Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (33)
- Business (30)
- Computer Sciences (27)
- Physical Sciences and Mathematics (27)
- Public Affairs, Public Policy and Public Administration (27)
-
- Science and Technology Studies (27)
- Sociology (26)
- Technology and Innovation (26)
- Computer Law (25)
- Criminology (25)
- Internet Law (25)
- Law (25)
- Law and Society (25)
- Other Engineering (25)
- Public Policy (25)
- Social Policy (25)
- Arts and Humanities (3)
- Education (2)
- Political Science (2)
- Anthropology (1)
- Communication (1)
- Legal Studies (1)
- Keyword
-
- Social Implications of ICT (19)
- Emerging Technologies (16)
- Privacy (12)
- Ethics (9)
- Location-Based Services (9)
-
- National Security (9)
- Surveillance (8)
- Uberveillance (8)
- Global Positioning Systems (7)
- Regulation (6)
- Information Security (5)
- Information Systems (5)
- Radio-frequency Identification (5)
- Security (5)
- Social Media (5)
- Technology (5)
- Emergency Management (4)
- Legislation (4)
- Microchip Implants (4)
- Microchips (4)
- Monitoring (4)
- RFID (4)
- Risk (4)
- Tracking (4)
- Australia (3)
- Automatic Identification (3)
- Control (3)
- Government (3)
- National security (3)
- Policing (3)
Articles 31 - 44 of 44
Full-Text Articles in Social and Behavioral Sciences
Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta
Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta
Professor Katina Michael
The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in these trends. …
Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael
Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael
Professor Katina Michael
Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.
The Technological Trajectory Of The Automatic Identification Industry: The Application Of The Systems Of Innovation (Si) Framework For The Characterisation And Prediction Of The Auto-Id Industry, Katina Michael
Professor Katina Michael
Traditionally the approach used to analyse technological innovation focused on the application of the techno-economic paradigm with the production function as its foundation. This thesis explores the rise of the evolutionary paradigm as a more suitable conceptual approach to investigating complex innovations like automatic identification (auto-ID) devices. Collecting and analysing data for five auto-ID case studies, (bar codes, magnetic-stripe cards, smart cards, biometrics and RF/ID transponders), it became evident that a process of migration, integration and convergence is happening within the auto-ID technology system (TS). The evolution of auto-ID is characterised by a new cluster of innovations, primarily emerging through …
Integrating Value-Driven Feedback And Recommendation Mechanisms Into Business Intelligence Systems, Byron Keating, Tim Coltman, Michael Katina, Valeria Baker
Integrating Value-Driven Feedback And Recommendation Mechanisms Into Business Intelligence Systems, Byron Keating, Tim Coltman, Michael Katina, Valeria Baker
Professor Katina Michael
Most leading organizations, in all sectors of industry, commerce and government are dependent upon
ERP for their organizational survival. Yet despite the importance of the decision to adopt ERP and its
impact on the entire firm’s performance the IT literature has been in the large part silent on the nature
of the ERP investment decision. This study is the first of its kind to determine the preference structure
of senior managers around the organizational benefits and risks of adopting ERP. We present the
results which provide interesting insights into how managers’ perceive the benefit and risk factors
salient to the …
Unpacking The Erp Investment Decision: An Empirical Assessment Of The Benefits And Risks, Byron Keating, Tim Coltman, Katina Michael, Valerie Baker
Unpacking The Erp Investment Decision: An Empirical Assessment Of The Benefits And Risks, Byron Keating, Tim Coltman, Katina Michael, Valerie Baker
Professor Katina Michael
Most leading organizations, in all sectors of industry, commerce and government are dependent upon ERP for their organizational survival. Yet despite the importance of the decision to adopt ERP and its impact on the entire firm’s performance the IT literature has been in the large part silent on the nature of the ERP investment decision. This study is the first of its kind to determine the preference structure of senior managers around the organizational benefits and risks of adopting ERP. We present the results which provide interesting insights into how managers’ perceive the benefit and risk factors salient to the …
Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt
Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt
Professor Katina Michael
Law disciplines technology, though it does so in a partial and incomplete way as reflected in the old adage that technology outstrips the capacity of law to regulate it. The rise of new technologies poses a significant threat to human rights – the pervasive use of CCTV (and now mobile CCTV), telecommunications interception, and low-cost audio-visual recording and tracking devices (some of these discreetly wearable), extend the power of the state and corporations significantly to intrude into the lives of citizens.
Editorial: "You Talkin' To Me?", Katina Michael
Editorial: "You Talkin' To Me?", Katina Michael
Professor Katina Michael
Advancing knowledge through robust research is an honourable aim- being scientific, finding the right methodology, executing project phases meticulously, and reporting on the outcomes as objectively and accurately as possible. But may I begin my inaugural editorial by saying that an even higher ideal to advancing knowledge is critiquing it as it happens. Reflective practice is not just something to be done by academics in their teaching- reflective practice is what we should all be doing as we go about undertaking our various day-to-day work tasks. For the engineer engaged in research and development, whether in industry or government, reflective …
Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas
Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas
Professor Katina Michael
Mobile alerts, notifications and location-based emergency warning systems are now an established part of mobile government strategies in an increasing number of countries worldwide. In Australia the national emergency warning system (NEWS) was instituted after the tragic Black Saturday Victorian Bushfires of February 2009. In the first phase, NEWS has enabled the provision of public information from the government to the citizen during emergencies anywhere and any time. Moving on from traditional short message service (SMS) notifications and cell broadcasting to more advanced location-based services, this paper provides executive-level recommendations about the viability of location-based mobile phone services in NEWS …
The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael
The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael
Professor Katina Michael
No abstract provided.
The Social Implications Of Emerging Technologies, Katina Michael
The Social Implications Of Emerging Technologies, Katina Michael
Professor Katina Michael
As the Program Committee Chair, I would like to first and foremost thank the forty person strong international program committee for their support, feedback and contributions from the outset. The Committee itself was made up of researchers from 11 countries, covering diverse disciplines and expertise. In their own right members of the program committee are renowned researchers, cited in many of the papers appearing in this year’s ISTAS full proceedings, and over the years appearing in associated publications such as IEEE Technology and Society Magazine. It was such an honour to work with persons possessing a truly collaborative spirit, some …
The Emerging Ethics Of Humancentric Gps Tracking And Monitoring, Katina Michael, Andrew Mcnamee, M G. Michael
The Emerging Ethics Of Humancentric Gps Tracking And Monitoring, Katina Michael, Andrew Mcnamee, M G. Michael
Professor Katina Michael
The Global Positioning System (GPS) is increasingly being adopted by private and public enterprise to track and monitor humans for location-based services (LBS). Some of these applications include personal locators for children, the elderly or those suffering from Alzheimer’s or memory loss, and the monitoring of parolees for law enforcement, security or personal protection purposes. The continual miniaturization of the GPS chipset means that receivers can take the form of wristwatches, mini mobiles and bracelets, with the ability to pinpoint the longitude and latitude of a subject 24/7/365. This paper employs usability context analyses to draw out the emerging ethical …
Location-Based Intelligence – Modeling Behavior In Humans Using Gps, Katina Michael, Andrew Mcnamee, M G. Michael, Holly Tootell
Location-Based Intelligence – Modeling Behavior In Humans Using Gps, Katina Michael, Andrew Mcnamee, M G. Michael, Holly Tootell
Professor Katina Michael
This paper introduces the notion of location-based intelligence by tracking the spatial properties and behavior of a single civilian participant over a two-week study period using a global positioning system (GPS) receiver, and displaying them on a geographic information system (GIS). The paper clearly shows the power of combining speed (S), distance (D), time (T) and elevation (E) data with the exact longitude and latitude position of the user. The issues drawn from the observation and the civilian’s personal diary are useful in understanding the social implications of tracking and monitoring objects and subjects using GPS. The findings show that …
Soap Box: If Katina Michael Could Send A Message To Government, It Would Be This..., K. Michael
Soap Box: If Katina Michael Could Send A Message To Government, It Would Be This..., K. Michael
Professor Katina Michael
No abstract provided.
The Social Implications Of Information Security Measures On Citizens And Business, K. Michael, M. G. Michael
The Social Implications Of Information Security Measures On Citizens And Business, K. Michael, M. G. Michael
Professor Katina Michael
The 2006 Workshop on the Social Implications of Information Security Measures on Citizens and Business was organised by the Research Network for a Secure Australia (RNSA) funded by the Australian Research Council. The Workshop will become a biennial event bringing together both researchers and practitioners in the fields relating to the national research priority entitled Safeguarding Australia.
In 2006, the workshop was held on the 29th May, at the Function Centre at the University of Wollongong between 8.30 am and 5.00 pm.
The Workshop was organised by RNSA members of the Centre for eBusiness Applications Research at the University of …