Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 30

Full-Text Articles in Social and Behavioral Sciences

Cloud Computing Data Breaches: A Socio-Technical Review Of Literature, David Kolevski, Katina Michael Oct 2015

Cloud Computing Data Breaches: A Socio-Technical Review Of Literature, David Kolevski, Katina Michael

Professor Katina Michael

As more and more personal, enterprise and government data, services and infrastructure moves to the cloud for storage and processing, the potential for data breaches increases. Already major corporations that have outsourced some of their IT requirements to the cloud have become victims of cyber attacks. Who is responsible and how to respond to these data breaches are just two pertinent questions facing cloud computing stakeholders who have entered an agreement on cloud services. This paper reviews literature in the domain of cloud computing data breaches using a socio-technical approach. Socio-technical theory encapsulates three major dimensions- the social, the technical, …


Keynote: Justifying Uberveillance- The Internet Of Things And The Flawed Sustainability Premise, Katina Michael Oct 2015

Keynote: Justifying Uberveillance- The Internet Of Things And The Flawed Sustainability Premise, Katina Michael

Professor Katina Michael

Imagine a world where everything was numbered. Not just homes with street addresses, or cars with number plates, or smart phones with telephone numbers, or email addresses with passwords, but absolutely everything you could see and touch and even that which you could not. Well, that world is here, right now. This vast expanse we call “Earth” is currently being quantified and photographed, inch by inch, by satellites, street cameras, drones and high altitude balloons. Longitude and latitude coordinates provide us with the precise degrees, minutes and seconds of the physical space, and unique time stamps tell us where a …


Ieee Istas13- People As Sensors: The Social Implications Of Living In A Smart World, Alexander Hayes, Katina Michael, Nick Rheinberger Jun 2015

Ieee Istas13- People As Sensors: The Social Implications Of Living In A Smart World, Alexander Hayes, Katina Michael, Nick Rheinberger

Alexander Hayes Mr.

What is the technological trajectory of people wearing sensors? What are the benefits, risks and costs? What is the vibe going to be like at ISTAS13 with people like Marvin Minsky and Ray Kurzweil attending? What do you hope to gain from the meeting? Can we foresee a time that all glasses will be embedded with sensors? What are the implications? E.g. in the higher education sector? What about the gathering of evidence by law enforcement? What is point of eye?


Reflections From The Wearable Computing Conference In Toronto, Canada, Nick Rheinberger, Katina Michael, Alexander Hayes Jun 2015

Reflections From The Wearable Computing Conference In Toronto, Canada, Nick Rheinberger, Katina Michael, Alexander Hayes

Alexander Hayes Mr.

Could sports men and women who are monitored using wearable computers actually be playing to a global theatre to ensure the upkeep of their performance benchmarks instead of consciously watching and reacting to what is happening in the game they are playing? What are the social implications of heart rate monitors and GPS units now embedded into player clothing? What were some of the reflections from the IEEE ISTAS13 meeting on Wearable Computers in Every Day Life? What were some of the main messages that you walked away with from that conference? What made the greatest impression on us was …


Using A Social-Ethical Framework To Evaluate Location-Based Services In An Internet Of Things World, Roba Abbas, Katina Michael, Mg Michael May 2015

Using A Social-Ethical Framework To Evaluate Location-Based Services In An Internet Of Things World, Roba Abbas, Katina Michael, Mg Michael

Associate Professor Katina Michael

The idea for an Internet of Things has matured since its inception as a concept in 1999. People today speak openly of a Web of Things and People, and even more broadly of an Internet of Everything. As our relationships become more and more complex and enmeshed, through the use of advanced technologies, we have pondered on ways to simplify flows of communications, to collect meaningful data, and use them to make timely decisions with respect to optimisation and efficiency. At their core, these flows of communications are pathways to registers of interaction, and tell the intricate story of outputs …


Perceived Barriers For Implanting Microchips In Humans: A Transnational Study, Christine Perakslis, Katina Michael, M.G. Michael, Robert Gable Jun 2014

Perceived Barriers For Implanting Microchips In Humans: A Transnational Study, Christine Perakslis, Katina Michael, M.G. Michael, Robert Gable

Professor Katina Michael

This quantitative, descriptive study investigated if there was a relationship between countries of residence of small business owners (N = 453) within four countries (Australia, India, UK, and the USA) with respect to perceived barriers to RFID (radio frequency identification) transponders being implanted into humans for employee ID. Participants were asked what they believed were the greatest barriers in instituting chip implants for access control in organizations. Participants had six options from which to select. There were significant chi-square analyses reported relative to respondents’ countries and: 1) a perceived barrier of technological issues (χ2 = 11.86, df = 3, p …


The Dark Side Of Online Gaming, Katherine Albrecht, Katina Michael, M.G. Michael Jun 2014

The Dark Side Of Online Gaming, Katherine Albrecht, Katina Michael, M.G. Michael

Professor Katina Michael

Horror stories in the media abound in relation to online gaming addiction- of parents disregarding their kids to the point of starvation spouses quarreling or divorcing, students flunking out of school, young men and women dying from heart attacks, even kids poisoning their parents to get online in order to play their favorite game spending copious time away from their family responsibilities. We shake our heads at these previously unimaginable stories of excess, but lately they've begun hitting closer to home. How many readers have seen close friends, even family members seduced away from their meaningful relationships by the promise …


Persona Categories: Highly Sought Places For Aussies To Live, Lachlan Hastings, Katina Michael May 2014

Persona Categories: Highly Sought Places For Aussies To Live, Lachlan Hastings, Katina Michael

Associate Professor Katina Michael

The site has been touted as potentially useful to retailers trying to determine where to locate future outlets.

However, Australian Privacy Foundation vice-chair Katina Michael said companies applying profiles could get it dramatically wrong or right.

Michael said that consumers had a choice to make in light of the "big data" trend, which often mischaracterised people.

"We can continue to believe the rhetoric that says: "We are doing no harm to individuals, it is hardly tracking when profiling small neighbourhoods"... or we can begin to demand an end to the on-selling of personal information,"she said.


We Got To Do Better, Katherine Albrecht, Katina Michael Mar 2014

We Got To Do Better, Katherine Albrecht, Katina Michael

Professor Katina Michael

Each year, thousands of film buffs gather at the Sundance International Film Festival in park City, UT, U.S.A., to see the offerings of the world’s brightest filmmakers. If it’s true that movies reflect the preoccupations and obsessions of the larger culture, it’s eye opening that three of the twelve contenders for international documentary film this year address the dark side of screen technology.

Love Child, looks at the tragic 2010 death by neglect of a three-month-old baby named “Sarang” (“Love” in Korean), when her parents spent up to twelve hours a day playing the game Prius, caring for their avatar …


Connected: To Everyone And Everything, Katherine Albrecht, Katina Michael Dec 2013

Connected: To Everyone And Everything, Katherine Albrecht, Katina Michael

Associate Professor Katina Michael

The activist group CASPIAN (Consumers Against Supermarket Privacy Invasion and Numbering) was founded in 1999 by Katherine Albrecht, the very same year that Kevin Ashton co-founder and executive director of the then Auto-ID Center at MIT made a presentation to Proctor & Gamble with a title that included the phrase “Internet of Things”. According to Ashton, “the most numerous and important routers of all” are people but people have limitations and are not very good at capturing data about objects in the physical world. In 2001, Ashton’s automatic identification vision had become a lot clearer. At the Auto-ID Center during …


No Limits To Watching?, Katina Michael, M.G. Michael Nov 2013

No Limits To Watching?, Katina Michael, M.G. Michael

M. G. Michael

Little by little, the introduction of new body-worn technologies is transforming the way people interact with their environment and one another, and perhaps even with themselves. Social and environmental psychology studies of human-technology interaction pose as many questions as answers. We are learning as we go: 'learning by doing' through interaction and 'learning by being'. Steve Mann calls this practice existential learning; wearers become photoborgs, a type of cyborg (cybernetic organism) whose primary intent is image capture from the domains of the natural and artificial. This approach elides the distinction between the technology and the human; they coalesce into one.


No Limits To Watching?, Katina Michael, M.G. Michael Nov 2013

No Limits To Watching?, Katina Michael, M.G. Michael

Professor Katina Michael

Little by little, the introduction of new body-worn technologies is transforming the way people interact with their environment and one another, and perhaps even with themselves. Social and environmental psychology studies of human-technology interaction pose as many questions as answers. We are learning as we go: 'learning by doing' through interaction and 'learning by being'. Steve Mann calls this practice existential learning; wearers become photoborgs, a type of cyborg (cybernetic organism) whose primary intent is image capture from the domains of the natural and artificial. This approach elides the distinction between the technology and the human; they coalesce into one.


Panel 2- Regulation, Policy Recommendations And Responses, Jonathan Clough, Scott Mellis, Simon Brown, Graham Ingram, Alana Maurushat, Katina Michael, Jason Ryning Nov 2013

Panel 2- Regulation, Policy Recommendations And Responses, Jonathan Clough, Scott Mellis, Simon Brown, Graham Ingram, Alana Maurushat, Katina Michael, Jason Ryning

Professor Katina Michael

A roundtable to be held on cybercrime at ANU. Panel 1 to be on the changing nature of cybercrime: threat and trend update. Panel 2 on regulation, policy recommendations and responses. Panel 3 on technical measures to combat cybercrime. Panel 4 on the investigation of cybercrime and victimisation. Panel 2 to be keynoted by Keith Besgrove (DBCD) and chaired by Jonathan Clough.


Social Implications Of Wearable Computing And Augmediated Reality In Every Day Life (Ieee Symposium On Technology And Society, Istas13), Katina Michael Jun 2013

Social Implications Of Wearable Computing And Augmediated Reality In Every Day Life (Ieee Symposium On Technology And Society, Istas13), Katina Michael

Associate Professor Katina Michael

It was in July 2012 that Steve Mann and I corresponded on the possibility of hosting a conference on wearable computing in Toronto, Canada. Steve had just returned home from a family holiday to France and publicly blogged about an unfortunate incident that had happened to him while away. On 17th July 2012 he posted: “Physical assault by McDonald’s for wearing Digital Eye Glass”. We both knew the timing was right for such an event that was not just a technical engineering or applied orientation on the theme of smart worlds, but an event that would grapple with the dichotomies …


Natural Disasters And Early Warning Systems In Australia, Emma Papaemanuel, Katina Michael, Peter Johnston Jan 2013

Natural Disasters And Early Warning Systems In Australia, Emma Papaemanuel, Katina Michael, Peter Johnston

Professor Katina Michael

Australia's national emergency warning system alerts. Radio program in Greek.


Are Disaster Early Warnings Effective?, Kerri Worthington, Katina Michael, Peter Johnson, Paul Barnes Jan 2013

Are Disaster Early Warnings Effective?, Kerri Worthington, Katina Michael, Peter Johnson, Paul Barnes

Professor Katina Michael

Australia's summer is traditionally a time of heightened preparation for natural disasters, with cyclones and floods menacing the north and bushfires a constant threat in the south. And the prospect of more frequent, and more intense, disasters thanks to climate change has brought the need for an effective early warning system to the forefront of policy-making. Technological advances and improved telecommunication systems have raised expectations that warning of disasters will come early enough to keep people safe. But are those expectations too high? Kerri Worthington reports. Increasingly, the world's governments -- and their citizens -- rely on technology-based early warning …


Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke Dec 2012

Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke

Professor Katina Michael

During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …


Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael Dec 2012

Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael

Professor Katina Michael

This paper investigates the introduction of location-based services by government as part of an all-hazards approach to modern emergency management solutions. Its main contribution is in exploring the determinants of an individual’s acceptance or rejection of location services. The authors put forward a conceptual model to better predict why an individual would accept or reject such services, especially with respect to emergencies. While it may be posited by government agencies that individuals would unanimously wish to accept life-saving and life-sustaining location services for their well-being, this view remains untested. The theorised determinants include: visibility of the service solution, perceived service …


The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael Dec 2012

The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael

Professor Katina Michael

Microchip implants for humans are not new. Placing heart pacemakers in humans for prosthesis is now considered a straightforward procedure. In more recent times we have begun to use brain pacemakers for therapeutic purposes to combat illnesses such as epilepsy, Parkinson’s Disease, and severe depression. Microchips are even being placed inside prosthetic knees and hips during restorative procedures to help in the gathering of post-operative analytics that can aid rehabilitation further. While medical innovations that utilise microchips abound, over the last decade we have begun to see the potential use of microchip implants for non-medical devices in humans, namely for …


Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael Dec 2012

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael

Associate Professor Katina Michael

The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …


Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom Dec 2012

Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom

Professor Katina Michael

Mobile Government Briefing: Provide services anywhere any time: - Transact to enable in-field data collection, request processing, order management, approvals, edits, updates and execute actions. - What are the implications for the incorporation of rich multimedia content on devices to better serve staff and citizens? - Addressing the security challenges of various risks around data access, data transmission, and data storage for BI architecture and mobile devices


Ieee T&S Magazine: Undergoing Transformation, Katina Michael Nov 2012

Ieee T&S Magazine: Undergoing Transformation, Katina Michael

Professor Katina Michael

Our Magazine is in a transformative period, not only because we are ‘Going Green’ in 2013 but because we are experiencing tremendous growth in quality international submissions. This means that we are increasingly appealing to an international audience with transdisciplinary interests. This has not gone unnoticed by the media, nor by our SSIT readership or wider engineering community.


Glogging Your Every Move, Lisa Wachsmuth, Katina Michael Nov 2012

Glogging Your Every Move, Lisa Wachsmuth, Katina Michael

Professor Katina Michael

"It is one thing to lug technologies around, another thing to wear them, and even more intrusive to bear them... But that's the direction in which we're headed."

"I think we're entering an era of person-view systems which will show things on ground level and will be increasingly relayed to others via social media.

"We've got people wearing recording devices on their fingers, in their caps or sunglasses - there are huge legal and ethical implications here."


The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei Jul 2012

The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei

Associate Professor Katina Michael

The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …


Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta Apr 2012

Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta

Professor Katina Michael

The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in these trends. …


The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz M. Al-Debei Dec 2011

The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz M. Al-Debei

Dr. Mutaz M. Al-Debei

The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …


The Social And Behavioral Implications Of Location-Based Services, Katina Michael, M.G. Michael Nov 2011

The Social And Behavioral Implications Of Location-Based Services, Katina Michael, M.G. Michael

Associate Professor Katina Michael

The social and behavioral implications of location-based services (LBS) are only now beginning to come to light in advanced markets where the services have been adopted by just a little over half the market (Microsoft 2011). Depending on one’s definition of what constitutes location-based services, statistics on the level of adoption differ considerably. While it is helpful to provide as broad a list of applications as possible in what constitutes LBS (e.g. everything from in-vehicle navigation systems to downloading a map using a computer), it can also cloud the real picture forming behind this emerging technology. Emerging not in the …


The Social Implications Of Emerging Technologies, Katina Michael Jun 2010

The Social Implications Of Emerging Technologies, Katina Michael

Professor Katina Michael

As the Program Committee Chair, I would like to first and foremost thank the forty person strong international program committee for their support, feedback and contributions from the outset. The Committee itself was made up of researchers from 11 countries, covering diverse disciplines and expertise. In their own right members of the program committee are renowned researchers, cited in many of the papers appearing in this year’s ISTAS full proceedings, and over the years appearing in associated publications such as IEEE Technology and Society Magazine. It was such an honour to work with persons possessing a truly collaborative spirit, some …


Soap Box: If Katina Michael Could Send A Message To Government, It Would Be This..., K. Michael Jun 2006

Soap Box: If Katina Michael Could Send A Message To Government, It Would Be This..., K. Michael

Professor Katina Michael

No abstract provided.


The Social Implications Of Information Security Measures On Citizens And Business, K. Michael, M. G. Michael May 2006

The Social Implications Of Information Security Measures On Citizens And Business, K. Michael, M. G. Michael

Professor Katina Michael

The 2006 Workshop on the Social Implications of Information Security Measures on Citizens and Business was organised by the Research Network for a Secure Australia (RNSA) funded by the Australian Research Council. The Workshop will become a biennial event bringing together both researchers and practitioners in the fields relating to the national research priority entitled Safeguarding Australia.

In 2006, the workshop was held on the 29th May, at the Function Centre at the University of Wollongong between 8.30 am and 5.00 pm.

The Workshop was organised by RNSA members of the Centre for eBusiness Applications Research at the University of …