Emerging forms of Covert Surveillance Using GPS-Enabled Devices

被引:15
作者
Abbas, Roba [1 ]
Michael, Katina [2 ]
Michael, M. G. [3 ]
Aloudat, Anas [4 ]
机构
[1] Univ Wollongong, Informat & Commun Technol, Business Informat Syst, Wollongong, NSW, Australia
[2] Univ Wollongong, Fac Informat, Informat & Commun Technol, Philosophy, Wollongong, NSW, Australia
[3] Univ Wollongong, Sch Informat Syst & Technol, Wollongong, NSW, Australia
[4] Univ Wollongong, Fac Informat, Sch Informat Syst & Technol, Informat Syst & Technol,Philosophy, Wollongong, NSW, Australia
关键词
Behavioral Tracking; Breadcrumb; Covert Surveillance; GPS; Location-Based Services; People; Relationships; Scenarios; Smart Phones; Socio-Ethical Implications; Trust;
D O I
10.4018/jcit.2011040102
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This case presents the possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non-traditional covert surveillance within a community setting, resulting in community members engaging in the covert observation of family, friends, or acquaintances. This case investigates five stakeholder relationships using scenarios to demonstrate the potential socio-ethical implications that tracking and monitoring will have on society. The five stakeholder types explored in this case include: (i) husband-wife (partner-partner), (ii) parent-child, (iii) employer-employee, (iv) friend-friend, and (v) stranger-stranger. Mobile technologies like mobile camera phones, global positioning system data loggers, spatial street databases, radio-frequency identification, and other pervasive computing can be used to gather real-time, detailed evidence for or against a given position in a given context. Limited laws and ethical guidelines exist for members of the community to follow when it comes to what is permitted when using unobtrusive technologies to capture multimedia and other data (e.g., longitude and latitude waypoints) that can be electronically chronicled. In this case, the evident risks associated with such practices are presented and explored.
引用
收藏
页码:19 / 33
页数:15
相关论文
共 22 条
[1]  
Barkhuus L., 2003, P 9 IFIP TC13 INT C, V3, P702
[2]  
Barreras A., 2007, CONVENIENT INVASIVE, P176
[3]   Social Network Sites: Definition, History, and Scholarship [J].
Boyd, Danah M. ;
Ellison, Nicole B. .
JOURNAL OF COMPUTER-MEDIATED COMMUNICATION, 2007, 13 (01) :210-230
[4]  
Chen Jengchung V., 2007, Information Communication & Society, V10, P488, DOI 10.1080/13691180701560002
[5]   Geoslavery [J].
Dobson, JE ;
Fisher, PF .
IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2003, 22 (01) :47-52
[6]   Big Brother has evolved [J].
Dobson, Jerome E. .
NATURE, 2009, 458 (7241) :968-968
[7]  
Ferenczi P. M., 2009, LAPTOP MAGAZINE FEB, P98
[8]  
Herbert W. A., 2006, IS J LAW POLICY INFO, V2, P409
[9]  
Herbert WA, 2010, INT SYMP TECHNOL SOC, P300, DOI 10.1109/ISTAS.2010.5514626
[10]  
Iqbal M. U., 2003, J INT COMMERCIAL LAW, V3, P178