The Application of Critical Social Theory to National Security Research Holly Tootell University of Wollongong.

Slides:



Advertisements
Similar presentations
Hospital Pandemic Influenza Planning by Ed Lydon, CVPH.
Advertisements

Hazard, Threats, Risk, Etc. An examination of some key terms … Walter G. Green III, Ph.D., CEM Disaster Theory Series No. 3 Copyright 2008 by Walter G.
DESEREC, an ICT for Trust and Security project DESEREC: Dependability and Security by Enhanced Reconfigurability.
Series 2: Project Management Understanding and Using 6 Basic Tools 9/2013 From the CIHS Video Series “Ten Minutes at a Time”
Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 1 Session 8 Modeling the Vulnerability of Targets to Threats of Terrorism John.
The Day After The Shakeout Place your Counties Logo Here MT DES Exercises.
Presenter’s Name June 17, 2003 Catastrophic Preparedness Incorporating Whole Community Philosophy  We must plan for the real, not the manageable  Plan.
Bridging the Gaps: Public Health and Radiation Emergency Preparedness Mr. James Kish, Director Technological Hazards National Preparedness Directorate.
Fiscal Year 2008 Urban Areas Security Initiative Nonprofit Security Grant Program Investment Justification Questions, Criteria, and Prioritization Methodology.
29 May 2006RNSA Workshop 1 Social Implication of National Security RNSA Workshop The risk of public data availability on critical infrastructure protection.
1 Suzanne Lockhart M.A. Criminology thesis University of Melbourne, 2005 Current: PhD candidate University of S.A Identity Fraud – Displacement effects.
CST 481/598 Many thanks to Jeni Li.  Potential negative impact to an asset  Probability of a loss  A function of three variables  The probability.
Abstract Earthquakes are hazardous to people and the economy. Potential loss impacts include lives, homes, office buildings, manufacturing plants, schools,
Session 131 Hazard Mapping and Modeling Supporting Emergency Response Operations using GIS and Modeling.
Exploratory Study: Vehicle Mileage Fees in Texas Ginger Goodin Richard T. Baker Texas Transportation Institute Research sponsored by the Texas Department.
LOUISE K. COMFORT, UNIVERSITY OF PITTSBURGH, PITTSBURGH, PA 15260, DESIGNING RESILIENCE FOR COMMUNITIES AT RISK.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Pandemic Influenza Preparedness Kentucky Department for Public Health Department for Public Health.
State Debris Management Plan California the “Disney Land of Disasters”
AMBIENT INTELLIGENCE Presented by GOKUL SURESH. INTRODUCTION  Evolution of Ambient Intelligence.  Science with a fictional view.  Enriching environment.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Preparing for Preparedness Development of Emergency and Disaster Medicine System (EDMS) in Latvia Preparing for Preparedness Development of Emergency.
Delivering Services for Hackney during London 2012.
PRM 702 Project Risk Management Lecture #28
Health promotion and health education programs. Assumptions of Health Promotion Relationship between Health education& Promotion Definition of Program.
Jeffery Graviet Emergency Services Coordinator, Salt Lake County Chairperson, Salt Lake Urban Area Working Group.
CITIZEN CORPS & CERT ORGANIZATIONS. What is Citizen Corps? Following the tragic events that occurred on September 11, 2001, state and local government.
HOMELAND SECURITY ADVISORY SYSTEM. Established after the terrorist attacks on America September 11, 2001.
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
HAZARDS AN DISASTERS HUMAN RESPONSE. Responses to the risk of hazard events – adjustments before Discuss the usefulness of assessing risk before deciding.
EDS Incident Command System Tabletop Exercise [Exercise Location] [Exercise Date] [Insert Logo Here]
Hazards and Disaster Management
SERIT Contributo per la preparazione di HORIZON 2020 Cultural Heritage and Built Environment Francesco Soldovieri, Laura Moltedo.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Massachusetts Digital Government Summit / Session - Smile You're On CameraPage 1.
Homeland Security Grant Program 2015 Process Michelle Hanneken Illinois Emergency Management Agency.
“We work to prevent and are prepared to respond to threats to our health and safety through coordinated efforts across the country and around the world.”
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University.
Technology survey: LBS Use Among the Top 1000 Canadian Companies Claude Caron, Ph.D. Pierre Desjardins, M.Sc. Martin Plante, M.Sc. Daniel Chamberland-Tremblay,
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Introduction to Homeland Security CHAPTER 1.
Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT Systems Lecture b This material (Comp7_Unit7b) was developed by.
TM Emerging Health Threats and Health Information Systems: Getting Public Health and Clinical Medicine to Real Time Response John W. Loonsk, M.D. Associate.
Using Informatics to Promote Community/Population Health
Working with HIT Systems
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
International Recovery Forum 2014 ~ The Role of Private Sector in Disaster Recovery ~ 21 January 2014 Kobe, Japan Dr Janet L. Asherson THE LINK BETWEEN.
TREASURY REGULATIONS’ CHANGES AND POTENTIAL IMPACT
Governor’s Office of Homeland Security and Emergency Response State Directors Meeting February 24, 2014 Bruce A. Davis, Ph.D. Senior Program Manager Resilient.
RFID and Public Policy Elliot Maxwell Fellow, Communications Program, Johns Hopkins University and Distinguished Research Fellow, Pennsylvania State University.
AUSTRALIA. A National Strategy for Enhancing the Safety and Security of our Food Supply ที่มา : We pride ourselves on our high safety and security standards.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by M. Brooke Rogers, Julia M. Pearce Chapter 6 - Risk Communication, Risk Perception and Behaviour as Foundations.
SNS Planning Elements Tabletop Exercise [Exercise Location] [Exercise Date] [Insert Logo Here]
UNECE – SC2 Rail Security Analysis and economic assessment of rail transport security 1st October 2009 Andrew Cook.
Fiscal Year 2007 Urban Area Security Initiative Nonprofit Security Grant Program Investment Justification Questions, Criteria, and Prioritization Methodology.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Kristian Krieger, M. Brooke Rogers Chapter 7 - Promoting Public Resilience against Chemical, Biological, Radiological.
GENERATING AND USING EVIDENCE THROUGHOUT THE PROGRAM CYCLE How is Evidence Produced? Key Messages Biodiversity conservation is about the health for the.
Recreation & Security HPR 413. General Security Must encompass all operations of the organization Should be written into management plans – Plans include.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Chapter 13: Police Strategies and Tactics Seminar 8.
YE-XingYi Dalian Nationalities University,China The Problem and Policy of City’s Public Security Management in China.
 Exists to serve the community’s interests by providing social conditions in which people maintain health  Describes epidemics and the spread of disease,
Article by Caroline Moser
Žilinská univerzita v Žiline Fakulta špeciálneho inžinierstva
HIRA This is the lesson objective.
CIRAS FINAL CONFERENCE
Professor Paul Cosford CB
INTRODUCTION For years there have been attacks around the United States for sometimes now, which is unexpected. However; there have not been good restoration.
HIRA This is the lesson objective.
Chapter 1 Key Security Terms.
Presentation transcript:

The Application of Critical Social Theory to National Security Research Holly Tootell University of Wollongong

Location-Based Services Scope for this research includes: RFID GPS and GIS Mobile service LBS can be used to identify the location of an information device, and in some instances the whereabouts of the user who owns it

National Security Not just terrorism Events of national security can include: National disasters: tsunami, earthquake Border control Transportation security Critical infrastructure protection Intelligence gathering Emergency preparedness

LBS being used for national security EventLocation-Based Service Border controlRFID – passive devices to denote ‘cleared vehicle’ GIS – Unmanned aerial vehicles for image transmission Natural DisasterRFID – to manage victim identification GIS – to estimate damage and target areas Terrorist attackGPS – locating persons at attack site CIPGPS – to monitor potential threats to major landmarks, buildings etc Critical Health Outbreaks RFID – to monitor patients, staff and visitors to hospitals during SARS Mobiles – updates of affected areas

A Critical Approach Where interpretive researchers seek to maintain the status quo (Walsham, 2005), critical researchers seek to emancipate subjects. Particularly in critical IS research, the aim is to expose attempts to “design and (mis)use IS to deceive, manipulate, exploit, dominate and disempower people.” (Cecez-Kecmanovic, 2001).

Critical Social Theory The “primary objective of CST is the improvement of the human condition” (Ngwenyama, 1991). The questioning of the neutrality of technology is essential to understand the social impact of new schemes.

Critical Social Theory Understanding communication perception Systems Acceptance and deployment of LBS national security strategies Lifeworld Technology acceptance Social implications Privacy expectation Role of power and bias Informing and changing Critica l Social Theory Content Analysis Case Studies Lifeworld knowledge for background information Qualitative Research Methodological Approach adapted from Titscher et al 2000 and Cecez-Kecmanovic 2001

Integrating NS and CST In each of the national security technology studies, a particular application of the technology is examined, which allows for an in-depth understanding of the system to occur, But it does not examine the impact these technologies can have when applied outside the realm of national security application.

Content Analysis To uncover reactions and trends September 11 Bali Bombing London Bombing SARS Preliminary results show a wave trend with key points of interest Immediately 3 months 12 months

The Price of Security The Price of Security is a concept that will be used to determine the trade-off that needs to be made when a new location-based technology is implemented as a solution to national security Complete CCTV in cities Biometric identification for passports Curb-to-curb surveillance RFID implants

Conclusion What this research is proposing is a way of understanding the impact LBS will have if applied as solutions to national security issues.

Questions? Holly Tootell School of IT and CS University of Wollongong PhD Research