Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 37

Full-Text Articles in Science and Technology Studies

Engineering Standards In Highway Design Litigation, Michael Lewyn Dec 2017

Engineering Standards In Highway Design Litigation, Michael Lewyn

Michael E Lewyn

Highway engineers sometimes believe that if they redesign streets to improve pedestrian safety (for example, by introducing traffic calming techniques) they might be successfully sued for negligent design by motorists. This chapter suggests that in such situations, governments are likely to be protected by discretionary function immunity. In addition, the chapter discusses a variety of technical issues.


Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke Dec 2012

Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke

Professor Katina Michael

During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …


Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael Dec 2012

Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael

Professor Katina Michael

This paper investigates the introduction of location-based services by government as part of an all-hazards approach to modern emergency management solutions. Its main contribution is in exploring the determinants of an individual’s acceptance or rejection of location services. The authors put forward a conceptual model to better predict why an individual would accept or reject such services, especially with respect to emergencies. While it may be posited by government agencies that individuals would unanimously wish to accept life-saving and life-sustaining location services for their well-being, this view remains untested. The theorised determinants include: visibility of the service solution, perceived service …


The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael Dec 2012

The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael

Professor Katina Michael

Microchip implants for humans are not new. Placing heart pacemakers in humans for prosthesis is now considered a straightforward procedure. In more recent times we have begun to use brain pacemakers for therapeutic purposes to combat illnesses such as epilepsy, Parkinson’s Disease, and severe depression. Microchips are even being placed inside prosthetic knees and hips during restorative procedures to help in the gathering of post-operative analytics that can aid rehabilitation further. While medical innovations that utilise microchips abound, over the last decade we have begun to see the potential use of microchip implants for non-medical devices in humans, namely for …


Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael Aug 2012

Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael

Professor Katina Michael

Late last year, IEEE SSIT was invited to put together a paper for the centennial edition of Proceedings of the IEEE that was published in May 2012. The paper titled, “Social Implications of Technology: The Past, the Present, and the Future,” brought together five members of SSIT with varying backgrounds, and two intense months of collaboration and exchange of ideas. I personally felt privileged to be working with Karl D. Stephan, Emily Anesta, Laura Jacobs and M.G. Michael on this project.


Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael Aug 2012

Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael

Professor Katina Michael

This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.


Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat May 2012

Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat

Professor Katina Michael

Location based social networking (LBSN) applications are part of a new suite of social networking tools. LBSN is the convergence between location based services (LBS) and online social networking (OSN). LBSN applications offer users the ability to look up the location of another “friend” remotely using a smart phone, desktop or other device, anytime and anywhere. Users invite their friends to participate in LBSN and there is a process of consent that follows. This paper explores the potential impact of LBSN upon trust in society. It looks at the willingness of individuals to share their location data with family, friends, …


Emp And Geomagnetic Storm Protection Of Critical Infrastructure, George H. Baker Iii May 2012

Emp And Geomagnetic Storm Protection Of Critical Infrastructure, George H. Baker Iii

George H Baker

EMP and solar storm wide geographic coverage and ubiquitous system effects beg the question of “Where to begin?” with protection efforts. Thus, in addressing these “wide area electromagnetic (EM) effects,” we must be clever in deciding where to invest limited resources. Based on simple risk analysis, the electric power and communication infrastructures emerge as the highest priority for EM protection. Programs focused on these highest risk infrastructures will go a long way in lessoning societal impact. Given the national scope of the effects, such programs must be coordinated at the national level but implemented at local level. Because wide-area EM …


Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta Apr 2012

Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta

Professor Katina Michael

The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in these trends. …


Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael Apr 2012

Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael

Professor Katina Michael

Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.


The Technological Trajectory Of The Automatic Identification Industry: The Application Of The Systems Of Innovation (Si) Framework For The Characterisation And Prediction Of The Auto-Id Industry, Katina Michael Mar 2012

The Technological Trajectory Of The Automatic Identification Industry: The Application Of The Systems Of Innovation (Si) Framework For The Characterisation And Prediction Of The Auto-Id Industry, Katina Michael

Professor Katina Michael

Traditionally the approach used to analyse technological innovation focused on the application of the techno-economic paradigm with the production function as its foundation. This thesis explores the rise of the evolutionary paradigm as a more suitable conceptual approach to investigating complex innovations like automatic identification (auto-ID) devices. Collecting and analysing data for five auto-ID case studies, (bar codes, magnetic-stripe cards, smart cards, biometrics and RF/ID transponders), it became evident that a process of migration, integration and convergence is happening within the auto-ID technology system (TS). The evolution of auto-ID is characterised by a new cluster of innovations, primarily emerging through …


Integrating Value-Driven Feedback And Recommendation Mechanisms Into Business Intelligence Systems, Byron Keating, Tim Coltman, Michael Katina, Valeria Baker Mar 2012

Integrating Value-Driven Feedback And Recommendation Mechanisms Into Business Intelligence Systems, Byron Keating, Tim Coltman, Michael Katina, Valeria Baker

Professor Katina Michael

Most leading organizations, in all sectors of industry, commerce and government are dependent upon

ERP for their organizational survival. Yet despite the importance of the decision to adopt ERP and its

impact on the entire firm’s performance the IT literature has been in the large part silent on the nature

of the ERP investment decision. This study is the first of its kind to determine the preference structure

of senior managers around the organizational benefits and risks of adopting ERP. We present the

results which provide interesting insights into how managers’ perceive the benefit and risk factors

salient to the …


Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt Feb 2012

Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt

Professor Katina Michael

Law disciplines technology, though it does so in a partial and incomplete way as reflected in the old adage that technology outstrips the capacity of law to regulate it. The rise of new technologies poses a significant threat to human rights – the pervasive use of CCTV (and now mobile CCTV), telecommunications interception, and low-cost audio-visual recording and tracking devices (some of these discreetly wearable), extend the power of the state and corporations significantly to intrude into the lives of citizens.


Comments On The Verizon-Spectrumco Deal, Scott J. Wallsten Jan 2012

Comments On The Verizon-Spectrumco Deal, Scott J. Wallsten

Scott J. Wallsten

No abstract provided.


Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas Sep 2011

Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas

Professor Katina Michael

Mobile alerts, notifications and location-based emergency warning systems are now an established part of mobile government strategies in an increasing number of countries worldwide. In Australia the national emergency warning system (NEWS) was instituted after the tragic Black Saturday Victorian Bushfires of February 2009. In the first phase, NEWS has enabled the provision of public information from the government to the citizen during emergencies anywhere and any time. Moving on from traditional short message service (SMS) notifications and cell broadcasting to more advanced location-based services, this paper provides executive-level recommendations about the viability of location-based mobile phone services in NEWS …


The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael Aug 2011

The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael

M. G. Michael

No abstract provided.


Precaution And Privacy Impact Assessment As Modes Towards Risk Governance, David Wright, RaphaëL Gellert, Serge Gutwirth, Michael Friedewald Aug 2011

Precaution And Privacy Impact Assessment As Modes Towards Risk Governance, David Wright, RaphaëL Gellert, Serge Gutwirth, Michael Friedewald

Michael Friedewald

No abstract provided.


The Future Of Digital Communications Research And Policy, Scott J. Wallsten Nov 2010

The Future Of Digital Communications Research And Policy, Scott J. Wallsten

Scott J. Wallsten

No abstract provided.


Residential And Business Broadband Prices Part 2: International Comparisons, Scott J. Wallsten, James Riso Nov 2010

Residential And Business Broadband Prices Part 2: International Comparisons, Scott J. Wallsten, James Riso

Scott J. Wallsten

For this project, we assemble a new dataset consisting of more than 25,000 residential and business broadband plans from all OECD countries from 2007–2009. We explore three issues: the relationship between plan components—such as metering—and consumer prices, price changes over time, and how broadband prices vary across countries.

This paper, part 2 of the project, studies prices and price changes over time in the United States and other OECD countries. We find that residential prices in the U.S. remained fairly stable overall in this time period for both standalone and triple play (voice, video, and data) plans, though prices for …


Mother Earth "Speaks": Change Yourself, Change The World, Use The Archetypal Energy "Harmony" As A Guide, Carroy U. Ferguson Jun 2010

Mother Earth "Speaks": Change Yourself, Change The World, Use The Archetypal Energy "Harmony" As A Guide, Carroy U. Ferguson

Carroy U "Cuf" Ferguson, Ph.D.

In relation to the Cosmos, we all, as human beings, live on this tiny planet we call Earth, a planet that supports and sustains life, as we know it. There are many different kinds of people, plants, and animals functioning in harmony with soil, air, and water--all linked to one another in a complex web of life to form one Earth community. Unfortunately, we often take this miracle and ecosystem of life for granted. When, however, we take the ecosystem of life too much for granted, Mother Earth "speaks," reflecting imbalances and dis-harmonies. When Mother Earth "speaks," her message is …


The Emergence Of Social Science Research In Nanotechnology, Philip Shapira, Jan Youtie, Alan L. Porter Feb 2010

The Emergence Of Social Science Research In Nanotechnology, Philip Shapira, Jan Youtie, Alan L. Porter

Philip Shapira

This article examines the development of social science literature focused on the emerging area of nanotechnology. It is guided by the exploratory proposition that early social science work on emerging technologies will draw on science and engineering literature on the technology in question to frame its investigative activities, but as the technologies and societal investments in them progress, social scientists will increasingly develop and draw on their own body of literature. To address this proposition the authors create a database of nanotechnology-social science literature by merging articles from the Web of Science’s Social Science Citation Index and Arts and Humanities …


The Limits And Opportunities Of Networks: Municipalities And Canadian Climate Change Policy, Christopher D. Gore Dec 2009

The Limits And Opportunities Of Networks: Municipalities And Canadian Climate Change Policy, Christopher D. Gore

Christopher D Gore

Research on climate change policy and politics has become increasingly focused on the actions and influence of subnational governments. In North America, this attention has been particularly focused on why subnational governments have taken action in the absence of national leadership, what effect action might have on future national climate policy, and whether the collective action of networks of municipal governments are reshaping and challenging the character of national and global climate governance. This paper examines Canadian municipal climate in light of the absence of a comprehensive and effective climate national strategy. The paper considers various reasons why local governments …


The Governance Of Problems. Puzzling, Powering, Participation, Robert Hoppe Dec 2009

The Governance Of Problems. Puzzling, Powering, Participation, Robert Hoppe

Robert Hoppe

No abstract provided.


Review: The Limits Of Boundaries: Why City-Regions Cannot Be Self-Governing, By Andrew Sancton, Christopher D. Gore Aug 2009

Review: The Limits Of Boundaries: Why City-Regions Cannot Be Self-Governing, By Andrew Sancton, Christopher D. Gore

Christopher D Gore

No abstract provided.


Reverse Auctions And Universal Telecommunications Service: Lessons From Global Experience, Scott J. Wallsten Mar 2008

Reverse Auctions And Universal Telecommunications Service: Lessons From Global Experience, Scott J. Wallsten

Scott J. Wallsten

The United States now spends around $7 billion on universal service programs—subsidies intended to ensure that the entire country has access to telecommunications services. Most of this money supports telecommunications service in “high cost” (primarily rural) areas, and the High Cost fund is growing quickly. In response to this growth, policymakers are considering using reverse auctions, or bids for the minimum subsidy, as a way to reduce expenditures. While the U.S. has not yet distributed funds for universal service programs using reverse auctions, the method has been used widely. First, reverse auctions are akin to standard government procurement procedures, which …


UbiquitäRes Computing Und Seine Auswirkungen Auf Die Industriearbeit, Ralf Lindner, Michael Friedewald Dec 2007

UbiquitäRes Computing Und Seine Auswirkungen Auf Die Industriearbeit, Ralf Lindner, Michael Friedewald

Michael Friedewald

Ubiquitäres Computing (UbiComp) bezeichnet eine alles durchdringende Informatisierung und Ver- netzung u.a. auch im Arbeitsleben. Es fügt sich in der industriellen Fertigung in die seit langem zu beobachtenden Trends der Rationalisierung und Flexibilisierung ein, beschleunigen diese und ver- stärken zum Teil deren Auswirkungen auf innerbetriebliche Prozesse. Mit Blick auf Tätigkeitsprofile und Qualifikationsanforderungen sind zwei gegenläufigen Folgen von UbiComp zu erwarten: Einer- seits werden bestimmte Tätigkeiten in der industriellen Fertigung eine qualitative Anreicherung und Erweiterung erfahren, während andererseits erweiterte Möglichkeiten zur Automatisierung von einfa- chen Kontroll-, Überwachungs- und anderen manuellen Tätigkeiten bestehen. Für die Mehrzahl der verbleibenden Beschäftigten in der industriellen …


Privacy, Identity And Security In Ambient Intelligence: A Scenario Analysis, Michael Friedewald, Elena Vildjiounaite, Yves Punie, David Wright Dec 2006

Privacy, Identity And Security In Ambient Intelligence: A Scenario Analysis, Michael Friedewald, Elena Vildjiounaite, Yves Punie, David Wright

Michael Friedewald

The success of Ambient Intelligence (AmI) will depend on how secure it can be made, how privacy and other rights of indi- viduals can be protected and how individuals can come to trust the intelligent world that surrounds them and through which they move. This article addresses these issues by analysing scenarios for ambient intelligence applications that have been developed over the last few years. It elaborates the assumptions that promotors make about the likely use of the technology and possibly unwanted side effects. It concludes with a number of threats for personal privacy that become evident.


Broadband Penetration: An Empirical Analysis Of State And Federal Policies, Scott J. Wallsten May 2005

Broadband Penetration: An Empirical Analysis Of State And Federal Policies, Scott J. Wallsten

Scott J. Wallsten

No abstract provided.


Barriers To Canadian Municipal Response To Climate Change, Pamela J. Robinson, Christopher D. Gore Dec 2004

Barriers To Canadian Municipal Response To Climate Change, Pamela J. Robinson, Christopher D. Gore

Christopher D Gore

No abstract provided.


Shifts In Environmental Governance In Canada: How Are Citizen Environment Groups To Respond?, Christopher Gore, Beth Savan, Alexis Morgan Dec 2003

Shifts In Environmental Governance In Canada: How Are Citizen Environment Groups To Respond?, Christopher Gore, Beth Savan, Alexis Morgan

Christopher D Gore

No abstract provided.