JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for SURVEILLANCE Archives


SURVEILLANCE Archives

SURVEILLANCE Archives


SURVEILLANCE@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

SURVEILLANCE Home

SURVEILLANCE Home

SURVEILLANCE  August 2010

SURVEILLANCE August 2010

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

Call for Book Chapters: New Title

From:

Katina Michael <[log in to unmask]>

Reply-To:

Katina Michael <[log in to unmask]>

Date:

Fri, 20 Aug 2010 10:26:51 +1000

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (217 lines)

Dear Surveillance List Members,

Please find below a call for book chapters for the title: "Uberveillance and the Social Implications of Microchip Implants: Emerging Technologies".

http://www.igi-global.com/AuthorsEditors/AuthorEditorResources/CallForBookChapters/CallForChapterDetails.aspx?CallForContentId=34694c1f-d796-4490-88c5-289f3bff2f6f

Uberveillance and the Social Implications of Microchip Implants: Emerging Technologies 
Editors: 
Associate Professor Katina Michael and Dr M.G. Michael
University of Wollongong, NSW, Australia

Call for Chapters: 
Proposals Submission Deadline: September 15, 2010
Introduction
Uberveillance can be defined as an omnipresent electronic surveillance facilitated by technology that makes it possible to embed surveillance devices in the human body. These embedded technologies can take the form of traditional pacemakers, radio-frequency identification (RFID) tag and transponder implants, biomems and nanotechnology devices.

Uberveillance has to do with the fundamental who (ID), where (location), and when (time) questions in an attempt to derive why (motivation), what (result), and even how (method/plan/thought). Uberveillance can be a predictive mechanism for a person’s expected behavior, traits, likes, or dislikes based on historical fact; or it can be about real-time measurement and observation; or it can be something in between. 

The inherent problem with uberveillance is that facts do not always add up to truth, and predictions based on uberveillance are not always correct. Uberveillance is more than closed circuit television feeds, or cross-agency databases linked to national identity cards, or biometrics and ePassports used for international travel. Uberveillance is the sum total of all these types of surveillance and the deliberate integration of an individual’s personal data for the continuous tracking and monitoring of identity, location, and condition in real time. 

In its ultimate form, uberveillance has to do with more than automatic identification technologies that we carry with us. It has to do with under-the-skin technology that is embedded in the body, such as microchip implants; it is that which cuts into the flesh – a charagma (mark). Think of it as Big Brother on the inside looking out. Like a black box embedded in the body which records and transmits specific measures. This charagma is virtually meaningless without the hybrid network architecture that supports its functionality: making the person a walking online node. We are referring here, to the lowest common denominator, the smallest unit of tracking – presently a tiny chip inside the body of a human being. This is opposed to other forms of spatial units such as satellite imagery, street views, or even cadastre blocks.

Objective of the Book
This book will aim to equip the wider community with information about the technological trajectory of RFID implants through exclusive primary interviews, case studies, literature reviews, ethnographies and frameworks supporting emerging technologies. The book will also provide professionals who are engaged in the development of emerging technologies with current and predicted social implications of human-centric technologies. In the context of innovation these findings should inform business system product/process life cycles through a feedback mechanism. The book will also be useful to professionals overseeing the evolution of the legal, policy and technology trichotomy in a given jurisdiction (e.g. the introduction of laws and regulations to stipulate the rights of individuals). The objective of the book is to develop an understanding of uberveillance (both in its emerging and ultimate forms) in a variety of application areas (medical, retail, policing etc).

Target Audience
The target audience of this book will be composed of professionals and researchers working in the field of emerging technologies, law and social policy including, e.g. information and communication sciences, administrative sciences and management, sociology, law and regulation, computer science, and information technology, policy, government, political science. Moreover, the book will provide insights and support to every day citizens who may be questioning the trajectory of micro and miniature technologies or the potential for humans to be embedded with electro-magnetic devices. Body wearable technologies are also of relevance, as they will act as complementary innovations to various forms of implants.

Recommended topics include, but are not limited to, the following:

Concepts, Theories and Frameworks
Uberveillance in context (e.g. retail, policing, medical)
Microchip implants, wearables and sousveillance
Electrophorus (bearers of technology) vs cyborgs (part man, part machine)
Defining uberveillance (concepts, frameworks and emerging theories)
Studies related to surveillance, dataveillance, sousveillance and uberveillance
From Orwell to Kafka- understanding RFID implants

Interviews
RFID implant pioneers
RFID implants in performance art
Motivations for implants (embedded systems) vs wearables
Titanium-based fashion implantables

Case Studies
Case studies on RFID implantees (e.g. exclusive primary interviews)
Case studies on RFID implant trials (e.g. Baja Beach Club)
Case studies on RFID vendors and resellers (e.g. Positive ID)
RFID implants for tourism and travel (the future of epassports)

Applications
RFID implants in subjects (people and animals)
RFID implants for physical access control
RFID implants in livestock and total farm management practices
ePayment and eBanking solutions using RFID implants
RFID implants and national security
RFID implants in natural disasters and national security (e.g. tagging victims)
RFID implants and archeological digs (e.g. tagging bones and parts)
Convenience solutions using RFID implants (e.g. social living)
RFID implants in pubs and clubs

Medical Applications
RFID implants and condition monitoring (e.g. wander alerts for Alzheimer’s)
Cochlear implants, retina implants, brain implants, contraceptive implants
Deep brain stimulation and other pacemakers
Therapeutic devices, micro nanotechnology, biomems
Microchip implants for drug delivery (e.g. diabetes)
RFID implants for medical applications (e.g. healthcare Identifiers)

Stakeholders
RFID and non government organizations (NGOs)
RFID implants and advocacy
The RFID implant value chain
Pioneering adopters of RFID implants for business
The Role of the Food and Drug Administration
The Role of CASPIAN
VeriChip/Positive ID
Manufacturers of RFID Transponders and Tags for Humans and Livestock/Pets
RFID Implantees

Hardware/Software/Business Information Systems/Process
Security issues and RFID implants
RFID implant hardware (transponders, tags, access devices)
RFID implants and upgrades
Technological integration and convergence: RFID implants, Mobile & GPS
Vendor perspectives on RFID implants (e.g. commercial investment)
RFID implant locations (upper arm, forearm, wrist, thumb, head, leg, foot)
Logistical issues with implanting patrons
RFID implants and the internet of things
Standards and defacto conventions

Social Implications
Social implications of uberveillance (e.g. the prospect of digital divide)
Privacy implications of uberveillance (e.g. consent, opt-in/out, control)
RFID implants and human rights
Health concerns
Who owns your identity (and your information)?
Real-time location capability
Policy development
Consumer willingness to adopt RFID implants
Surveillance, super-surveillance, exaggerated surveillance
Unauthorised monitoring and observation
Information manipulation, misrepresentation, misuse, absence of context
Omniscience vs omnipresence

Laws and Regulations, Codes of Conduct
Liability and responsibility
The pros and cons of state antichipping laws
Case law related to tracking and monitoring
Regulating the RFID implant industry
RFID implant ethics and codes of conduct
RFID implants and minors
Extended supervision orders for parolees and GPS anklets
Law enforcement and people tracking (extended supervision orders)
Policing and search warrants
Uberveillance in various markets
Compulsory chipping for pets

Innovation Studies
Innovations in manufacturing RFID tags and transponders
Understanding cultural change in technology adoption
High-tech innovation diffusion studies 
The value proposition for RFID implants
Future scenarios
The trajectory of RFID implants
Cultural differences in RFID implant acceptance (nationality, gender, age)
The prospects of nanotechnology
The limits of innovation- breakthrough technologies and their impact
The hype and the hope of RFID implants
Quantitative Forecast of the RFID implant market
Methodological approaches in the study of radical innovations

History
The history of RFID implants
From the ENIAC to the Microchip implant

Emerging Technologies
Point of View technologies
Location-enabled body wearables
Emerging automatic identification techniques- biometrics, DNA
Ambient intelligence, ubicomp, context-aware, ubiquitous computing
RFID implants and geographic information systems
RFID data management
Location-based services (not merely StreetView but PeopleView)
Location based social networking (what are you doing and where)
GPS vehicle trackers, telematics, fleet management and 24x7 observation 

Other
RFID implants in the science fiction genre (e.g. film, books, music etc)
RFID implants and surveillance (e.g. the prospect of tracking and monitoring)
Religious implications of RFID implants (e.g. interpretations of the Book of Revelation)
Transhumanism and RFID implants

Submission Procedure
Researchers, practitioners and members of the general public are invited to submit on or before September 15, 2010, a 2 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified by November 10, 2010 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by January 30, 2011. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.  

Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science Reference” imprints. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2011.

Important Dates
September 15, 2010: Proposal Submission Deadline
November 10, 2010: Notification of Acceptance
January 30, 2011: Full Chapter Submission
March 1, 2011:  Review Results Returned
May 1, 2011:  Final Chapter Submission

Editorial Advisory Board Members: 
Ms Roba Abbas, University of Wollongong, Australia
Dr Greg Adamson, University of Melbourne, Australia
Dr Katherine Albrecht, CASPIAN, United States
Mr Anas Aloudat, University of Wollongong, Australia
Dr Michael V Arnold, University of Melbourne, Australia
Ms Emilia Belleboni, Universidad Politecnica de Madrid, Spain
Professor Rafael Capurro, University of Wisconsin-Milwaukee, United States
Professor Kenneth Foster, University of Pennsylvania, United States
Mr Amal Graafstra, Amal.net, United States
Associate Professor Mireille Hildebrandt, Erasmus University Rotterdam, Netherlands
Associate Professor Peter Hyland, University of Wollongong, Australia
Mr Nicholas Huber, Accenture, Australia (for identification purposes only)
Ms Indrawati, Institut Manajemen Telkom, Indonesia
Dr Eleni Kosta, K.U.Leuven, Belgium
Professor Ronald Leenes, Tilburg University, The Netherlands
Associate Professor Avner Levin, Ryerson University, Canada
Professor Michael Loui, University of Illiniois at Urbana-Champaign, United States
Professor Noëmi Manders-Huits, Delft University of Technology, The Netherlands
Professor Keith Miller, University of Illinois at Springfield, United States
Dr Lyria Bennett Moses, University of New South Wales, Australia
Associate Professor Christine Perakslis, Johnson & Wales University, United States
Ms Laura Perusco, Macquarie Bank, United Kingdom (for identification purposes only)
Dr Kenneth Pimple, Indiana Bloomington University, United States
Dr Joseph Savirimuthu, University of Liverpool, United Kingdom
Professor Alan D. Smith, Robert Morris University, United States
Mr Charles Smith, Mesa State College Alumni, United States
Dr Judith Symonds, Auckland University of Technology, New Zealand
Dr Samuel Fosso Wamba, University of Wollongong, Australia
Professor John Weckert, Charles Sturt University, Australia

Inquiries and submissions can be forwarded electronically (Word document): 
Associate Professor Katina Michael, Dr M.G. Michael
School of Information Systems and Technology, Faculty of Informatics
UNIVERSITY OF WOLLONGONG, NSW AUSTRALIA 2522
Tel.:               +61 2 4221 3937         +61 2 4221 3937 • Fax: +61 2 4221 4045   •  GSM:               +61 431 201 172         +61 431 201 172
E-mail: [log in to unmask]
****************************************************
This is a message from the SURVEILLANCE listserv
for research and teaching in surveillance studies.

To unsubscribe, please send the following message to
<[log in to unmask]>:

UNSUBSCRIBE SURVEILLANCE

For further help, please visit:

http://www.jiscmail.ac.uk/help
****************************************************

Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

March 2024
February 2024
January 2024
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
December 2022
November 2022
October 2022
September 2022
August 2022
July 2022
June 2022
May 2022
April 2022
March 2022
February 2022
January 2022
December 2021
November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
December 2020
November 2020
October 2020
September 2020
August 2020
July 2020
June 2020
May 2020
April 2020
March 2020
February 2020
January 2020
December 2019
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
April 2019
March 2019
February 2019
January 2019
December 2018
November 2018
October 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
February 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
July 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
July 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
August 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
August 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
August 2008
July 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
August 2007
July 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
December 2006
November 2006
October 2006
September 2006
August 2006
July 2006
June 2006
May 2006
April 2006
March 2006
February 2006
January 2006
December 2005
November 2005
October 2005
August 2005
June 2005
May 2005
April 2005
March 2005
February 2005
January 2005
December 2004
November 2004
October 2004
September 2004
August 2004
June 2004
May 2004
April 2004
March 2004
February 2004
January 2004
December 2003
October 2003
September 2003
August 2003
July 2003
May 2003
April 2003
March 2003
February 2003
January 2003
December 2002
October 2002
September 2002
August 2002
June 2002
March 2002
February 2002
January 2002
November 2001
October 2001
September 2001
August 2001
July 2001
June 2001
May 2001
April 2001
March 2001
February 2001
January 2001
December 2000
November 2000
October 2000
September 2000
August 2000
July 2000
June 2000
May 2000
April 2000
March 2000
February 2000
January 2000
December 1999
November 1999
October 1999
September 1999
August 1999
July 1999
June 1999
May 1999
March 1999
February 1999
January 1999
December 1998
November 1998
October 1998


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager