Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Social and Behavioral Sciences

Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael Dec 2012

Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael

Professor Katina Michael

This special section is dedicated to privacy in the information age. Since the rise of mobile social media in particular and the advent of cloud computing few can dispute that the times have changed. Privacy is now understood in context, and within a framework that is completely different to what it once was. The right to be let alone physically seemingly has been replaced by the right to give away as much information as you want virtually. What safeguards can be introduced into such a society? We cannot claim to wish for privacy as a right if we ourselves do …


Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom Dec 2012

Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom

Professor Katina Michael

Mobile Government Briefing: Provide services anywhere any time: - Transact to enable in-field data collection, request processing, order management, approvals, edits, updates and execute actions. - What are the implications for the incorporation of rich multimedia content on devices to better serve staff and citizens? - Addressing the security challenges of various risks around data access, data transmission, and data storage for BI architecture and mobile devices


Ieee T&S Magazine: Undergoing Transformation, Katina Michael Nov 2012

Ieee T&S Magazine: Undergoing Transformation, Katina Michael

Professor Katina Michael

Our Magazine is in a transformative period, not only because we are ‘Going Green’ in 2013 but because we are experiencing tremendous growth in quality international submissions. This means that we are increasingly appealing to an international audience with transdisciplinary interests. This has not gone unnoticed by the media, nor by our SSIT readership or wider engineering community.


Premises Liability, Wayne Petherick, Brent Turvey Oct 2012

Premises Liability, Wayne Petherick, Brent Turvey

Wayne Petherick

Forensic Criminology: the scientific study of crime and criminals for the purposes of addressing investigative and legal issues. It is a science, a behavioral science, and a forensic science. This text is intended to educate students in an applied fashion regarding the nature and extent of forensic casework that is supported by, dependent upon, and interactive with research, theory, and knowledge derived from criminology. It is also intended to act as a preliminary guide for practitioners working with and within related criminal justice professions. Particularly those involved with assisting investigations, administrative inquiries, legal proceedings or providing expert findings or testimony …


Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael Jun 2012

Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael

Professor Katina Michael

Hacking: The Next Generation demonstrates just how hackers continue to exploit “back doors”. New ways of working and new ways of communicating have meant that the number of attack vectors continue to rise rapidly. This provides hackers with a greater number of opportunities to penetrate systems using blended approaches while organizations struggle to come up to speed with the latest technology developments and commensurate security capabilities. Dealing with anticipated threats is a lot harder than dealing with known threats.


Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael Jun 2012

Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael

Professor Katina Michael

Tracking and monitoring people as they operate within their personal networks benefits service providers and their constituents but involves hidden risks and costs.

Automatic identification technologies, CCTV cameras, pervasive and mobile networks, wearable computing, location-based services and social networks have traditionally served distinct purposes. However, we have observed patterns of integration, convergence and coexistence among all these innovations within the information and communication technology industry.1For example, ‘location-based social networking’ can draw on a smart phone's capacity to identify a user uniquely, locate him within 1–2m and share this information across his social network in real time. The resulting ability to …


Editorial: The Idio-Technopolis, Katina Michael May 2012

Editorial: The Idio-Technopolis, Katina Michael

Professor Katina Michael

The rapid rise of social media has brought with it an emphasis on the distinct dimensions of the whole person. Social media recognises that the individual has a personal network of extensions- a home life, a work life, a social life, a study life, a hobbyist life, and much more- some of these identities even hidden from full view. Each of these online value networks are now accessible by big business, where opinion leaders and early adopters are easily distinguishable, and where brand commentary between consumers matters manifold more than any form of targeted advertising.


Assessment Of Firesetters, Rebekah Doley, Bruce Watt Mar 2012

Assessment Of Firesetters, Rebekah Doley, Bruce Watt

Bruce Watt

Extract This chapter will equip readers with the information required to screen and assess arsonists effectively using a number of modalities. The appropriate tools are presented and discussed, along with the evidence base underlying them. The focus of the discussion is on risk assessment, recidivism and dangerousness. In particular, these issues are discussed with reference to mental health and psychiatric patients as arsonists. The terms ’arson’ and ’firesetting’ will be used interchangeably throughout this chapter; the term ‘arson’ is commonly acknowledged to have a legal definition, while firesetting describes the behaviour itself.


Assessment Of Firesetters, Rebekah Doley, Bruce Watt Mar 2012

Assessment Of Firesetters, Rebekah Doley, Bruce Watt

Rebekah Doley

Extract This chapter will equip readers with the information required to screen and assess arsonists effectively using a number of modalities. The appropriate tools are presented and discussed, along with the evidence base underlying them. The focus of the discussion is on risk assessment, recidivism and dangerousness. In particular, these issues are discussed with reference to mental health and psychiatric patients as arsonists. The terms ’arson’ and ’firesetting’ will be used interchangeably throughout this chapter; the term ‘arson’ is commonly acknowledged to have a legal definition, while firesetting describes the behaviour itself.


Power And Excitement In Arson: The Case Of Firefighter Arson, Rebekah Doley, Kenneth Fineman Mar 2012

Power And Excitement In Arson: The Case Of Firefighter Arson, Rebekah Doley, Kenneth Fineman

Rebekah Doley

Extract Perhaps more than most crimes, the crime of arson is often shrouded in anecdotal descriptions concerning what actually motivates the offender. Arson in any form is repugnant, but even more so when the individual involved is a serving member of the fire service. Fire department personnel and the community alike abhor incidents of this nature. Although the incidence of fire-fighter arson is low in comparison with the total number of currently serving fire-fighters, the impact on community faith and fire service morale is disproportionately great. The integrity of the service is demonstrated in the performance of its personnel. While …


Bushfire And Wildfire Arson: Arson Risk Assessment In The Australian Context, Troy Mcewan, Rebekah Doley, Mairead Dolan Mar 2012

Bushfire And Wildfire Arson: Arson Risk Assessment In The Australian Context, Troy Mcewan, Rebekah Doley, Mairead Dolan

Rebekah Doley

Extract Deliberately lit vegetation fires have the greatest destructive potential of any intentionally lit blaze. The ’Black Saturday’ bushfires of 7 February 2009 in Victoria, Australia, killed 173 people, injured 414 and destroyed 3500 buildings, including two entire towns (Teagne et al, 2010). Even before the fires had abated police and fire-fighters revealed that several had been deliberately lit (Silvester, 2009). The subsequent Royal Commission attributed four of the large fires to arson. These four fires caused 52 deaths and burnt approximately 2000 km2 of land, an area slightly larger than that of Greater London (Teague et aI, 2010). The …


Editorial: "You Talkin' To Me?", Katina Michael Feb 2012

Editorial: "You Talkin' To Me?", Katina Michael

Professor Katina Michael

Advancing knowledge through robust research is an honourable aim- being scientific, finding the right methodology, executing project phases meticulously, and reporting on the outcomes as objectively and accurately as possible. But may I begin my inaugural editorial by saying that an even higher ideal to advancing knowledge is critiquing it as it happens. Reflective practice is not just something to be done by academics in their teaching- reflective practice is what we should all be doing as we go about undertaking our various day-to-day work tasks. For the engineer engaged in research and development, whether in industry or government, reflective …