Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Emerging Technologies (6)
- Social Implications of ICT (4)
- Privacy (3)
- Surveillance (3)
- Uberveillance (3)
-
- Articles (2)
- Ethics (2)
- Global Positioning Systems (2)
- Information Security (2)
- Information Systems (2)
- National Security (2)
- Policing (2)
- SSIT (2)
- Security (2)
- Social networking (2)
- Technology (2)
- AN ESTATE DILEMMA - INACCESSIBLE ASSETS HIDING BEHIND PASSWORDS AND ENCRYPTION (1)
- AT&T (1)
- Abuse (1)
- Advancements (1)
- Airline; aircraft engine; crash; safety management; aviation; military aviation; aircraft speed; wildlife hazard; wildlife; wildlife strike; safety; (1)
- BMP Performance Monitoring (1)
- Bioretention (1)
- Bird strike; bird collision airplane; airplane damage; airport; airport bird control (1)
- Book review (1)
- Camera (1)
- Challenges (1)
- Chip implants (1)
- Cloud security (1)
- Context (1)
- Publication
- File Type
Articles 1 - 24 of 24
Full-Text Articles in Engineering
An Estate Dilemma - Inaccessible Assets Hiding Behind Passwords And Encryption, Douglas J. Henderson
An Estate Dilemma - Inaccessible Assets Hiding Behind Passwords And Encryption, Douglas J. Henderson
DOUGLAS J HENDERSON
Every person living in the modern world holds valuable assets, data, or information in digital mediums. Digital mediums include not only digital hardware storage mediums in personal possession (like external hard drives and internal hard drives within laptop and desktop computers, personal digital assistants, cell phones, and the like), but also those only accessible through a network. Because so much is held in digital mediums, when an individual dies or becomes incapacitated, another person must know how to access the incapacitated person’s digital assets and other important information (this person is known herein as the ‘Responsible Party’). There are potential …
Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael
Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael
Professor Katina Michael
This special section is dedicated to privacy in the information age. Since the rise of mobile social media in particular and the advent of cloud computing few can dispute that the times have changed. Privacy is now understood in context, and within a framework that is completely different to what it once was. The right to be let alone physically seemingly has been replaced by the right to give away as much information as you want virtually. What safeguards can be introduced into such a society? We cannot claim to wish for privacy as a right if we ourselves do …
Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom
Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom
Professor Katina Michael
Mobile Government Briefing: Provide services anywhere any time: - Transact to enable in-field data collection, request processing, order management, approvals, edits, updates and execute actions. - What are the implications for the incorporation of rich multimedia content on devices to better serve staff and citizens? - Addressing the security challenges of various risks around data access, data transmission, and data storage for BI architecture and mobile devices
Ieee T&S Magazine: Undergoing Transformation, Katina Michael
Ieee T&S Magazine: Undergoing Transformation, Katina Michael
Professor Katina Michael
Our Magazine is in a transformative period, not only because we are ‘Going Green’ in 2013 but because we are experiencing tremendous growth in quality international submissions. This means that we are increasingly appealing to an international audience with transdisciplinary interests. This has not gone unnoticed by the media, nor by our SSIT readership or wider engineering community.
The Legal Challenges Of Networked Robotics: From The Safety Intelligence Perspective, Yueh-Hsuan Weng, Sophie T.H. Zhao
The Legal Challenges Of Networked Robotics: From The Safety Intelligence Perspective, Yueh-Hsuan Weng, Sophie T.H. Zhao
Yueh-Hsuan Weng
Glogging Your Every Move, Lisa Wachsmuth, Katina Michael
Glogging Your Every Move, Lisa Wachsmuth, Katina Michael
Professor Katina Michael
"It is one thing to lug technologies around, another thing to wear them, and even more intrusive to bear them... But that's the direction in which we're headed."
"I think we're entering an era of person-view systems which will show things on ground level and will be increasingly relayed to others via social media.
"We've got people wearing recording devices on their fingers, in their caps or sunglasses - there are huge legal and ethical implications here."
Reviewing The American University Law Review On Extraterritoriality: A Critical Response To Viki Economides, Note, Tianrui Group Co. V. Itc: The Dubious Status Of Extraterritoriality And The Domestic Industry Requirement Requirement Of Section 337(Link), Jonathan R. K. Stroud
Jonathan R. K. Stroud
Recently, the Federal Circuit upheld the Commission’s decision to exclude goods based on a trade secret violation that largely happened abroad. The American University Law Review critiqued that decision on two grounds: First, that a presumption against extraterritorial application of U.S. law applied; and second, that licensing alone could not establish a domestic industry. The American University Law Review's critique remains incomplete, however, as the Federal Circuit correctly decided the case for at least two reasons. first, the Federal Circuit correctly applied the “extraterritorial presumption” canon of construction; and second, the recent Federal Circuit decision in InterDigital Communications LLC v. …
Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael
Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael
Professor Katina Michael
Late last year, IEEE SSIT was invited to put together a paper for the centennial edition of Proceedings of the IEEE that was published in May 2012. The paper titled, “Social Implications of Technology: The Past, the Present, and the Future,” brought together five members of SSIT with varying backgrounds, and two intense months of collaboration and exchange of ideas. I personally felt privileged to be working with Karl D. Stephan, Emily Anesta, Laura Jacobs and M.G. Michael on this project.
Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael
Professor Katina Michael
This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.
Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael
Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael
Professor Katina Michael
Hacking: The Next Generation demonstrates just how hackers continue to exploit “back doors”. New ways of working and new ways of communicating have meant that the number of attack vectors continue to rise rapidly. This provides hackers with a greater number of opportunities to penetrate systems using blended approaches while organizations struggle to come up to speed with the latest technology developments and commensurate security capabilities. Dealing with anticipated threats is a lot harder than dealing with known threats.
Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael
Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael
Professor Katina Michael
Tracking and monitoring people as they operate within their personal networks benefits service providers and their constituents but involves hidden risks and costs.
Automatic identification technologies, CCTV cameras, pervasive and mobile networks, wearable computing, location-based services and social networks have traditionally served distinct purposes. However, we have observed patterns of integration, convergence and coexistence among all these innovations within the information and communication technology industry.1For example, ‘location-based social networking’ can draw on a smart phone's capacity to identify a user uniquely, locate him within 1–2m and share this information across his social network in real time. The resulting ability to …
Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat
Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat
Professor Katina Michael
Location based social networking (LBSN) applications are part of a new suite of social networking tools. LBSN is the convergence between location based services (LBS) and online social networking (OSN). LBSN applications offer users the ability to look up the location of another “friend” remotely using a smart phone, desktop or other device, anytime and anywhere. Users invite their friends to participate in LBSN and there is a process of consent that follows. This paper explores the potential impact of LBSN upon trust in society. It looks at the willingness of individuals to share their location data with family, friends, …
Editorial: The Idio-Technopolis, Katina Michael
Editorial: The Idio-Technopolis, Katina Michael
Professor Katina Michael
The rapid rise of social media has brought with it an emphasis on the distinct dimensions of the whole person. Social media recognises that the individual has a personal network of extensions- a home life, a work life, a social life, a study life, a hobbyist life, and much more- some of these identities even hidden from full view. Each of these online value networks are now accessible by big business, where opinion leaders and early adopters are easily distinguishable, and where brand commentary between consumers matters manifold more than any form of targeted advertising.
Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta
Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta
Professor Katina Michael
The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in these trends. …
Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael
Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael
Professor Katina Michael
Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.
The Technological Trajectory Of The Automatic Identification Industry: The Application Of The Systems Of Innovation (Si) Framework For The Characterisation And Prediction Of The Auto-Id Industry, Katina Michael
Professor Katina Michael
Traditionally the approach used to analyse technological innovation focused on the application of the techno-economic paradigm with the production function as its foundation. This thesis explores the rise of the evolutionary paradigm as a more suitable conceptual approach to investigating complex innovations like automatic identification (auto-ID) devices. Collecting and analysing data for five auto-ID case studies, (bar codes, magnetic-stripe cards, smart cards, biometrics and RF/ID transponders), it became evident that a process of migration, integration and convergence is happening within the auto-ID technology system (TS). The evolution of auto-ID is characterised by a new cluster of innovations, primarily emerging through …
Integrating Value-Driven Feedback And Recommendation Mechanisms Into Business Intelligence Systems, Byron Keating, Tim Coltman, Michael Katina, Valeria Baker
Integrating Value-Driven Feedback And Recommendation Mechanisms Into Business Intelligence Systems, Byron Keating, Tim Coltman, Michael Katina, Valeria Baker
Professor Katina Michael
Most leading organizations, in all sectors of industry, commerce and government are dependent upon
ERP for their organizational survival. Yet despite the importance of the decision to adopt ERP and its
impact on the entire firm’s performance the IT literature has been in the large part silent on the nature
of the ERP investment decision. This study is the first of its kind to determine the preference structure
of senior managers around the organizational benefits and risks of adopting ERP. We present the
results which provide interesting insights into how managers’ perceive the benefit and risk factors
salient to the …
Bioretention: Evaluating Their Effectiveness For Improving Water Quality In New England Urban Environments, Mary Dehais
Bioretention: Evaluating Their Effectiveness For Improving Water Quality In New England Urban Environments, Mary Dehais
Mary Dehais
Nonpoint source (NPS) pollution is one of the leading causes of water quality problems in the United States. Bioretention has become one of the more frequently used stormwater management practices for addressing NPS pollution in urbanized watersheds in New England. Yet despite increased acceptance, bioretention is not widely practiced. This study explores and evaluates the efficacy of bioretention for protecting urban water quality. This research found that numerous monitoring methods are used by researchers and industry experts to assess the effectiveness of stormwater best management practices (BMPs) and low impact development (LID) practices that include bioretention. The two most common …
2011 Scholars And Artists Bibliography, Mark Tebeau
2011 Scholars And Artists Bibliography, Mark Tebeau
Mark Tebeau
This bibliography was created for the annual Friends of the Michael Schwartz Library Scholars and Artists Reception, recognizing scholarly and creative achievements of Cleveland State University faculty, staff and emeriti. Mark Tebeau was the guest speaker
Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt
Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt
Professor Katina Michael
Law disciplines technology, though it does so in a partial and incomplete way as reflected in the old adage that technology outstrips the capacity of law to regulate it. The rise of new technologies poses a significant threat to human rights – the pervasive use of CCTV (and now mobile CCTV), telecommunications interception, and low-cost audio-visual recording and tracking devices (some of these discreetly wearable), extend the power of the state and corporations significantly to intrude into the lives of citizens.
Editorial: "You Talkin' To Me?", Katina Michael
Editorial: "You Talkin' To Me?", Katina Michael
Professor Katina Michael
Advancing knowledge through robust research is an honourable aim- being scientific, finding the right methodology, executing project phases meticulously, and reporting on the outcomes as objectively and accurately as possible. But may I begin my inaugural editorial by saying that an even higher ideal to advancing knowledge is critiquing it as it happens. Reflective practice is not just something to be done by academics in their teaching- reflective practice is what we should all be doing as we go about undertaking our various day-to-day work tasks. For the engineer engaged in research and development, whether in industry or government, reflective …
Erau Aviation Wildlife Hazard Newsletter, Paul F. Eschenfelder
Erau Aviation Wildlife Hazard Newsletter, Paul F. Eschenfelder
Paul F. Eschenfelder
No abstract provided.
Nuclear Enlightenment, Daniel J. Boyle
Nuclear Enlightenment, Daniel J. Boyle
Daniel J Boyle
This article is intended for nations considering launching large nuclear programs, like the Kingdom of Saudi Arabia, as they evaluate the merits of designs to meet specific national requirements. Globally there are 433 nuclear power plants in operation in 30 countries, generating over 13% of the world’s electricity. Of these, all but 17 are water-cooled. Of the 17 that are not water-cooled reactors, one is cooled with liquid sodium and 16 are cooled with carbon dioxide. This article traces the historic roots of why the industry coalesced around water-cooled reactors, the consequent design problems, and describes an alternative design based …
Like Deck Chairs On The Titanic: Why Spectrum Reallocation Won’T Avert The Coming Data Crunch But Technology Might Keep The Wireless Industry Afloat, Brian J. Love, David J. Love, James V. Krogmeier
Like Deck Chairs On The Titanic: Why Spectrum Reallocation Won’T Avert The Coming Data Crunch But Technology Might Keep The Wireless Industry Afloat, Brian J. Love, David J. Love, James V. Krogmeier
Brian J. Love
Skyrocketing mobile data demands caused by increasing adoption of smartphones, tablet computers, and broadband-equipped laptops will soon swamp the capacity of our nation’s wireless networks, a fact that promises to stagnate a $1 trillion slice on the nation’s economy. Among scholars and policymakers studying this looming “spectrum crisis,” consensus is developing that regulators must swiftly reclaim spectrum licensed to other industries and reallocate those rights to wireless providers. In this interdisciplinary piece, we explain in succinct terms why this consensus is wrong. With data demands increasing at an exponential rate, spectrum reallocation plans that promise only linear growth are destined …