{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T10:06:18Z","timestamp":1767261978014,"version":"3.38.0"},"reference-count":22,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4,1]]},"abstract":"<p>This case presents the possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non-traditional covert surveillance within a community setting, resulting in community members engaging in the covert observation of family, friends, or acquaintances. This case investigates five stakeholder relationships using scenarios to demonstrate the potential socio-ethical implications that tracking and monitoring will have on society. The five stakeholder types explored in this case include: (i) husband-wife (partner-partner), (ii) parent-child, (iii) employer-employee, (iv) friend-friend, and (v) stranger-stranger. Mobile technologies like mobile camera phones, global positioning system data loggers, spatial street databases, radio-frequency identification, and other pervasive computing can be used to gather real-time, detailed evidence for or against a given position in a given context. Limited laws and ethical guidelines exist for members of the community to follow when it comes to what is permitted when using unobtrusive technologies to capture multimedia and other data (e.g., longitude and latitude waypoints) that can be electronically chronicled. In this case, the evident risks associated with such practices are presented and explored.<\/p>","DOI":"10.4018\/jcit.2011040102","type":"journal-article","created":{"date-parts":[[2011,10,20]],"date-time":"2011-10-20T14:40:59Z","timestamp":1319121659000},"page":"19-33","source":"Crossref","is-referenced-by-count":16,"title":["Emerging Forms of Covert Surveillance Using GPS-Enabled Devices"],"prefix":"10.4018","volume":"13","author":[{"given":"Roba","family":"Abbas","sequence":"first","affiliation":[{"name":"University of Wollongong, Australia"}]},{"given":"Katina","family":"Michael","sequence":"additional","affiliation":[{"name":"University of Wollongong, Australia"}]},{"given":"M. G.","family":"Michael","sequence":"additional","affiliation":[{"name":"University of Wollongong, Australia"}]},{"given":"Anas","family":"Aloudat","sequence":"additional","affiliation":[{"name":"University of Wollongong, Australia"}]}],"member":"2432","reference":[{"key":"jcit.2011040102-0","unstructured":"Barkuus, L., & Dey, A. (2003, September 1-5). Location-Based Services for Mobile Telephony: a Study of Users\u2019 Privacy Concerns. In Proceedings of the 9th IFIP TC13 International Conference on Human-Computer Interaction (INTERACT 2003), Zurich, Switzerland (pp. 709-712). New York, NY: ACM Press."},{"key":"jcit.2011040102-1","first-page":"176","article-title":"Wireless Location Tracking","author":"A.Barreras","year":"2007","journal-title":"Convenient or Invasive- The Information Age"},{"key":"jcit.2011040102-2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00393.x"},{"key":"jcit.2011040102-3","doi-asserted-by":"publisher","DOI":"10.1080\/13691180701560002"},{"key":"jcit.2011040102-4","doi-asserted-by":"publisher","DOI":"10.1038\/458968a"},{"key":"jcit.2011040102-5","doi-asserted-by":"crossref","unstructured":"Dobson, J. E., & Fisher, P. F. (2003). Geoslavery. IEEE Technology and Society Magazine, 47-52.","DOI":"10.1109\/MTAS.2003.1188276"},{"key":"jcit.2011040102-6","unstructured":"Ferenczi, P. M. (2009, February). You are here. Laptop Magazine, 98-102."},{"issue":"2","key":"jcit.2011040102-7","first-page":"409","article-title":"No Direction Home: Will the Law Keep Pace with Human Tracking Technology to Protect Individual Privacy and Stop Geoslavery? I\/S","volume":"2","author":"W. A.Herbert","year":"2006","journal-title":"Journal of Law and Policy"},{"key":"jcit.2011040102-8","doi-asserted-by":"crossref","unstructured":"Herbert, W. A. (2010, June 7-9). Workplace Consequences of Electronic Exhibitionism and Voyeurism. In K. Michael (Ed.), In Proceedings of the IEEE Symposium on Technology and Society (ISTAS2010), Wollongong, NSW, Australia (pp. 300-308). IEEE Society on Social Implications of Technology.","DOI":"10.1109\/ISTAS.2010.5514626"},{"issue":"3","key":"jcit.2011040102-9","first-page":"178","article-title":"Legal and Ethical Implications of GPS Vulnerabilities.","volume":"3","author":"M. U.Iqbal","year":"2003","journal-title":"Journal of International Commercial Law and Technology"},{"key":"jcit.2011040102-10","unstructured":"Kaupins, G., & Minch, R. (2005, January 3-6). Legal and Ethical Implications of Employee Location Monitoring. In Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS'05), Big Island, HI (pp. 1-10)."},{"key":"jcit.2011040102-11","doi-asserted-by":"publisher","DOI":"10.1006\/jado.1999.0266"},{"key":"jcit.2011040102-12","unstructured":"Levin, A., Foster, M., Nicholson, M. J., & Hernandez, T. (2006). Under the Radar? The Employer Perspective on Workplace Privacy. Toronto, ON, Canada: Ryerson University. Retrieved March 2009 from http:\/\/www.ryerson.ca\/tedrogersschool\/news\/archive\/UnderTheRadar.pdf"},{"key":"jcit.2011040102-13","unstructured":"Levin, A., Foster, M., West, B., Nicholson, M. J., Hernandez, T., & Cukier, W. (2008). The Next Digital Divide: Online Social Network Privacy. Toronto, ON, Canada: Ryerson University, Ted Rogers School of Management, Privacy and Cyber Crime Institute. Retrieved March 2009 from http:\/\/www.ryerson.ca\/tedrogersschool\/privacy\/Ryerson_Privacy_Institute_OSN_Report.pdf"},{"key":"jcit.2011040102-14","doi-asserted-by":"publisher","DOI":"10.1023\/A:1026387109484"},{"key":"jcit.2011040102-15","doi-asserted-by":"crossref","unstructured":"Michael, K., Mcnamee, A., & Michael, M. G. (2006, July 25-27). The Emerging Ethics of Humancentric GPS Tracking and Monitoring. In Proceedings of the International Conference on Mobile Business (ICMB2006), Copenhagen, Denmark (pp. 34-42). Washington, DC: IEEE Computer Society.","DOI":"10.1109\/ICMB.2006.43"},{"issue":"3","key":"jcit.2011040102-16","first-page":"85","article-title":"Uberveillance: Microchipping People and the Assault on Privacy.","volume":"LIII","author":"M. G.Michael","year":"2009","journal-title":"Quadrant"},{"key":"jcit.2011040102-17","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186726"},{"key":"jcit.2011040102-18","doi-asserted-by":"publisher","DOI":"10.1109\/MTAS.2007.335564"},{"key":"jcit.2011040102-19","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2007.73"},{"key":"jcit.2011040102-20","doi-asserted-by":"publisher","DOI":"10.1007\/BF02701789"},{"key":"jcit.2011040102-21","doi-asserted-by":"crossref","unstructured":"Weckert, J. (2000, September 6-8). Trust and Monitoring in the Workplace. In Proceedings of the IEEE International Symposium on Technology and Society, University as a Bridge from Technology to Society, Rome, Italy (pp. 245-250). IEEE Society on Social Implications of Technology.","DOI":"10.1109\/ISTAS.2000.915635"}],"container-title":["Journal of Cases on Information Technology"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=54464","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T03:29:35Z","timestamp":1741836575000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jcit.2011040102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2011,4,1]]},"references-count":22,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011,4]]}},"URL":"https:\/\/doi.org\/10.4018\/jcit.2011040102","relation":{},"ISSN":["1548-7717","1548-7725"],"issn-type":[{"type":"print","value":"1548-7717"},{"type":"electronic","value":"1548-7725"}],"subject":[],"published":{"date-parts":[[2011,4,1]]}}}