Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Social and Behavioral Sciences

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael Dec 2012

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael

Associate Professor Katina Michael

The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen ...


Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael Oct 2012

Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael

Associate Professor Katina Michael

This mixed methods study with a sequential explanatory strategy explored qualitatively the statistically significant quantitative findings relative to Indian respondents’ perceptions about RFID (radio frequency identification) transponders implanted into the human body. In the first analysis phase of the study, there was a significant chi-square analysis reported (χ2 = 56.64, df = 3, p = .000) relative to the perception of small business owners (N = 453) that implanted chips are a more secure form of identification and/or access control in organizations and the respondents’ country of residence. Countries under study included Australia, India, the UK and US. The country contributing most ...


The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei Jul 2012

The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei

Associate Professor Katina Michael

The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a ...


Commentary On: Mann, Steve (2012): Wearable Computing, Katina Michael, M.G. Michael Apr 2012

Commentary On: Mann, Steve (2012): Wearable Computing, Katina Michael, M.G. Michael

Associate Professor Katina Michael

In Professor Steve Mann- inventor, physicist, engineer, mathematician, scientist, designer, developer, project director, filmmaker, artist, instrumentalist, author, photographer, actor, activist- we see so much of the paradigmatic classical Greek philosopher. I recall asking Steve if technology shaped society or society shaped technology. He replied along the lines that the question was superfluous. Steve instead pointed to praxis, from which all theory, lessons or skills stem, are practiced, embodied and realized. Steve has always been preoccupied by the application of his ideas into form. In this way too, he can be considered a modern day Leonardo Da Vinci.


Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael Apr 2012

Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael

Associate Professor Katina Michael

With so much buzz around Cloud Computing, books like this one written by Winkler are much in demand. Winkler’s experience in the computing business shines through and as readers we are spoiled with a great deal of useful strategic information- a jam packed almost 300 page volume on securing the cloud.


In Memoriam: Associate Professor Dr Elaine Lawrence, Katina Michael Apr 2012

In Memoriam: Associate Professor Dr Elaine Lawrence, Katina Michael

Associate Professor Katina Michael

Despite being a graduate of the rigorous Bachelor of Information Technology at the University of Technology, Sydney (UTS) in 1996, I was unfortunate in that I missed being taught by Associate Professor Elaine Lawrence who began working at UTS in 1990 as a Lecturer in Computing Science. Dr Lawrence became a senior lecturer in 2000, and subsequently an associate professor in 2006. Our paths crossed in 2002 when I was tasked to deliver a new course entitled “eBusiness Principles” in my first year of lecturing at the University of Wollongong, and after an initial scurry to find an adequate textbook ...


Sousveillance And The Social Implications Of Point Of View Technologies In The Law Enforcement Sector, Katina Michael, M.G. Michael Feb 2012

Sousveillance And The Social Implications Of Point Of View Technologies In The Law Enforcement Sector, Katina Michael, M.G. Michael

Associate Professor Katina Michael

Policing today has become a high-tech affair; especially in the provision of incident event tracking and reporting systems increasingly being used to provide evidence in a court of law. These in-car video (ICV) and body worn recording systems are said to increase convictions and eliminate false claims made by defendants, providing documentary support to police officers and their associated actions in an incident. But today, new technologies such as smart phones equipped with cameras and global positioning system chipsets can also be found in the hands of the everyday citizen, used to capture everyday happenings and distributed to social networks ...


Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael Jan 2012

Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael

Associate Professor Katina Michael

In an age of outsourcing tasks that are not considered to be a core competency of the business, organisations have often relied on external consultants for matters pertaining to security. In actual fact, most companies could have utilized existing skill-sets in-house to produce a security risk management program, if only they knew what steps to take, and how to go about it all. Evan Wheeler in his book on information security risk management does just that- he equips professionals tasked with security, with the thinking required to create a program that is more preoccupied with the complex strategic-level questions than ...


Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke Jan 2012

Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke

Associate Professor Katina Michael

Location tracking and monitoring applications have proliferated with the arrival of smart phones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smart phone user down to 10 metres of accuracy on average. Innovators have been quick to capitalise on this emerging market by introducing novel pedestrian tracking technologies which can denote the geographic path of a mobile user. At the same time there is contention by law enforcement personnel over the need for a warrant process to track an individual in a public space. This paper considers the future of location ...