Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

None

Social Implications of ICT

Articles 1 - 7 of 7

Full-Text Articles in Physical Sciences and Mathematics

Editorial: High-Tech Lust, Katina Michael May 2013

Editorial: High-Tech Lust, Katina Michael

Professor Katina Michael

Are you in love with your Android or Apple device? Do you have a deep affection and suffer from separation anxiety [1] when your smartphone is not within arm’s length of your bed at night?

Don’t worry, you’re not alone. Rossiter [1] differentiates between “brand love” and “brand liking” which is significant. When it comes to our high-tech gadgetry people are likely to be able to cope better with being separated from a partner or child than being separated from a vital piece of technology which goes with them everywhere.


Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom Dec 2012

Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom

Professor Katina Michael

Mobile Government Briefing: Provide services anywhere any time: - Transact to enable in-field data collection, request processing, order management, approvals, edits, updates and execute actions. - What are the implications for the incorporation of rich multimedia content on devices to better serve staff and citizens? - Addressing the security challenges of various risks around data access, data transmission, and data storage for BI architecture and mobile devices


Ieee T&S Magazine: Undergoing Transformation, Katina Michael Nov 2012

Ieee T&S Magazine: Undergoing Transformation, Katina Michael

Professor Katina Michael

Our Magazine is in a transformative period, not only because we are ‘Going Green’ in 2013 but because we are experiencing tremendous growth in quality international submissions. This means that we are increasingly appealing to an international audience with transdisciplinary interests. This has not gone unnoticed by the media, nor by our SSIT readership or wider engineering community.


Emerging Forms Of Covert Surveillance Using Gps-Enabled Devices, Roba Abbas, Katina Michael, M.G. Michael, Anas Aloudat Jun 2011

Emerging Forms Of Covert Surveillance Using Gps-Enabled Devices, Roba Abbas, Katina Michael, M.G. Michael, Anas Aloudat

Professor Katina Michael

This paper presents the real possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non-traditional covert surveillance within a community setting, resulting in community members engaging in the covert observation of family, friends, or acquaintances. This paper investigates five stakeholder relationships using scenarios to demonstrate the potential socio-ethical implications that tracking and monitoring people will have on society at large. The five stakeholder types explored in this paper include: (i) husband-wife (partner-partner), (ii) parent-child, (iii) employer-employee, (iv) friend-friend, and (v) stranger-stranger. Mobile technologies such as mobile camera phones, global positioning system data loggers, …


Emerging Forms Of Covert Surveillance Using Gps-Enabled Devices, Roba Abbas, Katina Michael, M.G. Michael, Anas Aloudat Jun 2011

Emerging Forms Of Covert Surveillance Using Gps-Enabled Devices, Roba Abbas, Katina Michael, M.G. Michael, Anas Aloudat

Professor Katina Michael

This paper presents the real possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non-traditional covert surveillance within a community setting, resulting in community members engaging in the covert observation of family, friends, or acquaintances. This paper investigates five stakeholder relationships using scenarios to demonstrate the potential socio-ethical implications that tracking and monitoring people will have on society at large. The five stakeholder types explored in this paper include: (i) husband-wife (partner-partner), (ii) parent-child, (iii) employer-employee, (iv) friend-friend, and (v) stranger-stranger. Mobile technologies such as mobile camera phones, global positioning system data loggers, …


Demonstrating The Potential For Covert Policing In The Community: Five Stakeholder Scenarios, Roba Abbas, Katina Michael, M.G. Michael Dec 2010

Demonstrating The Potential For Covert Policing In The Community: Five Stakeholder Scenarios, Roba Abbas, Katina Michael, M.G. Michael

Professor Katina Michael

This paper presents the real possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non traditional covert policing within a community setting, resulting in community members engaging in covert policing of family, friends, or acquaintances. This paper investigates five stakeholder relationships using scenarios to demonstrate the potential socio-ethical implications that tracking and monitoring people will have on society at large. The five stakeholder types explored in this paper include: (i) husband-wife (partner-partner), (ii) parent-child, (iii) employer-employee, (iv) friend-friend, and (v) stranger-stranger. Mobile technologies such as mobile camera phones, global positioning system data loggers, …


Australia And The New Technologies: Towards Evidence Based Policy In Public Administration, K. Michael, M. G. Michael Jul 2008

Australia And The New Technologies: Towards Evidence Based Policy In Public Administration, K. Michael, M. G. Michael

Professor Katina Michael

This workshop addresses the application of evidence based policy in public administration. It specifically focuses on the issue of new technologies in the form of product and process innovations rolled out in Australia since major international events (e.g. Sept 11, Boxing Day Tsunami, Avian Flu outbreak). These product and process innovations introduced for the ‘common good’ are usually mandated by government agencies, designed and implemented by private business, and obligatorily adopted by citizens in the name of national security. The workshop investigates how information is gathered, processed and disseminated to provide evidence toward policy making. What qualitative and quantitative methods …