


default search action
ISTAS 2010: Wollongong, NSW, Australia
- Katina Michael:

2010 IEEE International Symposium on Technology and Society, ISTAS 2010, Wollongong, NSW, Australia, June 7-9, 2010. IEEE 2010, ISBN 978-1-4244-7777-7 - Carole McCartney

:
'Of weighty reasons and indiscriminate blankets: The retention of DNA for forensic purposes'. 1-8 - Roger Clarke

:
Cyborg rights. 9-22 - Michael G. Michael:

Demystifying the number of the beast in the book of revelation: Examples of ancient cryptology and the interpretation of the "666" conundrum. 23-41 - John Weckert:

In defence of the precautionary principle. 42-47 - Katina Michael

:
The legal, social and ethical controversy of the collection and storage of fingerprint profiles and DNA samples in forensic science. 48-60 - Mark Gasson:

Human Enhancement: Could you become infected with a computer virus? 61-68 - Lyria Bennett Moses

:
Regulating beyond nanotechnology do nano-specific problems require nano-specific solutions? 68-75 - Roba Abbas

:
An approach to studying location-based services regulation in Australia. 77-86 - Jennifer A. Heath:

Emerging consumers view of secondary uses of medical data. 87-95 - Mark Burdon

, Rouhshi Low
, Jason Reid:
If it's encrypted its secure! The viability of US state-based encryption exemptions. 96-102 - Stanislav Kurkovsky

, Ewa Syta, Bernardo Casano:
Continuous RFID-enabled authentication and its privacy implications. 103-110 - Shiro Uesugi

, Hitoshi Okada
, Toko Sasaki:
The impact of personality on acceptance of privacy-sensitive technologies: A comparative study of RFID and finger vein authentication systems. 111-122 - Lucy Resnyansky

:
The ICTs-mediated collaboration as a system of social activity. 123-137 - Malik Aleem Ahmed:

Equilibrium for CMC systems' alteration - An intercultural perspective. 138-144 - Indrawati

, San Murugesan
, Murali Raman:
3G Mobile multimedia services (MMS) utilization in Indonesia: An exploratory research. 145-155 - Sarah Jean Fusco, Katina Michael

, Michael G. Michael:
Using a social informatics framework to study the effects of location-based social networking on relationships between people: A review of literature. 157-171 - Samuel Fosso Wamba

, Alison Wicks:
RFID deployment and use in the dairy value chain: Applications, current issues and future research directions. 172-179 - William Ching, Rue Jing Teh, Binghao Li

, Chris Rizos
:
Uniwide WiFi based positioning system. 180-189 - Judith A. Symonds, John Ayoade:

The RFID tag pictorial glossary project. 190-195 - Sophie Nichol:

Emergence of creativity in learning via social technologies. 196-204 - Eva Cheng

, Stephen J. Davis, Ian S. Burnett
, Christian H. Ritz
:
The role of experts in social media - Are the tertiary educated engaged? 205-212 - Daniel Oost:

A potential loss of trust as a result of the conflicting messages within information security research. 213-219 - Peter Goldschmidt:

Surveillance monitoring and information assurance work systems. 220-226 - Iván Pau de la Cruz, Celia Fernández Aller

, Sergio Sánchez García, Justo Carracedo Gallardo:
A careful design for a tool to detect child pornography in P2P networks. 227-233 - Darren Palmer, Ian Warren, Peter Miller:

ID scanners in the night time economy. 234-241 - Katina Michael

, Michael G. Michael:
The diffusion of RFID implants for access control and epayments: A case study on Baja Beach Club in Barcelona. 242-252 - Lucy Resnyansky

:
Online identity as a semiotic phenomenon. 253-259 - Yinan Yang, Edward Lewis, Jan Newmarch:

Profile-based digital identity management - a better way to combat fraud. 260-267 - Emilia Pérez Belleboni, Sergio Sánchez García, Justo Carracedo Gallardo, Ana Gómez Oliva

:
Digital identity applied to telematic voting involving European citizens. Social and legal implications. 268-274 - Mohd Heikal Husin

, Paula M. C. Swatman:
Removing the barriers to enterprise 2.0. 275-283 - Jonathan Marshall

, Didar Zowghi
:
Software and the social production of disorder. 284-291 - David Wallace:

Practitioner accountability and decision-making technology. 292-299 - William A. Herbert:

Workplace consequences of electronic exhibitionism and voyeurism. 300-308 - Jeff Robbins:

GPS navigation... but what is it doing to us? 309-318 - Melissa de Zwart

, Michael Henderson
, Michael Phillips
, David Lindsay
:
'I like, stalk them on Facebook': Teachers' 'privacy' and the risks of social networking sites. 319-326 - Maria Claudia Buzzi

, Marina Buzzi
, Barbara Leporini, Fahim Akhter:
Is Facebook really "open" to all? 327-336 - Katherine Albrecht:

Microchip-induced tumors in laboratory rodents and dogs: A review of the literature 1990-2006. 337-349 - Hamed Ketabdar, Matti Lyra:

System and methodology for using mobile phones in live remote monitoring of physical activities. 350-356 - Roba Abbas

:
Location-based services: An examination of user attitudes and socio-ethical scenarios. 357-365 - Gordon A. Gow

, Nuwan Waidyanatha, Pushpa Mary Vincy:
Using mobile phones in a Real-Time Biosurveillance Program: Lessons from the frontlines in Sri Lanka and India. 366-374 - Noushin Laila Ansari, Md. Mahfuz Ashraf, Bushra Tahseen Malik, Helena Grunfeld:

Green IT awareness and practices: Results from a field study on mobile phone related e-waste in Bangladesh. 375-383 - Greg Adamson

:
One hundred reasons socially beneficial technology might not work. 384-398 - Marcus R. Wigan

:
Identity, contestability and ethics of unified virtualisation of society. 399-405 - Anas Aloudat

, Yehia Ibrahim Alzoubi:
Rankings of importance of location-based services utilisation for emergency management. 406-410 - Rouhshi Low

, Mark Burdon
, Sharon Christensen
, William D. Duncan, Paul Barnes
, Ernest Foo
:
Protecting the protectors: Legal liabilities from the use of Web 2.0 for Australian disaster response. 411-418 - Mark B. Freeman

, Alison Freeman:
Bonding over bushfires: Social networks in action. 419-426 - Michael Victor Arnold, Greg Adamson

:
A critique of privacy. 427-434 - Gayle Porter:

Alleviating the "dark side" of smart phone use. 435-440 - Stanislav Kurkovsky

, Ewa Syta:
Digital natives and mobile phones: A survey of practices and attitudes about privacy and security. 441-449 - Ahmed Al-Hmouz, Alison Freeman:

Learning on location: An adaptive mobile learning content framework. 450-456 - Miquel Oliver

, Johan Zuidweg, Michail Batikas
:
Wireless Commons against the digital divide. 457-465 - Andrew Whelan

:
'Extreme' music and graphic representation online. 466-474 - Hilary Davis

, Michael Victor Arnold, Martin R. Gibbs, Bjorn Nansen
:
Time, technology, and the rhythms of daily life. 475-479 - Eloy Portillo, Pedro Costa:

The role of technological acceleration in the crisis of modernity: A view by Paul Virilio. 480-483 - Sergio Sánchez, Emilia Pérez Belleboni, Ana Gómez Oliva

, Justo Carracedo Gallardo:
Social and legal implications of digital identity in a multi-national environment. 484-490 - Hendrik Opdebeeck:

Technology and overcoming the vulnerabilities of human life. Orpheus as a metaphor for man confronted with the impact of technology. 491-497 - Amal Graafstra, Katina Michael

, Michael G. Michael:
Social-technical issues facing the humancentric RFID implantee sub-culture through the eyes of Amal Graafstra. 498-516

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














