Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 40

Full-Text Articles in Social and Behavioral Sciences

Americans, Marketers, And The Internet: 1999-2012, Joseph Turow, Amy Bleakley, John Bracken, Michael X. Delli Carpini, Nora A. Draper, Lauren Feldman, Nathaniel Good, Jens Grossklags, Michael Hennessy, Chris Jay Hoofnagle, Rowan Howard-Williams, Jennifer King, Su Li, Kimberly Meltzer, Deirdre K. Mulligan, Lilach Nir Jan 2018

Americans, Marketers, And The Internet: 1999-2012, Joseph Turow, Amy Bleakley, John Bracken, Michael X. Delli Carpini, Nora A. Draper, Lauren Feldman, Nathaniel Good, Jens Grossklags, Michael Hennessy, Chris Jay Hoofnagle, Rowan Howard-Williams, Jennifer King, Su Li, Kimberly Meltzer, Deirdre K. Mulligan, Lilach Nir

Chris Jay Hoofnagle

This is a collection of the reports on the Annenberg national surveys that explored Americans' knowledge and opinions about the new digital-marketing world that was becoming part of their lives. So far we’ve released seven reports on the subject, in 1999, 2000, 2003, 2005, 2009, 2010, and 2012. The reports raised or deepened a range of provocative topics that have become part of public, policy, and industry discourse. In addition to these reports, I’ve included three journal articles — from I/S, New Media & Society and the Journal of Consumer Affairs — that synthesize some of the findings and place …


Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller Nov 2017

Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller

Teresa A. Miller

In prison, surveillance is power and power is sexualized. Sex and surveillance, therefore, are profoundly linked. Whereas numerous penal scholars from Bentham to Foucault have theorized the force inherent in the visual monitoring of prisoners, the sexualization of power and the relationship between sex and surveillance is more academically obscure. This article criticizes the failure of federal courts to consider the strong and complex relationship between sex and surveillance in analyzing the constitutionality of prison searches, specifically, cross-gender searches. The analysis proceeds in four parts. Part One introduces the issues posed by sex and surveillance. Part Two describes the sexually …


Mission Possible: Safeguarding The Heritage Of The California Missions, Rubén Mendoza Oct 2017

Mission Possible: Safeguarding The Heritage Of The California Missions, Rubén Mendoza

Rubén Mendoza

No abstract provided.


Incidence Rates For Work Health And Safety Incidents And Injuries In Australian Army Reserve Vs Full Time Soldiers, And A Comparison Of Reporting Systems, Rodney Pope, Rob Orr May 2017

Incidence Rates For Work Health And Safety Incidents And Injuries In Australian Army Reserve Vs Full Time Soldiers, And A Comparison Of Reporting Systems, Rodney Pope, Rob Orr

Rob Marc Orr

Objective:

To determine incidence rates of reported work health and safety (WHS) incidents and injuries in Army Reserve (ARES) and Australian Regular Army (ARA) personnel and assess the relative performance of the WHS incident reporting system, compared to ‘point-of-care’ systems.

Methods:

WHS incident data for a 24-month period were extracted from a military database. Reported WHS incident and injury rates for both populations were calculated and compared. The WHS injury rates were compared with previously published injury incidence rates based on ‘point-of-care’ incident reporting in Army populations to ascertain relative performance of WHS and ‘point-of-care’ systems.

Results:

In both populations …


Irresistible Bargains: Navigating The Surveillance Society, Robert M. Pallitto Dec 2016

Irresistible Bargains: Navigating The Surveillance Society, Robert M. Pallitto

Robert M Pallitto

Agents in contemporary societies are faced continually with choices regarding engagement with technological artifacts. They can choose to engage or decline engagement after considering the costs and benefits in each case. However, certain aspects of the surveillance society may be irresistible in a number of ways, so that refusal to engage with them is not a realistic option. The proliferation of the Internet of Things (IoT), particularly as embedded in “smart city” initiatives, helps to make surveillance technologies potentially irresistible. After laying the conceptual groundwork for discussing irresistible bargains, this essay offers a two-part normative critique, focusing on the asymmetrical …


Mhealth For Influenza Pandemic Surveillance In Developing Countries, Junhua Li, Nathan Moore, Shahriar Akter, Steven Bleisten, Pradeep Ray Dec 2015

Mhealth For Influenza Pandemic Surveillance In Developing Countries, Junhua Li, Nathan Moore, Shahriar Akter, Steven Bleisten, Pradeep Ray

Shahriar Akter

Influenza pandemics caused millions of deaths and massive economic losses worldwide in the last century. The impact of any future pandemic is likely to be greatest in developing countries as a result of their limited surveillance and healthcare resources. eHealth facilitates the detection and reporting of potential pandemic strains by using digital data transmitted, sorted and retrieved electronically both at the local site and at a distance. The implementation of eHealth is resource costly but developing countries have limited financial and technical resources. This adversely affects access to eHealth applications. Mobile communication technologies hold great promise in improving access to …


Using Data From Patient Interactions In Primary Care For Population Level Chronic Disease Surveillance: The Sentinel Practices Data Sourcing (Spds) Project, Abhijeet Ghosh, Karen Charlton, Lisa Girdo, Marijka Batterham Nov 2015

Using Data From Patient Interactions In Primary Care For Population Level Chronic Disease Surveillance: The Sentinel Practices Data Sourcing (Spds) Project, Abhijeet Ghosh, Karen Charlton, Lisa Girdo, Marijka Batterham

Dr Marijka Batterham

Background Population health planning within a health district requires current information on health profiles of the target population. Information obtained during primary care interactions may provide a valuable surveillance system for chronic disease burden. The Sentinel Practices Data Sourcing project aimed to establish a sentinel site surveillance system to obtain a region-specific estimate of the prevalence of chronic diseases and mental health disorders within the Illawarra-Shoalhaven region of New South Wales, Australia. Methods In September 2013, de-identified information for all patient interactions within the preceding 24 months was extracted and collated using a computerised chronic disease management program that has …


Keynote: Justifying Uberveillance- The Internet Of Things And The Flawed Sustainability Premise, Katina Michael Oct 2015

Keynote: Justifying Uberveillance- The Internet Of Things And The Flawed Sustainability Premise, Katina Michael

Professor Katina Michael

Imagine a world where everything was numbered. Not just homes with street addresses, or cars with number plates, or smart phones with telephone numbers, or email addresses with passwords, but absolutely everything you could see and touch and even that which you could not. Well, that world is here, right now. This vast expanse we call “Earth” is currently being quantified and photographed, inch by inch, by satellites, street cameras, drones and high altitude balloons. Longitude and latitude coordinates provide us with the precise degrees, minutes and seconds of the physical space, and unique time stamps tell us where a …


Reflections From The Wearable Computing Conference In Toronto, Canada, Nick Rheinberger, Katina Michael, Alexander Hayes Jun 2015

Reflections From The Wearable Computing Conference In Toronto, Canada, Nick Rheinberger, Katina Michael, Alexander Hayes

Alexander Hayes Mr.

Could sports men and women who are monitored using wearable computers actually be playing to a global theatre to ensure the upkeep of their performance benchmarks instead of consciously watching and reacting to what is happening in the game they are playing? What are the social implications of heart rate monitors and GPS units now embedded into player clothing? What were some of the reflections from the IEEE ISTAS13 meeting on Wearable Computers in Every Day Life? What were some of the main messages that you walked away with from that conference? What made the greatest impression on us was …


Using A Social-Ethical Framework To Evaluate Location-Based Services In An Internet Of Things World, Roba Abbas, Katina Michael, Mg Michael May 2015

Using A Social-Ethical Framework To Evaluate Location-Based Services In An Internet Of Things World, Roba Abbas, Katina Michael, Mg Michael

Associate Professor Katina Michael

The idea for an Internet of Things has matured since its inception as a concept in 1999. People today speak openly of a Web of Things and People, and even more broadly of an Internet of Everything. As our relationships become more and more complex and enmeshed, through the use of advanced technologies, we have pondered on ways to simplify flows of communications, to collect meaningful data, and use them to make timely decisions with respect to optimisation and efficiency. At their core, these flows of communications are pathways to registers of interaction, and tell the intricate story of outputs …


Using A Social-Ethical Framework To Evaluate Location-Based Services In An Internet Of Things World, Roba Abbas, Katina Michael, Mg Michael May 2015

Using A Social-Ethical Framework To Evaluate Location-Based Services In An Internet Of Things World, Roba Abbas, Katina Michael, Mg Michael

Dr Roba Abbas

The idea for an Internet of Things has matured since its inception as a concept in 1999. People today speak openly of a Web of Things and People, and even more broadly of an Internet of Everything. As our relationships become more and more complex and enmeshed, through the use of advanced technologies, we have pondered on ways to simplify flows of communications, to collect meaningful data, and use them to make timely decisions with respect to optimisation and efficiency. At their core, these flows of communications are pathways to registers of interaction, and tell the intricate story of outputs …


Hack Or Be Hacked: The Quasi-Totalitarianism Of Global Trusted Networks, Athina Karatzogianni, Martin Gak Apr 2015

Hack Or Be Hacked: The Quasi-Totalitarianism Of Global Trusted Networks, Athina Karatzogianni, Martin Gak

Athina Karatzogianni

This article focuses on digital surveillance ideology by examining specific empirical examples drawn from media reports of the Snowden affair, in order to nuance the politics, ethics, values and affects mobilized by governments and corporate elites to justify the collect-it-all practices by a ménage à trois of “trusted” global networks. It charts this political space as a sphere of action emerging against the backdrop of what we call ‘quasi-totalitarian’ mechanisms, which are fostered by alignment, collusion and imbrication of the three trusted authoritative networks. This approach accounts for a particular vexing problem in the articulation of digital politics. That is, …


War Against Muslims Post 9/11?, Alev Dudek Mar 2015

War Against Muslims Post 9/11?, Alev Dudek

Alev Dudek

9/11 has changed the life of Muslims substantially. Almost overnight, they became the target of media-hype, various “anti-terror” efforts, religious intolerance and hate crimes.


Wer Kann Sie Erraten?, Michael Friedewald, Dara Hallinan, Philip Schütz, Paul De Hert Jan 2015

Wer Kann Sie Erraten?, Michael Friedewald, Dara Hallinan, Philip Schütz, Paul De Hert

Michael Friedewald

No abstract provided.


Developing And Testing A Surveillance Impact Assessment Methodology, David Wright, Michael Friedewald, Raphael Gellert Jan 2015

Developing And Testing A Surveillance Impact Assessment Methodology, David Wright, Michael Friedewald, Raphael Gellert

Michael Friedewald

With the increasing pervasiveness of surveillance, from big companies such as Google and Facebook, as well as from the intelligence agencies, such as the US National Security Agency (NSA) and the UK Government Communications Headquarters (GCHQ), there is a clear need for a surveillance impact assessment (SIA), a method that addresses not only issues of privacy and data protection, but also ethical, social, economic, and political issues.

The SAPIENT project, funded by the European Commission, and undertaken by a consortium of partners from several European countries, aimed to develop an SIA methodology, based on stake- holder needs and a set …


The Co-Evolution Of Surveillance Technology And Surveillance Practices, Kerstin Gooas, Michael Friedewald, William Webster, Charles Leleux Jan 2015

The Co-Evolution Of Surveillance Technology And Surveillance Practices, Kerstin Gooas, Michael Friedewald, William Webster, Charles Leleux

Michael Friedewald

No abstract provided.


Surveillance In Chicago: Growing, But For What Purpose?, Rajiv Shah Jul 2014

Surveillance In Chicago: Growing, But For What Purpose?, Rajiv Shah

Rajiv Shah

Chicago is now one of the leading cities in the world in using surveillance technology. This growth began in 2003 when cameras were used to fight street level crime. Since then, Chicago’s camera network has grown to over 25,000 units, along with the use of a variety of new technologies. This chapter explains this growth and how it affects policing.


Forum Proceedings From “Uavs: Pros Vs Cons Symposium” In Toronto, Canada, June 2013, Katina Michael Feb 2014

Forum Proceedings From “Uavs: Pros Vs Cons Symposium” In Toronto, Canada, June 2013, Katina Michael

Associate Professor Katina Michael

Unmanned Aerial Systems (UAS), widely referred to as drones, are becoming increasingly relevant in civilian as well as military applications. UAS have been used by emergency services to help respond to and map environmental crises, to find missing people, to fight fires, and respond to traffic accidents. Their use in policing and border patrol functions is being trialled in many Western countries. Like other recent technologies (mobile phones etc), as they become cheaper and easier to use, they are likely to become much more prevalent in civilian life across a range of applications.

This conference will examine the current state …


Connected: To Everyone And Everything, Katherine Albrecht, Katina Michael Dec 2013

Connected: To Everyone And Everything, Katherine Albrecht, Katina Michael

Associate Professor Katina Michael

The activist group CASPIAN (Consumers Against Supermarket Privacy Invasion and Numbering) was founded in 1999 by Katherine Albrecht, the very same year that Kevin Ashton co-founder and executive director of the then Auto-ID Center at MIT made a presentation to Proctor & Gamble with a title that included the phrase “Internet of Things”. According to Ashton, “the most numerous and important routers of all” are people but people have limitations and are not very good at capturing data about objects in the physical world. In 2001, Ashton’s automatic identification vision had become a lot clearer. At the Auto-ID Center during …


Immigration Policing And Federalism Through The Lens Of Technology, Surveillance, And Privacy, Anil Kalhan Nov 2013

Immigration Policing And Federalism Through The Lens Of Technology, Surveillance, And Privacy, Anil Kalhan

Anil Kalhan

With the deployment of technology, federal programs to enlist state and local police assistance with immigration enforcement are undergoing a sea change. For example, even as it forcefully has urged invalidation of Arizona’s S.B. 1070 and similar state laws, the Obama administration has presided over the largest expansion of state and local immigration policing in U.S. history with its implementation of the “Secure Communities” program, which integrates immigration and criminal history database systems in order to automatically ascertain the immigration status of every individual who is arrested and booked by state and local police nationwide. By 2012, over one fifth …


Panel 2- Regulation, Policy Recommendations And Responses, Jonathan Clough, Scott Mellis, Simon Brown, Graham Ingram, Alana Maurushat, Katina Michael, Jason Ryning Nov 2013

Panel 2- Regulation, Policy Recommendations And Responses, Jonathan Clough, Scott Mellis, Simon Brown, Graham Ingram, Alana Maurushat, Katina Michael, Jason Ryning

Professor Katina Michael

A roundtable to be held on cybercrime at ANU. Panel 1 to be on the changing nature of cybercrime: threat and trend update. Panel 2 on regulation, policy recommendations and responses. Panel 3 on technical measures to combat cybercrime. Panel 4 on the investigation of cybercrime and victimisation. Panel 2 to be keynoted by Keith Besgrove (DBCD) and chaired by Jonathan Clough.


The Not-So-Simple Saga Of Edward And Barack..., Michael I. Niman Ph.D. Jun 2013

The Not-So-Simple Saga Of Edward And Barack..., Michael I. Niman Ph.D.

Michael I Niman Ph.D.

It reads like a political thriller. An NSA spook, Edward Snowden, meets his conscience, blows the whistle on a massive secret attack on the Fourth Amendment, and is pursued globally by an obsessed president. Spice things up with a bit of character development cross-pollinated with a history lesson. First there’s Darth President. His administration has earned the distinction of invoking the Espionage Act of 1917 (a constitutionally questionable World War One relic) more than all other presidents in the previous 96 years combined—by a factor of two. The Obama administration has charged eight people under the act. All previous administrations …


Social Implications Of Wearable Computing And Augmediated Reality In Every Day Life (Ieee Symposium On Technology And Society, Istas13), Katina Michael Jun 2013

Social Implications Of Wearable Computing And Augmediated Reality In Every Day Life (Ieee Symposium On Technology And Society, Istas13), Katina Michael

Associate Professor Katina Michael

It was in July 2012 that Steve Mann and I corresponded on the possibility of hosting a conference on wearable computing in Toronto, Canada. Steve had just returned home from a family holiday to France and publicly blogged about an unfortunate incident that had happened to him while away. On 17th July 2012 he posted: “Physical assault by McDonald’s for wearing Digital Eye Glass”. We both knew the timing was right for such an event that was not just a technical engineering or applied orientation on the theme of smart worlds, but an event that would grapple with the dichotomies …


Strategies To Address Iodine Deficiency In Australia Require Ongoing Monitoring And Surveillance, Heather Yeatman, Karen E. Charlton Apr 2013

Strategies To Address Iodine Deficiency In Australia Require Ongoing Monitoring And Surveillance, Heather Yeatman, Karen E. Charlton

Karen E. Charlton

No abstract provided.


Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke Dec 2012

Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke

Professor Katina Michael

During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …


Was Blind But Now I See: Animal Liberation Documentaries’ Deconstruction Of Barriers To Witnessing Injustice, Carrie Packwood Freeman, Scott Tulloch Dec 2012

Was Blind But Now I See: Animal Liberation Documentaries’ Deconstruction Of Barriers To Witnessing Injustice, Carrie Packwood Freeman, Scott Tulloch

Carrie P. Freeman

Many pro-animal documentaries are built around footage taken by undercover animal activists uncovering abuses in industries such as agriculture and fishing, fur, marine parks, and biomedical research labs. This analysis explores the central role of undercover activist footage in recent documentaries: Earthlings, The Cove, The Witness, Peaceable Kingdom, Behind the Mask, Fowl Play, and Dealing Dogs. Considering both form and function, I investigate how this undercover footage works in terms of providing an inherent critique of power in our relationship with nonhuman animals – a sense of witnessing a crime that is an injustice both in terms of causing animal …


Bargaining With The Machine: A Framework For Describing Encounters With Surveillance Technologies, Robert M. Pallitto Dec 2012

Bargaining With The Machine: A Framework For Describing Encounters With Surveillance Technologies, Robert M. Pallitto

Robert M Pallitto

Relationships between surveillance and inequality (e.g., as surveillance is used for domination, as surveillance affects subjects’ life-chances) have been a central concern of surveillance studies scholars. This concern with inequalities that are produced and sustained by surveillance runs parallel to the longstanding interest of many social theorists more generally with the unequal workings of power in nominally free societies. How is inequality sustained without resort to force? Why do people consent to subjugation? Some form of ideology critique is often employed to answer such questions. However, the work of Rosen (1996) and others has cast serious doubt on the ability of …


Glogging Your Every Move, Lisa Wachsmuth, Katina Michael Nov 2012

Glogging Your Every Move, Lisa Wachsmuth, Katina Michael

Professor Katina Michael

"It is one thing to lug technologies around, another thing to wear them, and even more intrusive to bear them... But that's the direction in which we're headed."

"I think we're entering an era of person-view systems which will show things on ground level and will be increasingly relayed to others via social media.

"We've got people wearing recording devices on their fingers, in their caps or sunglasses - there are huge legal and ethical implications here."


Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael Oct 2012

Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael

Associate Professor Katina Michael

This mixed methods study with a sequential explanatory strategy explored qualitatively the statistically significant quantitative findings relative to Indian respondents’ perceptions about RFID (radio frequency identification) transponders implanted into the human body. In the first analysis phase of the study, there was a significant chi-square analysis reported (χ2 = 56.64, df = 3, p = .000) relative to the perception of small business owners (N = 453) that implanted chips are a more secure form of identification and/or access control in organizations and the respondents’ country of residence. Countries under study included Australia, India, the UK and US. The country …


Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael Jun 2012

Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael

Professor Katina Michael

Tracking and monitoring people as they operate within their personal networks benefits service providers and their constituents but involves hidden risks and costs.

Automatic identification technologies, CCTV cameras, pervasive and mobile networks, wearable computing, location-based services and social networks have traditionally served distinct purposes. However, we have observed patterns of integration, convergence and coexistence among all these innovations within the information and communication technology industry.1For example, ‘location-based social networking’ can draw on a smart phone's capacity to identify a user uniquely, locate him within 1–2m and share this information across his social network in real time. The resulting ability to …