Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Emerging Technologies (6)
- Disaster Recovery (4)
- Social Implications of ICT (4)
- Artificial photosynthesis (3)
- Common heritage of humanity (3)
-
- Disaster recovery (3)
- Energy policy (3)
- Governance of Global Artificial Photosynthesis (Solar Fuels and Food) (3)
- Innovation (3)
- Privacy (3)
- Renewable energy (3)
- Social capital (3)
- Solar fuels (3)
- Surveillance (3)
- Technology (3)
- Uberveillance (3)
- Countering Violent Extremism (2)
- Countering violent extremism (2)
- Critical thinking (2)
- Digital divide (2)
- Ethics (2)
- Global Positioning Systems (2)
- Information Security (2)
- Information Systems (2)
- Inquiry (2)
- Learning (2)
- Mali (2)
- National Security (2)
- Policing (2)
- Problem-solving (2)
- Publication
-
- Professor Katina Michael (16)
- Daniel P Aldrich (6)
- Thomas A Faunce (6)
- Li Tang (2)
- Stephanie Pace Marshall, Ph.D. (2)
-
- Babette Babich (1)
- Diana Hicks (1)
- Dr. Michelle M. Thompson, GISP, FRGS (1)
- Eleanor Kutz (1)
- George H Baker (1)
- Gwendolyn C.H. Bakx (1)
- James E. Prieger (1)
- Kristen A. Yarmey (1)
- Linda Liu Hand (1)
- Martin Wain (1)
- Mary-Jane Rubenstein (1)
- Paul F. Eschenfelder (1)
- Payal Arora (1)
- Saurabh Gupta (1)
- Scott J. Wallsten (1)
- Shawn C. Burdette (1)
- Yueh-Hsuan Weng (1)
- kirby farrell (1)
- File Type
Articles 1 - 30 of 50
Full-Text Articles in Social and Behavioral Sciences
Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael
Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael
Professor Katina Michael
This special section is dedicated to privacy in the information age. Since the rise of mobile social media in particular and the advent of cloud computing few can dispute that the times have changed. Privacy is now understood in context, and within a framework that is completely different to what it once was. The right to be let alone physically seemingly has been replaced by the right to give away as much information as you want virtually. What safeguards can be introduced into such a society? We cannot claim to wish for privacy as a right if we ourselves do …
Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom
Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom
Professor Katina Michael
Mobile Government Briefing: Provide services anywhere any time: - Transact to enable in-field data collection, request processing, order management, approvals, edits, updates and execute actions. - What are the implications for the incorporation of rich multimedia content on devices to better serve staff and citizens? - Addressing the security challenges of various risks around data access, data transmission, and data storage for BI architecture and mobile devices
Ieee T&S Magazine: Undergoing Transformation, Katina Michael
Ieee T&S Magazine: Undergoing Transformation, Katina Michael
Professor Katina Michael
Our Magazine is in a transformative period, not only because we are ‘Going Green’ in 2013 but because we are experiencing tremendous growth in quality international submissions. This means that we are increasingly appealing to an international audience with transdisciplinary interests. This has not gone unnoticed by the media, nor by our SSIT readership or wider engineering community.
Radio As The Voice Of God: Peace And Tolerance Radio Programming’S Impact On Norms, Daniel P. Aldrich
Radio As The Voice Of God: Peace And Tolerance Radio Programming’S Impact On Norms, Daniel P. Aldrich
Daniel P Aldrich
Observers have argued that radio programming can alter norms, especially through hate radio designed to increase animosity between groups. This article tests whether or not radio programming under the countering violent extremism (CVE) policy framework can reduce potential conflict and increase civic engagement and positive views of foreign nations. Data from surveys of more than 1,000 respondents in Mali, Chad, and Niger illuminate the ways in which peace and tolerance programming changed perspectives and altered behavior in statistically significant ways. Results show that individuals exposed to multi-level U.S. government programming were more likely to listen to peace and tolerance radio. …
Hoffman Triangle 2012: Neighborhood Profile Report, Michelle M. Thompson, Josh Baer, Rachael Bauer, Frank Carter, Patrick Coyle, Alex Depriest, Malissa Dietsch, Lawrence Guimont, Kevin Harrison, Nelson Hollings, Annabeth Mccall, Tara Mckeefry, Valerie Mcmillan, Brooke Perry, Adarian Pike, Kevin Potter
Hoffman Triangle 2012: Neighborhood Profile Report, Michelle M. Thompson, Josh Baer, Rachael Bauer, Frank Carter, Patrick Coyle, Alex Depriest, Malissa Dietsch, Lawrence Guimont, Kevin Harrison, Nelson Hollings, Annabeth Mccall, Tara Mckeefry, Valerie Mcmillan, Brooke Perry, Adarian Pike, Kevin Potter
Dr. Michelle M. Thompson, GISP, FRGS
Hoffman Triangle is located in the Central City neighborhood of New Orleans. It is bounded by South Claiborne Avenue to the South, Toledo Street and Washington Avenue to the West and Martin Luther King Jr. Boulevard to the East. It is a neighborhood that continues to evolve and significantly grow after the Hurricane Katrina in 2005. In order to support the work that the Neighborhood Development Foundation, Associated Neighborhood Development and the Hoffman Triangle Neighborhood Association are doing to improve the quality of life of all existing and future residents, WhoData.org and the University of New Orleans – Department of …
The Legal Challenges Of Networked Robotics: From The Safety Intelligence Perspective, Yueh-Hsuan Weng, Sophie T.H. Zhao
The Legal Challenges Of Networked Robotics: From The Safety Intelligence Perspective, Yueh-Hsuan Weng, Sophie T.H. Zhao
Yueh-Hsuan Weng
Social Construction Of Safety In Uas Technology In Concrete Settings: Some Military Cases Studied, Gwendolyn C.H. Bakx, James M. Nyce
Social Construction Of Safety In Uas Technology In Concrete Settings: Some Military Cases Studied, Gwendolyn C.H. Bakx, James M. Nyce
Gwendolyn C.H. Bakx
Unmanned aerial systems (UASs) in general and UAS safety in particular have so far received little attention in the science, technology and society (STS) literature. This paper therefore reports on sev- eral (military) cases of this relatively new technology, focusing specifi cally on issues of safety. Quite often, safety of technology is considered the result of a rational process – one of a series of rational, often calculative, linear steps. The paper’s results suggest that establishing safety in military UASs is very much a social process. Approaching (military) UAS safety from this perspective could perhaps be complementary to more analytical …
Glogging Your Every Move, Lisa Wachsmuth, Katina Michael
Glogging Your Every Move, Lisa Wachsmuth, Katina Michael
Professor Katina Michael
"It is one thing to lug technologies around, another thing to wear them, and even more intrusive to bear them... But that's the direction in which we're headed."
"I think we're entering an era of person-view systems which will show things on ground level and will be increasingly relayed to others via social media.
"We've got people wearing recording devices on their fingers, in their caps or sunglasses - there are huge legal and ethical implications here."
Nietzsche’S Post-Human Imperative: On The “All-Too-Human” Dream Of Transhumanism, Babette Babich
Nietzsche’S Post-Human Imperative: On The “All-Too-Human” Dream Of Transhumanism, Babette Babich
Babette Babich
No abstract provided.
The Economic Benefits Of Mobile Broadband, James Prieger
The Economic Benefits Of Mobile Broadband, James Prieger
James E. Prieger
Mobile broadband is becoming increasingly important to national economies and the personal lives of users. However, broadband availability and adoption are not diffusing as quickly in rural areas or among certain minority groups. This article updates the rural and minority digital divide. Empirical estimations of mobile broadband provision and fixed broadband usage in the US show that rural areas have fewer providers and minorities have lower usage rates. The potential for mobile broadband to benefit rural areas through economic development and urban areas through enhancing the digital inclusion of minority communities is also examined.
Building Resilience: Social Capital In Post-Disaster Recovery, Daniel Aldrich
Building Resilience: Social Capital In Post-Disaster Recovery, Daniel Aldrich
Daniel P Aldrich
Each year, natural disasters threaten the strength and stability of communities worldwide. Yet responses to the challenges of recovery vary greatly and in ways that aren’t explained by the magnitude of the catastrophe or the amount of aid provided by national governments or the international community. The difference between resilience and disrepair, as Daniel P. Aldrich shows, lies in the depth of communities’ social capital. Building Resilience highlights the critical role of social capital in the ability of a community to withstand disaster and rebuild both the infrastructure and the ties that are at the foundation of any community. Aldrich …
Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael
Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael
Professor Katina Michael
Late last year, IEEE SSIT was invited to put together a paper for the centennial edition of Proceedings of the IEEE that was published in May 2012. The paper titled, “Social Implications of Technology: The Past, the Present, and the Future,” brought together five members of SSIT with varying backgrounds, and two intense months of collaboration and exchange of ideas. I personally felt privileged to be working with Karl D. Stephan, Emily Anesta, Laura Jacobs and M.G. Michael on this project.
Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael
Professor Katina Michael
This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.
Addressing Plagiarism In A Digital Age, Eleanor Kutz, Wayne Rhodes, Stephen Sutherland, Vivian Zamel
Addressing Plagiarism In A Digital Age, Eleanor Kutz, Wayne Rhodes, Stephen Sutherland, Vivian Zamel
Eleanor Kutz
Four faculty members from UMass Boston's English Department explore possible ways of addressing the issue of plagiarism with their students as easy access to materials on the Internet is making it easier then ever to draw on others’ words, with or without appropriate documentation. Approaching faculty concerns from four complementary perspectives, the authors make the case for 1) recasting our understanding of plagiarism in terms of influence, borrowing, and remixing of the sort that is central to musical and artistic creation, 2) examining how students might develop greater awareness of the ways in which they are working with sources in …
Ambivalence And The Decision Tree, Kirby Farrell
Ambivalence And The Decision Tree, Kirby Farrell
kirby farrell
We are insolubly ambivalent creatures. Traditionally cultures have managed ambivalence by focusing on character and morality in motives. Freudian psychology recognized that cognitive conflict is insoluble and stressed equilibrium and grace in adaptation. Today technology's binary structure is complicating and sometimes superseding the traditional trope of character by organizing cognition around the trope of the decision tree.
Intermolecular Approach To Metal Ion Indicators Based On Polymer Phase Transitions Coupled To Fluorescence Resonance Energy Transfer, Shawn Burdette, Shaojun Yao, Aaron Jones, Jie Du, Randy Jackson, Justin Massing, Daniel Kennedy, Nicholas Bencivenga, Roy Planalp, W.Rudolf Seitz
Intermolecular Approach To Metal Ion Indicators Based On Polymer Phase Transitions Coupled To Fluorescence Resonance Energy Transfer, Shawn Burdette, Shaojun Yao, Aaron Jones, Jie Du, Randy Jackson, Justin Massing, Daniel Kennedy, Nicholas Bencivenga, Roy Planalp, W.Rudolf Seitz
Shawn C. Burdette
An approach to ratiometric fluorescence detection of quenching metal ions was devised by copolymerizing N-isopropylacrylamide with small percentages of bipyridine and amine monomers. The copolymer was divided into two portions. The amine group on one portion was functionalized with AlexaFluor555 (donor fluorophore) and the other with AlexaFluor647 (acceptor fluorophore). The indicator consists of a mixture of these two portions. Aggregation above the lower critical solution temperature (LCST) of this copolymer brings about a large increase in fluorescence resonance energy transfer (FRET). Addition of Cu(II) and other complexing metal ions to the aggregated copolymer introduces charge onto the backbone, causing the …
Blessed Unrest: The Power Of Unreasonable People To Change The World, Stephanie Pace Marshall
Blessed Unrest: The Power Of Unreasonable People To Change The World, Stephanie Pace Marshall
Stephanie Pace Marshall, Ph.D.
In her keynote address at the 2008 NCSSSMST Professional Conference, Dr. Stephanie Pace Marshall addresses what work can be done with the collective resources of its Consortium members which beg to be shared and connected--and also explores what the source of "...our Blessed Unrest that will give us the courage to become unreasonable advocates for our children and for STEM transformation?"
Stem Talent: Moving Beyond Traditional Boundaries, Stephanie Pace Marshall
Stem Talent: Moving Beyond Traditional Boundaries, Stephanie Pace Marshall
Stephanie Pace Marshall, Ph.D.
The future well-being, prosperity and sustainability of our nation, the global community and our planet resides in igniting and nurturing decidedly different STEM minds that can advance both the new STEM frontier and the human future.
Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael
Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael
Professor Katina Michael
Hacking: The Next Generation demonstrates just how hackers continue to exploit “back doors”. New ways of working and new ways of communicating have meant that the number of attack vectors continue to rise rapidly. This provides hackers with a greater number of opportunities to penetrate systems using blended approaches while organizations struggle to come up to speed with the latest technology developments and commensurate security capabilities. Dealing with anticipated threats is a lot harder than dealing with known threats.
George Gilbert Pond And The Preservation Of Priestley House, Kristen A. Yarmey, Anthony Cianchetta
George Gilbert Pond And The Preservation Of Priestley House, Kristen A. Yarmey, Anthony Cianchetta
Kristen A. Yarmey
Display prepared for the Friends of Priestley House. George Gilbert Pond, a longtime and legendary professor of chemistry at Penn State, saved Priestley House from destruction by purchasing it at an auction in 1919. Since then, Penn State chemists have played a role in ensuring its long term preservation. Graphic design by Anthony Cianchetta. Photos courtesy of the Penn State University Archives and the Friends of Priestley House.
Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael
Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael
Professor Katina Michael
Tracking and monitoring people as they operate within their personal networks benefits service providers and their constituents but involves hidden risks and costs.
Automatic identification technologies, CCTV cameras, pervasive and mobile networks, wearable computing, location-based services and social networks have traditionally served distinct purposes. However, we have observed patterns of integration, convergence and coexistence among all these innovations within the information and communication technology industry.1For example, ‘location-based social networking’ can draw on a smart phone's capacity to identify a user uniquely, locate him within 1–2m and share this information across his social network in real time. The resulting ability to …
Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat
Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat
Professor Katina Michael
Location based social networking (LBSN) applications are part of a new suite of social networking tools. LBSN is the convergence between location based services (LBS) and online social networking (OSN). LBSN applications offer users the ability to look up the location of another “friend” remotely using a smart phone, desktop or other device, anytime and anywhere. Users invite their friends to participate in LBSN and there is a process of consent that follows. This paper explores the potential impact of LBSN upon trust in society. It looks at the willingness of individuals to share their location data with family, friends, …
Editorial: The Idio-Technopolis, Katina Michael
Editorial: The Idio-Technopolis, Katina Michael
Professor Katina Michael
The rapid rise of social media has brought with it an emphasis on the distinct dimensions of the whole person. Social media recognises that the individual has a personal network of extensions- a home life, a work life, a social life, a study life, a hobbyist life, and much more- some of these identities even hidden from full view. Each of these online value networks are now accessible by big business, where opinion leaders and early adopters are easily distinguishable, and where brand commentary between consumers matters manifold more than any form of targeted advertising.
The Politics Of Natural Disasters (Pre-Print), Daniel P. Aldrich
The Politics Of Natural Disasters (Pre-Print), Daniel P. Aldrich
Daniel P Aldrich
Political scientists, sociologists, geographers, anthropologists, economists, and historians have studied disaster recovery, best practices in disaster response, the role of the government in rebuilding, and so forth. This annotated bibliography illuminates representative examples of the interdisciplinary work in this vast academic subfield.
Cosmic Singularities: On The Nothing And The Sovereign, Mary-Jane Rubenstein
Cosmic Singularities: On The Nothing And The Sovereign, Mary-Jane Rubenstein
Mary-Jane Rubenstein
Until very recently, the creation myth of secular modernity has been the hot big bang hypothesis: the explosion of our single universe out of a single point. Physicists concede that in its traditional form, this story performs an uncanny recapitulation of Christian creation theology: the universe bursts forth suddenly, in a flood of light, out of nothing. As many contemporary thinkers have argued, however, the “nothing” of Christian orthodoxy is neither scripturally nor doctrinally self-evident; rather, it is the product of ontopolitical efforts to secure the sovereignty of God. This article traces the twinned concepts of sovereignty and nothingness through …
Emp And Geomagnetic Storm Protection Of Critical Infrastructure, George H. Baker Iii
Emp And Geomagnetic Storm Protection Of Critical Infrastructure, George H. Baker Iii
George H Baker
EMP and solar storm wide geographic coverage and ubiquitous system effects beg the question of “Where to begin?” with protection efforts. Thus, in addressing these “wide area electromagnetic (EM) effects,” we must be clever in deciding where to invest limited resources. Based on simple risk analysis, the electric power and communication infrastructures emerge as the highest priority for EM protection. Programs focused on these highest risk infrastructures will go a long way in lessoning societal impact. Given the national scope of the effects, such programs must be coordinated at the national level but implemented at local level. Because wide-area EM …
Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta
Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta
Professor Katina Michael
The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in these trends. …
Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael
Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael
Professor Katina Michael
Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.
The Technological Trajectory Of The Automatic Identification Industry: The Application Of The Systems Of Innovation (Si) Framework For The Characterisation And Prediction Of The Auto-Id Industry, Katina Michael
Professor Katina Michael
Traditionally the approach used to analyse technological innovation focused on the application of the techno-economic paradigm with the production function as its foundation. This thesis explores the rise of the evolutionary paradigm as a more suitable conceptual approach to investigating complex innovations like automatic identification (auto-ID) devices. Collecting and analysing data for five auto-ID case studies, (bar codes, magnetic-stripe cards, smart cards, biometrics and RF/ID transponders), it became evident that a process of migration, integration and convergence is happening within the auto-ID technology system (TS). The evolution of auto-ID is characterised by a new cluster of innovations, primarily emerging through …
Integrating Value-Driven Feedback And Recommendation Mechanisms Into Business Intelligence Systems, Byron Keating, Tim Coltman, Michael Katina, Valeria Baker
Integrating Value-Driven Feedback And Recommendation Mechanisms Into Business Intelligence Systems, Byron Keating, Tim Coltman, Michael Katina, Valeria Baker
Professor Katina Michael
Most leading organizations, in all sectors of industry, commerce and government are dependent upon
ERP for their organizational survival. Yet despite the importance of the decision to adopt ERP and its
impact on the entire firm’s performance the IT literature has been in the large part silent on the nature
of the ERP investment decision. This study is the first of its kind to determine the preference structure
of senior managers around the organizational benefits and risks of adopting ERP. We present the
results which provide interesting insights into how managers’ perceive the benefit and risk factors
salient to the …