Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
The application of location based services in national emergency warning systems: SMS, cell broadcast services and beyond (2011) (23)
Location-Based Services: a vehicle for IT&T convergence (2004) (23)
The technological trajectory of the automatic identification industry: the application of the systems of innovation (SI) framework for the characterisation and prediction of the auto-ID industry (2003) (23)
The social implications of covert policing : the fourth workshop on the social implications of national security, 7 April 2009 National Europe Centre, ANU, Canberra (2010) (3)
IEEE ISTAS13: Smart World- The Social Implications of Wearable Computers and Augmediated Reality in Everyday Life (2013) (3)
The FBI’s Cybercrime Alert on Mattel’s Barbie Video Girl: A Possible Method for the Production of Child Pornography or Just another Point of View (2011) (2)
The effects of knowledge management on information sharing practices: a case study on Nortel networks (2006) (1)
Book Review: Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges (written by Sajal K. Das, Krishna Kant, Nan Zhang) (2012) (1)
Big Data and Policing: The Pros and Cons of Using Situational Awareness for Proactive Criminalisation (2013) (1)
Katina Michael giving evidence at the Inquiry into the use of subsection 313(3) of the Telecommunications Act 1997 by government agencies to disrupt the operation of illegal online services (Infrastructure and Communications Committee) (2015) (1)
The microchipping of people and the uberveillance trajectory (2011) (1)
The European court of human rights ruling against the policy of keeping fingerprints and DNA samples of criminal suspects in Britain, Wales and Northern Ireland: the case of S. and Marper v United Kingdom (2010) (1)
The moral dilemma of death on the internet (2015) (1)
Editorial: Putting Technology into Perspective in Asia (2013) (1)
Sony Playstation Security Breach and Apple iPhone Tracking Applications (2011) (1)
A Brave New World of ‘Under the Skin’ Payments (2014) (1)
The Benefits and Harms of National Security Technologies (2015) (1)
IEEE ISTAS13- People as Sensors: The Social Implications of Living in a Smart World (2013) (1)
Katina Michael (Poetry Selection) in Nick Trakakis (Ed.) "Southern Sun, Aegean Light: Poetry of Second-Generation Greek-Australians", Scholarly Publishing (2011) (1)
'The Privacy Song' (this comedic song was written by Three Dead Trolls in a Baggie - an Alberta/Canada Band and features the uberveillance definition in their multimedia clip) (2008) (0)
Policy implications of convergence in the new security environment: an investigation into the symbiosis between risk management and intelligence (2008) (0)
Transforming Satellite Campuses of Tertiary-education Institutions in Nigeria through Appropriate Application of Information Technology: A Case Study (2014) (0)
The Use of Geospatial Intelligence for National Security: Determining the Threats and Identifying the Critical Infrastructure to Protect (2005) (0)
Medical Bionics: An interdisciplinary approach (The Critic: The Social Implications of Microchipping People) (2012) (0)
Transforming lives with medical bionics (2012) (0)
Concerns about Councils using Tools like Google Maps for Surveillance on People’s Properties (2010) (0)
What should Australians give up in interest of national security (2006) (0)
The Role of Women in Engineering & Information Sciences: Sustainability & New Directions (2014) (0)
Arrest after 'drone with drugs' nabbed near Metropolitan Remand Centre (2014) (0)
AFP accesses MyWay data for investigations (2014) (0)
Tracking All Shoppers in Malls Using Mobile Phones: Good Marketing or a Breach of Privacy? (2012) (0)
The Case Against Mandatory Data Retention Laws in Australia (2012) (0)
M.G. Michael and K. Michael (2009). "Uberveillance: Definition" in ed. S. Butler, Fifth Edition of the Macquarie Dictionary (Australia's National Dictionary, Sydney University), p. 1094 (2009) (0)
ANALYSIS: Human Microchipping Poses Dangers to Health, Privacy (2014) (0)
Wearables and Lifelogging (2015) (0)
Microchip Implants and Future Applications (2007) (0)
Uberveillance cements its position as an official dictionary word (2010) (0)
Ethical Issues and Challenges in Learning Analytics (2014) (0)
The Challenges Posed by Wearable Technologies (2013) (0)
Uberveillance and the Technological Trajectory of RFID (2015) (0)
Police Warn of the Perils of Online Social Networks for Children (2011) (0)
Privacy problems over an online eye (2013) (0)
A Selection of Graduation Stories (2009) (0)
Data Mining: Tracking Mobile Phones in Shopping Malls (2013) (0)
This Pervasive Day: the potential and perils of pervasive computing (2012) (0)
The eSurveillance Proposal by Attorney-General's (AG) Department: What are the Potential Privacy Implications? (2012) (0)
The Consequences of Living and Breathing with Hyperconnectedness (2014) (0)
Microchip Implants and Location-Based Services (2007) (0)
Do new privacy protection laws go far enough (2014) (0)
'Women Cops Should Join Hands to Fight Crime': Aruna Bahuguna (2015) (0)
Opening Ceremony for First BJTU Freshmens Majoring in Mechanical and Electronic Engineering with UOW Twinning Arrangement (2014) (0)
A dollhouse to inspire young women into science, engineering and technology (2015) (0)
National Security: the Access Card Debate and Emerging Technologies (2006) (0)
Workshop focus on social implications of covert policing (2009) (0)
Disney Magic Wristband: The Social Implications of the MyMagic+ System (2014) (0)
Succeeding in Literature Reviews: The Fundamentals (2014) (0)
If you track me, will we still trust each other? (2012) (0)
WIE Featured Person of the Month Highlights (Katina Michael) (2013) (0)
The Application of Geodemographic Data in Strategic Network Planning (2014) (0)
The Aut omatic Identific ation Trajectory (2003) (0)
Smart Data Collection Workshop Participant (Sydney Business School, 1 Gateway, Sydney, NSW) (2014) (0)
The Technological Trajectory: From Wearables to Implantables (2013) (0)
Pre-commitment Technology for Problem Gamblers- What are the Privacy Risks? (2011) (0)
The Application of Location-Based Emergency Warning Systems and the Socio-Ethical Considerations Surrounding Government Mandated Location-Based Services (2011) (0)
Operating a drone isn't as easy as it looks (2014) (0)
Keynote: Cultural Studies Association of Australasia Conference 2014: Provocations (2014) (0)
Exploding the Myth of Data Privacy: "I'm Your Private Data" (2013) (0)
The Packbots Are Coming (2014) (0)
Editorial: What is evidence-based policy (EBP)? (2008) (0)
The Social Implications of Technology and What You’re Going to Do About Them (2014) (0)
The Emergence of Community Policing Networks (2009) (0)
Stop Social Network Pitfalls (2010) (0)
TrackingPoint bolt-action rifles are game-changers, not a game (2013) (0)
Take Two: Dr Katina Michael and Sarah Fusco (2008) (0)
The Use of Mobile Social Networking in Illicit Networks: the medium is the message (2009) (0)
Question mark over internet privacy (2015) (0)
Changes to Digital Privacy Laws- But are Consumers Aware? (2014) (0)
Get some chips with your beer (2007) (0)
Drug Drop Drone (2014) (0)
Zhengzhou University and UOW Australia cooperation project 2014 - Graduation Ceremony (2014) (0)
To what extent can cybercrime be prevented through consumer awareness? Expert panel (2012) (0)
National Security versus Consumer Privacy: The Issues Surrounding the Cooperation between Business and Government in the Monitoring of Smart Phones used by Illicit Networks (2010) (0)
Uni workshop focuses on safety, security (2006) (0)
Apps that will help you keep your resolve (2012) (0)
Unmanned Aerial Vehicles and Systems: Pros and Cons (2013) (0)
Control,rust, Privacy, and Security: (2007) (0)
The Use of Biometric Identifiers in Clubs: the Position of the Australian Privacy Foundation (2008) (0)
Shopping center "track" system popular can instantly "catch" consumer (2013) (0)
The New Emerging Electronic Commerce Payment Scheme Landscape in the Banking Sector: Smart cards, Radio-frequency ID, Near-field Communications and Smart Phone Apps (2014) (0)
People plus: is transhumanism the next stage in our evolution? (2012) (0)
The Wollongong University Cooperative Education with Tianjin Polytechnic University: 2014 Opening Ceremony (2014) (0)
The Dark Side of Video Games (2016) (0)
Book Review of Hacking: The Next Generation (written by Nitesh Dhanjani, Billy Rios & Brett Hardin) (2012) (0)
Implantable Virus Detection Systems in Humans (2011) (0)
The Rise of Homo Electricus (2007) (0)
Rattenbury to raise warrants for MyWay data with Attorney-General (2014) (0)
Job Candidates have a Right to Access their Stored Personal Information after the Recruitment Process (2013) (0)
A Scholar's View (2013) (0)
Women In GIS: Katina Michael (2000) (0)
Keeping Track of Things (2009) (0)
Introducing the Research Network for a Secure Australia (2006) (0)
Through the looking glass into the future (2013) (0)
Government cracks down on identity fraud (2012) (0)
Demonstrating the potential for covert policing in the community: five stakeholder scenarios (2010) (0)
Women in Law Enforcement Conference is uniting women law enforcers, says Aruna Bahuguna (2015) (0)
War robots and the 2014 World Cup – defenders off the field (2014) (0)
The Prüm Treaty and the Implications of the European Court of Human Rights’ Ruling Against the UK’s Policy of Keeping Fingerprints and DNA Samples of Criminal Suspects Indefinitely (2009) (0)
The Socio-Ethical Implications of Wearable Technologies: Who’s Watching and Why (2014) (0)
Are we enslaved by technology? For and Against (2014) (0)
Total Curriculum Management: A Lifecycle Approach (2007) (0)
Special Section: Social Impacts of National Security Technologies (2012) (0)
Consumers Federation of Australia Standards Representative Workshop in Victoria (Standards Australia, Creating Positive Relationships, Consumer Policy, Representation, Panels) (2012) (0)
The Automatic Identification Technology System: Five Case Studies Exploring the Dynamics of Innovation in the High-tech Industry (2005) (0)
Planetary-ScaleRFIDServicesin an Age of Uberveillance This paper discusses possible futures for RFID, including an alternative to bar code tagging, and outlines a vision of a future RFID product service system. (2010) (0)
Implementing Namebers Using Implantable Technologies: The Future Prospects of Person ID (2010) (0)
The First Workshop on the Social Implications of National Security: An Interview with the Program Chair (2006) (0)
Self-guided bullets won't stuff up, but what about the grunts and drones firing them? (2012) (0)
A Brief Introduction into the Use of Content Analysis in Qualitative Research (2009) (0)
UOW and Westpac Supporting Women in Technology (2014) (0)
Consequences of big data on the individual: Interview (2013) (0)
Covert Policing using Unobtrusive Global Positioning Systems Trackers: A Demonstration (2009) (0)
OpinionNet Monitoring of Social Media by the Government, for Emergency Services, and for Brand Marketing- What are the social-ethical issues? (2012) (0)
Selling rewards schemes for your personal details as Coles reveal privacy policy (2014) (0)