Katina Michael
#163,703
Most Influential Person Now
Researcher ORCID ID = 0000-0003-3118-5557
Katina Michael's AcademicInfluence.com Rankings
Katina Michaelcomputer-science Degrees
Computer Science
#9635
World Rank
#10111
Historical Rank
Information Technology
#69
World Rank
#70
Historical Rank
Download Badge
Computer Science
Katina Michael's Degrees
- Bachelors Information Technology University of Wollongong
- Masters Transnational Crime Prevention University of Wollongong
Similar Degrees You Can Earn
Why Is Katina Michael Influential?
(Suggest an Edit or Addition)Katina Michael's Published Works
Published Works
- The pros and cons of RFID in supply chain management (2005) (412)
- Big Data: New Opportunities and New Challenges [Guest editors' introduction] (2013) (288)
- Factors affecting privacy disclosure on social network sites: an integrated model (2010) (150)
- The Emerging Ethics of Humancentric GPS Tracking and Monitoring (2006) (129)
- Securing the Cloud: Cloud Computer Security Techniques and Tactics (2012) (121)
- Transforming business using digital innovations: the application of AI, blockchain, cloud and data analytics (2020) (117)
- Social acceptance of location-based mobile government services for emergency management (2014) (113)
- Machine Ethics: The Design and Governance of Ethical AI and Autonomous Systems (2019) (111)
- Control, trust, privacy, and security: evaluating location-based services (2007) (101)
- Location and tracking of mobile devices: Überveillance stalks the streets (2013) (83)
- Toward the regulation of ubiquitous mobile government: a case study on location-based emergency services in Australia (2011) (71)
- Innovative Automatic Identification and Location-Based Services: From Bar Codes to Chip Implants (2009) (67)
- Lend me your arms: The use and implications of humancentric RFID (2007) (67)
- A research note on ethics in the emerging age of überveillance (2008) (62)
- COVID-19 Contact Trace App Deployments: Learnings From Australia and Singapore (2020) (55)
- The social and behavioural implications of location-based services (2011) (54)
- Toward a State of Überveillance (2010) (54)
- Planetary-Scale RFID Services in an Age of Uberveillance (2010) (51)
- Behind COVID-19 Contact Trace Apps: The Google–Apple Partnership (2020) (50)
- Social Implications of Technology: The Past, the Present, and the Future (2012) (49)
- Using a social informatics framework to study the effects of location-based social networking on relationships between people: A review of literature (2010) (49)
- Uberveillance and the Social Implications of Microchip Implants: Emerging Technologies (2013) (48)
- Location-based intelligence - modeling behavior in humans using GPS (2006) (47)
- Security Risk Management: Building an Information Security Risk Management Program from the Ground Up (2012) (45)
- Opportunities and Risks for Citizen Science in the Age of Artificial Intelligence (2019) (41)
- The Impact of Technology (2014) (40)
- The regulatory considerations and ethical dilemmas of location-based services (LBS): A literature review (2014) (35)
- Is it the End of Barcodes in Supply Chain Management (2005) (33)
- Privacy Issues and Solutions in Social Network Sites (2012) (29)
- RFID and Supply Chain Management: Introduction to the Special Issue (2008) (28)
- Meet Boston Dynamics' LS3 – the latest robotic war machine (2012) (28)
- The diffusion of RFID implants for access control and epayments: A case study on Baja Beach Club in Barcelona (2010) (28)
- Location-Based Services in Emergency Management- from Government to Citizens: Global Case Studies (2007) (27)
- RFID - A Unique Radio Innovation for the 21st Century (2010) (27)
- Uberveillance: microchipping people and the assault on privacy (2009) (27)
- Humancentric applications of precise location based services (2005) (27)
- Microchipping People: The Rise of the Electrophorus (2005) (26)
- Exploring the Social Implications of Location Based Social Networking: An Inquiry into the Perceived Positive and Negative Impacts of Using LBSN between Friends (2010) (26)
- Connected: To Everyone and Everything [Guest Editorial: Special Section on Sensors] (2013) (25)
- Smart Toys that are the Stuff of Nightmares [Editorial] (2016) (25)
- Engineering-Based Design Methodology for Embedding Ethics in Autonomous Robots (2019) (25)
- The future prospects of embedded microchips in humans as unique identifiers: the risks versus the rewards (2013) (25)
- No limits to watching? (2013) (24)
- Emerging Forms of Covert Surveillance Using GPS-Enabled Devices (2011) (24)
- The application of location based services in national emergency warning systems: SMS, cell broadcast services and beyond (2011) (23)
- Location-Based Services: a vehicle for IT&T convergence (2004) (23)
- The technological trajectory of the automatic identification industry: the application of the systems of innovation (SI) framework for the characterisation and prediction of the auto-ID industry (2003) (23)
- Location-Based Social Networking: Impact on Trust in Relationships (2012) (23)
- Homo Electricus and the Continued Speciation of Humans (2007) (23)
- Beyond Mere Compliance of RFID Regulations by the Farming Community: A Case Study of the Cochrane Dairy Farm (2007) (22)
- Sousveillance and Point of View Technologies in Law Enforcement: An Overview (2012) (21)
- RFID Adoption Issues: Analysis of Organizational Benefits and Risks (2009) (21)
- Social-technical issues facing the humancentric RFID implantee sub-culture through the eyes of Amal Graafstra (2010) (21)
- Using a Social-Ethical Framework to Evaluate Location-Based Services in an Internet of Things World (2015) (20)
- Location-Based Services and the Privacy-Security Dichotomy (2006) (20)
- Monitoring people using location-based social networking and its negative impact on trust (2011) (19)
- The Social, Cultural, Religious and Ethical Implications of Automatic Identification (2004) (18)
- National Security: The Social Implications of the Politics of Transparency (2006) (18)
- The legal ramifications of microchipping people in the United States of America- A state legislative comparison (2009) (18)
- Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges (2012) (17)
- Minimizing Product Shrinkage across the Supply Chain using Radio Frequency Identification: a Case Study on a Major Australian Retailer (2007) (17)
- Hacking: The Next Generation (2012) (16)
- From Dataveillance to Überveillance (Uberveillance) and the Realpolitik of the Transparent Society (2007) (16)
- Applications of Human Transponder Implants in Mobile Commerce (2005) (16)
- Connected: To Everyone and Everything (2013) (16)
- Bots Trending Now: Disinformation and Calculated Manipulation of the Masses [Editorial] (2017) (16)
- Location-Based Services for Emergency Management: A Multi-stakeholder Perspective (2009) (15)
- Überveillance, the web of things, and people: What is the culmination of all this surveillance? (2015) (15)
- Towards chipification: the multifunctional body art of the Net Generation (2006) (15)
- The legal, social and ethical controversy of the collection and storage of fingerprint profiles and DNA samples in forensic science (2010) (15)
- Perceived barriers for implanting microchips in humans: A transnational study (2014) (15)
- Microchip implants for humans as unique identifiers: a case study on VeriChip (2008) (15)
- The advancement of positioning technologies in defense intelligence (2006) (14)
- Cloud computing data breaches a socio-technical review of literature (2015) (14)
- The use of information and communication technology for the preservation of Aboriginal culture: the Badimaya people of Western Australia (2006) (14)
- Overcoming Visibility Issues in a Small-to-Medium Retailer Using Automatic Identification and Data Capture Technology: An Evolutionary Approach (2010) (14)
- Security workshop brings 'sousveillance' under the microscope (2012) (14)
- Managing hydrological infrastructure assets for improved flood control in coastal mega-cities of developing nations (2017) (13)
- Uberveillance and the Internet of Things and people (2014) (13)
- The Fallout from Emerging Technologies: Surveillance, Social Networks, and Suicide (2011) (13)
- RFID/NFC Implants for Bitcoin Transactions (2016) (12)
- Location privacy under dire threat as 'uberveillance' stalks the streets (2012) (12)
- The Fall-Out from Emerging Technologies: on Matters of Surveillance, Social Networks and Suicide (2011) (11)
- Realized Applications of Positioning Technologies in Defense Intelligence (2006) (11)
- Implementing 'Namebers' Using Microchip Implants: The Black Box Beneath The Skin (2012) (11)
- Knowledge Sharing and Organizational Change in a Leading Telecommunications Equipment Vendor: a Case Study on Southern Networks (2007) (10)
- Privacy, Value and Control Issues in Four Mobile Business Applications (2008) (10)
- "You Talkin' to Me?" [Edtorial] (2012) (10)
- Location Based Privacy, Protection, Safety and Security (2015) (10)
- Unintended Consequences of Living with AI: The Paradox of Technological Potential?Part II [Guest Editorial] (2016) (10)
- Privacy-value-control harmonization for RFID adoption in retail (2009) (9)
- Be Vigilant: There are Limits to Veillance (2014) (9)
- High-Tech Child's Play in the Cloud: Be safe and aware of the difference between virtual and real (2016) (9)
- The social phenomenon of body-modifying in a world of technological change: past, present, future (2016) (9)
- Historical Lessons on ID Technology and the Consequences of an Unchecked Trajectory (2006) (9)
- The Changing Ethics of Mediated Looking: Wearables, veillances, and power (2016) (9)
- RFID-enabled warehouse optimization: lessons from early adopters in the 3PL industry (2008) (9)
- The Value of Privacy: Safeguarding your information in the age of the Internet of Everything (2014) (9)
- RFID-Enabled Inventory Control Optimization: A Proof of Concept in a Small-to-Medium Retailer (2010) (8)
- Sketching and validating the location-based services (LBS) regulatory framework in Australia (2013) (8)
- The Social Implications of Humancentric Chip Implants: A Scenario - 'Thy Chipdom Come, Thy Will be Done' (2008) (8)
- The New Privacy Predators (2011) (8)
- Whose Body Is It?: The body as physical capital in a techno-society (2016) (8)
- Human Rights, Regulation, and National Security [Introduction] (2012) (8)
- Integrating Islands of Information Through CRM (2003) (8)
- We've Got to Do Better [Editorial] (2014) (7)
- Sousveillance: Implications for Privacy, Security, Trust, and the Law. (2015) (7)
- Wiener's Cybernetics Legacy and the Growing Need for the Interdisciplinary Approach [Scanning Our Past] (2015) (7)
- The Value of Government Mandated Location-Based Services in Emergencies in Australia (2011) (7)
- Social Implications of Wearable Computing and Augmediated Reality in Every Day Life (IEEE Symposium on Technology and Society, ISTAS13) (2013) (7)
- Wearable computers challenge human rights (2013) (7)
- RFID: Helpful New Technology or Threat to Privacy and Civil Liberties? (2015) (7)
- Amal Graafstra- The Do-It-Yourselfer RFID Implantee: The culture, values and ethics of hobbyist implantees (2008) (7)
- The Implications of Iris-Recognition Technologies: Will our eyes be our keys? (2016) (7)
- Wearables and Lifelogging: The socioethical implications. (2015) (7)
- Ethics in AI and Autonomous System Applications Design (2020) (7)
- Towards a Conceptual Model of User Acceptance of Location-Based Emergency Services (2013) (7)
- Manufacturing Consent: The Modern Pandemic of Technosolutionism (2020) (6)
- Privacy, Data Rights and Cybersecurity: Technology for Good in the Achievement of Sustainable Development Goals (2019) (6)
- The socio-ethical considerations surrounding government mandated location-based services during emergencies: an Australian case study (2011) (6)
- Consumer Technology-Based Solutions for COVID-19 (2021) (6)
- Editorial: special issue on Service-Based Electronic Commerce Systems (2013) (6)
- Implantable Medical Device Tells All: Uberveillance Gets to the Heart of the Matter (2017) (6)
- Resistance Is Not Futile, nil desperandum (2015) (6)
- You Want to Do What with RFID?: Perceptions of radio-frequency identification implants for employee identification in the workplace. (2017) (6)
- Inadequate Requirements Engineering Process: A Key Factor for Poor Software Development in Developing Nations: A Case Study (2014) (6)
- The Rise and Fall of Digital Music Distribution Services: a Cross-Case Comparison of MP3.com, Napster and Kazaa (2005) (6)
- A theory of exposure: Measuring technology system end user vulnerabilities (2017) (6)
- Pervasive Technologies: Principles to Consider (2014) (6)
- The Social Implications of Emerging Technologies (2010) (6)
- The Hybridization of Automatic Identification Techniques in Mass Market Applications: Towards a Model of Coexistence (2006) (6)
- Mental Health, Implantables, and Side Effects (2015) (6)
- The social implications of national security (2006) (6)
- Unpacking the ERP investment decision: An empirical assessment of the benefits and risks (2009) (6)
- Trends in the Selection of Automatic Identification Technology in Electronic Commerce Applications (2003) (5)
- Schengen Information System II: The balance between civil liberties, security and justice (2008) (5)
- Converging and coexisting systems towards smart surveillance (2012) (5)
- The proliferation of identification techniques for citizens throughout the ages (2006) (5)
- The Auto-ID Trajectory (2009) (5)
- A National Certification Programme for Academic Degrees in Cyber Security (2018) (5)
- The land of milk and money (2013) (5)
- Redefining Surveillance: Implications for Privacy, Security, Trust and the Law (2014) (5)
- Big Data: New Opportunities New (2013) (5)
- The Social Implications of Covert Policing (2010) (5)
- The Packbots Are Coming: Boosting security at the 2014 FIFA World Cup. (2014) (5)
- Editorial: In Memoriam of Associate Professor Dr. Elaine Lawrence (2012) (5)
- Human Tracking Technology in Mutual Legal Assistance and Police Inter-state Cooperation in International Crimes (2007) (4)
- Location-Based Social Networking and its Impact on Trust in Relationships (2012) (4)
- The Importance of Scenarios in Evaluating the Socio-ethical Implications of Location-based Services (2006) (4)
- For Now We See Through a Glass, Darkly [Editorial] (2013) (4)
- The coronavirus contact tracing app won't log your location, but it will reveal who you hang out with (2020) (4)
- Drones Humanus [Introduction to the Special Issue] (2014) (4)
- Microchip Implants for Employees in the Workplace: Findings from a Multi-Country Survey of Small Business Owners (2012) (4)
- Beyond Human: Lifelogging and Life Extension [Editorial] (2014) (4)
- Experts fear a European 'right to be forgotten' online ruling may be duplicated in Australia (2014) (4)
- Mental Health, Implantables, and Side Effects [Editorial] (2015) (4)
- Consumer Awareness in Australia on the Prospect of Humancentric RFID Implants for Personalized Applications (2007) (4)
- We Got to do Better (2014) (4)
- The AVIAN Flu Tracker - a Location Service Proof of Concept (2006) (4)
- Advanced location-based services (2008) (4)
- The RFID value proposition (2008) (4)
- The Dark Side of Video Games: Are you addicted? (2016) (4)
- The Social Implications of Information Security Measures on Citizens and Business (2006) (4)
- Socio-Ethical Implications of Implantable Technologies in the Military Sector [Guest Editorial] (2017) (3)
- An Information Systems Design Theory for an RFID University-Based Laboratory (2009) (3)
- The Current State of Commercial Location-Based Service Offerings in Australia (2009) (3)
- Resistance Is Not Futile, nil desperandum [Editorial] (2015) (3)
- The Paradigm Shift in Transnational Organised Crime (2008) (3)
- Using RFID to Overcome Inventory Control Challenges: A Proof of Concept (2009) (3)
- Science Fiction Is Full of Bots That Hurt People: ...But these bots are here now (2016) (3)
- The importance of conducting geodemographic market analysis on coastal areas: a pilot study using Kiama Council (2004) (3)
- Teaching ICT Ethics Using Wearable Computing: the Social Implications of the New 'Veillance' (2009) (3)
- Cyber Security in Nigeria: A Collaboration between Communities and Professionals (2015) (3)
- We are becoming enslaved by our technology (2014) (3)
- Unintended Consequences: The Paradox of Technological Potential (2016) (3)
- Privacy¿The Times They Are A-Changin' [Introduction] (2012) (3)
- RFID Implantable Devices for Humans and the Risk versus Reward Debate: "What are we waiting for?" (2010) (3)
- Towards the Blanket Coverage DNA Profiling and Sampling of Citizens in England, Wales and Northern Ireland: A Historical Review (2012) (3)
- Überveillance: 24/7 x 365 People Tracking & Monitoring (2008) (3)
- The importance of scenarios in the prediction of the social implications of emerging technologies and services (2011) (3)
- Location and interactive services not only at your fingertips but under your skin (2009) (3)
- Urban flood modelling using geo-social intelligence (2017) (3)
- Why some people do not use Facebook? (2019) (3)
- Ethical Issues to Consider for Microchip Implants in Humans (2012) (3)
- Sousveillance and the Social Implications of Point of View Technologies in the Law Enforcement Sector (2012) (3)
- Policing and Social Media (2012) (3)
- Key government agency perspectives on location based services regulation (2015) (3)
- Can Good Standards Propel Unethical Technologies? [Editorial] (2016) (3)
- Barcode (2013) (3)
- Bots without borders: how anonymous accounts hijack political debate (2017) (3)
- Novel NFC Applications to Enrich Our Connections: The NFC Forum Innovation Awards. (2017) (3)
- The structure and components of E-mall business models (2005) (3)
- A Note on Überveillance / A Note on Uberveillance (2007) (3)
- Apple Watch Temptation: Just visit the App Store. (2015) (3)
- The social implications of covert policing : the fourth workshop on the social implications of national security, 7 April 2009 National Europe Centre, ANU, Canberra (2010) (3)
- IEEE ISTAS13: Smart World- The Social Implications of Wearable Computers and Augmediated Reality in Everyday Life (2013) (3)
- Managing Technological Vulnerability of Urban Dwellers: Analysis, Trends, and Solutions (2020) (3)
- Australia and the New Technologies: Towards Evidence Based Policy in Public Administration (2008) (3)
- Pop password pill, or simply stick it (2013) (2)
- What Can People Do with Your Spatial Data?: Socio-Ethical Scenarios (2017) (2)
- Barcode: The Pioneer Auto-ID Technology (2009) (2)
- The Rise of the Electrophorus (2009) (2)
- Age Appropriate Digital Services for Young People: Major Reforms (2021) (2)
- Go 'Get Chipped': A Brief Overview of Non-Medical Implants between 1997-2013 (Part 1) (2017) (2)
- Putting Technology into Perspective in Asia [Editorial] (2013) (2)
- The Converging Veillances: Border Crossings in an Interconnected World (2016) (2)
- “Someone(thing)” to Watch Over Me: Big Data = Big Issues (2014) (2)
- Social and Economic Sustainability (2015) (2)
- Total Curriculum Management (TCM): An Integrated Curriculum Using Distributed Content (2007) (2)
- Recommendations for Australia's Implementation of the National Emergency Warning System Using Location-Based Services (2011) (2)
- Socioethical Approaches to Robotics Development [From the Guest Editors] (2018) (2)
- Sociology of the docile body (2016) (2)
- Curbing Cybercrime by Application of Internet Users’ Identification System (IUIS) in Nigeria (2014) (2)
- Reconnaissance and Social Engineering Risks as Effects of Social Networking (2014) (2)
- Überveillance, the Web of Things, and People (2015) (2)
- Predicting the socioethical implications of implanting people with microchips (2009) (2)
- Israel, Palestine and the benefits of waging war through Twitter (2012) (2)
- Police Accountability in an Age of Uberveillance (2009) (2)
- The Rise of the Wireless Internet (2003) (2)
- Credit card fraud: Behind the scenes (2017) (2)
- Locat'em: Towards Hierarchical Positioning Systems (2005) (2)
- Smart Cards: The Next Generation (2009) (2)
- Social and Organizational Aspects of Information Security Management (2008) (2)
- Digital Wearability Scenarios: Trialability on the run. (2015) (2)
- Magnetic-Stripe Cards: The Consolidating Force (2009) (2)
- The FBI’s Cybercrime Alert on Mattel’s Barbie Video Girl: A Possible Method for the Production of Child Pornography or Just another Point of View (2011) (2)
- Geographic Information Systems & Location-Based Services (2009) (2)
- Smart Environments & The Convergence of the Veillances: Privacy Violations to Consider (2016) (2)
- Speaking Out Against Socially Destructive Technologies: Norbert Wiener and the Call for Ethical Engagement [Guest Editorial] (2017) (2)
- Are You Addicted to Your Smartphone, Social Media, and More?: The New AntiSocial App Could Help (2017) (2)
- Living in a Smart World - People as Sensors (2013) (2)
- The need for a digital aid framework in humanitarian relief (2005) (2)
- What are the downsides of the government storing metadata for up to 2 years (2014) (2)
- Commentary on: Mann, Steve (2012): Wearable Computing (2012) (2)
- Special Section Editorial: Risk, Complexity and Sustainability (2013) (1)
- The Adoption of E-Commerce by Microbusinesses (2003) (1)
- Google Glass Privacy Issues Could Be a Buzzkill (2013) (1)
- Dealing With Technological Trajectories: Where We Have Come From and Where We Are Going (2020) (1)
- Session Six: Case Studies in Favour of a Federated Identity (2009) (1)
- The road from S and Marper to the Prum Treaty and the implications on human rights (2012) (1)
- Introducing location-based services into information technology curriculum: reflections on practice (2005) (1)
- The effects of knowledge management on information sharing practices: a case study on Nortel networks (2006) (1)
- Book Review: Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges (written by Sajal K. Das, Krishna Kant, Nan Zhang) (2012) (1)
- Enslaved [Editorial] (2014) (1)
- Microchipping People is a ?Bad Idea?: Interview with Andreas Sjostrom [Leading Edge] (2019) (1)
- The Battle Against Security Attacks (2003) (1)
- Heaven and Hell: Visions for Pervasive Adaptation (2011) (1)
- The Idio-Technopolis [Editorial] (2012) (1)
- The Automatic Identification Trajectory (2003) (1)
- The United Kingdom’s Cyber Security Degree Certification Program: A Cyber Security Body of Knowledge Case Study (2022) (1)
- Assessing technology system contributions to urban dweller vulnerabilities (2017) (1)
- Nortel Networks: Assesses Customer Needs Quickly and Accurately with MapInfo (2000) (1)
- Fraud prevention and control in the public sector (2011) (1)
- The Socio-Ethical Implications of Automatic Identification and Location Services (2009) (1)
- Supply system's technology configuration as a contributor to end-user vulnerability (2015) (1)
- Religion, Science, and Technology: An Interview with Metropolitan Kallistos Ware [Interview] (2017) (1)
- Big Data and Policing: The Pros and Cons of Using Situational Awareness for Proactive Criminalisation (2013) (1)
- Katina Michael giving evidence at the Inquiry into the use of subsection 313(3) of the Telecommunications Act 1997 by government agencies to disrupt the operation of illegal online services (Infrastructure and Communications Committee) (2015) (1)
- The microchipping of people and the uberveillance trajectory (2011) (1)
- The European court of human rights ruling against the policy of keeping fingerprints and DNA samples of criminal suspects in Britain, Wales and Northern Ireland: the case of S. and Marper v United Kingdom (2010) (1)
- The moral dilemma of death on the internet (2015) (1)
- Editorial: Putting Technology into Perspective in Asia (2013) (1)
- RFID Tags and Transponders: The New Kid on the Block (2009) (1)
- The Dilemmas of using Wearable Computing to Monitor People: An Extended Metaphor on the Tracking of Prison Inmates and Parolees (2009) (1)
- Biometrics: In Search of a Foolproof Solution (2009) (1)
- Location-based Services for Emergency Management (2009) (1)
- An Interview with Mr Peter Mahy of Howells LLP who represented S and Marper at the European Court of Human Rights (2010) (1)
- Introduction: Human Rights, Regulation and National Security (2012) (1)
- High-Tech Lust [Editorial] (2013) (1)
- Smart Infrastructure and Technology Systems Ethics (2021) (1)
- Barunga Music Online (2003) (1)
- Societal implications of wearable technology: interpreting "Trialability on the Run" (2017) (1)
- Hello Barbie, Hello Hackers: accessing your data will be child’s play (2015) (1)
- Editorial: High-Tech Lust (2013) (1)
- The State-Society Relationship: Big Data?s Big Future?But for Whom [Editorial] (2014) (1)
- WORKSHOP | Body Worn Video Recorders: The Socio-Technical Implications of Gathering Direct Evidence (2013) (1)
- When Uber Cars Become Driverless: "They Won't Need No Driver" [Editorial] (2016) (1)
- Sony Playstation Security Breach and Apple iPhone Tracking Applications (2011) (1)
- A Brave New World of ‘Under the Skin’ Payments (2014) (1)
- The Benefits and Harms of National Security Technologies (2015) (1)
- IEEE ISTAS13- People as Sensors: The Social Implications of Living in a Smart World (2013) (1)
- Katina Michael (Poetry Selection) in Nick Trakakis (Ed.) "Southern Sun, Aegean Light: Poetry of Second-Generation Greek-Australians", Scholarly Publishing (2011) (1)
- Social Implications of Technology: ¿Il buono, il brutto, il cattivo¿ [Editorial] (2012) (1)
- Are We Ready to Live In An Uberveillance Society (2013) (1)
- Editorial: The idio-technopolis (2012) (1)
- Brain Pacemakers in Consumer Medical Electronics Improve Quality of Life: Benefits, Risks, and Challenges (2018) (1)
- 'The Privacy Song' (this comedic song was written by Three Dead Trolls in a Baggie - an Alberta/Canada Band and features the uberveillance definition in their multimedia clip) (2008) (0)
- Modern Indentured Servitude in the Gig Economy: A Case Study on the Deregulation of the Taxi Industry in the United States (2022) (0)
- Policy implications of convergence in the new security environment: an investigation into the symbiosis between risk management and intelligence (2008) (0)
- Transforming Satellite Campuses of Tertiary-education Institutions in Nigeria through Appropriate Application of Information Technology: A Case Study (2014) (0)
- The Use of Geospatial Intelligence for National Security: Determining the Threats and Identifying the Critical Infrastructure to Protect (2005) (0)
- Medical Bionics: An interdisciplinary approach (The Critic: The Social Implications of Microchipping People) (2012) (0)
- Transforming lives with medical bionics (2012) (0)
- Concerns about Councils using Tools like Google Maps for Surveillance on People’s Properties (2010) (0)
- What should Australians give up in interest of national security (2006) (0)
- The Role of Women in Engineering & Information Sciences: Sustainability & New Directions (2014) (0)
- Arrest after 'drone with drugs' nabbed near Metropolitan Remand Centre (2014) (0)
- AFP accesses MyWay data for investigations (2014) (0)
- Tracking All Shoppers in Malls Using Mobile Phones: Good Marketing or a Breach of Privacy? (2012) (0)
- The Case Against Mandatory Data Retention Laws in Australia (2012) (0)
- M.G. Michael and K. Michael (2009). "Uberveillance: Definition" in ed. S. Butler, Fifth Edition of the Macquarie Dictionary (Australia's National Dictionary, Sydney University), p. 1094 (2009) (0)
- ANALYSIS: Human Microchipping Poses Dangers to Health, Privacy (2014) (0)
- Wearables and Lifelogging (2015) (0)
- Microchip Implants and Future Applications (2007) (0)
- Uberveillance cements its position as an official dictionary word (2010) (0)
- Ethical Issues and Challenges in Learning Analytics (2014) (0)
- The Challenges Posed by Wearable Technologies (2013) (0)
- Uberveillance and the Technological Trajectory of RFID (2015) (0)
- Police Warn of the Perils of Online Social Networks for Children (2011) (0)
- Privacy problems over an online eye (2013) (0)
- A Selection of Graduation Stories (2009) (0)
- Data Mining: Tracking Mobile Phones in Shopping Malls (2013) (0)
- This Pervasive Day: the potential and perils of pervasive computing (2012) (0)
- The eSurveillance Proposal by Attorney-General's (AG) Department: What are the Potential Privacy Implications? (2012) (0)
- The Consequences of Living and Breathing with Hyperconnectedness (2014) (0)
- Microchip Implants and Location-Based Services (2007) (0)
- Do new privacy protection laws go far enough (2014) (0)
- 'Women Cops Should Join Hands to Fight Crime': Aruna Bahuguna (2015) (0)
- Opening Ceremony for First BJTU Freshmens Majoring in Mechanical and Electronic Engineering with UOW Twinning Arrangement (2014) (0)
- A dollhouse to inspire young women into science, engineering and technology (2015) (0)
- National Security: the Access Card Debate and Emerging Technologies (2006) (0)
- Workshop focus on social implications of covert policing (2009) (0)
- Disney Magic Wristband: The Social Implications of the MyMagic+ System (2014) (0)
- Succeeding in Literature Reviews: The Fundamentals (2014) (0)
- If you track me, will we still trust each other? (2012) (0)
- WIE Featured Person of the Month Highlights (Katina Michael) (2013) (0)
- The Application of Geodemographic Data in Strategic Network Planning (2014) (0)
- Consumer Electronic Instrument Search and Seizure at International Borders: New Laws Allow Border Agents to Demand Passwords for Digital Devices (2019) (0)
- The Trajectory of Chip Implants for Humancentric Applications (2009) (0)
- Community Policing or Big Brother (2009) (0)
- Are disaster early warnings effective (2013) (0)
- Australian women desert technology courses, as university IT enrolments fall (2014) (0)
- Religion, Science & Technology: An Eastern Orthodox Perspective (2016) (0)
- Humans 'will be implanted with microchips' (2009) (0)
- On the Pitfalls of Location Based Social Networking (2009) (0)
- Your credit history could soon be up for sale (2011) (0)
- Couple explores brave new world (2009) (0)
- One Million Downloads for UOW’s Research Online (2009) (0)
- MC for Budding Ideas: UOW Research Show Case (2014) (0)
- Keynote Address: The Final Cut- Tampering with Direct Evidence from Wearable Computers (2013) (0)
- Digital Wearability Scenarios (2015) (0)
- Reflecting on the Contribution of T&S Magazine to the IEEE [Editorial] (2015) (0)
- Globalization and the Changing Face of IDentification (2009) (0)
- Brain Pacemakers in Consumer Medical Electronics Improve Quality of Life-Part II: The Need for Patient Feedback in the Product Lifecycle Management (2018) (0)
- Not So Fast [Book Reviews] (2017) (0)
- Living in a smart world (2013) (0)
- Katina Michael takes helm of tech magazine (2011) (0)
- Grandkids to welcome 'uberveillance' (2010) (0)
- The Emperor has no Privacy (2013) (0)
- Issues Papers: Social Media and Law Enforcement (2013) (0)
- Facial Recognition Systems at the Checkout: Are We Living in a Cashless Society? (2013) (0)
- Privacy and Security Issues in Social Networks section in Encyclopedia of Social Network Analysis and Mining (2013) (0)
- War and Conflict 2.0 (2014) (0)
- Big Dogs and Drones for Crowd Control: The Commercialisation of Military Robots (2015) (0)
- Victoria Police Assessing Spy Drones (2012) (0)
- Careers in Engineering & ICT: Transforming Your Future (2014) (0)
- Body Worn Video (BWV) Technologies in Policing: What are the Social Implications? (2012) (0)
- The ethics of observation: who is watching who? (2015) (0)
- Fragments from a Second Generation Greek-Australian: "Get On Board" (2013) (0)
- Who's the slave and who's the master? Humans vs technology (2014) (0)
- Consumers' Federation of Australia (CFA) representative on Standards Australia Committee for CH-041- Forensic Analysis (2010) (0)
- The Brocial Network and the Potential for Cyberstalking (2011) (0)
- Location-Enabled Social Media: (Consumer Privacy + Enterprise Security) < Government Control (2014) (0)
- Australia's National Security: An Interview with Dr Katina Michael (2006) (0)
- Persona Categories: Highly sought places for Aussies to live (2014) (0)
- Go ?Get Chipped?: A Brief Overview of Non-Medical Implants Between 2013-2017 (Part 2) [Editorial] (2017) (0)
- Forum Proceedings from “UAVs: Pros vs Cons Symposium” in Toronto, Canada, June 2013 (2014) (0)
- Welcome to the rise of homo electricus (2007) (0)
- The Security Risks of Using Tap N' Go Technology like PayPass (2015) (0)
- Big Brother for shoppers, technology to track your mobile (2013) (0)
- On Regulating Location Tracking and Implantable Technology for Non-Medical Applications: The Road Ahead (2010) (0)
- Australia PM says new terror laws will not invade privacy (2014) (0)
- Why some people do not use Facebook? (2019) (0)
- A switch in time (2014) (0)
- Apple Watch Temptation (2015) (0)
- The Aut omatic Identific ation Trajectory (2003) (0)
- Smart Data Collection Workshop Participant (Sydney Business School, 1 Gateway, Sydney, NSW) (2014) (0)
- The Technological Trajectory: From Wearables to Implantables (2013) (0)
- Pre-commitment Technology for Problem Gamblers- What are the Privacy Risks? (2011) (0)
- The Application of Location-Based Emergency Warning Systems and the Socio-Ethical Considerations Surrounding Government Mandated Location-Based Services (2011) (0)
- Operating a drone isn't as easy as it looks (2014) (0)
- Keynote: Cultural Studies Association of Australasia Conference 2014: Provocations (2014) (0)
- Exploding the Myth of Data Privacy: "I'm Your Private Data" (2013) (0)
- The Packbots Are Coming (2014) (0)
- Editorial: What is evidence-based policy (EBP)? (2008) (0)
- The Social Implications of Technology and What You’re Going to Do About Them (2014) (0)
- The Emergence of Community Policing Networks (2009) (0)
- Stop Social Network Pitfalls (2010) (0)
- TrackingPoint bolt-action rifles are game-changers, not a game (2013) (0)
- QBE's Insurance Scheme on GPS Tracking: Accuracy, Privacy, Property & Accessibility (2013) (0)
- Hi-tech vs privacy (2006) (0)
- Growth of social media, growth of cyber crime (2012) (0)
- Rundle Mall's plan to use mobile phone technology to track shoppers as they shop (2013) (0)
- The Case for Biometrics in National Security- The Australian National Audit Office Report (2008) (0)
- Govt launches security research network (2010) (0)
- Keeping Tabs on Dad (2013) (0)
- Vote 1 uberveillance: UOW term in running for 2008 Word of the Year (2009) (0)
- The Dark Side of Online Gaming (2014) (0)
- What is Uberveillance? In the Running for Word of the Year (2009) (0)
- EIS Associate Deans (2013) (0)
- Former NSW Privacy Commissioner Speaks at Wollongong National Security Workshop (2006) (0)
- Opening Ceremony of BJTU-UOW Mechanical & Electronic Engineering Offering (2014) (0)
- VISA and Microchipping People for NFC ePayments (2015) (0)
- IT sector in dire need of more women (2014) (0)
- The Technological Trajectory of Surveillance Technology (2007) (0)
- Social media new tool for fire warnings (2013) (0)
- Factors affecting privacy disclosure on social network sites: an integrated model (2013) (0)
- Humancentric Applications of RFID Chips (2007) (0)
- Privacy and Ethics Discussion (2013) (0)
- Guest Editors' Introduction (2009) (0)
- Drones: Drugs & Drop (2014) (0)
- Films from the Future [Book Review] (2019) (0)
- Take Two: Dr Katina Michael and Sarah Fusco (2008) (0)
- The Use of Mobile Social Networking in Illicit Networks: the medium is the message (2009) (0)
- Question mark over internet privacy (2015) (0)
- Changes to Digital Privacy Laws- But are Consumers Aware? (2014) (0)
- Get some chips with your beer (2007) (0)
- Drug Drop Drone (2014) (0)
- Zhengzhou University and UOW Australia cooperation project 2014 - Graduation Ceremony (2014) (0)
- To what extent can cybercrime be prevented through consumer awareness? Expert panel (2012) (0)
- National Security versus Consumer Privacy: The Issues Surrounding the Cooperation between Business and Government in the Monitoring of Smart Phones used by Illicit Networks (2010) (0)
- Uni workshop focuses on safety, security (2006) (0)
- Apps that will help you keep your resolve (2012) (0)
- Social and Economic Sustainability [Guest Editorial] (2015) (0)
- Unmanned Aerial Vehicles and Systems: Pros and Cons (2013) (0)
- Control,rust, Privacy, and Security: (2007) (0)
- The Use of Biometric Identifiers in Clubs: the Position of the Australian Privacy Foundation (2008) (0)
- Shopping center "track" system popular can instantly "catch" consumer (2013) (0)
- The New Emerging Electronic Commerce Payment Scheme Landscape in the Banking Sector: Smart cards, Radio-frequency ID, Near-field Communications and Smart Phone Apps (2014) (0)
- People plus: is transhumanism the next stage in our evolution? (2012) (0)
- The Wollongong University Cooperative Education with Tianjin Polytechnic University: 2014 Opening Ceremony (2014) (0)
- The Dark Side of Video Games (2016) (0)
- Book Review of Hacking: The Next Generation (written by Nitesh Dhanjani, Billy Rios & Brett Hardin) (2012) (0)
- Implantable Virus Detection Systems in Humans (2011) (0)
- The Rise of Homo Electricus (2007) (0)
- Rattenbury to raise warrants for MyWay data with Attorney-General (2014) (0)
- Job Candidates have a Right to Access their Stored Personal Information after the Recruitment Process (2013) (0)
- A Scholar's View (2013) (0)
- Women In GIS: Katina Michael (2000) (0)
- Keeping Track of Things (2009) (0)
- Introducing the Research Network for a Secure Australia (2006) (0)
- Through the looking glass into the future (2013) (0)
- Government cracks down on identity fraud (2012) (0)
- Demonstrating the potential for covert policing in the community: five stakeholder scenarios (2010) (0)
- Women in Law Enforcement Conference is uniting women law enforcers, says Aruna Bahuguna (2015) (0)
- ISTAS 2018: Technology, Ethics, and Policy [Special Issue Introduction] (2019) (0)
- The European Court of Human Rights Ruling Against Britain's Policy of Keeping Fingerprints & DNA samples of Criminal Suspects (2009) (0)
- Robots and Socio-Ethical Implications [Guest Editorial] (2018) (0)
- War robots and the 2014 World Cup – defenders off the field (2014) (0)
- The Prüm Treaty and the Implications of the European Court of Human Rights’ Ruling Against the UK’s Policy of Keeping Fingerprints and DNA Samples of Criminal Suspects Indefinitely (2009) (0)
- Impacts: At the intersection between the worlds of consumer electronics and socioeconomics. (2014) (0)
- Microchips for Humans (2007) (0)
- Privacy Implications of Coles Supermarket Bank Push (2013) (0)
- Privacy Act Amendments: What do they mean for Australian Consumers? (2014) (0)
- The Social Implications of Bionics (2012) (0)
- Location Based Services and their Social Implications (2011) (0)
- Soap Box: If Katina Michael could send a message to government, it would be this... (2006) (0)
- Follow up the job rejections (2013) (0)
- What Can Location Based Social Networking Applications Tell Us About An Individual's Behavioural Patterns? (2009) (0)
- Participant in the Workshop on the Future of the State-Society Relationship: A Joint Singapore-Australia Foresight Project (2014) (0)
- Are you addicted to social media? How do you know and how to kick the habit (2015) (0)
- Welcome to 'uber-veillance' says Australian Privacy Foundation (2015) (0)
- Packbots, the Soccer World Cup 2014, and Security: Is this the Future? (2014) (0)
- Stakeholders in the cloud computing value-chain : A socio-technical review of data breach literature (2020) (0)
- Big Data's Big Future-- But for Whom? (2014) (0)
- Watch will be wear it’s at (2015) (0)
- The Socio-Ethical Implications of Wearable Technologies: Who’s Watching and Why (2014) (0)
- Are we enslaved by technology? For and Against (2014) (0)
- Total Curriculum Management: A Lifecycle Approach (2007) (0)
- Special Section: Social Impacts of National Security Technologies (2012) (0)
- Consumers Federation of Australia Standards Representative Workshop in Victoria (Standards Australia, Creating Positive Relationships, Consumer Policy, Representation, Panels) (2012) (0)
- Sylvia Mercado Kierkegaard (1953-2015) (2018) (0)
- Book Throws Light on New Technologies (2009) (0)
- The Automatic Identification Technology System: Five Case Studies Exploring the Dynamics of Innovation in the High-tech Industry (2005) (0)
- Planetary-ScaleRFIDServicesin an Age of Uberveillance This paper discusses possible futures for RFID, including an alternative to bar code tagging, and outlines a vision of a future RFID product service system. (2010) (0)
- Implementing Namebers Using Implantable Technologies: The Future Prospects of Person ID (2010) (0)
- The First Workshop on the Social Implications of National Security: An Interview with the Program Chair (2006) (0)
- Self-guided bullets won't stuff up, but what about the grunts and drones firing them? (2012) (0)
- The Auto-ID Technology System (2009) (0)
- Getting the Balance Right Between Information Security and Privacy Rights (2013) (0)
- The Spying Landscape in Australia (2013) (0)
- New jeans protect credit cards from hacking (2014) (0)
- Interative Discussion Leader (IDT) @ FutureGov Forum Queensland on the theme of "Mobile Government" (2012) (0)
- East Para Primary School pupils to have fingerprints scanned: does it really work? (2015) (0)
- 1 THE PARADIGM SHIFT IN TRANSNATIONAL “ ORGANISED (2010) (0)
- Historical Background: From Manual Identification to Auto-ID (2009) (0)
- Keynote: Online Private Search Engines (2014) (0)
- Coles Fly-Buys: What is the Value of Personal Information and the Cost to Everyday Australians of Loyalty Card Schemes? (2014) (0)
- Fat Food Marketing to be Challenged at Open Night for Budding Researchers (2014) (0)
- Natural disasters and early warning systems in Australia (2013) (0)
- Big Brother, Location Tracking and Shopping Malls (2011) (0)
- Human implantable “black-box” technologies need greater scrutiny (2009) (0)
- Boost to CCTV Camera Funding in Australian Cities to Reduce Crime: What are the Risks? (2012) (0)
- Reflections from the Wearable Computing Conference in Toronto, Canada (2013) (0)
- The Brocial Network Facebook Site and its Impact on Community Members (2011) (0)
- The Human Machine: technology is becoming part of us, what are the benefits and risks this poses? (2015) (0)
- TEDxUWollongong: The Social Implications of Microchipping People (2012) (0)
- Title : A Research Note on Ethics in the Emerging Age of Überveillance Author Names and Affiliation : (2013) (0)
- Does Technology Challenge Us as Spiritual Beings (2013) (0)
- Is RFID Safe and Secure (2007) (0)
- Gamifying precision-guided firearms: Bugs and daffy wouldn't stand a chance (2016) (0)
- Teensafe spy app forces parents to choose between trust and online safety (2015) (0)
- Could biometrics give us a world without passwords (2015) (0)
- The Apple Watch and Wearable Downsides (2015) (0)
- Microchip Implants and the Consequences of Emerging Technologies (2010) (0)
- Book Review: "IP Location" by Martin Dawson et al. (2007) (0)
- The IEEE symposium on technology and society 2010 (7-10 June): the social implications of emerging technologies (2011) (0)
- The Future of Artificial Intelligence- Do We Have Anything to Fear? (2016) (0)
- Technology improves emergency warnings (2013) (0)
- ID Scan or Scam (2012) (0)
- With Words That Last (2009) (0)
- Rapid pace of technological change goes beyond George Orwell predictions (2009) (0)
- Yes, Your Cloud Storage Provider Is Looking For Child Porn In Your Files (2013) (0)
- After Five Years (2011) (0)
- Concern people without latest technology will miss fire warnings (2013) (0)
- Policing and the New Visibility: Body Worn Video Recorders Are Coming (2013) (0)
- Credit Card Fraud (2020) (0)
- CCNU Visits UOW in Academic Exchange Tour (2014) (0)
- The Rise of Uberveillance (2007) (0)
- Gone Fishing: Breaking with the Biometric Rhythm of Tech-Centricism [Editorial] (2016) (0)
- A Brief Introduction into the Use of Content Analysis in Qualitative Research (2009) (0)
- UOW and Westpac Supporting Women in Technology (2014) (0)
- Consequences of big data on the individual: Interview (2013) (0)
- Covert Policing using Unobtrusive Global Positioning Systems Trackers: A Demonstration (2009) (0)
- OpinionNet Monitoring of Social Media by the Government, for Emergency Services, and for Brand Marketing- What are the social-ethical issues? (2012) (0)
- Selling rewards schemes for your personal details as Coles reveal privacy policy (2014) (0)
- Location-based Social Media Use in Families : Qualitative Outcomes from Participant Observations (2018) (0)
- Editorial: After Five Years (2011) (0)
- Human microchipping: I've got you under my skin (2014) (0)
- IEEE T&S Magazine: Undergoing Transformation [Editorial] (2012) (0)
- Representing the Australian Privacy Foundation at the Google User and Privacy Forum (2012) (0)
- Glogging Your Every Move (2012) (0)
- Location-enabled Social Media: (Privacy + Security) < Control (2013) (0)
- The Brocial Network and the Risks of Uploading Geotagged Photos on Social Media (2011) (0)
- Secret criminal chat world of 'online underground' (2013) (0)
- Of drones and kill lists, and big dogs with disposition (2015) (0)
- Security Leaders Panel (2015) (0)
- Privacy Foundation concerned by AFP phone-tapping MPs (2013) (0)
- Risk, Complexity and Sustainability [Special Section Introduction] (2013) (0)
- Editorial: "You talkin' to me?" (2012) (0)
- Sound the alarm! Improving disaster warning systems (2013) (0)
- Wearing your password on your sleeve in the new age of identity protection (2015) (0)
- The Uberveillance Trajectory and the Possibility of Microchipping People for the Purposes of National Security (2011) (0)
- Social implications of national security workshop conducted (2007) (0)
- Dashcams Used to Gather Evidence of Adverse Driver Behaviour: Police Encourage Reporting by Citizens (2015) (0)
- BACKGROUND BRIEFING: Living in a smart world - people as sensors-20130620 0104-1 (2013) (0)
- T&S Magazine - Changes for 2021 [News and Notes] (2020) (0)
- The Apple Watch heralds a brave new world of digital living (2015) (0)
- Location-Based Social Networking Technologies for Tourism/Travel (2009) (0)
- Supermarket Money: Discounting the "I've got nothing to hide" argument (2013) (0)
- Can your boss be a Facebook “friend”? (2012) (0)
- Australia's Privacy Amendments: Online Dating, Cross-border Flows, Credit Reporting and More (2014) (0)
- Coles, Loyalty Card Schemes, and Banking - So What's the Connection? (2013) (0)
- Uberveillance Exhibition and Book Launch (2009) (0)
- Doing illegal things online? Here's what the tech companies are doing to catch you (2014) (0)
- Cybercrime and Social Media (2011) (0)
- Children, Teenagers and Social Network Sites: What are the Risks and What Can We Do to Overcome Them (2011) (0)
- 7th Annual MapWorld Conference (2000) (0)
- Keynote: Justifying Uberveillance- The Internet of Things and the Flawed Sustainability Premise (2015) (0)
- Humans in the Loop: Learning to Trust in AI but to What Extent? (2020) (0)
- The Online Privacy Frontier (2003) (0)
- ID scans raise privacy fears (2012) (0)
- Spy in the Sky Zooms in on Illegal Backyard Pools (2010) (0)
- Value Proposition The RFID Value Proposition (2017) (0)
- Conference examines wearable computing technologies in education (2009) (0)
- Warranted and Warrantless Tracking in Australia by Law Enforcement Agencies: Mass Surveillance, PRISM and the NSA Scandal (2013) (0)
- Thank You to Greg Adamson [News and Notes] (2017) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Katina Michael?
Katina Michael is affiliated with the following schools: