M.G. Michael

M.G. Michael Ph.D. (ACU), M.A (Hons) (MacqUni), M.Theol (SydUni), B.Theol (SCD), B.A.(SydUni), DipProfCouns (AIPC) is an Honorary Associate Professor in the School of Information Systems and Technology at the University of Wollongong, NSW, Australia. Michael is a theologian and historian with cross-disciplinary qualifications in the humanities and who introduced the concept of überveillance into the privacy and bioethics literature. Michael brings with him a unique perspective to Information Technology. His formal studies include Ancient History, Theology, General Philosophy, Political Sociology, Ethics, Linguistics, and Government. He was previously the coordinator of Information & Communication Security Issues and since 2005 has guest-lectured and tutored in Location-Based Services, IT & Citizen Rights, Principles of eBusiness, and IT & Innovation. The focus of his current research extends to modern hermeneutics and the Apocalypse of John; the historical antecedents of modern cryptography; the auto-ID trajectory; data protection, privacy and ethics related issues; biometrics, RFID and chip implants; national security and government policy; dataveillance and überveillance; and more broadly the system dynamics between technology and society. Michael is a member of the American Academy of Religion (AAR). He has guest edited the December 2006 volume of Prometheus, several IEEE Technology and Society Magazine issues in 2010-11, an issue for Information Technology Cases (2011) and more recently the Journal of Location-Based Services. He is also the proceedings editor of four national security workshops sponsored by the Australian Research Council’s Research Network for a Secure Australia.

Publications

What Can People Do with Your Spatial Data?: Socio-Ethical Scenarios
Roba Abbas, Katina Michael, M. G. Michael. © 2017. 32 pages.
Location-Based Services (LBS) provide value-added solutions to users based on location or position information and other contextual data. They enable the collection of GPS data...
Introduction: On the “Birth” of Uberveillance
M. G. Michael. © 2016. 31 pages.
When or how uberveillance will be implemented in its full-blown manifestation is still a subject for some intriguing discussion and a topic of robust disagreement, but what is...
Uberveillance and the Social Implications of Microchip Implants: Emerging Technologies
M.G. Michael, Katina Michael. © 2014. 509 pages.
In addition to common forms of spatial units such as satellite imagery and street views, emerging automatic identification technologies are exploring the use of microchip...
Introduction: On the “Birth” of Uberveillance
M. G. Michael. © 2014. 31 pages.
When or how uberveillance will be implemented in its full-blown manifestation is still a subject for some intriguing discussion and a topic of robust disagreement, but what is...
Emerging Forms of Covert Surveillance Using GPS-Enabled Devices
Roba Abbas, Katina Michael, M. G. Michael, Anas Aloudat. © 2013. 19 pages.
This case presents the possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non-traditional covert surveillance...
Emerging Forms of Covert Surveillance Using GPS-Enabled Devices
Roba Abbas, Katina Michael, M. G. Michael, Anas Aloudat. © 2012. 19 pages.
This case presents the possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non-traditional covert surveillance...
Emerging Forms of Covert Surveillance Using GPS-Enabled Devices
Roba Abbas, Katina Michael, M. G. Michael, Anas Aloudat. © 2011. 15 pages.
This case presents the possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non-traditional covert surveillance...
Innovative Automatic Identification and Location-Based Services: From Bar Codes to Chip Implants
Katina Michael, M.G. Michael. © 2009. 544 pages.
Automatic identification has evolved to use techniques that can identify an object or subject without direct human intervention. Such devices include the bar code...
Introduction
Katina Michael, M.G. Michael. © 2009. 24 pages.
This study is concerned with the automatic identification (auto-ID) industry which first came to prominence in the early 1970s. Auto-ID belongs to that larger sector known as...
Innovation Studies
Katina Michael, M.G. Michael. © 2009. 18 pages.
This chapter will explore literature in the field of innovation in order to establish a conceptual framework for the auto-ID trajectory research. The primary aim of this review...
Historical Background: From Manual Identification to Auto-ID
Katina Michael, M.G. Michael. © 2009. 29 pages.
This chapter takes the reader through a historical tour of identification techniques from ancient times to the present. The histories shed light on how the purpose of citizen...
Globalization and the Changing Face of IDentification
Katina Michael, M.G. Michael. © 2009. 17 pages.
National security measures can be defined as those technical and non-technical measures that have been initiated as a means to curb breaches in national security, irrespective of...
Barcode: The Pioneer Auto-ID Technology
Katina Michael, M.G. Michael. © 2009. 26 pages.
Of all the auto-ID technologies in the global market today, barcode is the most widely used. In 1994, Cohen (p. 55) wrote “...barcode technology is clearly at the forefront of...
Magnetic-Stripe Cards: The Consolidating Force
Katina Michael, M.G. Michael. © 2009. 38 pages.
Almost simultaneously that the retail industry underwent revolutionary changes with the introduction of bar code, the financial industry adopted magnetic-stripe card technology....
Smart Cards: The Next Generation
Katina Michael, M.G. Michael. © 2009. 37 pages.
The history of the smart card begins as far back as 1968. By that time magnetic-stripe cards while not widespread, had been introduced into the market (Purdue, 2008). Momentum...
Biometrics: In Search of a Foolproof Solution
Katina Michael, M.G. Michael. © 2009. 43 pages.
Biometrics is not only considered a more secure way to identify an individual but also a more convenient technique whereby the individual does not necessarily have to carry an...
RFID Tags and Transponders: The New Kid on the Block
Katina Michael, M.G. Michael. © 2009. 39 pages.
Radio frequency identification (RFID) in the form of tags or transponders is a means of auto-ID that can be used for tracking and monitoring objects, both living and non-living....
The Auto-ID Technology System
Katina Michael, M.G. Michael. © 2009. 17 pages.
This chapter analyses the findings from the case studies on bar codes, magnetic-stripe cards, smart cards, biometrics and RFID tags and transponders. Its main aim is to describe...
Geographic Information Systems & Location-Based Services
Katina Michael, M.G. Michael. © 2009. 38 pages.
This chapter is about geographic information systems (GIS) and its relevance to the location-based services industry. One might initially ask how relevant GIS is to a book that...
The Auto-ID Trajectory
Katina Michael, M.G. Michael. © 2009. 35 pages.
This chapter considers the automatic identification (auto-ID) trajectory within the context of converging disciplines to predict the realm of likely possibilities in the...
The Socio-Ethical Implications of Automatic Identification and Location Services
Katina Michael, M.G. Michael. © 2009. 37 pages.
The number of automatic identification (auto-ID) technologies being utilized in eBusiness applications is growing rapidly. With an increasing trend toward miniaturization and...
The Rise of the Electrophorus
Katina Michael, M.G. Michael. © 2009. 63 pages.
When Jacques Ellul (1964, p. 432) predicted the use of “electronic banks” in his book, The Technological Society, he was not referring to the computerization of financial...
Uberveillance
Katina Michael, M.G. Michael. © 2009. 21 pages.
Uberveillance, also überveillance, is an above and beyond, an exaggerated, an almost omnipresent 24/7 electronic surveillance. It is a surveillance that is not only “always on”...
Conclusion
Katina Michael, M.G. Michael. © 2009. 12 pages.
This chapter is dedicated to identifying the main outcomes of the study and reflections on the future directions of the technologies that were under investigation. In concluding...