Open Access. Powered by Scholars. Published by Universities.®
Science and Technology Studies Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Emerging Technologies (6)
- National Security (6)
- Privacy (5)
- Copyright (4)
- Policing (4)
-
- Security (4)
- Uberveillance (4)
- Artificial photosynthesis (3)
- Common heritage of humanity (3)
- Energy policy (3)
- Governance of Global Artificial Photosynthesis (Solar Fuels and Food) (3)
- Information Security (3)
- Renewable energy (3)
- Social Implications of ICT (3)
- Solar fuels (3)
- Surveillance (3)
- Intellectual Property (2)
- Interception (2)
- Law (2)
- Location-Based Services (2)
- Location-based services (2)
- Sustainability (2)
- Technology (2)
- Abuse (1)
- Access control (1)
- Adapters (1)
- Adoption (1)
- Airline; aircraft engine; crash; safety management; aviation; military aviation; aircraft speed; wildlife hazard; wildlife; wildlife strike; safety; (1)
- Articles (1)
- Australian High Court (1)
- Publication
- Publication Type
Articles 1 - 30 of 33
Full-Text Articles in Science and Technology Studies
Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael
Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael
Associate Professor Katina Michael
The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …
The Legal Challenges Of Networked Robotics: From The Safety Intelligence Perspective, Yueh-Hsuan Weng, Sophie T.H. Zhao
The Legal Challenges Of Networked Robotics: From The Safety Intelligence Perspective, Yueh-Hsuan Weng, Sophie T.H. Zhao
Yueh-Hsuan Weng
Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael
Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael
Associate Professor Katina Michael
This mixed methods study with a sequential explanatory strategy explored qualitatively the statistically significant quantitative findings relative to Indian respondents’ perceptions about RFID (radio frequency identification) transponders implanted into the human body. In the first analysis phase of the study, there was a significant chi-square analysis reported (χ2 = 56.64, df = 3, p = .000) relative to the perception of small business owners (N = 453) that implanted chips are a more secure form of identification and/or access control in organizations and the respondents’ country of residence. Countries under study included Australia, India, the UK and US. The country …
Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael
Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael
Professor Katina Michael
Late last year, IEEE SSIT was invited to put together a paper for the centennial edition of Proceedings of the IEEE that was published in May 2012. The paper titled, “Social Implications of Technology: The Past, the Present, and the Future,” brought together five members of SSIT with varying backgrounds, and two intense months of collaboration and exchange of ideas. I personally felt privileged to be working with Karl D. Stephan, Emily Anesta, Laura Jacobs and M.G. Michael on this project.
Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael
Professor Katina Michael
This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.
National Security Policy Constraints On Technological Innovation: A Case Study Of The Invention Secrecy Act Of 1951, Dorothy K. Mcallen
National Security Policy Constraints On Technological Innovation: A Case Study Of The Invention Secrecy Act Of 1951, Dorothy K. Mcallen
Master's Theses and Doctoral Dissertations
Recent studies indicate that the United States is trailing other countries in technological innovation and competitiveness. This case study examined national security policy constraints on technological innovation, specifically the Invention Secrecy Act. It focused on the social constructs of collaboration and interdisciplinary knowledge in the aerospace industry. The methodology included historical research, data collection, and semi-structured interviews with experts from academia, general industry, government and public policy, aerospace/defense industry, and federal government. The results of the study suggested that since World War II, national security policies have not been clearly and consistently defined, interpreted, or implemented. This lack of clarity …
The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei
The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei
Associate Professor Katina Michael
The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …
When Antitrust Met Facebook, Christopher S. Yoo
When Antitrust Met Facebook, Christopher S. Yoo
All Faculty Scholarship
Social networks are among the hottest phenomena on the Internet. Facebook eclipsed Google as the most visited website in both 2010 and 2011. Moreover, according to Nielsen estimates, as of the end of 2011 the average American spent nearly seven hours per month on Facebook, which is more time than they spent on Google, Yahoo!, YouTube, Microsoft, and Wikipedia combined. LinkedIn’s May 19, 2011 initial public offering (“IPO”) surpassed expectations, placing the value of the company at nearly $9 billion, and approximately a year later, its stock price had risen another 20 percent. Facebook followed suit a year later with …
The Uncertain Future Of "Hot News" Misappropriation After Barclays Capital V. Theflyonthewall.Com, Shyamkrishna Balganesh
The Uncertain Future Of "Hot News" Misappropriation After Barclays Capital V. Theflyonthewall.Com, Shyamkrishna Balganesh
All Faculty Scholarship
This is a follow-up piece to Professor Balganesh's 'Hot News': The Enduring Myth of Property in News, 111 COLUM. L. REV. 419 (2011), based on the Second Circuit's decision in Barclays Capital Inc. v. Theflyonthewall.com, 650 F.3d 876 (2d Cir. 2011).
Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat
Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat
Professor Katina Michael
Location based social networking (LBSN) applications are part of a new suite of social networking tools. LBSN is the convergence between location based services (LBS) and online social networking (OSN). LBSN applications offer users the ability to look up the location of another “friend” remotely using a smart phone, desktop or other device, anytime and anywhere. Users invite their friends to participate in LBSN and there is a process of consent that follows. This paper explores the potential impact of LBSN upon trust in society. It looks at the willingness of individuals to share their location data with family, friends, …
Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta
Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta
Professor Katina Michael
The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in these trends. …
Commentary On: Mann, Steve (2012): Wearable Computing, Katina Michael, M.G. Michael
Commentary On: Mann, Steve (2012): Wearable Computing, Katina Michael, M.G. Michael
Associate Professor Katina Michael
In Professor Steve Mann- inventor, physicist, engineer, mathematician, scientist, designer, developer, project director, filmmaker, artist, instrumentalist, author, photographer, actor, activist- we see so much of the paradigmatic classical Greek philosopher. I recall asking Steve if technology shaped society or society shaped technology. He replied along the lines that the question was superfluous. Steve instead pointed to praxis, from which all theory, lessons or skills stem, are practiced, embodied and realized. Steve has always been preoccupied by the application of his ideas into form. In this way too, he can be considered a modern day Leonardo Da Vinci.
Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael
Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael
Associate Professor Katina Michael
With so much buzz around Cloud Computing, books like this one written by Winkler are much in demand. Winkler’s experience in the computing business shines through and as readers we are spoiled with a great deal of useful strategic information- a jam packed almost 300 page volume on securing the cloud.
Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael
Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael
Professor Katina Michael
Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.
In Memoriam: Associate Professor Dr Elaine Lawrence, Katina Michael
In Memoriam: Associate Professor Dr Elaine Lawrence, Katina Michael
Associate Professor Katina Michael
Despite being a graduate of the rigorous Bachelor of Information Technology at the University of Technology, Sydney (UTS) in 1996, I was unfortunate in that I missed being taught by Associate Professor Elaine Lawrence who began working at UTS in 1990 as a Lecturer in Computing Science. Dr Lawrence became a senior lecturer in 2000, and subsequently an associate professor in 2006. Our paths crossed in 2002 when I was tasked to deliver a new course entitled “eBusiness Principles” in my first year of lecturing at the University of Wollongong, and after an initial scurry to find an adequate textbook, …
The Technological Trajectory Of The Automatic Identification Industry: The Application Of The Systems Of Innovation (Si) Framework For The Characterisation And Prediction Of The Auto-Id Industry, Katina Michael
Professor Katina Michael
Traditionally the approach used to analyse technological innovation focused on the application of the techno-economic paradigm with the production function as its foundation. This thesis explores the rise of the evolutionary paradigm as a more suitable conceptual approach to investigating complex innovations like automatic identification (auto-ID) devices. Collecting and analysing data for five auto-ID case studies, (bar codes, magnetic-stripe cards, smart cards, biometrics and RF/ID transponders), it became evident that a process of migration, integration and convergence is happening within the auto-ID technology system (TS). The evolution of auto-ID is characterised by a new cluster of innovations, primarily emerging through …
Integrating Value-Driven Feedback And Recommendation Mechanisms Into Business Intelligence Systems, Byron Keating, Tim Coltman, Michael Katina, Valeria Baker
Integrating Value-Driven Feedback And Recommendation Mechanisms Into Business Intelligence Systems, Byron Keating, Tim Coltman, Michael Katina, Valeria Baker
Professor Katina Michael
Most leading organizations, in all sectors of industry, commerce and government are dependent upon
ERP for their organizational survival. Yet despite the importance of the decision to adopt ERP and its
impact on the entire firm’s performance the IT literature has been in the large part silent on the nature
of the ERP investment decision. This study is the first of its kind to determine the preference structure
of senior managers around the organizational benefits and risks of adopting ERP. We present the
results which provide interesting insights into how managers’ perceive the benefit and risk factors
salient to the …
Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt
Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt
Professor Katina Michael
Law disciplines technology, though it does so in a partial and incomplete way as reflected in the old adage that technology outstrips the capacity of law to regulate it. The rise of new technologies poses a significant threat to human rights – the pervasive use of CCTV (and now mobile CCTV), telecommunications interception, and low-cost audio-visual recording and tracking devices (some of these discreetly wearable), extend the power of the state and corporations significantly to intrude into the lives of citizens.
Sousveillance And The Social Implications Of Point Of View Technologies In The Law Enforcement Sector, Katina Michael, M.G. Michael
Sousveillance And The Social Implications Of Point Of View Technologies In The Law Enforcement Sector, Katina Michael, M.G. Michael
Associate Professor Katina Michael
Policing today has become a high-tech affair; especially in the provision of incident event tracking and reporting systems increasingly being used to provide evidence in a court of law. These in-car video (ICV) and body worn recording systems are said to increase convictions and eliminate false claims made by defendants, providing documentary support to police officers and their associated actions in an incident. But today, new technologies such as smart phones equipped with cameras and global positioning system chipsets can also be found in the hands of the everyday citizen, used to capture everyday happenings and distributed to social networks …
Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael
Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael
Associate Professor Katina Michael
In an age of outsourcing tasks that are not considered to be a core competency of the business, organisations have often relied on external consultants for matters pertaining to security. In actual fact, most companies could have utilized existing skill-sets in-house to produce a security risk management program, if only they knew what steps to take, and how to go about it all. Evan Wheeler in his book on information security risk management does just that- he equips professionals tasked with security, with the thinking required to create a program that is more preoccupied with the complex strategic-level questions than …
Law, Environment, And The “Nondismal” Social Sciences, William Boyd, Douglas Kysar, Jeffrey J. Rachlinski
Law, Environment, And The “Nondismal” Social Sciences, William Boyd, Douglas Kysar, Jeffrey J. Rachlinski
Cornell Law Faculty Publications
Over the past 30 years, the influence of economics over the study of environmental law and policy has expanded considerably, becoming in the process the predominant framework for analyzing regulations that address pollution, natural resource use, and other environmental issues. This review seeks to complement the expansion of economic reasoning and methodology within the field of environmental law and policy by identifying insights to be gleaned from various “nondismal” social sciences. In particular, three areas of inquiry are highlighted as illustrative of interdisciplinary work that might help to complement law and economics and, in some cases, compensate for it: the …
Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke
Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke
Associate Professor Katina Michael
Location tracking and monitoring applications have proliferated with the arrival of smart phones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smart phone user down to 10 metres of accuracy on average. Innovators have been quick to capitalise on this emerging market by introducing novel pedestrian tracking technologies which can denote the geographic path of a mobile user. At the same time there is contention by law enforcement personnel over the need for a warrant process to track an individual in a public space. This paper considers the future of location …
Minecraft As Web 2.0: Amateur Creativity In Digital Games, Greg Lastowka
Minecraft As Web 2.0: Amateur Creativity In Digital Games, Greg Lastowka
Greg Lastowka
This book chapter considers how the digital game Minecraft has both enabled and benefited from various Web 2.0 practices. I begin with an explanation of the concept of Web 2.0 and then consider how that concept applies to the space of digital games.
Games Are Not Coffee Mugs: Games And The Right Of Publicity, 29 Santa Clara Computer & High Tech. L.J. 1 (2012), William K. Ford, Raizel Liebler
Games Are Not Coffee Mugs: Games And The Right Of Publicity, 29 Santa Clara Computer & High Tech. L.J. 1 (2012), William K. Ford, Raizel Liebler
UIC Law Open Access Faculty Scholarship
Are games more like coffee mugs, posters, and T-shirts, or are they more like books, magazines, and films? For purposes of the right of publicity, the answer matters. The critical question is whether games should be treated as merchandise or as expression. Three classic judicial decisions, decided in 1967, 1970, and 1973, held that the defendants needed permission to use the plaintiffs' names in their board games. These decisions judicially confirmed that games are merchandise, not something equivalent to more traditional media of expression. As merchandise, games are not like books; instead, they are akin to celebrity-embossed coffee mugs. To …
The End Of The Work As We Know It, Michael J. Madison
The End Of The Work As We Know It, Michael J. Madison
Articles
This paper takes a new look at the concept of the work of authorship in copyright, known in other systems as the copyright work. It complements inquiries into authorship and originality, extending earlier scholarship on the origins of legal “things” or objects and on the multi-dimensional character of their borders and boundaries.
Madisonian Fair Use, Michael J. Madison
Madisonian Fair Use, Michael J. Madison
Articles
This short essay reflects on developments in the law, scholarship, and practice of fair use since the publication in 2004 of an earlier article on patterns in fair use practice and adjudication. It synthesizes many of those developments in the idea of “Madisonian” fair use, borrowing the separation of powers metaphor from James Madison’s work on the US Constitution and applying it, lightly and in a preliminary way, to copyright.
Erau Aviation Wildlife Hazard Newsletter, Paul F. Eschenfelder
Erau Aviation Wildlife Hazard Newsletter, Paul F. Eschenfelder
Paul F. Eschenfelder
No abstract provided.
Ch 21. 'Future Perspectives On Solar Fuels', Thomas A. Faunce
Ch 21. 'Future Perspectives On Solar Fuels', Thomas A. Faunce
Thomas A Faunce
This chapter opens by examining whether the research and development of molecular solar fuels will be characterized in future by its promotion of fundamental societal virtues such as equality and environmental sustainability. As a thought experiment, it presents a vision of some important elements of such a future world—one where energy is primarily not only a matter of global artificial photosynthesis (GAP), but of such virtues. Central to the future perspective presented here is nanotechnological construction with enhanced efficiency of each aspect of the natural photosynthetic process into units capable of inexpensive mass production for domestic use. This involves a …
Governing Planetary Nanomedicine: Environmental Sustainability And A Unesco Universal Declaration On The Bioethics And Human Rights Of Natural And Artificial Photosynthesis (Global Solar Fuels And Foods)., Thomas A. Faunce
Thomas A Faunce
Environmental and public health-focused sciences are increasingly characterised as constituting an emerging discipline—planetary medicine. From a governance perspective, the ethical components of that discipline may usefully be viewed as bestowing upon our ailing natural environment the symbolic moral status of a patient. Such components emphasise, for example, the origins and content of professional and social virtues and related ethical principles needed to promote global governance systems and policies that reduce ecological stresses and pathologies derived from human overpopulation, selfishness and greed— such as pollution, loss of biodiversity, deforestation and greenhouse gas emissions, as well as provide necessary energy, water and …
A Bad Trip For Health-Related Human Rights: Implications Of Momcilovic V The Queen (2011) 85 Aljr 957, Tim Vines, Thomas A. Faunce
A Bad Trip For Health-Related Human Rights: Implications Of Momcilovic V The Queen (2011) 85 Aljr 957, Tim Vines, Thomas A. Faunce
Thomas A Faunce
Momcilovic v The Queen (2011) 85 ALJR 957 [PDF] ; [2011] HCA 34 arose from a prosecution for drug trafficking brought under the Drugs, Poisons and Controlled Substances Act 1981 (Vic) . The Australian High Court held that the Charter of Human Rights and Responsibilities Act 2006 (Vic) (the Charter) validly conferred a power on the Victorian Supreme Court and Court of Appeal to interpret legislation in a manner consistent with a defined list of human rights. By a slim majority it also held that the Charter validly created a judicial power to "declare" a law inconsistent with one or …