Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Privacy (12)
- Emerging Technologies (11)
- Social Implications of ICT (9)
- Location-Based Services (7)
- National Security (7)
-
- Computer Science (6)
- Global Positioning Systems (6)
- Surveillance (6)
- Emergency Management (5)
- Technology (5)
- Uberveillance (5)
- Ethics (4)
- Security (4)
- Free speech (3)
- Information Security (3)
- Information Systems (3)
- Intellectual property (3)
- Law (3)
- Policing (3)
- Risk (3)
- Artificial intelligence (2)
- Australia (2)
- Automation (2)
- Consequences (2)
- Copyright (2)
- Critical Infrastructure Assurance (2)
- E-Democracy (2)
- Electronic voting (2)
- ICT (2)
- Intelligence (2)
- Publication Year
- Publication
- File Type
Articles 1 - 30 of 54
Full-Text Articles in Law
Could A Robot Be District Attorney?, Stephen E. Henderson
Could A Robot Be District Attorney?, Stephen E. Henderson
Stephen E Henderson
No abstract provided.
Artificial Intelligence And Role-Reversible Judgment, Stephen E. Henderson, Kiel Brennan-Marquez
Artificial Intelligence And Role-Reversible Judgment, Stephen E. Henderson, Kiel Brennan-Marquez
Stephen E Henderson
Blockchain And Smart Contracts: The Missing Link In Copyright Licensing?, Balazs Bodo, Daniel Gervais, Joao Pedro Quintais
Blockchain And Smart Contracts: The Missing Link In Copyright Licensing?, Balazs Bodo, Daniel Gervais, Joao Pedro Quintais
Daniel J Gervais
Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond
Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond
Elizabeth De Armond
No abstract provided.
Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews
Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews
Lori B. Andrews
Introduction, Tracy Mitrano
Chapter Five: The San Bernardino Iphone Case, Tracy Mitrano
Chapter Five: The San Bernardino Iphone Case, Tracy Mitrano
Tracy Mitrano
Chapter Four: Information Security, Tracy Mitrano
Chapter One: Free Speech, Tracy Mitrano
Chapter Two: Privacy, Tracy Mitrano
Chapter Two: Privacy, Tracy Mitrano
Tracy Mitrano
Chapter Three: Intellectual Property, Tracy Mitrano
Chapter Three: Intellectual Property, Tracy Mitrano
Tracy Mitrano
No abstract provided.
Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes
Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes
Alexander Hayes Mr.
- From in-car video recording to body-worn video recording
- Exploring available technologies: how do they work, pros and cons
- Storing direct evidence in secure storage: factors to consider
- Citizens “shooting” back with POV tech – what are their rights?
- Crowdsourced sousveillance- harnessing public data for forensic profiling
- Police force policies and practices on the application of new media
Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague
Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague
Robert Sprague
Performance Rights For Software, Mark Perry, Stephen M. Watt
Performance Rights For Software, Mark Perry, Stephen M. Watt
Stephen M. Watt
As we use software in increasingly varied contexts, the concept of a software license has become progressively more complex. Software is embedded in devices that do not obviously resemble computers. Web services make software on one computer available to anyone with internet access. An individual may use several computers over the course of the day so the concept of a node locked or individual license is no longer clear. How should time based and single use and consumptive licenses be governed and interact? This paper examines how these and other issues in software licensing can be seen as instances of …
Private Cyber Retaliation Undermines Federal Authority, Jan Kallberg
Private Cyber Retaliation Undermines Federal Authority, Jan Kallberg
Jan Kallberg
The demarcation in cyber between the government and the private spheres is important to uphold because it influences how we see the state and the framework in which states interact. One reason we have a nation state is, in a uniform and structured way, under the guidance of a representative democracy, to deal with foreign hostility and malicious activity.
The state is given a monopoly on violence by its citizenry. The state then acts under the existing laws on behalf of the citizens to ensure the intentions of the population it represents. These powers grant the federal government an authority …
Wie Featured Person Of The Month Highlights (Katina Michael), Keyana Tenant, Katina Michael
Wie Featured Person Of The Month Highlights (Katina Michael), Keyana Tenant, Katina Michael
Professor Katina Michael
The WIE Featured Person of the Month is Katina Michael, editor-in-chief of IEEE Technology and Society Magazine. After working at OTIS Elevator Company and Andersen Consulting, Katina was offered and exciting graduate engineering position at Nortel in 1996; and her career has been fast track from there. Read Katina’s story on Page 7.
Natural Disasters And Early Warning Systems In Australia, Emma Papaemanuel, Katina Michael, Peter Johnston
Natural Disasters And Early Warning Systems In Australia, Emma Papaemanuel, Katina Michael, Peter Johnston
Professor Katina Michael
Australia's national emergency warning system alerts. Radio program in Greek.
Are Disaster Early Warnings Effective?, Kerri Worthington, Katina Michael, Peter Johnson, Paul Barnes
Are Disaster Early Warnings Effective?, Kerri Worthington, Katina Michael, Peter Johnson, Paul Barnes
Professor Katina Michael
Australia's summer is traditionally a time of heightened preparation for natural disasters, with cyclones and floods menacing the north and bushfires a constant threat in the south. And the prospect of more frequent, and more intense, disasters thanks to climate change has brought the need for an effective early warning system to the forefront of policy-making. Technological advances and improved telecommunication systems have raised expectations that warning of disasters will come early enough to keep people safe. But are those expectations too high? Kerri Worthington reports. Increasingly, the world's governments -- and their citizens -- rely on technology-based early warning …
Concern People Without Latest Technology Will Miss Fire Warnings, Sally Sara, Ashley Hall, Peter Johnson, Katina Michael
Concern People Without Latest Technology Will Miss Fire Warnings, Sally Sara, Ashley Hall, Peter Johnson, Katina Michael
Professor Katina Michael
But what if the website goes down in the way Victoria's Country Fire Authority website crashed as fires raged a few weeks ago? What about those people who don't own the latest technology? And what happens when the power goes out?
KATINA MICHAEL: Well there's no television, there isn't ability to access the internet potentially.
ASHLEY HALL: Professor Katina Michael is Associate Professor at the School of Information Systems and Technology at the University of Wollongong.
KATINA MICHAEL: I would suggest a long lasting powered radio because we don't want is we don't want when the lights go out, or …
Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke
Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke
Professor Katina Michael
During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …
Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael
Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael
Professor Katina Michael
This paper investigates the introduction of location-based services by government as part of an all-hazards approach to modern emergency management solutions. Its main contribution is in exploring the determinants of an individual’s acceptance or rejection of location services. The authors put forward a conceptual model to better predict why an individual would accept or reject such services, especially with respect to emergencies. While it may be posited by government agencies that individuals would unanimously wish to accept life-saving and life-sustaining location services for their well-being, this view remains untested. The theorised determinants include: visibility of the service solution, perceived service …
The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael
The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael
Professor Katina Michael
Microchip implants for humans are not new. Placing heart pacemakers in humans for prosthesis is now considered a straightforward procedure. In more recent times we have begun to use brain pacemakers for therapeutic purposes to combat illnesses such as epilepsy, Parkinson’s Disease, and severe depression. Microchips are even being placed inside prosthetic knees and hips during restorative procedures to help in the gathering of post-operative analytics that can aid rehabilitation further. While medical innovations that utilise microchips abound, over the last decade we have begun to see the potential use of microchip implants for non-medical devices in humans, namely for …
Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael
Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael
Professor Katina Michael
This special section is dedicated to privacy in the information age. Since the rise of mobile social media in particular and the advent of cloud computing few can dispute that the times have changed. Privacy is now understood in context, and within a framework that is completely different to what it once was. The right to be let alone physically seemingly has been replaced by the right to give away as much information as you want virtually. What safeguards can be introduced into such a society? We cannot claim to wish for privacy as a right if we ourselves do …
Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom
Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom
Professor Katina Michael
Mobile Government Briefing: Provide services anywhere any time: - Transact to enable in-field data collection, request processing, order management, approvals, edits, updates and execute actions. - What are the implications for the incorporation of rich multimedia content on devices to better serve staff and citizens? - Addressing the security challenges of various risks around data access, data transmission, and data storage for BI architecture and mobile devices
Ieee T&S Magazine: Undergoing Transformation, Katina Michael
Ieee T&S Magazine: Undergoing Transformation, Katina Michael
Professor Katina Michael
Our Magazine is in a transformative period, not only because we are ‘Going Green’ in 2013 but because we are experiencing tremendous growth in quality international submissions. This means that we are increasingly appealing to an international audience with transdisciplinary interests. This has not gone unnoticed by the media, nor by our SSIT readership or wider engineering community.
Glogging Your Every Move, Lisa Wachsmuth, Katina Michael
Glogging Your Every Move, Lisa Wachsmuth, Katina Michael
Professor Katina Michael
"It is one thing to lug technologies around, another thing to wear them, and even more intrusive to bear them... But that's the direction in which we're headed."
"I think we're entering an era of person-view systems which will show things on ground level and will be increasingly relayed to others via social media.
"We've got people wearing recording devices on their fingers, in their caps or sunglasses - there are huge legal and ethical implications here."
Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael
Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael
Professor Katina Michael
Late last year, IEEE SSIT was invited to put together a paper for the centennial edition of Proceedings of the IEEE that was published in May 2012. The paper titled, “Social Implications of Technology: The Past, the Present, and the Future,” brought together five members of SSIT with varying backgrounds, and two intense months of collaboration and exchange of ideas. I personally felt privileged to be working with Karl D. Stephan, Emily Anesta, Laura Jacobs and M.G. Michael on this project.
Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael
Professor Katina Michael
This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.
Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael
Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael
Professor Katina Michael
Hacking: The Next Generation demonstrates just how hackers continue to exploit “back doors”. New ways of working and new ways of communicating have meant that the number of attack vectors continue to rise rapidly. This provides hackers with a greater number of opportunities to penetrate systems using blended approaches while organizations struggle to come up to speed with the latest technology developments and commensurate security capabilities. Dealing with anticipated threats is a lot harder than dealing with known threats.
Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael
Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael
Professor Katina Michael
Tracking and monitoring people as they operate within their personal networks benefits service providers and their constituents but involves hidden risks and costs.
Automatic identification technologies, CCTV cameras, pervasive and mobile networks, wearable computing, location-based services and social networks have traditionally served distinct purposes. However, we have observed patterns of integration, convergence and coexistence among all these innovations within the information and communication technology industry.1For example, ‘location-based social networking’ can draw on a smart phone's capacity to identify a user uniquely, locate him within 1–2m and share this information across his social network in real time. The resulting ability to …