| 2010 | 'Extreme' music and graphic representation online. Andrew Whelan |
| 2010 | 'I like, stalk them on Facebook': Teachers' 'privacy' and the risks of social networking sites. Melissa de Zwart, Michael Henderson, Michael Phillips, David Lindsay |
| 2010 | 'Of weighty reasons and indiscriminate blankets: The retention of DNA for forensic purposes'. Carole McCartney |
| 2010 | 2010 IEEE International Symposium on Technology and Society, ISTAS 2010, Wollongong, NSW, Australia, June 7-9, 2010 Katina Michael |
| 2010 | 3G Mobile multimedia services (MMS) utilization in Indonesia: An exploratory research. Indrawati, San Murugesan, Murali Raman |
| 2010 | A careful design for a tool to detect child pornography in P2P networks. Iván Pau de la Cruz, Celia Fernández Aller, Sergio Sánchez García, Justo Carracedo Gallardo |
| 2010 | A critique of privacy. Michael Victor Arnold, Greg Adamson |
| 2010 | A potential loss of trust as a result of the conflicting messages within information security research. Daniel Oost |
| 2010 | Alleviating the "dark side" of smart phone use. Gayle Porter |
| 2010 | An approach to studying location-based services regulation in Australia. Roba Abbas |
| 2010 | Bonding over bushfires: Social networks in action. Mark B. Freeman, Alison Freeman |
| 2010 | Continuous RFID-enabled authentication and its privacy implications. Stanislav Kurkovsky, Ewa Syta, Bernardo Casano |
| 2010 | Cyborg rights. Roger Clarke |
| 2010 | Demystifying the number of the beast in the book of revelation: Examples of ancient cryptology and the interpretation of the "666" conundrum. Michael G. Michael |
| 2010 | Digital identity applied to telematic voting involving European citizens. Social and legal implications. Emilia Pérez Belleboni, Sergio Sánchez García, Justo Carracedo Gallardo, Ana Gómez Oliva |
| 2010 | Digital natives and mobile phones: A survey of practices and attitudes about privacy and security. Stanislav Kurkovsky, Ewa Syta |
| 2010 | Emergence of creativity in learning via social technologies. Sophie Nichol |
| 2010 | Emerging consumers view of secondary uses of medical data. Jennifer A. Heath |
| 2010 | Equilibrium for CMC systems' alteration - An intercultural perspective. Malik Aleem Ahmed |
| 2010 | GPS navigation... but what is it doing to us? Jeff Robbins |
| 2010 | Green IT awareness and practices: Results from a field study on mobile phone related e-waste in Bangladesh. Noushin Laila Ansari, Md. Mahfuz Ashraf, Bushra Tahseen Malik, Helena Grunfeld |
| 2010 | Human Enhancement: Could you become infected with a computer virus? Mark Gasson |
| 2010 | ID scanners in the night time economy. Darren Palmer, Ian Warren, Peter Miller |
| 2010 | Identity, contestability and ethics of unified virtualisation of society. Marcus R. Wigan |
| 2010 | If it's encrypted its secure! The viability of US state-based encryption exemptions. Mark Burdon, Rouhshi Low, Jason Reid |
| 2010 | In defence of the precautionary principle. John Weckert |
| 2010 | Is Facebook really "open" to all? Maria Claudia Buzzi, Marina Buzzi, Barbara Leporini, Fahim Akhter |
| 2010 | Learning on location: An adaptive mobile learning content framework. Ahmed Al-Hmouz, Alison Freeman |
| 2010 | Location-based services: An examination of user attitudes and socio-ethical scenarios. Roba Abbas |
| 2010 | Microchip-induced tumors in laboratory rodents and dogs: A review of the literature 1990-2006. Katherine Albrecht |
| 2010 | One hundred reasons socially beneficial technology might not work. Greg Adamson |
| 2010 | Online identity as a semiotic phenomenon. Lucy Resnyansky |
| 2010 | Practitioner accountability and decision-making technology. David Wallace |
| 2010 | Profile-based digital identity management - a better way to combat fraud. Yinan Yang, Edward Lewis, Jan Newmarch |
| 2010 | Protecting the protectors: Legal liabilities from the use of Web 2.0 for Australian disaster response. Rouhshi Low, Mark Burdon, Sharon Christensen, William D. Duncan, Paul Barnes, Ernest Foo |
| 2010 | RFID deployment and use in the dairy value chain: Applications, current issues and future research directions. Samuel Fosso Wamba, Alison Wicks |
| 2010 | Rankings of importance of location-based services utilisation for emergency management. Anas Aloudat, Yehia Ibrahim Alzoubi |
| 2010 | Regulating beyond nanotechnology do nano-specific problems require nano-specific solutions? Lyria Bennett Moses |
| 2010 | Removing the barriers to enterprise 2.0. Mohd Heikal Husin, Paula M. C. Swatman |
| 2010 | Social and legal implications of digital identity in a multi-national environment. Sergio Sánchez, Emilia Pérez Belleboni, Ana Gómez Oliva, Justo Carracedo Gallardo |
| 2010 | Social-technical issues facing the humancentric RFID implantee sub-culture through the eyes of Amal Graafstra. Amal Graafstra, Katina Michael, Michael G. Michael |
| 2010 | Software and the social production of disorder. Jonathan Marshall, Didar Zowghi |
| 2010 | Surveillance monitoring and information assurance work systems. Peter Goldschmidt |
| 2010 | System and methodology for using mobile phones in live remote monitoring of physical activities. Hamed Ketabdar, Matti Lyra |
| 2010 | Technology and overcoming the vulnerabilities of human life. Orpheus as a metaphor for man confronted with the impact of technology. Hendrik Opdebeeck |
| 2010 | The ICTs-mediated collaboration as a system of social activity. Lucy Resnyansky |
| 2010 | The RFID tag pictorial glossary project. Judith A. Symonds, John Ayoade |
| 2010 | The diffusion of RFID implants for access control and epayments: A case study on Baja Beach Club in Barcelona. Katina Michael, Michael G. Michael |
| 2010 | The impact of personality on acceptance of privacy-sensitive technologies: A comparative study of RFID and finger vein authentication systems. Shiro Uesugi, Hitoshi Okada, Toko Sasaki |
| 2010 | The legal, social and ethical controversy of the collection and storage of fingerprint profiles and DNA samples in forensic science. Katina Michael |
| 2010 | The role of experts in social media - Are the tertiary educated engaged? Eva Cheng, Stephen J. Davis, Ian S. Burnett, Christian H. Ritz |
| 2010 | The role of technological acceleration in the crisis of modernity: A view by Paul Virilio. Eloy Portillo, Pedro Costa |
| 2010 | Time, technology, and the rhythms of daily life. Hilary Davis, Michael Victor Arnold, Martin R. Gibbs, Bjorn Nansen |
| 2010 | Uniwide WiFi based positioning system. William Ching, Rue Jing Teh, Binghao Li, Chris Rizos |
| 2010 | Using a social informatics framework to study the effects of location-based social networking on relationships between people: A review of literature. Sarah Jean Fusco, Katina Michael, Michael G. Michael |
| 2010 | Using mobile phones in a Real-Time Biosurveillance Program: Lessons from the frontlines in Sri Lanka and India. Gordon A. Gow, Nuwan Waidyanatha, Pushpa Mary Vincy |
| 2010 | Wireless Commons against the digital divide. Miquel Oliver, Johan Zuidweg, Michail Batikas |
| 2010 | Workplace consequences of electronic exhibitionism and voyeurism. William A. Herbert |