Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Science and Technology Studies

The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M G. Michael Jan 2014

The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M G. Michael

M. G. Michael

Microchip implants for humans are not new. Placing heart pacemakers in humans for prosthesis is now considered a straightforward procedure. In more recent times we have begun to use brain pacemakers for therapeutic purposes to combat illnesses such as epilepsy, Parkinson's disease, and severe depression. Microchips are even being placed inside prosthetic knees and hips during restorative procedures to help in the gathering of post-operative analytics that can aid rehabilitation further. While medical innovations that utilize microchips abound, over the last decade we have begun to see the potential use of microchip implants for non-medical devices in humans, namely for …


Social Implications Of Technology: The Past, The Present, And The Future, Karl Stephan, Katina Michael, M. G. Michael, Laura Jacob, Emily Anesta Jan 2014

Social Implications Of Technology: The Past, The Present, And The Future, Karl Stephan, Katina Michael, M. G. Michael, Laura Jacob, Emily Anesta

M. G. Michael

The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in these trends. …


The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael Aug 2011

The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael

M. G. Michael

No abstract provided.


Demystifying The Number Of The Beast In The Book Of Revelation: Examples Of Ancient Cryptology And The Interpretation Of The 666 Conundrum, M. G. Michael Jun 2010

Demystifying The Number Of The Beast In The Book Of Revelation: Examples Of Ancient Cryptology And The Interpretation Of The 666 Conundrum, M. G. Michael

M. G. Michael

As the year 2000 came and went, with the suitably forecasted fuse-box of utopian and apocalyptic responses, the question of "666" (Rev 13:18) was once more brought to our attention in different ways. Biblical scholars, for instance, focused again on the interpretation of the notorious conundrum and on the Traditionsgeschichte of Antichrist. For some of those commentators it was a reply to the outpouring of sensationalist publications fuelled by the millennial mania. This paper aims to shed some light on the background, the sources, and the interpretation of the “number of the beast”. It explores the ancient techniques for understanding …


666 Or 616 (Rev. 13,18), M. G. Michael Oct 2008

666 Or 616 (Rev. 13,18), M. G. Michael

M. G. Michael

No abstract provided.


The Genre Of The Apocalypse: What Are They Saying Now?, M. G. Michael Oct 2008

The Genre Of The Apocalypse: What Are They Saying Now?, M. G. Michael

M. G. Michael

No abstract provided.


National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael May 2008

National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael

M. G. Michael

This special issue of Prometheus is dedicated to the theme of the Social Implications of National Security Measures on Citizens and Business. National security measures can be defined as those technical and non-technical measures that have been initiated as a means to curb breaches in national security, irrespective of whether these might occur by nationals or aliens in or from outside the sovereign state. National security includes such government priorities as maintaining border control, safeguarding against pandemic outbreaks, preventing acts of terror, and even discovering and eliminating identification fraud. Governments worldwide are beginning to implement information and communication security techniques …


Historical Lessons On Id Technology And The Consequences Of An Unchecked Trajectory, Katina Michael, M G. Michael May 2008

Historical Lessons On Id Technology And The Consequences Of An Unchecked Trajectory, Katina Michael, M G. Michael

M. G. Michael

This paper traces the use of identification techniques throughout the ages and focuses on the growing importance of citizen identification by governments. The paper uses a historical approach beginning with manual techniques such as tattoos, through to more recent automatic identification (auto-ID) techniques such as smart cards and biometrics. The findings indicate that identification techniques born for one purpose have gradually found their way into alternate applications, and in some instances have been misused altogether. There is also strong evidence to suggest that governments are moving away from localized identification schemes to more global systems based on universal lifetime identifiers.


Privacy, Value And Control Issues In Four Mobile Business Applications, Benjamin D. Renegar, Katina Michael, M G. Michael May 2008

Privacy, Value And Control Issues In Four Mobile Business Applications, Benjamin D. Renegar, Katina Michael, M G. Michael

M. G. Michael

This paper presents four case studies that explore the adoption and acceptance of mobile technologies and services within the context of the privacy-value-control (PVC) trichotomy. The technologies studied include: the mobile phone, electronic toll payment tags, e-passports, and loyalty card programs. The study shows that despite the potential barriers to adoption in each of the depicted cases, the applications were embraced with great success soon after their introduction. An understanding of why these mobile innovations succeeded in spite of the concerns surrounding them will serve to help practitioners understand other issues currently plaguing emerging technologies like radio-frequency identification (RFID) tags …