Open Access. Powered by Scholars. Published by Universities.®
Science and Technology Studies Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (39)
- Law (21)
- Communication (20)
- Public Affairs, Public Policy and Public Administration (19)
- Physical Sciences and Mathematics (18)
-
- Business (17)
- Communication Technology and New Media (17)
- Computer Law (16)
- Computer Sciences (16)
- Technology and Innovation (15)
- Internet Law (14)
- Public Policy (14)
- Sociology (13)
- Law and Society (12)
- Other Engineering (11)
- Computer Engineering (9)
- Criminology (9)
- Library and Information Science (9)
- Science and Technology Policy (9)
- Social Policy (9)
- Digital Communications and Networking (8)
- Computer and Systems Architecture (7)
- Life Sciences (7)
- Arts and Humanities (6)
- Philosophy (6)
- Science and Technology Law (6)
- Social Media (6)
- Bioinformatics (5)
- Institution
-
- University of Wollongong (21)
- Selected Works (10)
- Wright State University (5)
- California State University, San Bernardino (4)
- SelectedWorks (4)
-
- City University of New York (CUNY) (3)
- University of Pennsylvania Carey Law School (3)
- Eastern Michigan University (2)
- Old Dominion University (2)
- University of Massachusetts Amherst (2)
- University of Pittsburgh School of Law (2)
- Arcadia University (1)
- Florida International University (1)
- Johnson & Wales University (1)
- Kansas State University Libraries (1)
- Nova Southeastern University (1)
- Penn State Dickinson Law (1)
- Syracuse University (1)
- Texas A&M University School of Law (1)
- The College of Wooster (1)
- University of Denver (1)
- University of Kentucky (1)
- University of Rhode Island (1)
- Western University (1)
- Publication Year
- Publication
-
- Faculty of Engineering and Information Sciences - Papers: Part A (15)
- Kno.e.sis Publications (5)
- Professor Katina Michael (5)
- Journal of International Technology and Information Management (4)
- All Faculty Scholarship (3)
-
- Associate Professor Katina Michael (3)
- Faculty of Engineering and Information Sciences - Papers: Part B (3)
- Michael Friedewald (3)
- Ethics in Science and Engineering National Clearinghouse (2)
- M. G. Michael (2)
- Master's Theses and Doctoral Dissertations (2)
- Open Educational Resources (2)
- The Journal of Sociotechnical Critique (2)
- Alexander Hayes Mr. (1)
- Articles (1)
- Book Chapters (1)
- Collaborative Librarianship (1)
- Dickinson Law Review (2017-Present) (1)
- Dissertations, Theses, and Capstone Projects (1)
- FDLA Journal (1)
- FIMS Publications (1)
- Faculty Scholarship (1)
- Graduate Theses & Dissertations (1)
- Information Science Faculty Publications (1)
- MBA Faculty Conference Papers & Journal Articles (1)
- NPP eBooks (1)
- Payal Arora (1)
- Professor Willy Susilo (1)
- School of Information Studies - Post-doc and Student Scholarship (1)
- Senior Honors Projects (1)
- Publication Type
- File Type
Articles 1 - 30 of 71
Full-Text Articles in Science and Technology Studies
Content Moderation As Surveillance, Hannah Bloch-Wehba
Content Moderation As Surveillance, Hannah Bloch-Wehba
Faculty Scholarship
Technology platforms are the new governments, and content moderation is the new law, or so goes a common refrain. As platforms increasingly turn toward new, automated mechanisms of enforcing their rules, the apparent power of the private sector seems only to grow. Yet beneath the surface lies a web of complex relationships between public and private authorities that call into question whether platforms truly possess such unilateral power. Law enforcement and police are exerting influence over platform content rules, giving governments a louder voice in supposedly “private” decisions. At the same time, law enforcement avails itself of the affordances of …
Public Goods From Private Data: An Effectiveness And Justification Dilemma For Digital Contact Tracing, Andrew Buzzell
Public Goods From Private Data: An Effectiveness And Justification Dilemma For Digital Contact Tracing, Andrew Buzzell
The Journal of Sociotechnical Critique
Debate about the adoption of digital contact tracing (DCT) apps to control the spread of COVID-19 has focussed on risks to individual privacy. This emphasis reveals significant challenges to ethical deployment of DCT, but generates constraints which undermine justification to implement DCT. It would be a mistake to view this result solely as the successful operation of ethical foresight analysis, preventing deployment of potentially harmful technology. Privacy-centric analysis treats data as private property, frames the relationship between individuals and governments as adversarial, entrenches technology platforms as gatekeepers, and supports a conception of emergency public health authority as limited by individual …
Digital Privacy In The Home, Kelley Flannery Rowan
Digital Privacy In The Home, Kelley Flannery Rowan
Works of the FIU Libraries
This workshop covers how to stay safe in a digital environment while using the many conveniences a smart home offers. The first half focuses on understanding where the risks are in the digital environment and how to stay safe by creating secure networks and employing strong security tactics with biometrics, passwords, and other available features. The second half focuses on the Internet of Things, covering everything you are likely to find in a smart home. The presentation offers tips on how to reduce the risk of hackers invading your privacy through smart speakers and TVs, as well as addressing the …
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Dickinson Law Review (2017-Present)
No abstract provided.
The Impact Of User Control And Transparency In App Design On Privacy Concerns And Behavior Of Mobile App Users, Arwa Alawajy
The Impact Of User Control And Transparency In App Design On Privacy Concerns And Behavior Of Mobile App Users, Arwa Alawajy
Dissertations, Theses, and Capstone Projects
Mobile apps have unprecedented access to sensitive personal information. The increasing commodification of mobile-user data motivates us to explore the vital role of app developers in protecting users’ privacy. This dissertation examines the privacy of mobile app users from the perspective of HCI. According to Communication Privacy Management (CPM) theory, people believe they own their personal information and have the right to control how or with whom they share this information. In practice, individuals manage their privacy system and the boundaries between the public and private domain. Users make privacy disclosure decisions according to their individual characteristics and the perceptions …
Disruptive Technologies With Applications In Airline & Marine And Defense Industries, Randall K. Nichols, Hans C. Mumm, Wayne Lonstein, Suzanne Sincavage, Candice M. Carter, John-Paul Hood, Randall Mai, Mark Jackson, Bart Shields
Disruptive Technologies With Applications In Airline & Marine And Defense Industries, Randall K. Nichols, Hans C. Mumm, Wayne Lonstein, Suzanne Sincavage, Candice M. Carter, John-Paul Hood, Randall Mai, Mark Jackson, Bart Shields
NPP eBooks
Disruptive Technologies With Applications in Airline, Marine, Defense Industries is our fifth textbook in a series covering the world of Unmanned Vehicle Systems Applications & Operations On Air, Sea, and Land. The authors have expanded their purview beyond UAS / CUAS / UUV systems that we have written extensively about in our previous four textbooks. Our new title shows our concern for the emergence of Disruptive Technologies and how they apply to the Airline, Marine and Defense industries. Emerging technologies are technologies whose development, practical applications, or both are still largely unrealized, such that they are figuratively emerging into prominence …
The Republic Of Letters And The Origins Of Scientific Knowledge Commons, Michael J. Madison
The Republic Of Letters And The Origins Of Scientific Knowledge Commons, Michael J. Madison
Book Chapters
The knowledge commons framework, deployed here in a review of the early network of scientific communication known as the Republic of Letters, combines a historical sensibility regarding the character of scientific research and communications with a modern approach to analyzing institutions for knowledge governance. Distinctions and intersections between public purposes and privacy interests are highlighted. Lessons from revisiting the Republic of Letters as knowledge commons may be useful in advancing contemporary discussions of Open Science.
Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian
Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian
Journal of International Technology and Information Management
Information and Communications technologies (ICT) pervade society. The Internet, wireless communication, and social media are ubiquitous in and indispensable in society today. As they continue to grow and mushroom, there are new and increased calls from various segments of the society such as technologists, activists, sociologists, and legal experts, who issue warnings on the more nefarious and undesirable uses of ICTs, especially by governments. In fact, government control and surveillance using ICTs is not a new phenomenon. By looking at history, we are able to see several instances when ICTs have been used by governments to control, surveil, and infringe …
Pandemic Surveillance Discrimination, Christian Sundquist
Pandemic Surveillance Discrimination, Christian Sundquist
Articles
The COVID-19 pandemic has laid bare the abiding tension between surveillance and privacy. Public health epidemiology has long utilized a variety of surveillance methods—such as contact tracing, quarantines, and mandatory reporting laws—to control the spread of disease during past epidemics and pandemics. Officials have typically justified the resulting intrusions on privacy as necessary for the greater public good by helping to stave off larger health crisis. The nature and scope of public health surveillance in the battle against COVID-19, however, has significantly changed with the advent of new technologies. Digital surveillance tools, often embedded in wearable technology, have greatly increased …
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
Open Educational Resources
Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.
Brave New World: Privacy, Data Sharing And Evidence Based Policy Making, Rhonda S. Binda
Brave New World: Privacy, Data Sharing And Evidence Based Policy Making, Rhonda S. Binda
Open Educational Resources
The trifecta of globalization, urbanization and digitization have created new opportunities and challenges across our nation, cities, boroughs and urban centers. Cities in particular are in a unique position at the center of commerce and technology becoming hubs for innovation and practical application of emerging technology. In this rapidly changing 24/7 digitized world, governments are leveraging innovation and technology to become more effective, efficient, transparent and to be able to better plan for and anticipate the needs of its citizens, businesses and community organizations. This class will provide the framework for how cities and communities can become smarter and more …
From Protecting To Performing Privacy, Garfield Benjamin
From Protecting To Performing Privacy, Garfield Benjamin
The Journal of Sociotechnical Critique
Privacy is increasingly important in an age of facial recognition technologies, mass data collection, and algorithmic decision-making. Yet it persists as a contested term, a behavioural paradox, and often fails users in practice. This article critiques current methods of thinking privacy in protectionist terms, building on Deleuze's conception of the society of control, through its problematic relation to freedom, property and power. Instead, a new mode of understanding privacy in terms of performativity is provided, drawing on Butler and Sedgwick as well as Cohen and Nissenbaum. This new form of privacy is based on identity, consent and collective action, a …
Text Messaging Between School Counselors And Students: An Exploratory Study, Nicholas R. Gilly
Text Messaging Between School Counselors And Students: An Exploratory Study, Nicholas R. Gilly
Graduate Theses & Dissertations
This exploratory case study examines the impact of text messaging on mentoring relationships when used as an outreach between school counselors and high school students, where established relationships are lacking. An SMS gateway was used to mediate communication between school counselors (N=2) and students (N=5) over a three-month timeframe. The SMS gateway converted email, sent from counselors, to text messages, which were received on mobile devices of students and allowed students to respond back to counselors. Findings indicate that the use of text messaging may ease scheduling of face-to-face meetings between counselors and students, but evidence does not support any …
A New Approach To Keep The Privacy Information Of The Signer In A Digital Signature Scheme, Dung Hoang Duong, Willy Susilo, Viet Cuong Trinh
A New Approach To Keep The Privacy Information Of The Signer In A Digital Signature Scheme, Dung Hoang Duong, Willy Susilo, Viet Cuong Trinh
Faculty of Engineering and Information Sciences - Papers: Part B
In modern applications, such as Electronic Voting, e-Health, e-Cash, there is a need that the validity of a signature should be verified by only one responsible person. This is opposite to the traditional digital signature scheme where anybody can verify a signature. There have been several solutions for this problem, the first one is we combine a signature scheme with an encryption scheme; the second one is to use the group signature; and the last one is to use the strong designated verifier signature scheme with the undeniable property. In this paper, we extend the traditional digital signature scheme to …
Towards Practical Privacy-Preserving Analytics For Iot And Cloud Based Healthcare Systems, Sagar Sharma, Keke Chen, Amit P. Sheth
Towards Practical Privacy-Preserving Analytics For Iot And Cloud Based Healthcare Systems, Sagar Sharma, Keke Chen, Amit P. Sheth
Kno.e.sis Publications
Modern healthcare systems now rely on advanced computing methods and technologies, such as IoT devices and clouds, to collect and analyze personal health data at unprecedented scale and depth. Patients, doctors, healthcare providers, and researchers depend on analytical models derived from such data sources to remotely monitor patients, early-diagnose diseases, and find personalized treatments and medications. However, without appropriate privacy protection, conducting data analytics becomes a source of privacy nightmare. In this paper, we present the research challenges in developing practical privacy-preserving analytics in healthcare information systems. The study is based on kHealth - a personalized digital healthcare information system …
Reading Reflection Privacy And Security, Paul Sujith Rayi
Reading Reflection Privacy And Security, Paul Sujith Rayi
School of Information Studies - Post-doc and Student Scholarship
No abstract provided.
Data Privacy And System Security For Banking And Financial Services Industry Based On Cloud Computing Infrastructure, Abhishek Mahalle, Jianming Yong, Xiaohui Tao, Jun Shen
Data Privacy And System Security For Banking And Financial Services Industry Based On Cloud Computing Infrastructure, Abhishek Mahalle, Jianming Yong, Xiaohui Tao, Jun Shen
Faculty of Engineering and Information Sciences - Papers: Part B
No abstract provided.
Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar
Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar
Journal of International Technology and Information Management
mHealth (Mobile Health) applications (apps) have transformed the doctor-patient relationship. They help users with varied functionalities such as monitoring their health, understanding specific health conditions, consulting doctors online and achieving fitness goals. Whilst these apps provide an option of equitable and convenient access to healthcare, a lot of personal and sensitive data about users is collected, stored and shared to achieve these functionalities. Little is known about the privacy and security concerns these apps address. Based on literature review, this paper identifies the privacy risks and security features for evaluating thirty apps in the Medical category across two app distribution …
Are You Really Anonymous Online? Your Friends On Twitter May Give You Away, Jessica T. Su
Are You Really Anonymous Online? Your Friends On Twitter May Give You Away, Jessica T. Su
FDLA Journal
As you browse the internet, online advertisers track nearly every site you visit, amassing a trove of information on your habits and preferences. When you visit a news site, they might see you’re a fan of basketball, opera and mystery novels, and accordingly select ads tailored to your tastes.
Advertisers use this information to create highly personalized experiences, but they typically don’t know exactly who you are. They observe only your digital trail, not your identity itself, and so you might feel that you’ve retained a degree of anonymity.
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving For Cloud Storage, Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, Geyong Min
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving For Cloud Storage, Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, Geyong Min
Faculty of Engineering and Information Sciences - Papers: Part A
Remote data integrity checking (RDIC) enables a data storage server, say a cloud server, to prove to a verifier that it is actually storing a data owner's data honestly. To date, a number of RDIC protocols have been proposed in the literature. However, most of the constructions suffer from the issue of requiring complex key management. That is, they rely on the expensive public key infrastructure (PKI), which might hinder the deployment of RDIC in practice. In this paper, we propose a new construction of identity-based (ID-based) RDIC protocol by making use of key-homomorphic cryptographic primitive to reduce the system …
Emergent Ai, Social Robots And The Law: Security, Privacy And Policy Issues, Ramesh Subramanian
Emergent Ai, Social Robots And The Law: Security, Privacy And Policy Issues, Ramesh Subramanian
Journal of International Technology and Information Management
The rapid growth of AI systems has implications on a wide variety of fields. It can prove to be a boon to disparate fields such as healthcare, education, global logistics and transportation, to name a few. However, these systems will also bring forth far-reaching changes in employment, economy and security. As AI systems gain acceptance and become more commonplace, certain critical questions arise: What are the legal and security ramifications of the use of these new technologies? Who can use them, and under what circumstances? What is the safety of these systems? Should their commercialization be regulated? What are the …
What Is Privacy? The Threat Of Surveillance And Blackmail In The 21st Century, Harrison S. Ruprecht
What Is Privacy? The Threat Of Surveillance And Blackmail In The 21st Century, Harrison S. Ruprecht
Senior Independent Study Theses
In an interview published in Wired magazine on November 12, 2013, Steven Levy asked Bill Gates, in virtue of recent NSA revelations, “What is the proper balance of surveillance and security, and where do we go from here?”[1] Gates responded, “Historically, privacy was almost implicit, because it was hard to find and gather information. But in the digital world, whether it's digital cameras or satellites or just what you click on, we need to have more explicit rules - not just for governments but for private companies.”[2] In many ways Gates’ thought anticipates my project. In the pages …
Personal Privacy: A Study To Determine Views On Privacy As It Relates To Technology Acceptance, Keith A. Wuotinen
Personal Privacy: A Study To Determine Views On Privacy As It Relates To Technology Acceptance, Keith A. Wuotinen
Master's Theses and Doctoral Dissertations
This descriptive correlation study sought to learn the relationships, if any, between a person’s concern for privacy and their acceptance of technology, in conjunction with the control factors of the Big Five personality factors. The study employed a modified Concern for Information Privacy (CFIP) scale and a modified Technology Acceptance Model (TAM) approach in conjunction with the Big Five personality factors using a 51-question survey.
The study surveyed students at Eastern Michigan University in Ypsilanti, Michigan, who were enrolled in the College of Technology. The results indicated that there was a significant positive relationship between the CFIP and the TAM. …
Privacy And The Information Age: A Longitudinal View, Charles E. Downing
Privacy And The Information Age: A Longitudinal View, Charles E. Downing
Journal of International Technology and Information Management
As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake these principles? …
Remembering Me: Big Data, Individual Identity, And The Psychological Necessity Of Forgetting, Jacquelyn A. Burkell
Remembering Me: Big Data, Individual Identity, And The Psychological Necessity Of Forgetting, Jacquelyn A. Burkell
FIMS Publications
Each of us has a personal narrative: a story that defines us, and one that we tell about ourselves to our inner and outer worlds. A strong sense of identity is rooted in a personal narrative that has coherence and correspondence (Conway, 2005): coherence in the sense that the story we tell is consistent with and supportive of our current version of ‘self’; and correspondence in the sense that the story reflects the contents of autobiographical memory and the meaning of our experiences. These goals are achieved by a reciprocal interaction of autobiographical memory and the self, in which memories …
Smart Environments & The Convergence Of The Veillances: Privacy Violations To Consider, Christine Perakslis, Katina Michael, M.G. Michael
Smart Environments & The Convergence Of The Veillances: Privacy Violations To Consider, Christine Perakslis, Katina Michael, M.G. Michael
MBA Faculty Conference Papers & Journal Articles
As a vast array of embedded smart devices will connect to the IoT (Internet of Things), society is rapidly moving into the unchartered territory of Pervasive Technology. Networks of devices will be unobtrusive; thereby freeing humans from the effort of human-to-machine (H2M) interactions, as well as elements of everyday decision-making. Technology will be far more intelligent and ubiquitous, thinking and acting for us behind the lines of visibility. The purpose of this paper is to probe the attributes of pervasive technologies (e.g. smart environments) within the context of the rapidly converging four veillances (i.e. surveillance, dataveillance, sousveillance, and uberveillance), so …
Improving Speech Privacy In Personal Sound Zones, Jacob Donley, Christian H. Ritz, Bastiaan (Willem) Kleijn
Improving Speech Privacy In Personal Sound Zones, Jacob Donley, Christian H. Ritz, Bastiaan (Willem) Kleijn
Faculty of Engineering and Information Sciences - Papers: Part A
This paper proposes two methods for providing speech privacy between spatial zones in anechoic and reverberant environments. The methods are based on masking the content leaked between regions. The masking is optimised to maximise the speech intelligibility contrast (SIC) between the zones. The first method uses a uniform masker signal that is combined with desired multizone loudspeaker signals and requires acoustic contrast between zones. The second method computes a space-time domain masker signal in parallel with the loudspeaker signals so that the combination of the two emphasises the spectral masking in the targeted quiet zone. Simulations show that it is …
Public Cloud Data Auditing With Practical Key Update And Zero Knowledge Privacy, Yong Yu, Yannan Li, Man Ho Au, Willy Susilo, Kim-Kwang Raymond Choo, Xinpeng Zhang
Public Cloud Data Auditing With Practical Key Update And Zero Knowledge Privacy, Yong Yu, Yannan Li, Man Ho Au, Willy Susilo, Kim-Kwang Raymond Choo, Xinpeng Zhang
Faculty of Engineering and Information Sciences - Papers: Part A
Data integrity is extremely important for cloud based storage services, where cloud users no longer have physical possession of their outsourced files. A number of data auditing mechanisms have been proposed to solve this problem. However, how to update a cloud user's private auditing key (as well as the authenticators those keys are associated with) without the user's re-possession of the data remains an open problem. In this paper, we propose a key-updating and authenticator-evolving mechanism with zero-knowledge privacy of the stored files for secure cloud data auditing, which incorporates zero knowledge proof systems, proxy re-signatures and homomorphic linear authenticators. …
Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes
Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes
Alexander Hayes Mr.
- From in-car video recording to body-worn video recording
- Exploring available technologies: how do they work, pros and cons
- Storing direct evidence in secure storage: factors to consider
- Citizens “shooting” back with POV tech – what are their rights?
- Crowdsourced sousveillance- harnessing public data for forensic profiling
- Police force policies and practices on the application of new media
An Analysis Of Tools For Online Anonymity, Stephanie Winkler, Sherali Zeadally
An Analysis Of Tools For Online Anonymity, Stephanie Winkler, Sherali Zeadally
Information Science Faculty Publications
Purpose
The purpose of this paper is to examine the possible explanations for the slow adoption and development of online anonymity technology. The ability to remain anonymous while engaging in different activities, online is increasingly sought after by consumers with privacy concerns. Currently, the only way to maintain online anonymity is through the use of technology. This paper reviews and analyzes the tools currently available to consumers to maintain online anonymity. There are only four tools available to consumers to ensure online anonymity: anonymous remailers, rewebbers, The Onion Router (Tor) and the Invisible Internet Project (I2P). These tools provide the …