Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Emerging Technologies (5)
- National Security (4)
- Social Implications of ICT (4)
- Ethics (3)
- Location-Based Services (3)
-
- Privacy (3)
- Risk (3)
- Surveillance (3)
- Uberveillance (3)
- Civil rights litigation (2)
- Information Security (2)
- People (2)
- Police crime (2)
- Police misconduct (2)
- Section 1983 (2)
- Technology (2)
- Trust (2)
- Abuse (1)
- Acceptance (1)
- Aesthetic (1)
- African-American Community (1)
- Analysis (1)
- Articles (1)
- Australia (1)
- Bureaucracy (1)
- Case Studies (1)
- Cellular mobile (1)
- Citywatcher (1)
- Consequences (1)
- Consumers (1)
Articles 1 - 18 of 18
Full-Text Articles in Criminology
Federal Civil Rights Litigation Pursuant To 42 U.S.C. §1983 As A Correlate Of Police Misconduct, Philip M. Stinson, Steven L. Brewer Jr, Theresa M. Lanese, Mallorie A. Wilson
Federal Civil Rights Litigation Pursuant To 42 U.S.C. §1983 As A Correlate Of Police Misconduct, Philip M. Stinson, Steven L. Brewer Jr, Theresa M. Lanese, Mallorie A. Wilson
Philip M Stinson
Police officers acting in their official capacity are subject to being sued in federal court pursuant to 42 U.S.C. §1983 for violating constitutional rights under the color of law. Using data obtained in a larger study on police crime in the United States, names of more than 5,500 nonfederal sworn law enforcement officers who were arrested during the years 2005-2011 were checked against the civil case party master name index of the federal courts’ Public Access to Courts Electronic Records (PACER) system. Findings indicate that more than 20% of the police officers who were arrested for committing one or more …
Federal Civil Rights Litigation Pursuant To 42 U.S.C. §1983 As A Correlate Of Police Misconduct, Philip M. Stinson, Steven L. Brewer Jr, Theresa M. Lanese, Mallorie A. Wilson
Federal Civil Rights Litigation Pursuant To 42 U.S.C. §1983 As A Correlate Of Police Misconduct, Philip M. Stinson, Steven L. Brewer Jr, Theresa M. Lanese, Mallorie A. Wilson
Philip M Stinson
Police officers acting in their official capacity are subject to being sued in federal court pursuant to 42 U.S.C. §1983 for violating constitutional rights under the color of law. Using data obtained in a larger study on police crime in the United States, names of more than 5,500 nonfederal sworn law enforcement officers who were arrested during the years 2005-2011 were checked against the civil case party master name index of the federal courts’ Public Access to Courts Electronic Records (PACER) system. Findings indicate that more than 20% of the police officers who were arrested for committing one or more …
Book Review: Policing And The Poetics Of Everyday Life., Rodger E. Broome Phd
Book Review: Policing And The Poetics Of Everyday Life., Rodger E. Broome Phd
Rodger E. Broome
Policing and the poetics of everyday life. Chicago: University of Illinois Press, 2008. 256 pp. ISBN 978-0-252-03371-1 (cloth). $42.00. Policing and the Poetics of Everyday Life is a hermeneutical-aesthetic analysis within a human scientific approach of modern policing in the United States. It is an important study of police-citizen encounters informed by hermeneutic aesthetic thought and the author’s professional experience as a veteran with a Seattle area police department in Washington, USA.
Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke
Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke
Professor Katina Michael
During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …
Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael
Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael
Professor Katina Michael
This paper investigates the introduction of location-based services by government as part of an all-hazards approach to modern emergency management solutions. Its main contribution is in exploring the determinants of an individual’s acceptance or rejection of location services. The authors put forward a conceptual model to better predict why an individual would accept or reject such services, especially with respect to emergencies. While it may be posited by government agencies that individuals would unanimously wish to accept life-saving and life-sustaining location services for their well-being, this view remains untested. The theorised determinants include: visibility of the service solution, perceived service …
The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael
The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael
Professor Katina Michael
Microchip implants for humans are not new. Placing heart pacemakers in humans for prosthesis is now considered a straightforward procedure. In more recent times we have begun to use brain pacemakers for therapeutic purposes to combat illnesses such as epilepsy, Parkinson’s Disease, and severe depression. Microchips are even being placed inside prosthetic knees and hips during restorative procedures to help in the gathering of post-operative analytics that can aid rehabilitation further. While medical innovations that utilise microchips abound, over the last decade we have begun to see the potential use of microchip implants for non-medical devices in humans, namely for …
Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael
Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael
Professor Katina Michael
Late last year, IEEE SSIT was invited to put together a paper for the centennial edition of Proceedings of the IEEE that was published in May 2012. The paper titled, “Social Implications of Technology: The Past, the Present, and the Future,” brought together five members of SSIT with varying backgrounds, and two intense months of collaboration and exchange of ideas. I personally felt privileged to be working with Karl D. Stephan, Emily Anesta, Laura Jacobs and M.G. Michael on this project.
Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael
Professor Katina Michael
This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.
Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat
Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat
Professor Katina Michael
Location based social networking (LBSN) applications are part of a new suite of social networking tools. LBSN is the convergence between location based services (LBS) and online social networking (OSN). LBSN applications offer users the ability to look up the location of another “friend” remotely using a smart phone, desktop or other device, anytime and anywhere. Users invite their friends to participate in LBSN and there is a process of consent that follows. This paper explores the potential impact of LBSN upon trust in society. It looks at the willingness of individuals to share their location data with family, friends, …
Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta
Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta
Professor Katina Michael
The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in these trends. …
Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael
Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael
Professor Katina Michael
Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.
The Technological Trajectory Of The Automatic Identification Industry: The Application Of The Systems Of Innovation (Si) Framework For The Characterisation And Prediction Of The Auto-Id Industry, Katina Michael
Professor Katina Michael
Traditionally the approach used to analyse technological innovation focused on the application of the techno-economic paradigm with the production function as its foundation. This thesis explores the rise of the evolutionary paradigm as a more suitable conceptual approach to investigating complex innovations like automatic identification (auto-ID) devices. Collecting and analysing data for five auto-ID case studies, (bar codes, magnetic-stripe cards, smart cards, biometrics and RF/ID transponders), it became evident that a process of migration, integration and convergence is happening within the auto-ID technology system (TS). The evolution of auto-ID is characterised by a new cluster of innovations, primarily emerging through …
Integrating Value-Driven Feedback And Recommendation Mechanisms Into Business Intelligence Systems, Byron Keating, Tim Coltman, Michael Katina, Valeria Baker
Integrating Value-Driven Feedback And Recommendation Mechanisms Into Business Intelligence Systems, Byron Keating, Tim Coltman, Michael Katina, Valeria Baker
Professor Katina Michael
Most leading organizations, in all sectors of industry, commerce and government are dependent upon
ERP for their organizational survival. Yet despite the importance of the decision to adopt ERP and its
impact on the entire firm’s performance the IT literature has been in the large part silent on the nature
of the ERP investment decision. This study is the first of its kind to determine the preference structure
of senior managers around the organizational benefits and risks of adopting ERP. We present the
results which provide interesting insights into how managers’ perceive the benefit and risk factors
salient to the …
Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt
Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt
Professor Katina Michael
Law disciplines technology, though it does so in a partial and incomplete way as reflected in the old adage that technology outstrips the capacity of law to regulate it. The rise of new technologies poses a significant threat to human rights – the pervasive use of CCTV (and now mobile CCTV), telecommunications interception, and low-cost audio-visual recording and tracking devices (some of these discreetly wearable), extend the power of the state and corporations significantly to intrude into the lives of citizens.
Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas
Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas
Professor Katina Michael
Mobile alerts, notifications and location-based emergency warning systems are now an established part of mobile government strategies in an increasing number of countries worldwide. In Australia the national emergency warning system (NEWS) was instituted after the tragic Black Saturday Victorian Bushfires of February 2009. In the first phase, NEWS has enabled the provision of public information from the government to the citizen during emergencies anywhere and any time. Moving on from traditional short message service (SMS) notifications and cell broadcasting to more advanced location-based services, this paper provides executive-level recommendations about the viability of location-based mobile phone services in NEWS …
The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael
The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael
M. G. Michael
No abstract provided.
Challenges Of Reporting On Corrections, Jeffrey Ian Ross Ph.D.
Challenges Of Reporting On Corrections, Jeffrey Ian Ross Ph.D.
Jeffrey Ian Ross Ph.D.
No abstract provided.
Social Policy, Imperiled Communities, And Hiv/Aids Transmission In Prisons: A Call For Zero Tolerance, Louis F. Graham, Henrie Treadwell, Kisha Braithwaite
Social Policy, Imperiled Communities, And Hiv/Aids Transmission In Prisons: A Call For Zero Tolerance, Louis F. Graham, Henrie Treadwell, Kisha Braithwaite
Louis F Graham
HIV/AIDS and African-American male imprisonment contribute to the destruction of African-American communities. African-American men and HIV/AIDS are disproportionately represented throughout all sectors of the criminal justice industry, including the juvenile justice system. The criminal justice system contributes to unacceptably high African-American male imprisonment rates and HIV prevalence directly via the ‘war on drugs’ and lax enforcement of institutional policy among other things, and indirectly through perpetuation of economic hardship which further exacerbates imprisonment rates, thus closing the loop of a vicious cycle of revolving prison doors and HIV contraction. This article briefly introduces surrounding socio-political issues that contextualizes the ensuing …