison, surveillance is power and power is sexualized. Sex and surveillance, therefore, are profoundly linked. Whereas numerous penal scholars from Bentham to Foucault have theorized the force inherent in the visual monitoring of prisoners, the sexualization of power and the relationship between sex and surveillance is more academically obscure. This article criticizes the failure of federal courts to consider the strong and complex relationship between sex and surveillance in analyzing the constitutionality of prison searches, specifically, cross-gender searches. The analysis proceeds in four parts. Part One introduces the issues posed by sex and surveillance. Part Two describes the sexually …
Mission Possible: Safeguarding The Heritage Of The California Missions, Rubén Mendoza
Mission Possible: Safeguarding The Heritage Of The California Missions, Rubén Mendoza
Rubén Mendoza
No abstract provided.
Incidence Rates For Work Health And Safety Incidents And Injuries In Australian Army Reserve Vs Full Time Soldiers, And A Comparison Of Reporting Systems, Rodney Pope, Rob Orr
Incidence Rates For Work Health And Safety Incidents And Injuries In Australian Army Reserve Vs Full Time Soldiers, And A Comparison Of Reporting Systems, Rodney Pope, Rob Orr
Rob Marc Orr
Objective:
To determine incidence rates of reported work health and safety (WHS) incidents and injuries in Army Reserve (ARES) and Australian Regular Army (ARA) personnel and assess the relative performance of the WHS incident reporting system, compared to ‘point-of-care’ systems.
Methods:
WHS incident data for a 24-month period were extracted from a military database. Reported WHS incident and injury rates for both populations were calculated and compared. The WHS injury rates were compared with previously published injury incidence rates based on ‘point-of-care’ incident reporting in Army populations to ascertain relative performance of WHS and ‘point-of-care’ systems.
Results:
In both populations …
Irresistible Bargains: Navigating The Surveillance Society, Robert M. Pallitto
Irresistible Bargains: Navigating The Surveillance Society, Robert M. Pallitto
Robert M Pallitto
Mhealth For Influenza Pandemic Surveillance In Developing Countries, Junhua Li, Nathan Moore, Shahriar Akter, Steven Bleisten, Pradeep Ray
Mhealth For Influenza Pandemic Surveillance In Developing Countries, Junhua Li, Nathan Moore, Shahriar Akter, Steven Bleisten, Pradeep Ray
Shahriar Akter
Influenza pandemics caused millions of deaths and massive economic losses worldwide in the last century. The impact of any future pandemic is likely to be greatest in developing countries as a result of their limited surveillance and healthcare resources. eHealth facilitates the detection and reporting of potential pandemic strains by using digital data transmitted, sorted and retrieved electronically both at the local site and at a distance. The implementation of eHealth is resource costly but developing countries have limited financial and technical resources. This adversely affects access to eHealth applications. Mobile communication technologies hold great promise in improving access to …
Using Data From Patient Interactions In Primary Care For Population Level Chronic Disease Surveillance: The Sentinel Practices Data Sourcing (Spds) Project, Abhijeet Ghosh, Karen Charlton, Lisa Girdo, Marijka Batterham
Using Data From Patient Interactions In Primary Care For Population Level Chronic Disease Surveillance: The Sentinel Practices Data Sourcing (Spds) Project, Abhijeet Ghosh, Karen Charlton, Lisa Girdo, Marijka Batterham
Dr Marijka Batterham
Background Population health planning within a health district requires current information on health profiles of the target population. Information obtained during primary care interactions may provide a valuable surveillance system for chronic disease burden. The Sentinel Practices Data Sourcing project aimed to establish a sentinel site surveillance system to obtain a region-specific estimate of the prevalence of chronic diseases and mental health disorders within the Illawarra-Shoalhaven region of New South Wales, Australia. Methods In September 2013, de-identified information for all patient interactions within the preceding 24 months was extracted and collated using a computerised chronic disease management program that has …
Keynote: Justifying Uberveillance- The Internet Of Things And The Flawed Sustainability Premise, Katina Michael
Keynote: Justifying Uberveillance- The Internet Of Things And The Flawed Sustainability Premise, Katina Michael
Professor Katina Michael
Imagine a world where everything was numbered. Not just homes with street addresses, or cars with number plates, or smart phones with telephone numbers, or email addresses with passwords, but absolutely everything you could see and touch and even that which you could not. Well, that world is here, right now. This vast expanse we call “Earth” is currently being quantified and photographed, inch by inch, by satellites, street cameras, drones and high altitude balloons. Longitude and latitude coordinates provide us with the precise degrees, minutes and seconds of the physical space, and unique time stamps tell us where a …
Reflections From The Wearable Computing Conference In Toronto, Canada, Nick Rheinberger, Katina Michael, Alexander Hayes
Reflections From The Wearable Computing Conference In Toronto, Canada, Nick Rheinberger, Katina Michael, Alexander Hayes
Alexander Hayes Mr.
Could sports men and women who are monitored using wearable computers actually be playing to a global theatre to ensure the upkeep of their performance benchmarks instead of consciously watching and reacting to what is happening in the game they are playing? What are the social implications of heart rate monitors and GPS units now embedded into player clothing? What were some of the reflections from the IEEE ISTAS13 meeting on Wearable Computers in Every Day Life? What were some of the main messages that you walked away with from that conference? What made the greatest impression on us was …
Using A Social-Ethical Framework To Evaluate Location-Based Services In An Internet Of Things World, Roba Abbas, Katina Michael, Mg Michael
Using A Social-Ethical Framework To Evaluate Location-Based Services In An Internet Of Things World, Roba Abbas, Katina Michael, Mg Michael
Dr Roba Abbas
The idea for an Internet of Things has matured since its inception as a concept in 1999. People today speak openly of a Web of Things and People, and even more broadly of an Internet of Everything. As our relationships become more and more complex and enmeshed, through the use of advanced technologies, we have pondered on ways to simplify flows of communications, to collect meaningful data, and use them to make timely decisions with respect to optimisation and efficiency. At their core, these flows of communications are pathways to registers of interaction, and tell the intricate story of outputs …
Hack Or Be Hacked: The Quasi-Totalitarianism Of Global Trusted Networks, Athina Karatzogianni, Martin Gak
Hack Or Be Hacked: The Quasi-Totalitarianism Of Global Trusted Networks, Athina Karatzogianni, Martin Gak
Athina Karatzogianni
War Against Muslims Post 9/11?, Alev Dudek
War Against Muslims Post 9/11?, Alev Dudek
Alev Dudek
Wer Kann Sie Erraten?, Michael Friedewald, Dara Hallinan, Philip Schütz, Paul De Hert
Wer Kann Sie Erraten?, Michael Friedewald, Dara Hallinan, Philip Schütz, Paul De Hert
Michael Friedewald
No abstract provided.
Immigration Policing And Federalism Through The Lens Of Technology, Surveillance, And Privacy, Anil Kalhan
Immigration Policing And Federalism Through The Lens Of Technology, Surveillance, And Privacy, Anil Kalhan
Anil Kalhan
With the deployment of technology, federal programs to enlist state and local police assistance with immigration enforcement are undergoing a sea change. For example, even as it forcefully has urged invalidation of Arizona’s S.B. 1070 and similar state laws, the Obama administration has presided over the largest expansion of state and local immigration policing in U.S. history with its implementation of the “Secure Communities” program, which integrates immigration and criminal history database systems in order to automatically ascertain the immigration status of every individual who is arrested and booked by state and local police nationwide. By 2012, over one fifth …
Panel 2- Regulation, Policy Recommendations And Responses, Jonathan Clough, Scott Mellis, Simon Brown, Graham Ingram, Alana Maurushat, Katina Michael, Jason Ryning
Panel 2- Regulation, Policy Recommendations And Responses, Jonathan Clough, Scott Mellis, Simon Brown, Graham Ingram, Alana Maurushat, Katina Michael, Jason Ryning
Professor Katina Michael
A roundtable to be held on cybercrime at ANU. Panel 1 to be on the changing nature of cybercrime: threat and trend update. Panel 2 on regulation, policy recommendations and responses. Panel 3 on technical measures to combat cybercrime. Panel 4 on the investigation of cybercrime and victimisation. Panel 2 to be keynoted by Keith Besgrove (DBCD) and chaired by Jonathan Clough.
The Not-So-Simple Saga Of Edward And Barack..., Michael I. Niman Ph.D.
The Not-So-Simple Saga Of Edward And Barack..., Michael I. Niman Ph.D.
Michael I Niman Ph.D.
It reads like a political thriller. An NSA spook, Edward Snowden, meets his conscience, blows the whistle on a massive secret attack on the Fourth Amendment, and is pursued globally by an obsessed president. Spice things up with a bit of character development cross-pollinated with a history lesson. First there’s Darth President. His administration has earned the distinction of invoking the Espionage Act of 1917 (a constitutionally questionable World War One relic) more than all other presidents in the previous 96 years combined—by a factor of two. The Obama administration has charged eight people under the act. All previous administrations …
Strategies To Address Iodine Deficiency In Australia Require Ongoing Monitoring And Surveillance, Heather Yeatman, Karen E. Charlton
Strategies To Address Iodine Deficiency In Australia Require Ongoing Monitoring And Surveillance, Heather Yeatman, Karen E. Charlton
Karen E. Charlton
No abstract provided.
Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke
Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke
Professor Katina Michael
During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …
Was Blind But Now I See: Animal Liberation Documentaries’ Deconstruction Of Barriers To Witnessing Injustice, Carrie Packwood Freeman, Scott Tulloch
Was Blind But Now I See: Animal Liberation Documentaries’ Deconstruction Of Barriers To Witnessing Injustice, Carrie Packwood Freeman, Scott Tulloch
Carrie P. Freeman
Many pro-animal documentaries are built around footage taken by undercover animal activists uncovering abuses in industries such as agriculture and fishing, fur, marine parks, and biomedical research labs. This analysis explores the central role of undercover activist footage in recent documentaries: Earthlings, The Cove, The Witness, Peaceable Kingdom, Behind the Mask, Fowl Play, and Dealing Dogs. Considering both form and function, I investigate how this undercover footage works in terms of providing an inherent critique of power in our relationship with nonhuman animals – a sense of witnessing a crime that is an injustice both in terms of causing animal …
Bargaining With The Machine: A Framework For Describing Encounters With Surveillance Technologies, Robert M. Pallitto
Bargaining With The Machine: A Framework For Describing Encounters With Surveillance Technologies, Robert M. Pallitto
Robert M Pallitto
Glogging Your Every Move, Lisa Wachsmuth, Katina Michael
Glogging Your Every Move, Lisa Wachsmuth, Katina Michael
Professor Katina Michael
"It is one thing to lug technologies around, another thing to wear them, and even more intrusive to bear them... But that's the direction in which we're headed."
"I think we're entering an era of person-view systems which will show things on ground level and will be increasingly relayed to others via social media.
"We've got people wearing recording devices on their fingers, in their caps or sunglasses - there are huge legal and ethical implications here."
Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael
Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael
Professor Katina Michael
Tracking and monitoring people as they operate within their personal networks benefits service providers and their constituents but involves hidden risks and costs.
Automatic identification technologies, CCTV cameras, pervasive and mobile networks, wearable computing, location-based services and social networks have traditionally served distinct purposes. However, we have observed patterns of integration, convergence and coexistence among all these innovations within the information and communication technology industry.1For example, ‘location-based social networking’ can draw on a smart phone's capacity to identify a user uniquely, locate him within 1–2m and share this information across his social network in real time. The resulting ability to …
Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt
Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt
Professor Katina Michael
Law disciplines technology, though it does so in a partial and incomplete way as reflected in the old adage that technology outstrips the capacity of law to regulate it. The rise of new technologies poses a significant threat to human rights – the pervasive use of CCTV (and now mobile CCTV), telecommunications interception, and low-cost audio-visual recording and tracking devices (some of these discreetly wearable), extend the power of the state and corporations significantly to intrude into the lives of citizens.
The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael
The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael
M. G. Michael
No abstract provided.
The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael
The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael
Professor Katina Michael
No abstract provided.
National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael
National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael
M. G. Michael
This special issue of Prometheus is dedicated to the theme of the Social Implications of National Security Measures on Citizens and Business. National security measures can be defined as those technical and non-technical measures that have been initiated as a means to curb breaches in national security, irrespective of whether these might occur by nationals or aliens in or from outside the sovereign state. National security includes such government priorities as maintaining border control, safeguarding against pandemic outbreaks, preventing acts of terror, and even discovering and eliminating identification fraud. Governments worldwide are beginning to implement information and communication security techniques …
The Emerging Ethics Of Humancentric Gps Tracking And Monitoring, Katina Michael, Andrew Mcnamee, M G. Michael
The Emerging Ethics Of Humancentric Gps Tracking And Monitoring, Katina Michael, Andrew Mcnamee, M G. Michael
Professor Katina Michael
The Global Positioning System (GPS) is increasingly being adopted by private and public enterprise to track and monitor humans for location-based services (LBS). Some of these applications include personal locators for children, the elderly or those suffering from Alzheimer’s or memory loss, and the monitoring of parolees for law enforcement, security or personal protection purposes. The continual miniaturization of the GPS chipset means that receivers can take the form of wristwatches, mini mobiles and bracelets, with the ability to pinpoint the longitude and latitude of a subject 24/7/365. This paper employs usability context analyses to draw out the emerging ethical …