Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Privacy (2)
- Automatic Identification (1)
- Community policing (1)
- Covert policing (1)
- Cyberbullying (1)
-
- Cybercrime (1)
- DNA (1)
- Emerging Technologies (1)
- Ethics (1)
- European Court of Human Rights (1)
- Facebook (1)
- GPS (1)
- Global Positioning Systems (1)
- Graafstra (1)
- Human Rights (1)
- Innovation (1)
- LBS (1)
- LBSN (1)
- Law, DNA (1)
- Literature Review (1)
- Location Based Services (1)
- Location Based Social Networking (1)
- Location-Based Services (1)
- Point-of-View (POV) (1)
- Police (1)
- Policing (1)
- Prüm Treaty (1)
- RFID (1)
- RFID Implants (1)
- Religion (1)
Articles 1 - 6 of 6
Full-Text Articles in Physical Sciences and Mathematics
Demonstrating The Potential For Covert Policing In The Community: Five Stakeholder Scenarios, Roba Abbas, Katina Michael, M.G. Michael
Demonstrating The Potential For Covert Policing In The Community: Five Stakeholder Scenarios, Roba Abbas, Katina Michael, M.G. Michael
Professor Katina Michael
This paper presents the real possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non traditional covert policing within a community setting, resulting in community members engaging in covert policing of family, friends, or acquaintances. This paper investigates five stakeholder relationships using scenarios to demonstrate the potential socio-ethical implications that tracking and monitoring people will have on society at large. The five stakeholder types explored in this paper include: (i) husband-wife (partner-partner), (ii) parent-child, (iii) employer-employee, (iv) friend-friend, and (v) stranger-stranger. Mobile technologies such as mobile camera phones, global positioning system data loggers, …
The Road From S. And Marper To The Prüm Treaty And The Implications On Human Rights, K. Michael
The Road From S. And Marper To The Prüm Treaty And The Implications On Human Rights, K. Michael
Professor Katina Michael
This chapter investigates the implications of the S. and Marper v United Kingdom ruling by the European Court of Human Rights (ECtHR), which found that the UK Government’s current deoxyribonucleic acid (DNA) retention policy breached Article 8 of the European Convention on Human Rights (ECHR) (Council of Europe 2008). The aim of this chapter is to look beyond the changes that have been instigated in Britain, since the landmark decision by the ECtHR was made, and toward the legal and human rights implications of the sharing of DNA data across the borders of European Union member states. Of significance here …
Guest Editors Introduction: Rfid - A Unique Radio Innovation For The 21st Century, Rajit Gadh, George Roussos, K. Michael, George Q. Huang, Shiv Prabhu, Peter Chu
Guest Editors Introduction: Rfid - A Unique Radio Innovation For The 21st Century, Rajit Gadh, George Roussos, K. Michael, George Q. Huang, Shiv Prabhu, Peter Chu
Professor Katina Michael
In 1948, the Proceedings of the Institute of Radio Engineers published Harry Stockman’s seminal work on “communication by means of reflected power,” which many consider as the first paper on RFID. The paper concluded by expressing the expectation that “considerable research and development work has to be done before the remaining basic problems in reflected-power communication are solved, and before the field of useful applications is explored.” It is only appropriate that after more than 60 years following the publication of this work by its progenitor, in this special issue the Proceedings of the IEEE review current developments towards the …
Stop Social Network Pitfalls, K. Michael
Stop Social Network Pitfalls, K. Michael
Professor Katina Michael
Ask a group of teenagers how they spend their spare time and most will mention Facebook, YouTube, World of Warcraft, or Second Life – ‘virtual’ social networks that bring millions of people together online. The benefits of social networks have been touted but what about the pitfalls? Some teens will share everything about themselves to hundreds of online friends, most of whom they have never met. Twitter style prompts like where you are, what you are doing, and who you are doing it with reveal a lot about one’s behaviours, one’s inner thoughts, and even one’s vulnerabilities. Some teens upload …
Using A Social Informatics Framework To Study The Effects Of Location-Based Social Networking On Relationships Between People: A Review Of Literature, Sarah Jean Fusco, K. Michael, M.G. Michael
Using A Social Informatics Framework To Study The Effects Of Location-Based Social Networking On Relationships Between People: A Review Of Literature, Sarah Jean Fusco, K. Michael, M.G. Michael
Professor Katina Michael
This paper is predominantly a review of literature on the emerging mobile application area known as location-based social networking. The study applies the social informatics framework to the exploratory question of what effect location based social networking may have on relationships between people. The classification model used in the paper relates previous research on location based services and online social networking together. Specifically the wider study is concerned with literature which identifies the impact of technology on trust with respect to friendship. This paper attempts to draw out the motivations behind using location based social networking applications and the implications …
Social-Technical Issues Facing The Humancentric Rfid Implantee Sub-Culture Through The Eyes Of Amal Graafstra, Amal Graafstra, K. Michael, M.G. Michael
Social-Technical Issues Facing The Humancentric Rfid Implantee Sub-Culture Through The Eyes Of Amal Graafstra, Amal Graafstra, K. Michael, M.G. Michael
Professor Katina Michael
Radio-frequency identification (RFID) tags and transponders have traditionally been used to identify domesticated animals so that they can be reunited with their owners in the event that they stray. In the late 1990s, industry started to investigate the benefits of using RFID to identifying non-living things throughout the supply chain toward new efficiencies in business operations. Not long after, people began to consider the possibilities of getting RFID tag or transponder implants for themselves. Mr Amal Graafstra of the United States is one of the first, and probably most well-known ‘do it yourselfer’ (DIY) implantees, who enjoys building customized projects …