This website has been archived and is no longer updated.

The content featured is no longer current and is being made available to the general public for research and historical information purposes only.


Powerhouse Museum - Home


Back


 
Take it further
Refugee tagging

Design and technology

1. a)

Imagine Australia had a government that oppressed people and you had to escape.
i) Where would you go?
ii) What country would you try to go to?

b)
i) What do you think would happen when you got there?
ii) Would the people in the other country just let you come in and do what you like?
iii) Or would they want to know who you were and why you wanted to be in their country?
  c) What do you think it would be like to live in a refugee camp?
See if you can find some information on the Internet about life for refugees around the world.
2. a) Imagine you work for the government and a lot of refugees flooded into the country. Imagine you have been asked to work out what to do with them, how to look after them, how to keep track of them.
  b)
i) How would you organise dealing with them?
ii) How would you decide who should be able to stay in Australia and who didn't really need to escape from their original country?
  c) See if you can find some information on the Internet about how the Australian Government looks after refugees and how it decides who stays.
3. a) Should technologies be used to identify and keep track of people? Why?
  b) If a technology exists, then it might be used for controlling people. If the technology exists is it always OK to use it with people?
4. a) Do we have the right to keep things about ourselves private? If we do, how can we control the way technology is used to process and distribute information about us?
  b) Should some technologies not be used for information systems about people? Should it be allowed but should governments regulate it?
5.   What if someone who has nothing to do with a crime does not want to provide a sample for DNA identification? Should you have the right to keep this information private? Or, should you have to provide that information about yourself, even if the police do not actually suspect you in particular?
6. a) Watch the sci-fi film Wedlock.
Identify the tagging mechanism used in the film.
  b) Compare and contrast the identification and tracking system used in the film with the DMPIT system using AVID technology.
  c) Identify and discuss any ethical and social issues arising from the type of control system used in the film.

Information processes and technology

Information systems

1.

For the DMPIT system used at Guantanamo Bay, identify and discuss:

  • the purpose of the system, including who it was for and why there was a need
  • the data or information used in the system
  • the information technology used
  • the participants involved.
2. Distinguish between, and categorise activities within the DMPIT system in terms of the seven information processes.
3. For the DMPIT system, diagrammatically represent the information system.
diagram
4. Explain how the need of the United States government to gather information about refugees in camps was supported by DMPITS.
5.

In the refugee camp at Guantanamo Bay, identify the people who are:

  • in the environment
  • users of the DMPITS
  • participants in the information system.
6. Use a data dictionary to describe the data collected on the refugees.
7. Identify the data in the DMPIT system and the information that it is transformed into.
8. Describe how the data used by the DMPIT system is digitised by the hardware that collects it.
9. Draw a data flow diagram to illustrate the data flow in the DMPIT system.

Social and ethical issues

1. Identify the privacy implications to individuals subjected to the DMPIT system employed to keep track of refugees. Propose strategies to ensure the human rights of individuals are protected.
2. Identify and discuss issues of access to, and the control of information contained in DMPIT systems operated by governments.
3. Discuss the social and ethical issues of organisations using DMPITS to keep track of their employees.

Related systems

1.

Local councils have information systems for pets, to keep track of all dogs and cats, through the use of microchips which are inserted under the skin of the pet. This enables councils to identify if a cat or dog is either a stray or a pet, and then locate and return it to the owners.
For a pet information system:

  • Identify and describe the required information technology, participants and data or information.
  • Create an appropriate data dictionary to describe the data which would assist councils in returning lost pets to owners.
  • Describe the social and ethical issues associated with this system, including issues associated with incorrect data.
2. A government wishes to keep track of its soldiers going on a tour of duty to a foreign country. Identify and describe the information processes and information technology required to develop such a system. Identify and discuss any security, access or control issues of this system.

Research

1. Research how video and voice recognition work.
2. Speak to a vet about the process of implanting a microchip or ask your teacher to organise a visit from a vet.
3. Visit the local council animal compound to find out how the information system for micro-chipped pets functions in the local community.
4. Investigate the following animal tracking systems.
Shark tracking http://www.marine.csiro.au/PressReleasesfolder/01releases/neal/8may01.html
http://www.marine.csiro.au/research/tagging/neale/
Tuna tracking
http://www.csiro.au/page.asp?type=mediaRelease&id=popuptagstracktunafromspace

Software design and development
Increasing levels of technology can either provide centralised control systems which concentrate power in the hands of fewer and fewer people, or distributed systems which place some control with many individual users, for example, the Internet.

Discuss the implications of emerging information control technologies on the future of democratic societies.

References
American Bible Society (1976) Good News Bible, American Bible Society, New York, p. 315.
Beniger, J. R. (1986) The Control Revolution, Harvard university Press, Massachussetts, p. 39-40.
Brady, T. V. (1998) The IDENT System: "Putting Structure to the Chaos of the Border", National Institute of Justice Journal, 237, October 1998.
http://www.ncjrs.org/txtfiles/jr000237.txt
Brakeman, L. (1994) New DoD system tracks refugees, Automatic ID News, Vol 10, No 13, pp. 1, 14-17. Advanstar Communications Inc.
Dechman, G. H. (1996) Fingerprint Case Study: The Haitians at Guantanamo Bay, DMPITS Case History, http://www.fpusa.com/pubs.htm
Global Supermarket (2002) Technology to the test, Global Supermarket: Official publication of the National Food Industry Strategy, Global Supermarket, Vol, 6, No. 2, p. 53. http://www.globalsupermarket.com.au.
Masland, T. et al (1994) A US invasion of Haiti?, Special Report for Newsweek, The Bulletin, July 19, pp. 58-63.
Powerhouse Museum (2001) Cyberworlds: computers and connections, Powerhouse Museum, Sydney, p. 9.

HSC technology syllabses support - HOME spacer Refugee tagging