1. Introduction
This study seeks to examine the relationship that exists between the use of location‐based services (LBS) and national security initiatives, and specifically the perceived impact they have on citizens.
Public awareness of national security has increased significantly since the terrorist attacks in the United States of America on September 11, 2001. Of the many high‐technology solutions used in response to breaches of national security the use of complex information technologies, including radio frequency identification (RFID), global positioning system (GPS), and biometric identification appear to be the most popular. Location‐based services require these technologies to provide functions that include: immigration and visa control applications (through biometric identification on passports) to advanced home‐detention functionality (RFID chips for movement tracking).1 Location applications have the potential to be privacy insensitive and pervasive, and are already considered by some to be inherently so.2 Evidence suggests that there is a need to research the impact that location applications have on society as a whole.
Previous studies of LBS with respect to national security have focused on two main categories: technology responses to resolving weaknesses in national security preparedness and communications; and privacy‐based research that examines the responses of the public to the impact the proposed technologies will have on personal privacy. Although when drawn together these two perspectives create a relatively complete picture of their use, lacking are the motivations and public reactions to the technologies that have been adopted.
To understand the motivations of government and drivers for public motivation and adoption, Critical Social Theory (CST) developed by Jurgen Habermas3 is applied. The primary objective of CST, and more particularly the application of CST to Information Systems (IS) research is to discover how ‘… many small IT changes add up to a policy that affects the nature of the society in which we live’.4 CST’s primary aim is emancipation through knowledge and study of past behaviour. CST allows the issue of LBS adoption for national security to be studied by examining events of national security significance through public reaction as documented in the popular media.
For future advancement of government‐driven solutions to national security threats and preparations, it is imperative that current research looks beyond the solutions themselves and develop greater awareness of their implications. The outcome of this research is to provide a framework for evaluating the impact of location‐based solutions to national security problems and not to limit the development of technology or to prevent its use.
2. Location‐Based Services for National Security
Location‐based services (LBS) exploit knowledge about where an information device is located. The information device can be used to locate living and non‐living entities (people, artefacts in rooms, etc.). Location can be represented in a variety of ways, e.g. address or latitude/longitude. Depending on the context LBS can utilize several technologies for knowing where an information device is geographically located. Global positioning system (GPS), cell identification, broadband satellite network, assisted GPS, wireless local area networks (WLAN) and radio frequency identification (RFID) are examples of technologies used.5
LBS are used in multiple market segments: personal, commercial and government, for diverse purposes, including navigation and personalized marketing material dependent on location. LBS also provide a technological solution to the more serious issue of national security. Their ability to calculate position information (either push or pull in nature) provides an invaluable resource for preventive, protective and responsive situations. A pull technology requires the user to request the information, where a push service delivers the information automatically based on the position of the user. An example of the LBS technologies being used in national security include: RFID for disaster management, disease outbreaks, and secure access control; GPS devices for monitoring emergency response teams and the monitoring of public health outbreaks and mobile stations for emergency response.
3. Critical Social Theory in Information Systems Research
Qualitative research is used when the focus of research is the ‘real world’.6 The tools of qualitative research allow a researcher to interact with those that the research phenomenon effects, both directly and through social artefacts like newspapers, popular magazines and other feedback sources.7 A qualitative approach is most useful when a researcher wants to describe, interpret, verify or evaluate the impact of a particular area of interest.8
Critical Social Theory (CST) is a qualitative approach to research. There are three underlying paradigms in which qualitative research can take place: positivism, interpretivism and critical theory. Positivism and interpretivism are the two most common approaches used by researchers in Information Systems,9 however over the past 20 years there has been a significant body of work that has been applying critical theory to Information Systems research topics.10
The critical approach differs from interpretivist in that it seeks to understand the workings of the whole phenomena: a critical study in Information Systems cannot look at technology alone, it must strive to understand it in terms of the industrial, societal and national context it is applied in.11 It is the impact that innovation has had on the population that is most critical to its success or failure. A critical researcher aims to better understand how societies work to produce beneficial and detrimental effects, in this case through adoption of location applications. The researcher then looks for ways to mitigate or eliminate the damaging effects (of the location applications).12 Critical researchers use knowledge that is grounded in social and political practices. Historical analysis of a phenomena is used to identify long‐held associations.13 McGrath14 states that ‘[f]or more than 30 years, critical research in information systems (IS) has challenged the assumption that technology innovation is inherently desirable and hence to the benefit of all’. Cezec‐Kemanovic,15 Kirkpatrick,16 Lyytinen and Klein,17 Lyytenin and Ngwenyama,18 Ngwenyama and Lee19 and Wong20 are researchers who have investigated and applied the work to IS research. It is a method designed to reveal ‘hidden agendas, concealed inequalities and tacit manipulation’ in the examination of the complex relationships of information systems, socio‐political and organizational contexts.21 CST is a qualitative approach to Information Systems (IS) research. It differs from an interpretivist perspective by its intention to emancipate the subjects of the study, rather than to empathize with them. Figure 1 describes the relationships between approaches to IS research and a suggestion of tools used to operationalize the theories.22
Where interpretive researchers seek to maintain the status quo,23 critical researchers seek to emancipate subjects. Habermas’s theory is intent on effecting radical change through understanding distortions of communications.24 CST looks to the outside world and examines opinions that appear in the ‘public sphere’, defined by Fairclough as the connection between social systems and the domain of everyday living (‘lifeworld’), where people deliberate on matters of social and political concerns.25 Lifeworld is a term used by Habermas to refer to a common world of experience.26 Cecez‐Kecmanovic27 describes it as the ‘taken‐for‐granted universe of daily social activities of members’. CST implies that the researcher has an agenda and is setting out to examine the ‘lifeworld’ to come to understand the meaning of things.
Lyytinen and Klein28 state: ‘[Habermas’ critical theory] suggests that information systems which are designed to increase organisational effectiveness must also increase human understanding and emancipate people from undesirable social and physical constraints, distorted communication and misapplied power’. The questioning of the neutrality of technology is essential to understand the social impact of new schemes. Particularly in critical IS research, the aim is to expose attempts to ‘design and (mis)use IS to deceive, manipulate, exploit, dominate and disempower people’.29
4. National Security and Critical Social Theory
The ‘primary objective of CST is the improvement of the human condition’.30 A number of technology studies have researched the importance of wireless services in disaster recovery efforts,31 particularly the uptake of commercial network provision as a viable alternative for the small market of public safety. They have identified that if primary communications infrastructure is damaged or destroyed, it is the mobile services that are the lifeline. Connolly,32 Chen33 and Popp34 identify the significance that IP location and Internet content can make in making knowledge links for counter‐terrorism responses. In each of these studies, a particular application of the technology is examined, which allows for an in‐depth understanding of the system to occur, but for disaster planning, it does not provide an over‐arching view of the technology solutions being used together. Nor does it examine the impact these technologies can have when applied outside the realm of national security application.
Privacy studies have identified LBS technologies as being perceived as a threat to privacy regardless of purpose.35 They have also examined the change in public perception to information collection and management for the purpose of ‘homeland’ security.36 Halchin37 has examined the use of government websites by terrorist organizations as an aid to planning attacks. From this aspect, control and management of information is seen as critical to the fight to protect national security. However the counter argument to this is that by restricting access to online government information, potential terrorists are prevented from getting access, as are ordinary citizens.
Seifert38 has written about the importance of information storage and collections in terms of infrastructure management, and related to this is the research by Raghu39 that examines the need for collaborative decision making. This approach to national security research, although not from a technical or LBS perspective, is at least beginning to examine the problem holistically.
The use of CST will allow the researcher to investigate the impact that location applications for national security have through public perception. The content analysis tool Leximancer will be used to investigate the phenomenon through popular media sources. The content to be analysed can include words, phrases, sentences, paragraphs, pictures, symbols, or ideas.40 Content analysis has gained momentum as a research method through the rapid expansion of mass communication, both mass media and international politics.41 Content analysis is useful for making inferences by objectively and systematically recognizing particular patterns within messages and it does not need to be limited to textual analysis.42
Throughout this data collection and analysis, the researcher will be looking for indications of change in government perspective and response to events of interest, also for changes in public sentiment with regard to proposed solutions. Anecdotal evidence suggests that at selected time periods after an event of national security significance, public sentiment changes to reflect a more learned appreciation of measures that have taken place in response to the event. Through performing multiple analyses of the same data sets but focusing on specific indicators, e.g. event, time period, or technology, indicators of change will be able to be extracted and compared.
5. Conclusion
Whether it is the use of RFID bracelets to monitor home‐detention prisoners, the implementation of biometric identification passport systems or the development of GPS monitoring systems for natural disaster management, the notion that personal privacy will be affected in order to enhance security cannot be denied. Previous studies have primarily focused on the implementation of a single LBS or the privacy impact of one location technology. From this it has been difficult to identify the continual shift in public perception and reaction to LBS. To determine the wide‐ranging effects of the application of LBS to national security, the focus provided by CST, combined with the results of the content analysis, will bring together a detailed study of the concept of privacy and civil liberties being exchanged for security.