Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Physical Sciences and Mathematics

International Terrorism:Role ,Responsibility And Operation Of Media Channles, Ratnesh Dwivedi Mr Nov 2008

International Terrorism:Role ,Responsibility And Operation Of Media Channles, Ratnesh Dwivedi Mr

Ratnesh Dwivedi

"Terrorism" is a term that cannot be given a stable defintion. Or rather, it can, but to do so forstalls any attempt to examine the major feature of its relation to television in the contemporary world. As the central public arena for organising ways of picturing and talking about social and political life, TV plays a pivotal role in the contest between competing defintions, accounts and explanations of terrorism. Which term is used in any particular context is inextricably tied to judgemements about the legitimacy of the action in question and of the political system against which it is directed. …


666 Or 616 (Rev. 13,18), M. G. Michael Oct 2008

666 Or 616 (Rev. 13,18), M. G. Michael

M. G. Michael

No abstract provided.


The Genre Of The Apocalypse: What Are They Saying Now?, M. G. Michael Oct 2008

The Genre Of The Apocalypse: What Are They Saying Now?, M. G. Michael

M. G. Michael

No abstract provided.


National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael May 2008

National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael

M. G. Michael

This special issue of Prometheus is dedicated to the theme of the Social Implications of National Security Measures on Citizens and Business. National security measures can be defined as those technical and non-technical measures that have been initiated as a means to curb breaches in national security, irrespective of whether these might occur by nationals or aliens in or from outside the sovereign state. National security includes such government priorities as maintaining border control, safeguarding against pandemic outbreaks, preventing acts of terror, and even discovering and eliminating identification fraud. Governments worldwide are beginning to implement information and communication security techniques …


Historical Lessons On Id Technology And The Consequences Of An Unchecked Trajectory, Katina Michael, M G. Michael May 2008

Historical Lessons On Id Technology And The Consequences Of An Unchecked Trajectory, Katina Michael, M G. Michael

M. G. Michael

This paper traces the use of identification techniques throughout the ages and focuses on the growing importance of citizen identification by governments. The paper uses a historical approach beginning with manual techniques such as tattoos, through to more recent automatic identification (auto-ID) techniques such as smart cards and biometrics. The findings indicate that identification techniques born for one purpose have gradually found their way into alternate applications, and in some instances have been misused altogether. There is also strong evidence to suggest that governments are moving away from localized identification schemes to more global systems based on universal lifetime identifiers.


Privacy, Value And Control Issues In Four Mobile Business Applications, Benjamin D. Renegar, Katina Michael, M G. Michael May 2008

Privacy, Value And Control Issues In Four Mobile Business Applications, Benjamin D. Renegar, Katina Michael, M G. Michael

M. G. Michael

This paper presents four case studies that explore the adoption and acceptance of mobile technologies and services within the context of the privacy-value-control (PVC) trichotomy. The technologies studied include: the mobile phone, electronic toll payment tags, e-passports, and loyalty card programs. The study shows that despite the potential barriers to adoption in each of the depicted cases, the applications were embraced with great success soon after their introduction. An understanding of why these mobile innovations succeeded in spite of the concerns surrounding them will serve to help practitioners understand other issues currently plaguing emerging technologies like radio-frequency identification (RFID) tags …


Historical Lessons On Id Technology And The Consequences Of An Unchecked Trajectory, Katina Michael, M G. Michael May 2008

Historical Lessons On Id Technology And The Consequences Of An Unchecked Trajectory, Katina Michael, M G. Michael

Professor Katina Michael

This paper traces the use of identification techniques throughout the ages and focuses on the growing importance of citizen identification by governments. The paper uses a historical approach beginning with manual techniques such as tattoos, through to more recent automatic identification (auto-ID) techniques such as smart cards and biometrics. The findings indicate that identification techniques born for one purpose have gradually found their way into alternate applications, and in some instances have been misused altogether. There is also strong evidence to suggest that governments are moving away from localized identification schemes to more global systems based on universal lifetime identifiers.


Barriers To Rfid Adoption In The Supply Chain, Nick Huber, Katina Michael, Luke Mccathie May 2008

Barriers To Rfid Adoption In The Supply Chain, Nick Huber, Katina Michael, Luke Mccathie

Professor Katina Michael

This paper explores the current barriers to adoption of radio-frequency identification (RFID) for supply chain applications, and documents the perceptions of key players in the Australian RFID market. The paper contains data collected from interviews of both technology providers (e.g. RFID vendors), and prospective business customer (i.e. a large retailer). Data collected is analyzed using qualitative content analysis, and supported with figures and tables. The findings show that the three main barriers to RFID adoption are: the cost of RFID implementation (especially ongoing tag costs), lack of customer awareness and education, and a technology which is only at the beginning …


The Emerging Ethics Of Humancentric Gps Tracking And Monitoring, Katina Michael, Andrew Mcnamee, M G. Michael May 2008

The Emerging Ethics Of Humancentric Gps Tracking And Monitoring, Katina Michael, Andrew Mcnamee, M G. Michael

Professor Katina Michael

The Global Positioning System (GPS) is increasingly being adopted by private and public enterprise to track and monitor humans for location-based services (LBS). Some of these applications include personal locators for children, the elderly or those suffering from Alzheimer’s or memory loss, and the monitoring of parolees for law enforcement, security or personal protection purposes. The continual miniaturization of the GPS chipset means that receivers can take the form of wristwatches, mini mobiles and bracelets, with the ability to pinpoint the longitude and latitude of a subject 24/7/365. This paper employs usability context analyses to draw out the emerging ethical …


Location-Based Intelligence – Modeling Behavior In Humans Using Gps, Katina Michael, Andrew Mcnamee, M G. Michael, Holly Tootell May 2008

Location-Based Intelligence – Modeling Behavior In Humans Using Gps, Katina Michael, Andrew Mcnamee, M G. Michael, Holly Tootell

Professor Katina Michael

This paper introduces the notion of location-based intelligence by tracking the spatial properties and behavior of a single civilian participant over a two-week study period using a global positioning system (GPS) receiver, and displaying them on a geographic information system (GIS). The paper clearly shows the power of combining speed (S), distance (D), time (T) and elevation (E) data with the exact longitude and latitude position of the user. The issues drawn from the observation and the civilian’s personal diary are useful in understanding the social implications of tracking and monitoring objects and subjects using GPS. The findings show that …


Vendor Perceptions Of How Rfid Can Minimize Product Shrinkage In The Retail Supply Chain, N. Huber, Katina Michael May 2008

Vendor Perceptions Of How Rfid Can Minimize Product Shrinkage In The Retail Supply Chain, N. Huber, Katina Michael

Professor Katina Michael

The objective of this paper is to investigate product shrinkage in the retail supply chain, and to consider how radio frequency identification (RFID) could act as a partial solution toward a retailer’s loss prevention strategy. The research uses semi-structured interviews to collect data, and a qualitative content analysis to present the results. Given that the number of RFID deployments in the retail supply chain is limited, RFID vendors, resellers, and associations are instead used to gather the current value propositions. Representatives from nine Australian RFID vendors and associations were interviewed in August and September of 2006. The results indicate that …