Open Access. Powered by Scholars. Published by Universities.®
Science and Technology Studies Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California State University, San Bernardino (120)
- Selected Works (48)
- SelectedWorks (46)
- Western Kentucky University (24)
- Clemson University (23)
-
- University of Wollongong (11)
- University of Pittsburgh School of Law (10)
- University of Pennsylvania Carey Law School (8)
- Harbin University of Science and Technology (7)
- City University of New York (CUNY) (6)
- University of South Florida (4)
- Kennesaw State University (3)
- University of Kentucky (3)
- Georgia Southern University (2)
- Liberty University (2)
- Old Dominion University (2)
- Olivet Nazarene University (2)
- St. John's University (2)
- State University of New York College at Buffalo - Buffalo State College (2)
- Stony Brook University (2)
- Technological University Dublin (2)
- UIC School of Law (2)
- University of Nevada, Las Vegas (2)
- Arcadia University (1)
- Beirut Arab University (1)
- California Polytechnic State University, San Luis Obispo (1)
- Central Washington University (1)
- Claremont Colleges (1)
- Clark University (1)
- DePaul University (1)
- Keyword
-
- Technology (21)
- Emerging Technologies (16)
- Nanotechnology (15)
- Privacy (15)
- Innovation (14)
-
- Social Implications of ICT (13)
- Location-Based Services (11)
- National Security (11)
- Surveillance (10)
- ToC (10)
- Patent (9)
- Uberveillance (9)
- Ethics (8)
- Faculty Development & Life (8)
- Information (8)
- Patents (8)
- Security (8)
- Emergency Management (7)
- Global Positioning Systems (7)
- Trust (7)
- United States (7)
- Competition (6)
- Cybersecurity (6)
- Faculty development (6)
- Law (6)
- Policing (6)
- Social Media (6)
- Competitive manufacturing, supply chain, just-in-time production (5)
- Information Security (5)
- Monitoring (5)
- Publication Year
- Publication
-
- Journal of International Technology and Information Management (119)
- Professor Katina Michael (25)
- Journal of the Patent and Trademark Resource Center Association (23)
- Philip Shapira (23)
- DLTS Faculty Publications (21)
-
- Paul Swamidass (12)
- Associate Professor Katina Michael (10)
- All Faculty Scholarship (8)
- Articles (8)
- Journal of Science and Technology Management (7)
- Li Tang (6)
- Open Educational Resources (5)
- Kathleen P King (4)
- Leadership, Counseling, Adult, Career and Higher Education Faculty Publications (4)
- Manoj Maharaj (4)
- Book Chapters (3)
- Evgeny A. Klochikhin (3)
- ORED Quarterly Newsletter (3)
- Dissertations (2)
- Electronic Theses and Dissertations (2)
- Journal of Cybersecurity Education, Research and Practice (2)
- Journal of Global Awareness (2)
- Odai Khasawneh (2)
- Technology & Society Faculty Publications (2)
- Administración de Empresas (1)
- Alexander Hayes Mr. (1)
- All Undergraduate Projects (1)
- BAU Journal - Science and Technology (1)
- Beyond: Undergraduate Research Journal (1)
- Brookings Scholar Lecture Series (1)
- Publication Type
Articles 241 - 270 of 371
Full-Text Articles in Science and Technology Studies
Ieee T&S Magazine: Undergoing Transformation, Katina Michael
Ieee T&S Magazine: Undergoing Transformation, Katina Michael
Professor Katina Michael
Our Magazine is in a transformative period, not only because we are ‘Going Green’ in 2013 but because we are experiencing tremendous growth in quality international submissions. This means that we are increasingly appealing to an international audience with transdisciplinary interests. This has not gone unnoticed by the media, nor by our SSIT readership or wider engineering community.
Glogging Your Every Move, Lisa Wachsmuth, Katina Michael
Glogging Your Every Move, Lisa Wachsmuth, Katina Michael
Professor Katina Michael
"It is one thing to lug technologies around, another thing to wear them, and even more intrusive to bear them... But that's the direction in which we're headed."
"I think we're entering an era of person-view systems which will show things on ground level and will be increasingly relayed to others via social media.
"We've got people wearing recording devices on their fingers, in their caps or sunglasses - there are huge legal and ethical implications here."
Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael
Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael
Associate Professor Katina Michael
This mixed methods study with a sequential explanatory strategy explored qualitatively the statistically significant quantitative findings relative to Indian respondents’ perceptions about RFID (radio frequency identification) transponders implanted into the human body. In the first analysis phase of the study, there was a significant chi-square analysis reported (χ2 = 56.64, df = 3, p = .000) relative to the perception of small business owners (N = 453) that implanted chips are a more secure form of identification and/or access control in organizations and the respondents’ country of residence. Countries under study included Australia, India, the UK and US. The country …
Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael
Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael
Professor Katina Michael
Late last year, IEEE SSIT was invited to put together a paper for the centennial edition of Proceedings of the IEEE that was published in May 2012. The paper titled, “Social Implications of Technology: The Past, the Present, and the Future,” brought together five members of SSIT with varying backgrounds, and two intense months of collaboration and exchange of ideas. I personally felt privileged to be working with Karl D. Stephan, Emily Anesta, Laura Jacobs and M.G. Michael on this project.
Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael
Professor Katina Michael
This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.
The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei
The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei
Associate Professor Katina Michael
The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …
Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael
Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael
Professor Katina Michael
Hacking: The Next Generation demonstrates just how hackers continue to exploit “back doors”. New ways of working and new ways of communicating have meant that the number of attack vectors continue to rise rapidly. This provides hackers with a greater number of opportunities to penetrate systems using blended approaches while organizations struggle to come up to speed with the latest technology developments and commensurate security capabilities. Dealing with anticipated threats is a lot harder than dealing with known threats.
Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael
Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael
Professor Katina Michael
Tracking and monitoring people as they operate within their personal networks benefits service providers and their constituents but involves hidden risks and costs.
Automatic identification technologies, CCTV cameras, pervasive and mobile networks, wearable computing, location-based services and social networks have traditionally served distinct purposes. However, we have observed patterns of integration, convergence and coexistence among all these innovations within the information and communication technology industry.1For example, ‘location-based social networking’ can draw on a smart phone's capacity to identify a user uniquely, locate him within 1–2m and share this information across his social network in real time. The resulting ability to …
Career-Based Influences On Scientific Recognition In The United States And Europe: Longitudinal Evidence From Curriculum Vitae Data, Jan Youtie, Juan Rogers, Thomas Heinze, Philip Shapira, Li Tang
Career-Based Influences On Scientific Recognition In The United States And Europe: Longitudinal Evidence From Curriculum Vitae Data, Jan Youtie, Juan Rogers, Thomas Heinze, Philip Shapira, Li Tang
Philip Shapira
This paper examines how funding patterns, career pathways and collaboration networks influence scientific recognition. We analyze these institutional factors in the early and middle phases of academic careers through comparison of a group of researchers recognized as creative by their peers with a matched group of researchers. Measurement of scientific recognition is based on survey nominations and research prizes in two growing, laboratory-intensive research domains: nanotechnology and human genetics. Curriculum vitae data is used to compare researchers based in the United States and Europe. In the early career model for the United States, we find that scientific recognition is associated …
Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat
Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat
Professor Katina Michael
Location based social networking (LBSN) applications are part of a new suite of social networking tools. LBSN is the convergence between location based services (LBS) and online social networking (OSN). LBSN applications offer users the ability to look up the location of another “friend” remotely using a smart phone, desktop or other device, anytime and anywhere. Users invite their friends to participate in LBSN and there is a process of consent that follows. This paper explores the potential impact of LBSN upon trust in society. It looks at the willingness of individuals to share their location data with family, friends, …
Editorial: The Idio-Technopolis, Katina Michael
Editorial: The Idio-Technopolis, Katina Michael
Professor Katina Michael
The rapid rise of social media has brought with it an emphasis on the distinct dimensions of the whole person. Social media recognises that the individual has a personal network of extensions- a home life, a work life, a social life, a study life, a hobbyist life, and much more- some of these identities even hidden from full view. Each of these online value networks are now accessible by big business, where opinion leaders and early adopters are easily distinguishable, and where brand commentary between consumers matters manifold more than any form of targeted advertising.
Perceptions Measurement Of Professional Certifications To Augment Buffalo State College Baccalaureate Technology Programs, As A Representative American Postsecondary Educational Institution, Christopher N. Brown
Perceptions Measurement Of Professional Certifications To Augment Buffalo State College Baccalaureate Technology Programs, As A Representative American Postsecondary Educational Institution, Christopher N. Brown
Industrial Technology Theses
The purpose of this study was to assess, measure, and analyze whether voluntary, nationally-recognized professional certification credentials were important to augment technology programs at Buffalo State College (BSC), as a representative postsecondary baccalaureate degree-granting institution offering technology curricula. Six BSC undergraduate technology programs were evaluated within the scope of this study: 1.) Computer Information Systems; 2.) Electrical Engineering, Electronics; 3.) Electrical Engineering, Smart Grid; 4.) Industrial Technology; 5.) Mechanical Engineering; and 6.) Technology Education. This study considered the following three aspects of the problem: a.) postsecondary technology program enrollment and graduation trends; b.) the value/awareness of professional certifications to employers …
Designing An "Information-Experience" Using Creativity Science Theory And Tools, Stephanie Belhomme
Designing An "Information-Experience" Using Creativity Science Theory And Tools, Stephanie Belhomme
Creativity and Change Leadership Graduate Student Master's Projects
An “information-experience” encapsulated by a technological/digital audio-visual tool presents data and potentially meaningful information to prompt actionable knowledge concerning: “unspoken creative process elements;” their profound impacts on both how well our “physiology of creativity” functions; but also on how well foundational creative thinking and behavioral prerequisites (energy, motivation, imagination, and ownership) are leveraged.
The product: 1) introduces the user to one component of the CPS (Creative Problem Solving) Facilitation Process - Exploring the Challenge; 2) features a content specific component which prompts exploration of the many correlations between societal, organizational / community, human physiological / behavioral data, and the direct …
Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta
Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta
Professor Katina Michael
The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in these trends. …
Commentary On: Mann, Steve (2012): Wearable Computing, Katina Michael, M.G. Michael
Commentary On: Mann, Steve (2012): Wearable Computing, Katina Michael, M.G. Michael
Associate Professor Katina Michael
In Professor Steve Mann- inventor, physicist, engineer, mathematician, scientist, designer, developer, project director, filmmaker, artist, instrumentalist, author, photographer, actor, activist- we see so much of the paradigmatic classical Greek philosopher. I recall asking Steve if technology shaped society or society shaped technology. He replied along the lines that the question was superfluous. Steve instead pointed to praxis, from which all theory, lessons or skills stem, are practiced, embodied and realized. Steve has always been preoccupied by the application of his ideas into form. In this way too, he can be considered a modern day Leonardo Da Vinci.
Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael
Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael
Associate Professor Katina Michael
With so much buzz around Cloud Computing, books like this one written by Winkler are much in demand. Winkler’s experience in the computing business shines through and as readers we are spoiled with a great deal of useful strategic information- a jam packed almost 300 page volume on securing the cloud.
Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael
Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael
Professor Katina Michael
Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.
In Memoriam: Associate Professor Dr Elaine Lawrence, Katina Michael
In Memoriam: Associate Professor Dr Elaine Lawrence, Katina Michael
Associate Professor Katina Michael
Despite being a graduate of the rigorous Bachelor of Information Technology at the University of Technology, Sydney (UTS) in 1996, I was unfortunate in that I missed being taught by Associate Professor Elaine Lawrence who began working at UTS in 1990 as a Lecturer in Computing Science. Dr Lawrence became a senior lecturer in 2000, and subsequently an associate professor in 2006. Our paths crossed in 2002 when I was tasked to deliver a new course entitled “eBusiness Principles” in my first year of lecturing at the University of Wollongong, and after an initial scurry to find an adequate textbook, …
The Technological Trajectory Of The Automatic Identification Industry: The Application Of The Systems Of Innovation (Si) Framework For The Characterisation And Prediction Of The Auto-Id Industry, Katina Michael
Professor Katina Michael
Traditionally the approach used to analyse technological innovation focused on the application of the techno-economic paradigm with the production function as its foundation. This thesis explores the rise of the evolutionary paradigm as a more suitable conceptual approach to investigating complex innovations like automatic identification (auto-ID) devices. Collecting and analysing data for five auto-ID case studies, (bar codes, magnetic-stripe cards, smart cards, biometrics and RF/ID transponders), it became evident that a process of migration, integration and convergence is happening within the auto-ID technology system (TS). The evolution of auto-ID is characterised by a new cluster of innovations, primarily emerging through …
Integrating Value-Driven Feedback And Recommendation Mechanisms Into Business Intelligence Systems, Byron Keating, Tim Coltman, Michael Katina, Valeria Baker
Integrating Value-Driven Feedback And Recommendation Mechanisms Into Business Intelligence Systems, Byron Keating, Tim Coltman, Michael Katina, Valeria Baker
Professor Katina Michael
Most leading organizations, in all sectors of industry, commerce and government are dependent upon
ERP for their organizational survival. Yet despite the importance of the decision to adopt ERP and its
impact on the entire firm’s performance the IT literature has been in the large part silent on the nature
of the ERP investment decision. This study is the first of its kind to determine the preference structure
of senior managers around the organizational benefits and risks of adopting ERP. We present the
results which provide interesting insights into how managers’ perceive the benefit and risk factors
salient to the …
Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt
Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt
Professor Katina Michael
Law disciplines technology, though it does so in a partial and incomplete way as reflected in the old adage that technology outstrips the capacity of law to regulate it. The rise of new technologies poses a significant threat to human rights – the pervasive use of CCTV (and now mobile CCTV), telecommunications interception, and low-cost audio-visual recording and tracking devices (some of these discreetly wearable), extend the power of the state and corporations significantly to intrude into the lives of citizens.
Editorial: "You Talkin' To Me?", Katina Michael
Editorial: "You Talkin' To Me?", Katina Michael
Professor Katina Michael
Advancing knowledge through robust research is an honourable aim- being scientific, finding the right methodology, executing project phases meticulously, and reporting on the outcomes as objectively and accurately as possible. But may I begin my inaugural editorial by saying that an even higher ideal to advancing knowledge is critiquing it as it happens. Reflective practice is not just something to be done by academics in their teaching- reflective practice is what we should all be doing as we go about undertaking our various day-to-day work tasks. For the engineer engaged in research and development, whether in industry or government, reflective …
Sousveillance And The Social Implications Of Point Of View Technologies In The Law Enforcement Sector, Katina Michael, M.G. Michael
Sousveillance And The Social Implications Of Point Of View Technologies In The Law Enforcement Sector, Katina Michael, M.G. Michael
Associate Professor Katina Michael
Policing today has become a high-tech affair; especially in the provision of incident event tracking and reporting systems increasingly being used to provide evidence in a court of law. These in-car video (ICV) and body worn recording systems are said to increase convictions and eliminate false claims made by defendants, providing documentary support to police officers and their associated actions in an incident. But today, new technologies such as smart phones equipped with cameras and global positioning system chipsets can also be found in the hands of the everyday citizen, used to capture everyday happenings and distributed to social networks …
Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael
Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael
Associate Professor Katina Michael
In an age of outsourcing tasks that are not considered to be a core competency of the business, organisations have often relied on external consultants for matters pertaining to security. In actual fact, most companies could have utilized existing skill-sets in-house to produce a security risk management program, if only they knew what steps to take, and how to go about it all. Evan Wheeler in his book on information security risk management does just that- he equips professionals tasked with security, with the thinking required to create a program that is more preoccupied with the complex strategic-level questions than …
Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke
Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke
Associate Professor Katina Michael
Location tracking and monitoring applications have proliferated with the arrival of smart phones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smart phone user down to 10 metres of accuracy on average. Innovators have been quick to capitalise on this emerging market by introducing novel pedestrian tracking technologies which can denote the geographic path of a mobile user. At the same time there is contention by law enforcement personnel over the need for a warrant process to track an individual in a public space. This paper considers the future of location …
A Trans-Atlantic Conversation On Responsible Innovation And Responsible Governance, Sally Randles, Jan Youtie, David Guston, Barbara Harthorn, Chris Newfield, Philip Shapira, Fern Wickson, Arie Rip, René Von Schomberg, Nick Pidgeon
A Trans-Atlantic Conversation On Responsible Innovation And Responsible Governance, Sally Randles, Jan Youtie, David Guston, Barbara Harthorn, Chris Newfield, Philip Shapira, Fern Wickson, Arie Rip, René Von Schomberg, Nick Pidgeon
Philip Shapira
How can innovation be balanced with responsible governance? Responsible innovation and responsible governance are broad concepts which mean different things to different groups. This paper presents the results of a roundtable held at the Society for Nanotechnology and Emerging Technologies (S.NET) 2011 conference with academics and policymakers from Europe and the US. The results of this roundtable discussion raise issues of definition, lack of consensus, and the role of philosophy versus practical intervention.
Friedrich Nietzsche: The Abyss And Technology, Mary Willis
Friedrich Nietzsche: The Abyss And Technology, Mary Willis
Mary Willis
Friedrich Nietzsche, while being an extremely interesting man, shall only be a part of the focus of this thesis. Nietzsche was famous for an often misquoted quote which goes like this: “He who fights with monsters might take care lest he thereby become a monster. And if you gaze for long into an abyss, the abyss gazes also into you.” I would like to take this quote and borrow from Nietzsche’s philosophical ideas about life to compare modern technology to the abyss. Nietzsche claims that the principle of “life” is a more pressing and higher concern than that of “knowledge,” …
Linking Development And Innovation: What Does Technological Change Bring To The Society?, Evgeny A. Klochikhin
Linking Development And Innovation: What Does Technological Change Bring To The Society?, Evgeny A. Klochikhin
Evgeny A. Klochikhin
Recently, there has been a popular trend in academic research for paying more attention to ‘pro-poor’ policies and theoretical studies. This tradition has emerged from a broader understanding of development that includes not only economic but also social and political dimensions. Meanwhile, innovation researchers are still considering development as mere economic growth without much focus on the social impacts of technological change. This article recognizes that, despite these fundamental differences, the concepts of innovation and development have much in common and are, in fact, positively connected and mutually beneficial. This assumption has some important implications for the innovation and development …
Resource Discovery Tools: Supporting Serendipity, Tammera M. Race
Resource Discovery Tools: Supporting Serendipity, Tammera M. Race
DLTS Faculty Publications
Serendipity, the accidental discovery of something useful, plays an important role in discovery and the acquisition of new knowledge. The process and role of serendipity varies across disciplines. As library collections have become increasingly digital faculty lament the loss of serendipity of browsing library stacks. Resource discovery tools may have features that support serendipity as part of information seeking. A comparison of four commercial Web-scale discovery tools, Online Computer Library Center (OCLC) WorldCat® Local1, Serials Solution2® Summon3™, ExLibris4® Primo Central5™, and EBSCO Discovery Services (EDS)6™, links product features to characteristics that support serendipitous discovery. However, having such features is only …
An Investigation Of The Appropriation Of Technology-Mediated Training Methods Incorporating Enactive And Collaborative Learning, Saurabh Gupta, Robert Bostrom
An Investigation Of The Appropriation Of Technology-Mediated Training Methods Incorporating Enactive And Collaborative Learning, Saurabh Gupta, Robert Bostrom
Saurabh Gupta
The growth in the application of information technology to student and employee learning underscores the need to understand the impact of Technology-Mediated Learning (TML) methods. Using previous developed TML models, based on Social Cognitive Theory and Adaptive Structuration Meta-Theory, the effectiveness of three training methods were examined in this study: technology-mediated (using both vicarious and enactive learning), collaborative and combined (collaborative plus technology-mediated). The study also focused on the learning process. The experimental study results showed a significant positive influence of enactive learning enabled TML and collaborative training on specific training outcomes while the combined training method shows positive results …