Katina Michael

Katina Michael Ph.D., M.TransCrimPrev, B.I.T is Associate Professor in the School of Information Systems and Technology at the University of Wollongong. Katina presently holds a full-time appointment as the Associate Dean - International of the Faculty of Engineering and Information Sciences. She is the IEEE Technology and Society Magazine editor-in-chief and also serves on the editorial board of Elsevier’s Computers & Security journal. Since 2008 she has been a board member of the Australian Privacy Foundation, and in 2011 elected Vice Chair. Michael researches on the socio-ethical implications of emerging technologies. She has also conducted research on the regulatory environment surrounding the tracking and monitoring of people using commercial global positioning systems (GPS) applications in the area of dementia, mental illness, parolees, and minors for which she was awarded an Australian Research Council Discovery grant. Michael has written and edited six books, guest edited numerous special issue journals on themes related to radio-frequency identification (RFID) tags, supply chain management, location-based services, innovation, surveillance/uberveillance, and big data. She has published over 125 academic peer reviewed papers and was responsible for the creation of the human factors series of workshops hosted annually since 2006 on the “Social Implications of National Security”, sponsored by the Research Network for a Secure Australia. Katina was the program chair for IEEE’s International Symposium on Technology and Society (ISTAS) in 2010 at the University of Wollongong, and 2013 at the University of Toronto. She is a Senior Member of the IEEE. She is well-known for her research into the social implications of microchipping people.

Publications

Credit Card Fraud: Behind the Scenes
Dan DeFilippi, Katina Michael. © 2020. 15 pages.
This chapter provides a single person case study of Mr. Dan DeFilippi who was arrested for credit card fraud by the US Secret Service in December 2004. The chapter delves into...
Societal Implications of Wearable Technology: Interpreting “Trialability on the Run”
Katina Michael, Deniz Gokyer, Samer Abbas. © 2018. 23 pages.
This chapter presents a set of scenarios involving the GoPro wearable Point of View (PoV) camera. The scenarios are meant to stimulate discussion about acceptable usage contexts...
What Can People Do with Your Spatial Data?: Socio-Ethical Scenarios
Roba Abbas, Katina Michael, M. G. Michael. © 2017. 32 pages.
Location-Based Services (LBS) provide value-added solutions to users based on location or position information and other contextual data. They enable the collection of GPS data...
Societal Implications of Wearable Technology: Interpreting “Trialability on the Run”
Katina Michael, Deniz Gokyer, Samer Abbas. © 2017. 29 pages.
This chapter presents a set of scenarios involving the GoPro wearable Point of View (PoV) camera. The scenarios are meant to stimulate discussion about acceptable usage contexts...
Credit Card Fraud: Behind the Scenes
Dan DeFilippi, Katina Michael. © 2017. 20 pages.
This chapter provides a single person case study of Mr. Dan DeFilippi who was arrested for credit card fraud by the US Secret Service in December 2004. The chapter delves into...
Uberveillance and the Social Implications of Microchip Implants: Emerging Technologies
M.G. Michael, Katina Michael. © 2014. 509 pages.
In addition to common forms of spatial units such as satellite imagery and street views, emerging automatic identification technologies are exploring the use of microchip...
The Socio-Ethical Considerations Surrounding Government Mandated Location-Based Services during Emergencies: An Australian Case Study
Anas Aloudat, Katina Michael. © 2014. 26 pages.
The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian bushfires claimed 173 lives, the worst...
Towards the Blanket Coverage DNA Profiling and Sampling of Citizens in England, Wales, and Northern Ireland
Katina Michael. © 2014. 21 pages.
The European Court of Human Rights (ECtHR) ruling of S and Marper v United Kingdom will have major implications on the retention of Deoxyribonucleic Acid (DNA) samples, profiles...
The Value of Government Mandated Location-Based Services in Emergencies in Australia
Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei. © 2013. 29 pages.
The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst...
Emerging Forms of Covert Surveillance Using GPS-Enabled Devices
Roba Abbas, Katina Michael, M. G. Michael, Anas Aloudat. © 2013. 19 pages.
This case presents the possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non-traditional covert surveillance...
Towards a Conceptual Model of User Acceptance of Location-Based Emergency Services
Anas Aloudat, Katina Michael. © 2013. 18 pages.
This paper investigates the introduction of location-based services by government as part of an all-hazards approach to modern emergency management solutions. Its main...
Overcoming Visibility Issues in a Small-to-Medium Retailer Using Automatic Identification and Data Capture Technology: An Evolutionary Approach
Dane Hamilton, Katina Michael, Samuel Fosso Wamba. © 2012. 25 pages.
In this paper, the authors the inventory control practices of a small-to-medium retailer to identify common challenges this type of organization experiences with respect to...
Emerging Forms of Covert Surveillance Using GPS-Enabled Devices
Roba Abbas, Katina Michael, M. G. Michael, Anas Aloudat. © 2012. 19 pages.
This case presents the possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non-traditional covert surveillance...
The Socio-Ethical Considerations Surrounding Government Mandated Location-Based Services during Emergencies: An Australian Case Study
Anas Aloudat, Katina Michael. © 2011. 26 pages.
The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian bushfires claimed 173 lives, the worst...
Emerging Forms of Covert Surveillance Using GPS-Enabled Devices
Roba Abbas, Katina Michael, M. G. Michael, Anas Aloudat. © 2011. 15 pages.
This case presents the possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non-traditional covert surveillance...
The Value of Government Mandated Location-Based Services in Emergencies in Australia
Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei. © 2011. 28 pages.
The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst...
Overcoming Visibility Issues in a Small-to-Medium Retailer Using Automatic Identification and Data Capture Technology: An Evolutionary Approach
Dane Hamilton, Katina Michael, Samuel Fosso Wamba. © 2010. 24 pages.
In this paper, the authors the inventory control practices of a small-to-medium retailer to identify common challenges this type of organization experiences with respect to...
Innovative Automatic Identification and Location-Based Services: From Bar Codes to Chip Implants
Katina Michael, M.G. Michael. © 2009. 544 pages.
Automatic identification has evolved to use techniques that can identify an object or subject without direct human intervention. Such devices include the bar code...
Introduction
Katina Michael, M.G. Michael. © 2009. 24 pages.
This study is concerned with the automatic identification (auto-ID) industry which first came to prominence in the early 1970s. Auto-ID belongs to that larger sector known as...
Innovation Studies
Katina Michael, M.G. Michael. © 2009. 18 pages.
This chapter will explore literature in the field of innovation in order to establish a conceptual framework for the auto-ID trajectory research. The primary aim of this review...
Historical Background: From Manual Identification to Auto-ID
Katina Michael, M.G. Michael. © 2009. 29 pages.
This chapter takes the reader through a historical tour of identification techniques from ancient times to the present. The histories shed light on how the purpose of citizen...
Globalization and the Changing Face of IDentification
Katina Michael, M.G. Michael. © 2009. 17 pages.
National security measures can be defined as those technical and non-technical measures that have been initiated as a means to curb breaches in national security, irrespective of...
Barcode: The Pioneer Auto-ID Technology
Katina Michael, M.G. Michael. © 2009. 26 pages.
Of all the auto-ID technologies in the global market today, barcode is the most widely used. In 1994, Cohen (p. 55) wrote “...barcode technology is clearly at the forefront of...
Magnetic-Stripe Cards: The Consolidating Force
Katina Michael, M.G. Michael. © 2009. 38 pages.
Almost simultaneously that the retail industry underwent revolutionary changes with the introduction of bar code, the financial industry adopted magnetic-stripe card technology....
Smart Cards: The Next Generation
Katina Michael, M.G. Michael. © 2009. 37 pages.
The history of the smart card begins as far back as 1968. By that time magnetic-stripe cards while not widespread, had been introduced into the market (Purdue, 2008). Momentum...
Biometrics: In Search of a Foolproof Solution
Katina Michael, M.G. Michael. © 2009. 43 pages.
Biometrics is not only considered a more secure way to identify an individual but also a more convenient technique whereby the individual does not necessarily have to carry an...
RFID Tags and Transponders: The New Kid on the Block
Katina Michael, M.G. Michael. © 2009. 39 pages.
Radio frequency identification (RFID) in the form of tags or transponders is a means of auto-ID that can be used for tracking and monitoring objects, both living and non-living....
The Auto-ID Technology System
Katina Michael, M.G. Michael. © 2009. 17 pages.
This chapter analyses the findings from the case studies on bar codes, magnetic-stripe cards, smart cards, biometrics and RFID tags and transponders. Its main aim is to describe...
Geographic Information Systems & Location-Based Services
Katina Michael, M.G. Michael. © 2009. 38 pages.
This chapter is about geographic information systems (GIS) and its relevance to the location-based services industry. One might initially ask how relevant GIS is to a book that...
The Auto-ID Trajectory
Katina Michael, M.G. Michael. © 2009. 35 pages.
This chapter considers the automatic identification (auto-ID) trajectory within the context of converging disciplines to predict the realm of likely possibilities in the...
The Socio-Ethical Implications of Automatic Identification and Location Services
Katina Michael, M.G. Michael. © 2009. 37 pages.
The number of automatic identification (auto-ID) technologies being utilized in eBusiness applications is growing rapidly. With an increasing trend toward miniaturization and...
The Rise of the Electrophorus
Katina Michael, M.G. Michael. © 2009. 63 pages.
When Jacques Ellul (1964, p. 432) predicted the use of “electronic banks” in his book, The Technological Society, he was not referring to the computerization of financial...
Uberveillance
Katina Michael, M.G. Michael. © 2009. 21 pages.
Uberveillance, also überveillance, is an above and beyond, an exaggerated, an almost omnipresent 24/7 electronic surveillance. It is a surveillance that is not only “always on”...
Conclusion
Katina Michael, M.G. Michael. © 2009. 12 pages.
This chapter is dedicated to identifying the main outcomes of the study and reflections on the future directions of the technologies that were under investigation. In concluding...
The Advancement of Positioning Technologies in Defense Intelligence
Katina Michael, Amelia Masters. © 2008. 18 pages.
The adoption of positioning technologies to supplement, complement and function as defense intelligence applications has become widely accepted within homeland security and...
The Use of Information and Communication Technology for the Preservation of Aboriginal Culture: The Badimaya People of Western Australia
Katina Michael, Leone Dunn. © 2008. 4 pages.
Information and communication technology (ICT) has been applied successfully to numerous remote indigenous communities around the world. The greatest gains have been made when...
Realized Applications of Positioning Technologies in Defense Intelligence
Katina Michael, Amelia Masters. © 2008. 19 pages.
Spurred by the recent escalation of terrorist attacks and their increasingly devastating outcomes, defense intelligence in the context of homeland security has been drawn into...
Knowledge Sharing and Organizational Change in a Leading Telecommunications Equipment Vendor: a Case Study on Southern Networks
Katina Michael. © 2007. 21 pages.
In 1999 Southern Networks deployed the Open Text Livelink knowledge management system (KMS). Livelink allowed for the centralization of key corporate applications and associated...
Homo Electricus and the Continued Speciation of Humans
Katina Michael. © 2007. 7 pages.
Today however we are on the brink of building a new sentient being, a bearer of electricity, a modern man belonging to a new race, beyond that which can be considered merely part...
The Use of Information and Communication Technology for the Preservation of Aboriginal Culture: The Badimaya People of Western Australia
Katina Michael, Leone Dunn. © 2007. 5 pages.
Information and communication technology (ICT) has been applied successfully to numerous remote indigenous communities around the world. The greatest gains have been made when...
Realized Applications of Positioning Technologies in Defense Intelligence
Katina Michael, Amelia Masters. © 2006. 29 pages.
Spurred by the recent escalation of terrorist attacks and their increasingly devastating outcomes, defense intelligence in the context of homeland security has been drawn into...
The Advancement of Positioning Technologies in Defense Intelligence
Katina Michael, Amelia Masters. © 2006. 25 pages.
The adoption of positioning technologies to supplement, complement and function as defense intelligence applications has become widely accepted within homeland security and...