Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Public Affairs, Public Policy and Public Administration (16)
- Engineering (14)
- Law (14)
- Science and Technology Studies (13)
- Physical Sciences and Mathematics (12)
-
- Sociology (12)
- Business (11)
- Public Policy (11)
- Computer Sciences (10)
- Criminology (9)
- Arts and Humanities (8)
- Communication (8)
- Computer Law (8)
- Internet Law (8)
- Law and Society (8)
- Other Engineering (8)
- Social Policy (8)
- Technology and Innovation (8)
- Communication Technology and New Media (6)
- Policy Design, Analysis, and Evaluation (3)
- Science and Technology Policy (3)
- Criminal Law (2)
- Defense and Security Studies (2)
- Education (2)
- Fourth Amendment (2)
- Law and Politics (2)
- Legal Studies (2)
- Medicine and Health Sciences (2)
- National Security Law (2)
- Publication
-
- Professor Katina Michael (8)
- Associate Professor Katina Michael (6)
- Michael Friedewald (6)
- M. G. Michael (2)
- Robert M Pallitto (2)
-
- Alev Dudek (1)
- Alexander Hayes Mr. (1)
- Anil Kalhan (1)
- Athina Karatzogianni (1)
- Bright B Simons (1)
- Carrie P. Freeman (1)
- Chris Jay Hoofnagle (1)
- Dr Marijka Batterham (1)
- Dr Roba Abbas (1)
- Karen E. Charlton (1)
- Michael I Niman Ph.D. (1)
- Rajiv Shah (1)
- Rob Marc Orr (1)
- Rubén Mendoza (1)
- Shahriar Akter (1)
- Teresa A. Miller (1)
- File Type
Articles 1 - 30 of 40
Full-Text Articles in Social and Behavioral Sciences
Americans, Marketers, And The Internet: 1999-2012, Joseph Turow, Amy Bleakley, John Bracken, Michael X. Delli Carpini, Nora A. Draper, Lauren Feldman, Nathaniel Good, Jens Grossklags, Michael Hennessy, Chris Jay Hoofnagle, Rowan Howard-Williams, Jennifer King, Su Li, Kimberly Meltzer, Deirdre K. Mulligan, Lilach Nir
Americans, Marketers, And The Internet: 1999-2012, Joseph Turow, Amy Bleakley, John Bracken, Michael X. Delli Carpini, Nora A. Draper, Lauren Feldman, Nathaniel Good, Jens Grossklags, Michael Hennessy, Chris Jay Hoofnagle, Rowan Howard-Williams, Jennifer King, Su Li, Kimberly Meltzer, Deirdre K. Mulligan, Lilach Nir
Chris Jay Hoofnagle
This is a collection of the reports on the Annenberg national surveys that explored Americans' knowledge and opinions about the new digital-marketing world that was becoming part of their lives. So far we’ve released seven reports on the subject, in 1999, 2000, 2003, 2005, 2009, 2010, and 2012. The reports raised or deepened a range of provocative topics that have become part of public, policy, and industry discourse. In addition to these reports, I’ve included three journal articles — from I/S, New Media & Society and the Journal of Consumer Affairs — that synthesize some of the findings and place …
Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller
Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller
Teresa A. Miller
In prison, surveillance is power and power is sexualized. Sex and surveillance, therefore, are profoundly linked. Whereas numerous penal scholars from Bentham to Foucault have theorized the force inherent in the visual monitoring of prisoners, the sexualization of power and the relationship between sex and surveillance is more academically obscure. This article criticizes the failure of federal courts to consider the strong and complex relationship between sex and surveillance in analyzing the constitutionality of prison searches, specifically, cross-gender searches. The analysis proceeds in four parts. Part One introduces the issues posed by sex and surveillance. Part Two describes the sexually …
Mission Possible: Safeguarding The Heritage Of The California Missions, Rubén Mendoza
Mission Possible: Safeguarding The Heritage Of The California Missions, Rubén Mendoza
Rubén Mendoza
No abstract provided.
Incidence Rates For Work Health And Safety Incidents And Injuries In Australian Army Reserve Vs Full Time Soldiers, And A Comparison Of Reporting Systems, Rodney Pope, Rob Orr
Incidence Rates For Work Health And Safety Incidents And Injuries In Australian Army Reserve Vs Full Time Soldiers, And A Comparison Of Reporting Systems, Rodney Pope, Rob Orr
Rob Marc Orr
Objective:
To determine incidence rates of reported work health and safety (WHS) incidents and injuries in Army Reserve (ARES) and Australian Regular Army (ARA) personnel and assess the relative performance of the WHS incident reporting system, compared to ‘point-of-care’ systems.
Methods:
WHS incident data for a 24-month period were extracted from a military database. Reported WHS incident and injury rates for both populations were calculated and compared. The WHS injury rates were compared with previously published injury incidence rates based on ‘point-of-care’ incident reporting in Army populations to ascertain relative performance of WHS and ‘point-of-care’ systems.
Results:
In both populations …
Irresistible Bargains: Navigating The Surveillance Society, Robert M. Pallitto
Irresistible Bargains: Navigating The Surveillance Society, Robert M. Pallitto
Robert M Pallitto
Mhealth For Influenza Pandemic Surveillance In Developing Countries, Junhua Li, Nathan Moore, Shahriar Akter, Steven Bleisten, Pradeep Ray
Mhealth For Influenza Pandemic Surveillance In Developing Countries, Junhua Li, Nathan Moore, Shahriar Akter, Steven Bleisten, Pradeep Ray
Shahriar Akter
Influenza pandemics caused millions of deaths and massive economic losses worldwide in the last century. The impact of any future pandemic is likely to be greatest in developing countries as a result of their limited surveillance and healthcare resources. eHealth facilitates the detection and reporting of potential pandemic strains by using digital data transmitted, sorted and retrieved electronically both at the local site and at a distance. The implementation of eHealth is resource costly but developing countries have limited financial and technical resources. This adversely affects access to eHealth applications. Mobile communication technologies hold great promise in improving access to …
Using Data From Patient Interactions In Primary Care For Population Level Chronic Disease Surveillance: The Sentinel Practices Data Sourcing (Spds) Project, Abhijeet Ghosh, Karen Charlton, Lisa Girdo, Marijka Batterham
Using Data From Patient Interactions In Primary Care For Population Level Chronic Disease Surveillance: The Sentinel Practices Data Sourcing (Spds) Project, Abhijeet Ghosh, Karen Charlton, Lisa Girdo, Marijka Batterham
Dr Marijka Batterham
Background Population health planning within a health district requires current information on health profiles of the target population. Information obtained during primary care interactions may provide a valuable surveillance system for chronic disease burden. The Sentinel Practices Data Sourcing project aimed to establish a sentinel site surveillance system to obtain a region-specific estimate of the prevalence of chronic diseases and mental health disorders within the Illawarra-Shoalhaven region of New South Wales, Australia. Methods In September 2013, de-identified information for all patient interactions within the preceding 24 months was extracted and collated using a computerised chronic disease management program that has …
Keynote: Justifying Uberveillance- The Internet Of Things And The Flawed Sustainability Premise, Katina Michael
Keynote: Justifying Uberveillance- The Internet Of Things And The Flawed Sustainability Premise, Katina Michael
Professor Katina Michael
Imagine a world where everything was numbered. Not just homes with street addresses, or cars with number plates, or smart phones with telephone numbers, or email addresses with passwords, but absolutely everything you could see and touch and even that which you could not. Well, that world is here, right now. This vast expanse we call “Earth” is currently being quantified and photographed, inch by inch, by satellites, street cameras, drones and high altitude balloons. Longitude and latitude coordinates provide us with the precise degrees, minutes and seconds of the physical space, and unique time stamps tell us where a …
Reflections From The Wearable Computing Conference In Toronto, Canada, Nick Rheinberger, Katina Michael, Alexander Hayes
Reflections From The Wearable Computing Conference In Toronto, Canada, Nick Rheinberger, Katina Michael, Alexander Hayes
Alexander Hayes Mr.
Could sports men and women who are monitored using wearable computers actually be playing to a global theatre to ensure the upkeep of their performance benchmarks instead of consciously watching and reacting to what is happening in the game they are playing? What are the social implications of heart rate monitors and GPS units now embedded into player clothing? What were some of the reflections from the IEEE ISTAS13 meeting on Wearable Computers in Every Day Life? What were some of the main messages that you walked away with from that conference? What made the greatest impression on us was …
Using A Social-Ethical Framework To Evaluate Location-Based Services In An Internet Of Things World, Roba Abbas, Katina Michael, Mg Michael
Using A Social-Ethical Framework To Evaluate Location-Based Services In An Internet Of Things World, Roba Abbas, Katina Michael, Mg Michael
Associate Professor Katina Michael
The idea for an Internet of Things has matured since its inception as a concept in 1999. People today speak openly of a Web of Things and People, and even more broadly of an Internet of Everything. As our relationships become more and more complex and enmeshed, through the use of advanced technologies, we have pondered on ways to simplify flows of communications, to collect meaningful data, and use them to make timely decisions with respect to optimisation and efficiency. At their core, these flows of communications are pathways to registers of interaction, and tell the intricate story of outputs …
Using A Social-Ethical Framework To Evaluate Location-Based Services In An Internet Of Things World, Roba Abbas, Katina Michael, Mg Michael
Using A Social-Ethical Framework To Evaluate Location-Based Services In An Internet Of Things World, Roba Abbas, Katina Michael, Mg Michael
Dr Roba Abbas
The idea for an Internet of Things has matured since its inception as a concept in 1999. People today speak openly of a Web of Things and People, and even more broadly of an Internet of Everything. As our relationships become more and more complex and enmeshed, through the use of advanced technologies, we have pondered on ways to simplify flows of communications, to collect meaningful data, and use them to make timely decisions with respect to optimisation and efficiency. At their core, these flows of communications are pathways to registers of interaction, and tell the intricate story of outputs …
Hack Or Be Hacked: The Quasi-Totalitarianism Of Global Trusted Networks, Athina Karatzogianni, Martin Gak
Hack Or Be Hacked: The Quasi-Totalitarianism Of Global Trusted Networks, Athina Karatzogianni, Martin Gak
Athina Karatzogianni
War Against Muslims Post 9/11?, Alev Dudek
War Against Muslims Post 9/11?, Alev Dudek
Alev Dudek
Wer Kann Sie Erraten?, Michael Friedewald, Dara Hallinan, Philip Schütz, Paul De Hert
Wer Kann Sie Erraten?, Michael Friedewald, Dara Hallinan, Philip Schütz, Paul De Hert
Michael Friedewald
No abstract provided.
Developing And Testing A Surveillance Impact Assessment Methodology, David Wright, Michael Friedewald, Raphael Gellert
Developing And Testing A Surveillance Impact Assessment Methodology, David Wright, Michael Friedewald, Raphael Gellert
Michael Friedewald
With the increasing pervasiveness of surveillance, from big companies such as Google and Facebook, as well as from the intelligence agencies, such as the US National Security Agency (NSA) and the UK Government Communications Headquarters (GCHQ), there is a clear need for a surveillance impact assessment (SIA), a method that addresses not only issues of privacy and data protection, but also ethical, social, economic, and political issues.
The SAPIENT project, funded by the European Commission, and undertaken by a consortium of partners from several European countries, aimed to develop an SIA methodology, based on stake- holder needs and a set …
The Co-Evolution Of Surveillance Technology And Surveillance Practices, Kerstin Gooas, Michael Friedewald, William Webster, Charles Leleux
The Co-Evolution Of Surveillance Technology And Surveillance Practices, Kerstin Gooas, Michael Friedewald, William Webster, Charles Leleux
Michael Friedewald
No abstract provided.
Surveillance In Chicago: Growing, But For What Purpose?, Rajiv Shah
Surveillance In Chicago: Growing, But For What Purpose?, Rajiv Shah
Rajiv Shah
Chicago is now one of the leading cities in the world in using surveillance technology. This growth began in 2003 when cameras were used to fight street level crime. Since then, Chicago’s camera network has grown to over 25,000 units, along with the use of a variety of new technologies. This chapter explains this growth and how it affects policing.
Forum Proceedings From “Uavs: Pros Vs Cons Symposium” In Toronto, Canada, June 2013, Katina Michael
Forum Proceedings From “Uavs: Pros Vs Cons Symposium” In Toronto, Canada, June 2013, Katina Michael
Associate Professor Katina Michael
Unmanned Aerial Systems (UAS), widely referred to as drones, are becoming increasingly relevant in civilian as well as military applications. UAS have been used by emergency services to help respond to and map environmental crises, to find missing people, to fight fires, and respond to traffic accidents. Their use in policing and border patrol functions is being trialled in many Western countries. Like other recent technologies (mobile phones etc), as they become cheaper and easier to use, they are likely to become much more prevalent in civilian life across a range of applications.
This conference will examine the current state …
Connected: To Everyone And Everything, Katherine Albrecht, Katina Michael
Connected: To Everyone And Everything, Katherine Albrecht, Katina Michael
Associate Professor Katina Michael
The activist group CASPIAN (Consumers Against Supermarket Privacy Invasion and Numbering) was founded in 1999 by Katherine Albrecht, the very same year that Kevin Ashton co-founder and executive director of the then Auto-ID Center at MIT made a presentation to Proctor & Gamble with a title that included the phrase “Internet of Things”. According to Ashton, “the most numerous and important routers of all” are people but people have limitations and are not very good at capturing data about objects in the physical world. In 2001, Ashton’s automatic identification vision had become a lot clearer. At the Auto-ID Center during …
Immigration Policing And Federalism Through The Lens Of Technology, Surveillance, And Privacy, Anil Kalhan
Immigration Policing And Federalism Through The Lens Of Technology, Surveillance, And Privacy, Anil Kalhan
Anil Kalhan
With the deployment of technology, federal programs to enlist state and local police assistance with immigration enforcement are undergoing a sea change. For example, even as it forcefully has urged invalidation of Arizona’s S.B. 1070 and similar state laws, the Obama administration has presided over the largest expansion of state and local immigration policing in U.S. history with its implementation of the “Secure Communities” program, which integrates immigration and criminal history database systems in order to automatically ascertain the immigration status of every individual who is arrested and booked by state and local police nationwide. By 2012, over one fifth …
Panel 2- Regulation, Policy Recommendations And Responses, Jonathan Clough, Scott Mellis, Simon Brown, Graham Ingram, Alana Maurushat, Katina Michael, Jason Ryning
Panel 2- Regulation, Policy Recommendations And Responses, Jonathan Clough, Scott Mellis, Simon Brown, Graham Ingram, Alana Maurushat, Katina Michael, Jason Ryning
Professor Katina Michael
A roundtable to be held on cybercrime at ANU. Panel 1 to be on the changing nature of cybercrime: threat and trend update. Panel 2 on regulation, policy recommendations and responses. Panel 3 on technical measures to combat cybercrime. Panel 4 on the investigation of cybercrime and victimisation. Panel 2 to be keynoted by Keith Besgrove (DBCD) and chaired by Jonathan Clough.
The Not-So-Simple Saga Of Edward And Barack..., Michael I. Niman Ph.D.
The Not-So-Simple Saga Of Edward And Barack..., Michael I. Niman Ph.D.
Michael I Niman Ph.D.
It reads like a political thriller. An NSA spook, Edward Snowden, meets his conscience, blows the whistle on a massive secret attack on the Fourth Amendment, and is pursued globally by an obsessed president. Spice things up with a bit of character development cross-pollinated with a history lesson. First there’s Darth President. His administration has earned the distinction of invoking the Espionage Act of 1917 (a constitutionally questionable World War One relic) more than all other presidents in the previous 96 years combined—by a factor of two. The Obama administration has charged eight people under the act. All previous administrations …
Social Implications Of Wearable Computing And Augmediated Reality In Every Day Life (Ieee Symposium On Technology And Society, Istas13), Katina Michael
Social Implications Of Wearable Computing And Augmediated Reality In Every Day Life (Ieee Symposium On Technology And Society, Istas13), Katina Michael
Associate Professor Katina Michael
It was in July 2012 that Steve Mann and I corresponded on the possibility of hosting a conference on wearable computing in Toronto, Canada. Steve had just returned home from a family holiday to France and publicly blogged about an unfortunate incident that had happened to him while away. On 17th July 2012 he posted: “Physical assault by McDonald’s for wearing Digital Eye Glass”. We both knew the timing was right for such an event that was not just a technical engineering or applied orientation on the theme of smart worlds, but an event that would grapple with the dichotomies …
Strategies To Address Iodine Deficiency In Australia Require Ongoing Monitoring And Surveillance, Heather Yeatman, Karen E. Charlton
Strategies To Address Iodine Deficiency In Australia Require Ongoing Monitoring And Surveillance, Heather Yeatman, Karen E. Charlton
Karen E. Charlton
No abstract provided.
Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke
Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke
Professor Katina Michael
During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …
Was Blind But Now I See: Animal Liberation Documentaries’ Deconstruction Of Barriers To Witnessing Injustice, Carrie Packwood Freeman, Scott Tulloch
Was Blind But Now I See: Animal Liberation Documentaries’ Deconstruction Of Barriers To Witnessing Injustice, Carrie Packwood Freeman, Scott Tulloch
Carrie P. Freeman
Many pro-animal documentaries are built around footage taken by undercover animal activists uncovering abuses in industries such as agriculture and fishing, fur, marine parks, and biomedical research labs. This analysis explores the central role of undercover activist footage in recent documentaries: Earthlings, The Cove, The Witness, Peaceable Kingdom, Behind the Mask, Fowl Play, and Dealing Dogs. Considering both form and function, I investigate how this undercover footage works in terms of providing an inherent critique of power in our relationship with nonhuman animals – a sense of witnessing a crime that is an injustice both in terms of causing animal …
Bargaining With The Machine: A Framework For Describing Encounters With Surveillance Technologies, Robert M. Pallitto
Bargaining With The Machine: A Framework For Describing Encounters With Surveillance Technologies, Robert M. Pallitto
Robert M Pallitto
Glogging Your Every Move, Lisa Wachsmuth, Katina Michael
Glogging Your Every Move, Lisa Wachsmuth, Katina Michael
Professor Katina Michael
"It is one thing to lug technologies around, another thing to wear them, and even more intrusive to bear them... But that's the direction in which we're headed."
"I think we're entering an era of person-view systems which will show things on ground level and will be increasingly relayed to others via social media.
"We've got people wearing recording devices on their fingers, in their caps or sunglasses - there are huge legal and ethical implications here."
Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael
Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael
Associate Professor Katina Michael
This mixed methods study with a sequential explanatory strategy explored qualitatively the statistically significant quantitative findings relative to Indian respondents’ perceptions about RFID (radio frequency identification) transponders implanted into the human body. In the first analysis phase of the study, there was a significant chi-square analysis reported (χ2 = 56.64, df = 3, p = .000) relative to the perception of small business owners (N = 453) that implanted chips are a more secure form of identification and/or access control in organizations and the respondents’ country of residence. Countries under study included Australia, India, the UK and US. The country …
Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael
Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael
Professor Katina Michael
Tracking and monitoring people as they operate within their personal networks benefits service providers and their constituents but involves hidden risks and costs.
Automatic identification technologies, CCTV cameras, pervasive and mobile networks, wearable computing, location-based services and social networks have traditionally served distinct purposes. However, we have observed patterns of integration, convergence and coexistence among all these innovations within the information and communication technology industry.1For example, ‘location-based social networking’ can draw on a smart phone's capacity to identify a user uniquely, locate him within 1–2m and share this information across his social network in real time. The resulting ability to …