Gloria Chen – Annotated bibliography
Katrin Arning, Sylvia Kowalewski & Martina Ziefle 2014. ‘Health Concerns Versus Mobile Data Needs: Conjoint Measurement of Preferences for Mobile Communication Network Scenarios’ in Human and Ecological Risk Assessment: An International Journal,Vol.20, No.5, pp.1359-1384
Link:http://www.tandfonline.com.ezproxy.lib.rmit.edu.au/doi/full/10.1080/10807039.2013.838127
The demands for mobile broadband services and ubiquitous network coverage in this societies are increasing, the mobile communication network infrastructure has to be expanded. This article explores the question of the technical infrastructure of mobile base stations raises the public’s anxiety about health risks due to EMF.
This article pointed out: Empirical studies in different countries (Korpinen and Pääkkönen 2009; Schreier et al. 2006) showed that people deem a broad range of health complaints (e.g. sleep disorders, headaches, dizziness, muscle pains) to EMFs emitted from base stations.Some studies (Baliatsas et al. 2011; Bortkiewicz et al. 2012) report high symptom prevalence rates (e.g., up to 57% for headaches) for people living close to base stations.
This article is a report of a study. It has a very rigorous process of investigation and reliable data.It is useful for us to prove that the electromagnetic fields could be harmful.But it’s important to note that this article admits people don’t take it as an serious problem, they rarely feel sick and those data may be deviated — The assessed preference ratings of the respondents do not mirror actual behavior, and the limited number of attributes and the small sample size in this study could cause it happens.We need to be aware of this.
Lee Humphreys 2011, ‘Who’s Watching Whom? A Study of Interactive Technology and Surveillance’ in Journal of Communication, Vol.61, No.4,pp.575-595
Link:http://onlinelibrary.wiley.com.ezproxy.lib.rmit.edu.au/doi/10.1111/j.14602466.2011.01570.x/
This article explores issues of privacy and surveillance with new interactive technologies.Information technology and new media allow for collecting and sharing personal information at unprecedented levels.This article shows how people think about privacy and surveillance problem when using mobile social networks.
The article focus on three types of surveillance: ‘voluntary panopticon’, ‘lateral surveillance’, and ‘self-surveillance’ Whitaker R says “A voluntary or ‘participatory’ panopticon differs from older systems of surveillance in that it is consensual.” People willingly participate in the monitoring of their own behavior, what I focus on is ‘Lateral surveillance’.
This article is useful to our research as it admits that with the advent of the Internet and interactive media, people can be easy to know the information of strangers,even to locate them. Citizens can monitor other citizens’ behavior through nonreciprocal forms of watching. Everyday people can search for information about other citizens without their knowledge or permission.This is a dangerous signal: people may be exposed to other’s views at any time. But we should know that this article also said some people were not concerned about privacy when using the mobile social network.
Paul Ian,Rose, Brent&Cassavoy Liane 2011 ‘Smart phone Spying Reality Check.’ in PC world, Vol.29,No 7, pp.13-15
Link:http://web.b.ebscohost.com.ezproxy.lib.rmit.edu.au/ehost/detail/detail?sid=26ccd803-bd2c-
The article discusses information being collected by smart phones and smart phone applications about their owners. In fact, people can never escape the smart phones’ monitored, because every kind of smart phone has this function.
This article is useful to our research that every kind of smart phone will collect their owner’s information and apply it –Location-tracking technology used by iPhone, Google Android and Microsoft, also, Some smart phone APP like the Angry Birds collect a phone’s unique identification number and share it with third parties. This article says “Millions of smart phone owners are being tracked by their phones. In addition, their mobile apps are eavesdropping on them. And information on their whereabouts is being sold to third parties.” The Wall Street Journal discovered that most of the 101 apps it tested shared a phone’s unique ID number with third parties.
More disturbing to mobile-privacy experts are future phone services that might be vulnerable to rogue developers, or user-location databases that have the potential to be hacked. At a U.S. Senate judiciary subcommittee hearing about mobile-device tracking in early May, senators in attendance suggested that new laws may be needed to govern the collection of data over phones, this may be a useful point.
Victoria Kisekkaa,Sharmistha Bagchi-Senb&H. Raghav Rao 2013, ‘Extent of private information disclosure on online social networks: An exploration of Facebook mobile phone users’ in Computers in Human Behavior,Vol.29, No.6, pp.2722-2729
Link:http://www.sciencedirect.com.ezproxy.lib.rmit.edu.au/science/article/pii/S0747563213002616?
This article adopts the communication privacy management theory and investigates the factors that influence the extent of private information disclosure of Facebook mobile phone users. “a number of Facebook users do not set privacy settings to limit public access to their information” ( Consumer Reports magazine., 2012).This article also talk about Age differences in information disclosure.
This article is useful that it shows clearly ‘Because information sharing increases the rate at which malware and cyber attacks spread, and with personal privacy and national security concerns at an all-time high’The type of personal information typically shared includes pictures,full names, date of birth, email address, mailing/physical address, phone numbers, sexual orientation, group affiliations, name of significant other, and sometimes family members’ names (Gross and Acquisti, 2005 and Stutzman, 2006). This extent of information disclosure may lead to serious attacks such as identity theft, neighborhood attacks (Bin and Jian, 2008 and Jagatic et al., 2007)
At the same time, this article also mentioned some people were not concerned about privacy when using the mobile social network.
Roger Highfield 2014, ‘Spying on the censors: How metadata could expose regimes’ in Index on Censorship,Vol.43, No.2, pp.71-74
Link:http://ioc.sagepub.com.ezproxy.lib.rmit.edu.au/content/43/2/71.full
This article points out:metadata might offer fascinating opportunities to spy on the censors who spy on us.Metadata is pervasive. But, overall, this article has a positive evaluation of metadata. AS the article say ‘By far the most common uses of all this metadata are relatively benign, though they can be annoying.’
The article is useful that it has different point of view with other article, which can help us to find the positive side of the smart technology and privacy problem. It shows that ‘Many companies use metadata to reveal our habits, interests and connections to work out what we buy, where we go online and who we talk to, so we can be targeted with hints, suggestions and advertising’. Some people may think this information is very annoying, but it is really fit our interests, we may find out some good information or APP from those advertisement.
But, it can not be said that when you send or receive messages by mobile or other third-party apps, a huge amount can be deduced. Add in a phone’s location data and email metadata and it is easy to see whom you work with (activity in office hours), who you like to hang out with or are related to (lots of calls) and where you like to relax (activity in the evenings).is not dangerous.
Xi Lua, Junko Watanabea, Qingbo Liua, Masayo Ujia, Masahiro Shonob&Toshinori Kitamuraa 2011, ‘Internet and mobile phone text-messaging dependency: Factor structure and correlation with dysphoric mood among Japanese adults’ in Computers in Human Behavior, Vol.27, No.5,pp.1702-1709
Link:http://www.sciencedirect.com.ezproxy.lib.rmit.edu.au/science/article/pii/S0747563211000562
This article points out the exceedingly growth of the Internet and mobile phone has been accompanied by problem about its impact, on consumers and on broader society. One recurring concern involves Internet and mobile phone “addicts”, whose use of these technologies has become excessive and out-of-control and severely disrupts their lives.
This article is useful that compares to previous physical discomfort (few people) it is common for people have psychological illness with mobile phone — A total of 92 men and 54 women filled in the Internet Addiction Questionnaire (IAQ), the Self-perception of Text-message Dependency Scale (STDS), and the Hospital Anxiety and Depression Scale (HADS). The prevalence of “light Internet addiction” and “severe Internet addiction” were 33.7% and 6.1% for men whereas they were 24.6% and 1.8% for women. The prevalence of “light mobile phone text-message addiction” was 3.1% for men and 5.4% for women. Although the widespread availability of mobile phones provides a convenient method of communication via text messages, it has been pointed out that some people exhibit so-called Text-message Dependency, an over-reliance on text-messaging in their daily lives (Masataka, 2005). Bit it is important that these data are based on the investigates of Japanese, it seems can not to be a a powerful evidence.