Katina Michael
Katina Michael Ph.D., M.TransCrimPrev, B.I.T is Associate Professor in the School of Information Systems and Technology at the University of Wollongong. Katina presently holds a full-time appointment as the Associate Dean - International of the Faculty of Engineering and Information Sciences. She is the IEEE Technology and Society Magazine editor-in-chief and also serves on the editorial board of Elsevier’s Computers & Security journal. Since 2008 she has been a board member of the Australian Privacy Foundation, and in 2011 elected Vice Chair. Michael researches on the socio-ethical implications of emerging technologies. She has also conducted research on the regulatory environment surrounding the tracking and monitoring of people using commercial global positioning systems (GPS) applications in the area of dementia, mental illness, parolees, and minors for which she was awarded an Australian Research Council Discovery grant. Michael has written and edited six books, guest edited numerous special issue journals on themes related to radio-frequency identification (RFID) tags, supply chain management, location-based services, innovation, surveillance/uberveillance, and big data. She has published over 125 academic peer reviewed papers and was responsible for the creation of the human factors series of workshops hosted annually since 2006 on the “Social Implications of National Security”, sponsored by the Research Network for a Secure Australia. Katina was the program chair for IEEE’s International Symposium on Technology and Society (ISTAS) in 2010 at the University of Wollongong, and 2013 at the University of Toronto. She is a Senior Member of the IEEE. She is well-known for her research into the social implications of microchipping people.
Publications
 |
Dan DeFilippi, Katina Michael.
© 2020. 15 pages.
This chapter provides a single person case study of Mr. Dan DeFilippi who was arrested for credit card fraud by the US Secret Service in December 2004. The chapter delves into...
|
 |
Katina Michael, Deniz Gokyer, Samer Abbas.
© 2018. 23 pages.
This chapter presents a set of scenarios involving the GoPro wearable Point of View (PoV) camera. The scenarios are meant to stimulate discussion about acceptable usage contexts...
|
 |
Roba Abbas, Katina Michael, M. G. Michael.
© 2017. 32 pages.
Location-Based Services (LBS) provide value-added solutions to users based on location or position information and other contextual data. They enable the collection of GPS data...
|
 |
Katina Michael, Deniz Gokyer, Samer Abbas.
© 2017. 29 pages.
This chapter presents a set of scenarios involving the GoPro wearable Point of View (PoV) camera. The scenarios are meant to stimulate discussion about acceptable usage contexts...
|
 |
Dan DeFilippi, Katina Michael.
© 2017. 20 pages.
This chapter provides a single person case study of Mr. Dan DeFilippi who was arrested for credit card fraud by the US Secret Service in December 2004. The chapter delves into...
|
 |
M.G. Michael, Katina Michael.
© 2014. 509 pages.
In addition to common forms of spatial units such as satellite imagery and street views, emerging automatic identification technologies are exploring the use of microchip...
|
 |
Anas Aloudat, Katina Michael.
© 2014. 26 pages.
The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian bushfires claimed 173 lives, the worst...
|
 |
Katina Michael.
© 2014. 21 pages.
The European Court of Human Rights (ECtHR) ruling of S and Marper v United Kingdom will have major implications on the retention of Deoxyribonucleic Acid (DNA) samples, profiles...
|
 |
Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei.
© 2013. 29 pages.
The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst...
|
 |
Roba Abbas, Katina Michael, M. G. Michael, Anas Aloudat.
© 2013. 19 pages.
This case presents the possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non-traditional covert surveillance...
|
 |
Anas Aloudat, Katina Michael.
© 2013. 18 pages.
This paper investigates the introduction of location-based services by government as part of an all-hazards approach to modern emergency management solutions. Its main...
|
 |
Dane Hamilton, Katina Michael, Samuel Fosso Wamba.
© 2012. 25 pages.
In this paper, the authors the inventory control practices of a small-to-medium retailer to identify common challenges this type of organization experiences with respect to...
|
 |
Roba Abbas, Katina Michael, M. G. Michael, Anas Aloudat.
© 2012. 19 pages.
This case presents the possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non-traditional covert surveillance...
|
 |
Anas Aloudat, Katina Michael.
© 2011. 26 pages.
The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian bushfires claimed 173 lives, the worst...
|
 |
Roba Abbas, Katina Michael, M. G. Michael, Anas Aloudat.
© 2011. 15 pages.
This case presents the possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non-traditional covert surveillance...
|
 |
Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei.
© 2011. 28 pages.
The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst...
|
 |
Dane Hamilton, Katina Michael, Samuel Fosso Wamba.
© 2010. 24 pages.
In this paper, the authors the inventory control practices of a small-to-medium retailer to identify common challenges this type of organization experiences with respect to...
|
 |
Katina Michael, M.G. Michael.
© 2009. 544 pages.
Automatic identification has evolved to use techniques that can identify an object or subject without direct human intervention. Such devices include the bar code...
|
 |
Katina Michael, M.G. Michael.
© 2009. 24 pages.
This study is concerned with the automatic identification (auto-ID) industry which first came to prominence in the early 1970s. Auto-ID belongs to that larger sector known as...
|
 |
Katina Michael, M.G. Michael.
© 2009. 18 pages.
This chapter will explore literature in the field of innovation in order to establish a conceptual framework for the auto-ID trajectory research. The primary aim of this review...
|
 |
Katina Michael, M.G. Michael.
© 2009. 29 pages.
This chapter takes the reader through a historical tour of identification techniques from ancient times to the present. The histories shed light on how the purpose of citizen...
|
 |
Katina Michael, M.G. Michael.
© 2009. 17 pages.
National security measures can be defined as those technical and non-technical measures that have been initiated as a means to curb breaches in national security, irrespective of...
|
 |
Katina Michael, M.G. Michael.
© 2009. 26 pages.
Of all the auto-ID technologies in the global market today, barcode is the most widely used. In 1994, Cohen (p. 55) wrote “...barcode technology is clearly at the forefront of...
|
 |
Katina Michael, M.G. Michael.
© 2009. 38 pages.
Almost simultaneously that the retail industry underwent revolutionary changes with the introduction of bar code, the financial industry adopted magnetic-stripe card technology....
|
 |
Katina Michael, M.G. Michael.
© 2009. 37 pages.
The history of the smart card begins as far back as 1968. By that time magnetic-stripe cards while not widespread, had been introduced into the market (Purdue, 2008). Momentum...
|
 |
Katina Michael, M.G. Michael.
© 2009. 43 pages.
Biometrics is not only considered a more secure way to identify an individual but also a more convenient technique whereby the individual does not necessarily have to carry an...
|
 |
Katina Michael, M.G. Michael.
© 2009. 39 pages.
Radio frequency identification (RFID) in the form of tags or transponders is a means of auto-ID that can be used for tracking and monitoring objects, both living and non-living....
|
 |
Katina Michael, M.G. Michael.
© 2009. 17 pages.
This chapter analyses the findings from the case studies on bar codes, magnetic-stripe cards, smart cards, biometrics and RFID tags and transponders. Its main aim is to describe...
|
 |
Katina Michael, M.G. Michael.
© 2009. 38 pages.
This chapter is about geographic information systems (GIS) and its relevance to the location-based services industry. One might initially ask how relevant GIS is to a book that...
|
 |
Katina Michael, M.G. Michael.
© 2009. 35 pages.
This chapter considers the automatic identification (auto-ID) trajectory within the context of converging disciplines to predict the realm of likely possibilities in the...
|
 |
Katina Michael, M.G. Michael.
© 2009. 37 pages.
The number of automatic identification (auto-ID) technologies being utilized in eBusiness applications is growing rapidly. With an increasing trend toward miniaturization and...
|
 |
Katina Michael, M.G. Michael.
© 2009. 63 pages.
When Jacques Ellul (1964, p. 432) predicted the use of “electronic banks” in his book, The Technological Society, he was not referring to the computerization of financial...
|
 |
Katina Michael, M.G. Michael.
© 2009. 21 pages.
Uberveillance, also überveillance, is an above and beyond, an exaggerated, an almost omnipresent 24/7 electronic surveillance. It is a surveillance that is not only “always on”...
|
 |
Katina Michael, M.G. Michael.
© 2009. 12 pages.
This chapter is dedicated to identifying the main outcomes of the study and reflections on the future directions of the technologies that were under investigation. In concluding...
|
 |
Katina Michael, Amelia Masters.
© 2008. 18 pages.
The adoption of positioning technologies to supplement, complement and function as defense intelligence applications has become widely accepted within homeland security and...
|
 |
Katina Michael, Leone Dunn.
© 2008. 4 pages.
Information and communication technology (ICT) has been applied successfully to numerous remote indigenous communities around the world. The greatest gains have been made when...
|
 |
Katina Michael, Amelia Masters.
© 2008. 19 pages.
Spurred by the recent escalation of terrorist attacks and their increasingly devastating outcomes, defense intelligence in the context of homeland security has been drawn into...
|
 |
Katina Michael.
© 2007. 21 pages.
In 1999 Southern Networks deployed the Open Text Livelink knowledge management system (KMS). Livelink allowed for the centralization of key corporate applications and associated...
|
 |
Katina Michael.
© 2007. 7 pages.
Today however we are on the brink of building a new sentient being, a bearer of electricity, a modern man belonging to a new race, beyond that which can be considered merely part...
|
 |
Katina Michael, Leone Dunn.
© 2007. 5 pages.
Information and communication technology (ICT) has been applied successfully to numerous remote indigenous communities around the world. The greatest gains have been made when...
|
 |
Katina Michael, Amelia Masters.
© 2006. 29 pages.
Spurred by the recent escalation of terrorist attacks and their increasingly devastating outcomes, defense intelligence in the context of homeland security has been drawn into...
|
 |
Katina Michael, Amelia Masters.
© 2006. 25 pages.
The adoption of positioning technologies to supplement, complement and function as defense intelligence applications has become widely accepted within homeland security and...
|