default search action
ISTAS 2010: Wollongong, NSW, Australia
- Katina Michael:
2010 IEEE International Symposium on Technology and Society, ISTAS 2010, Wollongong, NSW, Australia, June 7-9, 2010. IEEE 2010, ISBN 978-1-4244-7777-7 - Carole McCartney:
'Of weighty reasons and indiscriminate blankets: The retention of DNA for forensic purposes'. 1-8 - Roger Clarke:
Cyborg rights. 9-22 - Michael G. Michael:
Demystifying the number of the beast in the book of revelation: Examples of ancient cryptology and the interpretation of the "666" conundrum. 23-41 - John Weckert:
In defence of the precautionary principle. 42-47 - Katina Michael:
The legal, social and ethical controversy of the collection and storage of fingerprint profiles and DNA samples in forensic science. 48-60 - Mark Gasson:
Human Enhancement: Could you become infected with a computer virus? 61-68 - Lyria Bennett Moses:
Regulating beyond nanotechnology do nano-specific problems require nano-specific solutions? 68-75 - Roba Abbas:
An approach to studying location-based services regulation in Australia. 77-86 - Jennifer A. Heath:
Emerging consumers view of secondary uses of medical data. 87-95 - Mark Burdon, Rouhshi Low, Jason Reid:
If it's encrypted its secure! The viability of US state-based encryption exemptions. 96-102 - Stanislav Kurkovsky, Ewa Syta, Bernardo Casano:
Continuous RFID-enabled authentication and its privacy implications. 103-110 - Shiro Uesugi, Hitoshi Okada, Toko Sasaki:
The impact of personality on acceptance of privacy-sensitive technologies: A comparative study of RFID and finger vein authentication systems. 111-122 - Lucy Resnyansky:
The ICTs-mediated collaboration as a system of social activity. 123-137 - Malik Aleem Ahmed:
Equilibrium for CMC systems' alteration - An intercultural perspective. 138-144 - Indrawati, San Murugesan, Murali Raman:
3G Mobile multimedia services (MMS) utilization in Indonesia: An exploratory research. 145-155 - Sarah Jean Fusco, Katina Michael, Michael G. Michael:
Using a social informatics framework to study the effects of location-based social networking on relationships between people: A review of literature. 157-171 - Samuel Fosso Wamba, Alison Wicks:
RFID deployment and use in the dairy value chain: Applications, current issues and future research directions. 172-179 - William Ching, Rue Jing Teh, Binghao Li, Chris Rizos:
Uniwide WiFi based positioning system. 180-189 - Judith A. Symonds, John Ayoade:
The RFID tag pictorial glossary project. 190-195 - Sophie Nichol:
Emergence of creativity in learning via social technologies. 196-204 - Eva Cheng, Stephen J. Davis, Ian S. Burnett, Christian H. Ritz:
The role of experts in social media - Are the tertiary educated engaged? 205-212 - Daniel Oost:
A potential loss of trust as a result of the conflicting messages within information security research. 213-219 - Peter Goldschmidt:
Surveillance monitoring and information assurance work systems. 220-226 - Iván Pau de la Cruz, Celia Fernández Aller, Sergio Sánchez García, Justo Carracedo Gallardo:
A careful design for a tool to detect child pornography in P2P networks. 227-233 - Darren Palmer, Ian Warren, Peter Miller:
ID scanners in the night time economy. 234-241 - Katina Michael, Michael G. Michael:
The diffusion of RFID implants for access control and epayments: A case study on Baja Beach Club in Barcelona. 242-252 - Lucy Resnyansky:
Online identity as a semiotic phenomenon. 253-259 - Yinan Yang, Edward Lewis, Jan Newmarch:
Profile-based digital identity management - a better way to combat fraud. 260-267 - Emilia Pérez Belleboni, Sergio Sánchez García, Justo Carracedo Gallardo, Ana Gómez Oliva:
Digital identity applied to telematic voting involving European citizens. Social and legal implications. 268-274 - Mohd Heikal Husin, Paula M. C. Swatman:
Removing the barriers to enterprise 2.0. 275-283 - Jonathan Marshall, Didar Zowghi:
Software and the social production of disorder. 284-291 - David Wallace:
Practitioner accountability and decision-making technology. 292-299 - William A. Herbert:
Workplace consequences of electronic exhibitionism and voyeurism. 300-308 - Jeff Robbins:
GPS navigation... but what is it doing to us? 309-318 - Melissa de Zwart, Michael Henderson, Michael Phillips, David Lindsay:
'I like, stalk them on Facebook': Teachers' 'privacy' and the risks of social networking sites. 319-326 - Maria Claudia Buzzi, Marina Buzzi, Barbara Leporini, Fahim Akhter:
Is Facebook really "open" to all? 327-336 - Katherine Albrecht:
Microchip-induced tumors in laboratory rodents and dogs: A review of the literature 1990-2006. 337-349 - Hamed Ketabdar, Matti Lyra:
System and methodology for using mobile phones in live remote monitoring of physical activities. 350-356 - Roba Abbas:
Location-based services: An examination of user attitudes and socio-ethical scenarios. 357-365 - Gordon A. Gow, Nuwan Waidyanatha, Pushpa Mary Vincy:
Using mobile phones in a Real-Time Biosurveillance Program: Lessons from the frontlines in Sri Lanka and India. 366-374 - Noushin Laila Ansari, Md. Mahfuz Ashraf, Bushra Tahseen Malik, Helena Grunfeld:
Green IT awareness and practices: Results from a field study on mobile phone related e-waste in Bangladesh. 375-383 - Greg Adamson:
One hundred reasons socially beneficial technology might not work. 384-398 - Marcus R. Wigan:
Identity, contestability and ethics of unified virtualisation of society. 399-405 - Anas Aloudat, Yehia Ibrahim Alzoubi:
Rankings of importance of location-based services utilisation for emergency management. 406-410 - Rouhshi Low, Mark Burdon, Sharon Christensen, William D. Duncan, Paul Barnes, Ernest Foo:
Protecting the protectors: Legal liabilities from the use of Web 2.0 for Australian disaster response. 411-418 - Mark B. Freeman, Alison Freeman:
Bonding over bushfires: Social networks in action. 419-426 - Michael Victor Arnold, Greg Adamson:
A critique of privacy. 427-434 - Gayle Porter:
Alleviating the "dark side" of smart phone use. 435-440 - Stanislav Kurkovsky, Ewa Syta:
Digital natives and mobile phones: A survey of practices and attitudes about privacy and security. 441-449 - Ahmed Al-Hmouz, Alison Freeman:
Learning on location: An adaptive mobile learning content framework. 450-456 - Miquel Oliver, Johan Zuidweg, Michail Batikas:
Wireless Commons against the digital divide. 457-465 - Andrew Whelan:
'Extreme' music and graphic representation online. 466-474 - Hilary Davis, Michael Victor Arnold, Martin R. Gibbs, Bjorn Nansen:
Time, technology, and the rhythms of daily life. 475-479 - Eloy Portillo, Pedro Costa:
The role of technological acceleration in the crisis of modernity: A view by Paul Virilio. 480-483 - Sergio Sánchez, Emilia Pérez Belleboni, Ana Gómez Oliva, Justo Carracedo Gallardo:
Social and legal implications of digital identity in a multi-national environment. 484-490 - Hendrik Opdebeeck:
Technology and overcoming the vulnerabilities of human life. Orpheus as a metaphor for man confronted with the impact of technology. 491-497 - Amal Graafstra, Katina Michael, Michael G. Michael:
Social-technical issues facing the humancentric RFID implantee sub-culture through the eyes of Amal Graafstra. 498-516
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.