scholarly journals Emerging Forms of Covert Surveillance Using GPS-Enabled Devices

Author(s):  
Roba Abbas ◽  
Katina Michael ◽  
M. G. Michael ◽  
Anas Aloudat

This case presents the possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non-traditional covert surveillance within a community setting, resulting in community members engaging in the covert observation of family, friends, or acquaintances. This case investigates five stakeholder relationships using scenarios to demonstrate the potential socio-ethical implications that tracking and monitoring will have on society. The five stakeholder types explored in this case include: (i) husband-wife (partner-partner), (ii) parent-child, (iii) employer-employee, (iv) friend-friend, and (v) stranger-stranger. Mobile technologies like mobile camera phones, global positioning system data loggers, spatial street databases, radio-frequency identification, and other pervasive computing can be used to gather real-time, detailed evidence for or against a given position in a given context. Limited laws and ethical guidelines exist for members of the community to follow when it comes to what is permitted when using unobtrusive technologies to capture multimedia and other data (e.g., longitude and latitude waypoints) that can be electronically chronicled. In this case, the evident risks associated with such practices are presented and explored.

Author(s):  
Roba Abbas ◽  
Katina Michael ◽  
M. G. Michael ◽  
Anas Aloudat

This case presents the possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non-traditional covert surveillance within a community setting, resulting in community members engaging in the covert observation of family, friends, or acquaintances. This case investigates five stakeholder relationships using scenarios to demonstrate the potential socio-ethical implications that tracking and monitoring will have on society. The five stakeholder types explored in this case include: (i) husband-wife (partner-partner), (ii) parent-child, (iii) employer-employee, (iv) friend-friend, and (v) stranger-stranger. Mobile technologies like mobile camera phones, global positioning system data loggers, spatial street databases, radio-frequency identification, and other pervasive computing can be used to gather real-time, detailed evidence for or against a given position in a given context. Limited laws and ethical guidelines exist for members of the community to follow when it comes to what is permitted when using unobtrusive technologies to capture multimedia and other data (e.g., longitude and latitude waypoints) that can be electronically chronicled. In this case, the evident risks associated with such practices are presented and explored.


2011 ◽  
Vol 13 (2) ◽  
pp. 19-33 ◽  
Author(s):  
Roba Abbas ◽  
Katina Michael ◽  
M. G. Michael ◽  
Anas Aloudat

This case presents the possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non-traditional covert surveillance within a community setting, resulting in community members engaging in the covert observation of family, friends, or acquaintances. This case investigates five stakeholder relationships using scenarios to demonstrate the potential socio-ethical implications that tracking and monitoring will have on society. The five stakeholder types explored in this case include: (i) husband-wife (partner-partner), (ii) parent-child, (iii) employer-employee, (iv) friend-friend, and (v) stranger-stranger. Mobile technologies like mobile camera phones, global positioning system data loggers, spatial street databases, radio-frequency identification, and other pervasive computing can be used to gather real-time, detailed evidence for or against a given position in a given context. Limited laws and ethical guidelines exist for members of the community to follow when it comes to what is permitted when using unobtrusive technologies to capture multimedia and other data (e.g., longitude and latitude waypoints) that can be electronically chronicled. In this case, the evident risks associated with such practices are presented and explored.


Author(s):  
Shu Wen Lee ◽  
Pek Hia Lai

Most governments around the world have implemented or are in the midst of implementing electronic government (e-Government). E-Government has its share of advantages, disadvantages and limitations. The rise of mobile technologies can be seen as the answer to complement e-Government. With the high adoption level of mobile devices and the rising demands for instant information and interactions with government bodies, mobile government (m-Government) is born. Unlike e-Government, m-Government is not restricted to being internet-based. Different wireless or mobile communication modes such as Short Message Service (SMS), mobile applications, and Radio Frequency Identification (RFID) have provided different avenues to implement or enhance M-Government. Both e-Government and m-Government implementations create different values for the different stakeholders. This chapter examines an e-Government and m-Government Component Assessment Cube Framework for value assessment of both e-Government and m-Government information technology project implementations. The three main groups explored in the framework are namely (value) components, stages, and stakeholders.


2010 ◽  
Vol 26 (4) ◽  
pp. 370-376 ◽  
Author(s):  
Torin Monahan ◽  
Jill A. Fisher

Objectives: The aim of this study was to assess empirically the social and ethical risks associated with implantable radio-frequency identification (RFID) devices.Methods: Qualitative research included observational studies in twenty-three U.S. hospitals that have implemented new patient identification systems and eighty semi-structured interviews about the social and ethical implications of new patient identification systems, including RFID implants.Results: The study identified three primary social and ethical risks associated with RFID implants: (i) unfair prioritization of patients based on their participation in the system, (ii) diminished trust of patients by care providers, and (iii) endangerment of patients who misunderstand the capabilities of the systems.Conclusions: RFID implants may aggravate inequalities in access to care without any clear health benefits. This research underscores the importance of critically evaluating new healthcare technologies from the perspective of both normative ethics and empirical ethics.


2015 ◽  
pp. 735-752
Author(s):  
Shu Wen Lee ◽  
Pek Hia Lai

Most governments around the world have implemented or are in the midst of implementing electronic government (e-Government). E-Government has its share of advantages, disadvantages and limitations. The rise of mobile technologies can be seen as the answer to complement e-Government. With the high adoption level of mobile devices and the rising demands for instant information and interactions with government bodies, mobile government (m-Government) is born. Unlike e-Government, m-Government is not restricted to being internet-based. Different wireless or mobile communication modes such as Short Message Service (SMS), mobile applications, and Radio Frequency Identification (RFID) have provided different avenues to implement or enhance M-Government. Both e-Government and m-Government implementations create different values for the different stakeholders. This chapter examines an e-Government and m-Government Component Assessment Cube Framework for value assessment of both e-Government and m-Government information technology project implementations. The three main groups explored in the framework are namely (value) components, stages, and stakeholders.


Author(s):  
Mary Brown

Radio Frequency Identification (RFID) technologies are becoming ubiquitous in a variety of settings and industries. The healthcare industry has adopted the use of RFID as a means of tracking equipment, managing inventory, to locating human resources including controversial applications involving injecting chips into humans as a means of authentication. There are a variety of ethical implications to the use of this technology as well as potential health concerns that will be explored in this chapter.


Author(s):  
Koong Lin ◽  
Chad Lin ◽  
Huei Leu

The need for more and more flexibility (in terms of time and location) in business operations, context-based services, decentralization of business processes, and information processing and innovative services has introduced new ubiquitous environments, sensing technologies, and pervasive devices. This new category of devices, sensors, and ubiquitous environments, has the capabilities to observe the users all the time using sensors; provide timely information to service providers using communication channels; and offer accurate services to users anywhere and anytime through tiny mobile terminals. This chapter provides the users of the pervasive business technologies an overview of the basic infrastructure and protocols used to form these ubiquitous wireless environments and provide context-based comfort, while taking care of confidentiality, secrecy, integrity, and authenticity. Along with an introduction to the markup languages, protocols, and security threats, the chapter concludes with the discussion of a range of common biometric, cryptographic, and routing solutions. The spending for RFID (radio frequency identification) has been increasing rapidly in recent years. According to Gartner, global spending on RFID is likely to reach US$3 billion by 2010 (CNET, 2005). In addition, interests continue to grow for the adoption of this mobile computing and commerce device in many different types of applications (ABI, 2006). In 2005, Wal-Mart asked its top 100 suppliers to use RFID tags, and this had a profound effect on the projected growth of RFID technology as well as potential applications in the industrial, defense, and retails sectors (Albertsons, 2004). However, very few studies have examined and evaluated the adoption of RFID options by the organizations. Organizations face various risks and uncertainties when assessing the adopted mobile technologies. Different organizations are likely to encounter different challenges and problems. This research aims to develop a mechanism that can help organizations to specify their risks and choose a suitable adoption alternative. This research has adopted the AHP (analytic hierarchy process) methodology to analyze the data, as it is useful for analyzing different RFID adoption alternatives and can assist organizations in predicting the possible issues and challenges when adopting RFID. The objectives of this article are to: (1) describe basic components of a mobile computing and commerce device, RFID; and (2) explore the current practices, issues, and applications in this mobile technology.


2013 ◽  
Vol 2013 ◽  
pp. 1-9 ◽  
Author(s):  
Mira Trebar ◽  
Metka Lotrič ◽  
Irena Fonda ◽  
Anton Pleteršek ◽  
Kosta Kovačič

Radio frequency identification (RFID) is an innovative and well-recognized technology that supports all kinds of traceability systems in many areas. It becomes very important in the food industry where the electronic systems are used to capture the data in the supply chain. Additionally, RFID data loggers with sensors are available to perform a cold chain optimization for perishable foods. This paper presents the temperature monitoring solution at the box level in the fish supply chain as part of the traceability system implemented with RFID technology. RFID data loggers are placed inside the box to measure the temperature of the product and on the box for measuring ambient temperature. The results show that the system is very helpful during the phases of storage and transportation of fish to provide the quality control. The sensor data is available immediately at the delivery to be checked on the mobile RFID reader and afterwards stored in the traceability systems database to be presented on a web to stakeholders and private consumers.


Sign in / Sign up

Export Citation Format

Share Document