Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation

2012

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 49

Full-Text Articles in Law

An Assessment Of The Effects Of Desertification In Yobe State, Nigeria, Jibril Musa Phd Dec 2012

An Assessment Of The Effects Of Desertification In Yobe State, Nigeria, Jibril Musa Phd

Confluence Journal Environmental Studies (CJES), Kogi State University, Nigeria

Desertification is one of the most serious environmental and socio-economic problems of our time. Desertification describes circumstances of land degradation in arid, semi-arid and dry sub-humid regions resulting from the climatic variation and human activities. The fundamental goal of this thesis was to assess the effects of desertification in Yobe State, Nigeria. The present threat of desertification in the sahel has reached an alarming stage where crops cultivation and animal rearing/grazing are no more productive, soil has lost its nutrient/fertility, various infrastructure had given way because of windstorm from the neighbouring Niger Republic and sand dunes had taken over. The …


Using Remote Sensing Data To Improve Rice Production In Kutigi, Niger State, Nigeria, Jibril Musa Phd, M B. Yunusa Dec 2012

Using Remote Sensing Data To Improve Rice Production In Kutigi, Niger State, Nigeria, Jibril Musa Phd, M B. Yunusa

Confluence Journal Environmental Studies (CJES), Kogi State University, Nigeria

This research work looked in the used of Remote Sensing to improve Agricultural production in Kutigi, Niger State. The aim of the study is to use remote sensing to improve rice farming activities in Kutigi, Niger State. It is very important to identify such methods to improve Agricultural production because experts are always interested in new researches and findings to better the standard of living in any environment. In view of this, Remotely-sensed data could be used or employed to elevate most of these agricultural problems in Kutigi through the following objectives: Using Landsat imagery to assess the present landuse …


Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael Dec 2012

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael

Associate Professor Katina Michael

The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …


Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael Dec 2012

Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael

Professor Katina Michael

This special section is dedicated to privacy in the information age. Since the rise of mobile social media in particular and the advent of cloud computing few can dispute that the times have changed. Privacy is now understood in context, and within a framework that is completely different to what it once was. The right to be let alone physically seemingly has been replaced by the right to give away as much information as you want virtually. What safeguards can be introduced into such a society? We cannot claim to wish for privacy as a right if we ourselves do …


Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom Dec 2012

Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom

Professor Katina Michael

Mobile Government Briefing: Provide services anywhere any time: - Transact to enable in-field data collection, request processing, order management, approvals, edits, updates and execute actions. - What are the implications for the incorporation of rich multimedia content on devices to better serve staff and citizens? - Addressing the security challenges of various risks around data access, data transmission, and data storage for BI architecture and mobile devices


High Speed Rail: Strategic Information For The Australian Context, Tania Von Der Heidt, Pat Gillett, Chris Hale, Philip Laird, Alex Wardrop, Robert Weatherby, Charles Waingold, Michael Charles, Ian Rossow, Dale Coleman, Bala Ramasokeran, Rocco Zito, Michael Taylor, Adrian Pollock Dec 2012

High Speed Rail: Strategic Information For The Australian Context, Tania Von Der Heidt, Pat Gillett, Chris Hale, Philip Laird, Alex Wardrop, Robert Weatherby, Charles Waingold, Michael Charles, Ian Rossow, Dale Coleman, Bala Ramasokeran, Rocco Zito, Michael Taylor, Adrian Pollock

Dr Philip Laird

No abstract provided.


Ieee T&S Magazine: Undergoing Transformation, Katina Michael Nov 2012

Ieee T&S Magazine: Undergoing Transformation, Katina Michael

Professor Katina Michael

Our Magazine is in a transformative period, not only because we are ‘Going Green’ in 2013 but because we are experiencing tremendous growth in quality international submissions. This means that we are increasingly appealing to an international audience with transdisciplinary interests. This has not gone unnoticed by the media, nor by our SSIT readership or wider engineering community.


Competition And Innovation In Copyright And The Dmca, Herbert J. Hovenkamp Nov 2012

Competition And Innovation In Copyright And The Dmca, Herbert J. Hovenkamp

All Faculty Scholarship

This book of CASES AND MATERIALS ON INNOVATION AND COMPETITION POLICY is intended for educational use. The book is free for all to use subject to an open source license agreement. It differs from IP/antitrust casebooks in that it considers numerous sources of competition policy in addition to antitrust, including those that emanate from the intellectual property laws themselves, and also related issues such as the relationship between market structure and innovation, the competitive consequences of regulatory rules governing technology competition such as net neutrality and interconnection, misuse, the first sale doctrine, and the Digital Millennium Copyright Act (DMCA). Chapters …


Glogging Your Every Move, Lisa Wachsmuth, Katina Michael Nov 2012

Glogging Your Every Move, Lisa Wachsmuth, Katina Michael

Professor Katina Michael

"It is one thing to lug technologies around, another thing to wear them, and even more intrusive to bear them... But that's the direction in which we're headed."

"I think we're entering an era of person-view systems which will show things on ground level and will be increasingly relayed to others via social media.

"We've got people wearing recording devices on their fingers, in their caps or sunglasses - there are huge legal and ethical implications here."


Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael Oct 2012

Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael

Associate Professor Katina Michael

This mixed methods study with a sequential explanatory strategy explored qualitatively the statistically significant quantitative findings relative to Indian respondents’ perceptions about RFID (radio frequency identification) transponders implanted into the human body. In the first analysis phase of the study, there was a significant chi-square analysis reported (χ2 = 56.64, df = 3, p = .000) relative to the perception of small business owners (N = 453) that implanted chips are a more secure form of identification and/or access control in organizations and the respondents’ country of residence. Countries under study included Australia, India, the UK and US. The country …


Variations In Climatic Parameters And Food Crop Yields: Implications On Food Security In Benue State, Nigeria., Emmanuel Adamgbe, Fanan Ujoh Oct 2012

Variations In Climatic Parameters And Food Crop Yields: Implications On Food Security In Benue State, Nigeria., Emmanuel Adamgbe, Fanan Ujoh

Confluence Journal Environmental Studies (CJES), Kogi State University, Nigeria

Agricultural production in Nigeria like in other developing countries is highly vulnerable to variations in climatic parameters which may have inverse or direct effect on the performance of food crops. This paper examines the patterns and trends of the variations in the climatic parameters and the implications of such variations on efficient yield rates of some food crops in Benue State using data on climatic variables (rainfall, temperature, sunshine) and the yield of some crops per hectare for 25 years (1986-2010). Data on the climatic variables were collected from the Nigerian Meteorological Agency, AirForce Base, Makurdi while the data on …


Competition In Information Technologies: Standards-Essential Patents, Non-Practicing Entities And Frand Bidding, Herbert J. Hovenkamp Oct 2012

Competition In Information Technologies: Standards-Essential Patents, Non-Practicing Entities And Frand Bidding, Herbert J. Hovenkamp

All Faculty Scholarship

Standard Setting is omnipresent in networked information technologies. Virtually every cellular phone, computer, digital camera or similar device contains technologies governed by a collaboratively developed standard. If these technologies are to perform competitively, the processes by which standards are developed and implemented must be competitive. In this case attaining competitive results requires a mixture of antitrust and non-antitrust legal tools.

FRAND refers to a firm’s ex ante commitment to make its technology available at a “fair, reasonable and nondiscriminatory royalty.” The FRAND commitment results from bidding to have one’s own technology selected as a standard. Typically the FRAND commitment is …


Sustainable Water Management On Brownfields Sites, Ryan Fenwick, New England Environmental Finance Center Oct 2012

Sustainable Water Management On Brownfields Sites, Ryan Fenwick, New England Environmental Finance Center

Sustainable Communities Capacity Building

This practice guide was developed by the Environmental Finance Center Network (EFCN) through the Capacity Building for Sustainable Communities program funded by the US Department of Housing and Urban Development and the US Environmental Protection Agency. Through a cooperative agreement with HUD, EFCN is providing capacity building and technical assistance to recipients of grants from the federal Partnership for Sustainable Communities, an interagency collaboration that aims to help towns, cities, and regions develop in more economically, environmentally, and socially sustainable ways.


Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael Aug 2012

Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael

Professor Katina Michael

Late last year, IEEE SSIT was invited to put together a paper for the centennial edition of Proceedings of the IEEE that was published in May 2012. The paper titled, “Social Implications of Technology: The Past, the Present, and the Future,” brought together five members of SSIT with varying backgrounds, and two intense months of collaboration and exchange of ideas. I personally felt privileged to be working with Karl D. Stephan, Emily Anesta, Laura Jacobs and M.G. Michael on this project.


Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael Aug 2012

Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael

Professor Katina Michael

This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.


Renewable Energy Storage Systems, Kyle Herman Jul 2012

Renewable Energy Storage Systems, Kyle Herman

Dr. Kyle S. Herman

This paper investigates various storage options for renewable energy, in an attempt to deter the insidious effect of the common notion that renewable energy is intermittent and thus cannot compete with fossil fuel or conventional energies, the object of this paper is to reveal a few basic storage options for renewable energy which are already widely deployed.


Un-Obtainium: The Quest For Rare Earth Elements, Brahm Heyman Jul 2012

Un-Obtainium: The Quest For Rare Earth Elements, Brahm Heyman

International Political Economy Theses

The 17 "rare earth elements" are essential for the development of new technologies. Over the last several decades, China has established a virtual monopoly on the rare earth industry, producing over 97% of the world's current demand. This was achieved by effectively undercutting other producers who stopped competing in this market. In 2010, in an effort to bolster its domestic market, China decided to reduce the amount of rare earth elements that it would export. This situation can be used to consider China's relations with the rest of the world from two perspectives. (1) The realist perspective views China's actions …


The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei Jul 2012

The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei

Associate Professor Katina Michael

The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …


Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael Jun 2012

Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael

Professor Katina Michael

Hacking: The Next Generation demonstrates just how hackers continue to exploit “back doors”. New ways of working and new ways of communicating have meant that the number of attack vectors continue to rise rapidly. This provides hackers with a greater number of opportunities to penetrate systems using blended approaches while organizations struggle to come up to speed with the latest technology developments and commensurate security capabilities. Dealing with anticipated threats is a lot harder than dealing with known threats.


Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael Jun 2012

Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael

Professor Katina Michael

Tracking and monitoring people as they operate within their personal networks benefits service providers and their constituents but involves hidden risks and costs.

Automatic identification technologies, CCTV cameras, pervasive and mobile networks, wearable computing, location-based services and social networks have traditionally served distinct purposes. However, we have observed patterns of integration, convergence and coexistence among all these innovations within the information and communication technology industry.1For example, ‘location-based social networking’ can draw on a smart phone's capacity to identify a user uniquely, locate him within 1–2m and share this information across his social network in real time. The resulting ability to …


Internet Policy Going Forward: Does One Size Still Fit All?, Christopher S. Yoo Jun 2012

Internet Policy Going Forward: Does One Size Still Fit All?, Christopher S. Yoo

All Faculty Scholarship

Much of the current debate over Internet policy is framed by the belief that there has always been a single Internet that was open to everyone. Closer inspection reveals a number of important ways in which the architecture has deviated from this commitment. Providers frequently deploy Voice over Internet Protocol (VoIP) and Internet Protocol Television (IPTV) over hybrid networks that reserve bandwidth or employ technologies such as MultiProtocol Label Switching (MPLS) that are not fully accessible to the public Internet. At the same time, the increasing value in variety and decreasing returns to scale is mitigating the value of being …


Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat May 2012

Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat

Professor Katina Michael

Location based social networking (LBSN) applications are part of a new suite of social networking tools. LBSN is the convergence between location based services (LBS) and online social networking (OSN). LBSN applications offer users the ability to look up the location of another “friend” remotely using a smart phone, desktop or other device, anytime and anywhere. Users invite their friends to participate in LBSN and there is a process of consent that follows. This paper explores the potential impact of LBSN upon trust in society. It looks at the willingness of individuals to share their location data with family, friends, …


Editorial: The Idio-Technopolis, Katina Michael May 2012

Editorial: The Idio-Technopolis, Katina Michael

Professor Katina Michael

The rapid rise of social media has brought with it an emphasis on the distinct dimensions of the whole person. Social media recognises that the individual has a personal network of extensions- a home life, a work life, a social life, a study life, a hobbyist life, and much more- some of these identities even hidden from full view. Each of these online value networks are now accessible by big business, where opinion leaders and early adopters are easily distinguishable, and where brand commentary between consumers matters manifold more than any form of targeted advertising.


Carl Schmitt's Critique Of Liberalism And The European Union, Kyle S. Herman May 2012

Carl Schmitt's Critique Of Liberalism And The European Union, Kyle S. Herman

Dr. Kyle S. Herman

I invoke Carl Schmitt's Critique of Liberalism outlined in "The Concept of the Political" to better understand the European Union (EU) as a governmental institution. It is my contention that the EU is a liberal institution, with the sole intent to drive economic policy while ignoring identity, similar to what Schmitt rails against in his critique of liberalism. For that reason I demonstrate how the EU fits well into the mold Schmitt laid out to identify liberal politics. Therefore I use Schmitt's critique as both a starting point for defining the European Union and, by superimposing his critique onto the …


Dynamics Of Land Use/Land Cover Changes And Its Implication On Food Security In Anyigba, North Central, Nigeria, Tokula E. Arome, Sunday P. Ejaro (Phd) May 2012

Dynamics Of Land Use/Land Cover Changes And Its Implication On Food Security In Anyigba, North Central, Nigeria, Tokula E. Arome, Sunday P. Ejaro (Phd)

Confluence Journal Environmental Studies (CJES), Kogi State University, Nigeria

This study assessed land use/land cover changes and its effect on Agricultural land in Anyigba. The objectives were to identify and delineate different land use / land cover categories, assess the rate of change that occurred and examine the impact of land use/land cover change on food security using satellite remote sensing data collected at three different years (1987 Land sat TM, 2001 Land Sat TM and 2011 Land Sat ETM). The study utilized GIS software such as Idrisi Andes academic and ArcGIS 9.3. The study area covers approximately 31.8km2, and four major land use/cover classes were utilized (built up, …


La Transparencia En La Protección De Datos Personales, Bruno L. Costantini García May 2012

La Transparencia En La Protección De Datos Personales, Bruno L. Costantini García

Bruno L. Costantini García

La Transparencia en la Protección de Datos Personales, ponencia elaborada dentro de los trabajos del VII Congreso Nacional de Organismos Públicos Autónomos (OPAM)


Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta Apr 2012

Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta

Professor Katina Michael

The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in these trends. …


Commentary On: Mann, Steve (2012): Wearable Computing, Katina Michael, M.G. Michael Apr 2012

Commentary On: Mann, Steve (2012): Wearable Computing, Katina Michael, M.G. Michael

Associate Professor Katina Michael

In Professor Steve Mann- inventor, physicist, engineer, mathematician, scientist, designer, developer, project director, filmmaker, artist, instrumentalist, author, photographer, actor, activist- we see so much of the paradigmatic classical Greek philosopher. I recall asking Steve if technology shaped society or society shaped technology. He replied along the lines that the question was superfluous. Steve instead pointed to praxis, from which all theory, lessons or skills stem, are practiced, embodied and realized. Steve has always been preoccupied by the application of his ideas into form. In this way too, he can be considered a modern day Leonardo Da Vinci.


Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael Apr 2012

Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael

Associate Professor Katina Michael

With so much buzz around Cloud Computing, books like this one written by Winkler are much in demand. Winkler’s experience in the computing business shines through and as readers we are spoiled with a great deal of useful strategic information- a jam packed almost 300 page volume on securing the cloud.


Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael Apr 2012

Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael

Professor Katina Michael

Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.