Guest Edited Special Issues

  1. Michael, K. & Michael, M.G. 2006, Prometheus, “The Social Implications of National Security” 24(4)
  2. Labrador, M, Michael, K. & Kuepper, A. 2008, Computer Communications, “Advanced Location-Based Services”, 31(6)
  3. Coltman,T., Gadh, R. and Michael, K., 2008, Journal of Theoretical and Applied Electronic Commerce Research, “RFID and Supply Chain Management”, 3(1)
  4. Gadh, R., Michael, K. (et al.), 2010, Proceedings of the IEEE, “RFID - A Unique Radio Innovation for the 21st Century”, 98(9)
  5. Michael, K. & Michael, M.G. 2010, IEEE Technology and Society Magazine, “Uberveillance”, 29(2)
  6. Michael, K., Michael, M.G. & Abbas, R. 2011, Journal of Cases on Information Technology, “The Social Implications of Emerging Technologies”, 13(2)
  7. Michael, K. & Michael, M.G. 2011, IEEE Technology and Society Magazine, “The Social Implications of Emerging Technologies”, 30(2)
  8. Michael, K. & Michael, M.G. 2011, Journal of Location-Based Services, “The social and behavioural implications of location-based services”, (3-4)
  9. Michael, K. & Miller, K. 2012, IEEE Computer, “Big Data: Opportunities and Challenges”, 46(6)
  10. Shiguo Lian, Xi Chen, and Katina Michael, 2013, Electronic Commerce Research, "Service-Based Electronic Commerce Systems", (13)2
  11. Katina Michael, 2015, IEEE Consumer Electronics Magazine, "Little Brother is Watching", 4(2)
  12. Ramona Pringle, Katina Michael and M.G. Michael, IEEE Potentials, 2016, "Unintended Consequences", 35(5)
  13. Katina Michael, Diana Bowman, Meg Leta Jones, Ramona Pringle, IEEE Technology and Society Magazine, 2018, "Robots and Socio-Ethical Implications", 37(1)
  14. Noel Sharkey, Aimee van Wynsberghe, John C. Havens, Katina Michael, IEEE Robotics and Automation, 2018, "Socioethical Approaches to Robotics Development", (25)1

Presentations (non-peer reviewed)

  1. Michael, K. (2003). The Importance of Conducting Geodemographic Market Analysis on Coastal Areas: A Pilot Study Using Kiama Council. Coastal GIS. C. D. Woodroffe and R. A. Furness. Wollongong, Australia, Centre for Maritime Policy: 481-96.
  2. Michael, K. (2004). Knowledge Management. Knowledge & Culture: Organisational Intangibles & Their Tangible Value Greenwich, UK.
  3. Chew, T. Y. and K. Michael (2005). Locat'em: Towards Hierarchical Positioning Systems. 32nd Annual Research Seminars for School of Surveying and Spatial Information Systems SNAP, University of New South Wales, Australia.
  4. Michael, K. (2005). The Automatic Identification Technology System: Five Case Studies Exploring the Dynamics of Innovation in the High-tech Industry. IEEE Engineering Management Society, Singapore Chapter, Singapore.
  5. Michael, K. (2005). The Use of Geospatial Intelligence for National Security: Determining the Threats and Identifying the Critical Infrastructure to Protect. Risk Assessment Workshop: The Research Network for a Secure Australia University of New South Wales, Australia.
  6. Michael, K. (2006). Introducing the Research Network for a Secure Australia. STEP Forum: Science, Technology and Economic Progress, University of Canberra, Australia.
  7. Michael, K. and M. G. Michael (2006). The Proliferation of Identification Techniques for Citizens throughout the Ages. The Social Implications of Information Security Measures on Citizens and Business. K. Michael and M. G. Michael. Wollongong, University of Wollongong: 7-26.
  8. Michael, K., B. Stroh, et al. (2006). The AVIAN Flu Tracker- a Location Service Proof of Concept. Recent Advances in Security Technology 2006. P. Mendis, J. Lai and E. Dawson. Canberra, Australian Homeland Security Research Centre: 244-58.
  9. Johnston, K., K. Michael, et al. (2007). Consumer Awareness in Australia on the Prospect of Humancentric RFID Implants for Personalized Applications. Special Session of the Sixth IEEE International Conference on Mobile Business (Presentation Only), Toronto, Canada, IEEE.
  10. Michael, K. and M. G. Michael. (May 2007). "Uni In The Brewery: Session 2 (The Rise of Homo Electricus)" UniBrewery, from http://www.uow.edu.au/research/unibrewery/UOW009417.html.
  11. Michael, K. (2007). Total Curriculum Management (TCM): An Integrated Curriculum Using Distributed Content. Distributive Leadership for Learning and Teaching | Assessment Roundtable, Sydney, NSW, Australia, University of Wollongong, University of Tasmania.
  12. Michael, K. (2007). Total Curriculum Management: A Lifecycle Approach. Teaching and Learning Scholars Retreat, Cleveland, Victoria.
  13. Michael, K. and M. G. Michael (2007). The Rise of Homo Electricus. Australian Innovation Festival, Wollongong, Australia.
  14. Aloudat, A., K. Michael, et al. (2007). Location-Based Services in Emergency Management- from Government to Citizens: Global Case Studies. Recent Advances in Security Technology. P. Mendis, J. Lai and E. Dawson. Melbourne, Australian Homeland Security Research Centre: 190-201.
  15. Michael, K. and G. Rose (2007). Human Tracking Technology in Mutual Legal Assistance and Police Inter-state Cooperation in International Crimes. From Dataveillance to Uberveillance and the Realpolitik of the Transparent Society. K. Michael and M. G. Michael. Wollongong, University of Wollongong: 241-56.
  16. Michael, M. G. and K. Michael (2007). A Note on Uberveillance. From Dataveillance to Uberveillance and the Realpolitik of the Transparent Society. K. Michael and M. G. Michael. Wollongong, University of Wollongong: 9-26.
  17. Michael, K. (2008). Representing the Australian Privacy Foundation. Consultations on the Uniform Privacy Principles Proposed by the Australian Law Reform Commission, Department of Prime Minister and Cabinet, 1-3 National Circuit, Canberra.
  18. Michael, M. G. and K. Michael (2008). Überveillance: 24/7 x 365 People Tracking & Monitoring. You are where you’ve been: Technological threats to your location privacy, Sydney, NSW, Australia, UNSW, Australia.
  19. Michael, K. and M. G. Michael (2008). What is Evidence-Based Policy (EBP)? Australia and the New Technologies: Towards Evidence Based Policy in Public Administration. K. Michael and M. G. Michael. Wollongong, University of Wollongong: 11-6.
  20. Wamba, S. F. and K. Michael (2008). An Information Systems Design Theory for an RFID University-Based Laboratory. 4th Information Systems Foundations Workshop, Canberra: 1-14.
  21. RFID Adoption Issues: Analysis of Organizational Benefits and Risks (with Samuel F. Wamba, Byron Keating, and Tim Coltman), Auto ID Labs (2009)
  22. Predicting the socioethical implications of implanting people with microchips (with M.G. Michael), PerAda Magazine (2009)
  23. Goldsmith, A. and K. Michael (2009). Police Accountability in an Age of Uberveillance. Australia and New Zealand Society of Criminology Conference: Crime and Justice Challenges in the 21st Century: Victims, Offenders and Communities, Perth, Australia, Australia and New Zealand Society.
  24. Michael, K., M. G. Michael, et al. (2009). The Dilemmas of using Wearable Computing to Monitor People: An Extended Metaphor on the Tracking of Prison Inmates and Parolees. Australia and New Zealand Society of Criminology Conference: Crime and Justice Challenges in the 21st Century: Victims, Offenders and Communities, Perth, Australia, Australia and New Zealand Society of Criminology.
  25. Michael, K. and M. G. Michael (2009). "Predicting the socioethical implications of implanting people with microchips." PerAda Magazine: 1-3.
  26. Michael, K. (28 August 2009). "Location Based Services for Emergency Management." Public Sphere #3: Australian ICT & Creative Industries DevelopmentRetrieved 9 August 2009, from http://www.katelundy.com.au/2009/07/24/public-sphere-3-australian-ict-creative-industries-development/.
  27. Michael, K. (25 August 2009). The Prüm Treaty and the Implications of the European Court of Human Rights' Ruling Against the UK's Policy of Keeping Fingerprints and DNA Samples of Criminal Suspects. Centre for Transnational Crime Prevention Seminar Series, Faculty of Law, Innovation Campus, University of Wollongong.
  28. Michael, K. (19 August 2009). Cloud Computing- A Different Perspective. Gilbert and Tobin Layers (An Invited Talk to Telstra Legal), Sydney, Australia.
  29. Michael, K. (30 July 2009). The Language and Meaning of Implantables for Human. The IEEE Society on the Social Implications of Technology: Australian Chapter, Melbourne, Victoria, IEEE.
  30. Abbas, R. and K. Michael (2009). Covert Policing using Unobtrusive Global Positioning Systems Trackers: A Demonstration. The Social Implications of Covert Policing, National Europe Centre, Australian National University, Canberra, NEC- ANU.
  31. Abbas, R., K. Michael, et al. (2009). Demonstrating the Potential for Covert Policing in the Community: Five Stakeholder Scenarios. The Social Implications of Covert Policing, National Europe Centre, Australian National University, Canberra, NEC- ANU.
  32. Michael, K. (2009). The Emergence of Community Policing Networks. Crossing Borders- Promoting Regional Law Enforcement Cooperation: European, Australian and Asia-Pacific Perspectives, Australian National University, Canberra, NEC- ANU.
  33. Michael, K. (2009). Katina Michael gives Evidence as a Board Member of the Australian Privacy Foundation. Senate Standing Committee for Legal and Constitutional Affairs (Personal Property Securities Bill 2008), NSW Parliament House, Sydney, Australia.
  34. Michael, K. (2009). The National Plan to Reduce Violence Against Women. Representing the Australian Privacy Foundation at the Amnesty International Roundtable Forum, NSW Action Centre, Chippendale, Australia.
  35. Michael, K. (2009). Session Six: Case Studies in Favour of a Federated Identity. 7th Annual Management & Information Security Forum, Sydney, NSW, Australia.
  36. Michael, K. and C. Harfield (2009). The European Court of Human Rights Ruling Against Britain's Policy of Keeping Fingerprints & DNA samples of Criminal Suspects. The Social Implications of Covert Policing, National Europe Centre, Australian National University, Canberra, NEC- ANU.
  37. Michael, K. and M. G. Michael (2009). Teaching ICT Ethics Using Wearable Computing: the Social Implications of the New 'Veillance' AUPOV09- Australian Point of View Technologies Conference Wollongong, Australia, AUPOV.
  38. What Can Location Based Social Networking Applications Tell Us About An Individual's Behavioural Patterns?, Institute for Innovation in Business and Social Research Retreat- University of Wollongong (2009)
  39. On Regulating Location Tracking and Implantable Technology for Non-Medical Applications: The Road Ahead (with Roba Abbas and Anas Aloudat), Institute for Social Transformation Research (ISTR) (2010)
  40. National Security versus Consumer Privacy: The Issues Surrounding the Cooperation between Business and Government in the Monitoring of Smart Phones used by Illicit Networks, Illicit Networks (2010)
  41. RFID Implantable Devices for Humans and the Risk versus Reward Debate: "What are we waiting for?", PerAda Workshop on Security, Trust and Privacy (2010)
  42. Implementing Namebers Using Implantable Technologies: The Future Prospects of Person ID (with M.G. Michael), 'This Pervasive Day' Workshop, Imperial College London (2010)
  43. The Application of Location-Based Emergency Warning Systems and the Socio-Ethical Considerations Surrounding Government Mandated Location-Based Services (with Anas Aloudat), CEPS Conference 2011: Risk and Resilience-Redefining Security (2011)
  44. Implantable Virus Detection Systems in Humans (with M.G. Michael), Exposing Bodies: Surveillance & Embodiment (2011)
  45. Event Report: The IEEE Symposium on Technology and Society 2010 (7-10 June): The Social Implications of Emerging Technologies, Event Report which appeared in the Journal of Cases on Information Technology (JCIT) Special Issue on the "Social Implications of Emerging Technologies" (2011)
  46. The Prüm Treaty and the Implications of the European Court of Human Rights’ Ruling Against the UK’s Policy of Keeping Fingerprints and DNA Samples of Criminal Suspects Indefinitely, Exposing Bodies: Surveillance & Embodiment (2011)
  47. Fraud prevention and control in the public sector, IIR Conferences: An Informa Business (2011)
  48. The FBI’s Cybercrime Alert on Mattel’s Barbie Video Girl: A Possible Method for the Production of Child Pornography or Just another Point of View, The 4th Regional Conference on Cybercrime and International Criminal Cooperation (CICC11) (2011)
  49. Heaven and Hell: Visions for Pervasive Adaptation (with Edinburgh Napier University, Jeremy Pitt, and Nikola Serbedzija), FET11: The European Future Technologies Conference and Exhibition (2011)
  50. The Case Against Mandatory Data Retention Laws in Australia, New Media Regulation and Cultural Literacies -- The Need for Evidence-Based Policy (Institute for Social Transformation Research) (2012)
  51. Tracking All Shoppers in Malls Using Mobile Phones: Good Marketing or a Breach of Privacy?, IIBSOR Research Retreat, University of Wollongong (2012)
  52. The Social Implications of Bionics, The 3rd Asia-Pacific Symposium on Nanobionics (2012)
  53. Book Review: Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges (written by Sajal K. Das, Krishna Kant, Nan Zhang), Computers & Security Journal (2012)
  54. Book Review of Hacking: The Next Generation (written by Nitesh Dhanjani, Billy Rios & Brett Hardin), Computers & Security Journal (2012)
  55. Book Review: Securing the Cloud: Cloud Computer Security Techniques and Tactics, Computers & Security Journal (2012)
  56. Book Review: The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice, Computers & Security (2012)
  57. Growth of social media, growth of cyber crime, Informa Conference (2012)
  58. To what extent can cybercrime be prevented through consumer awareness? Expert panel (with John Lounsbury, Leanne Vale, and Ty Miller), Cybercrime Symposium (2012)
  59. Israel, Palestine and the benefits of waging war through Twitter, The Conversation (2012)
  60. People plus: is transhumanism the next stage in our evolution?, The Conversation: Science and Technology (2012)
  61. Meet Boston Dynamics' LS3 – the latest robotic war machine, The Conversation: Science and Technology (2012)
  62. Converging and coexisting systems towards smart surveillance (with MG Michael), Awareness Magazine (Self-Awareness in Autonomic Systems): Networks & Infrastructure (2012)
  63. Self-guided bullets won’t stuff up, but what about the grunts and drones firing them?, The Conversation (2012)
  64. Sousveillance and Point of View Technologies in Law Enforcement: An Overview (with M.G. Michael), The Sixth Workshop on the Social Implications of National Security: Sousveillance and Point of View Technologies in Law Enforcement (An Overview) (2012)
  65. Microchip Implants for Employees in the Workplace: Findings from a Multi-Country Survey of Small Business Owners (with Christine Perakslis and M.G. Michael), Surveillance and/in Everyday Life: Monitoring Pasts, Presents and Futures (2012)
  66. Towards the Blanket Coverage DNA Profiling and Sampling of Citizens in England, Wales and Northern Ireland: A Historical Review, Surveillance and/in Everyday Life: Monitoring Pasts, Presents and Futures (2012)
  67. Body Worn Video (BWV) Technologies in Policing: What are the Social Implications?, IIBSOR Research Retreat (2012)
  68. Book Review: Security Risk Management: Building an Information Security Risk Management Program from the Ground Up, Computers & Security Journal (2012)
  69. Panel 2- Regulation, policy recommendations and responses (with Jonathan Clough, Scott Mellis, Simon Brown, Graham Ingram, Alana Maurushat, and Jason Ryning), ANU Cybercrime Observatory Workshop 2013 (2013)
  70. Fragments from a Second Generation Greek-Australian: "Get On Board", Women of the World Series: University of Wollongong (2013)
  71. The Challenges Posed by Wearable Technologies, ACT Gaggle initiative - mTech: The Educational Context (2013)
  72. Unmanned Aerial Vehicles and Systems: Pros and Cons, Seventh Forum on the Social Implications of National Security (UAVs: Pros and Cons in Policing, Security & Everyday Life) (2013)
  73. Getting the Balance Right Between Information Security and Privacy Rights, Privacy Reform & Compliance Forum: INFORMA Conference (2013)
  74. Big Data and Policing: The Pros and Cons of Using Situational Awareness for Proactive Criminalisation, Centre for Excellence in Policing and Security: Human Rights and Policing Conference (2013)
  75. WORKSHOP | Body Worn Video Recorders: The Socio-Technical Implications of Gathering Direct Evidence (with Alexander Hayes), INFORMA Police Technology Forum 2013 (2013)
  76. Location-enabled Social Media: (Privacy + Security) < Control, Social Media Workshop (Sponsored by Office of Naval Research Science and Technology, Defence Science Institute, Australian Government Department of Defense) (2013)
  77. Issues Papers: Social Media and Law Enforcement, Commissioner for Law Enforcement Data Security (2013)
  78. The land of milk and money, The Drum: Analysis and Opinion on the Issues of the Day (2013)
  79. TrackingPoint bolt-action rifles are game-changers, not a game, The Conversation (2013)
  80. Keynote: Cultural Studies Association of Australasia Conference 2014: Provocations, CSAA (2014)
  81. Succeeding in Literature Reviews: The Fundamentals, University of Wollongong - Dubai (2014)
  82. The New Emerging Electronic Commerce Payment Scheme Landscape in the Banking Sector: Smart cards, Radio-frequency ID, Near-field Communications and Smart Phone Apps, Nanjing University (2014)
  83. A Brave New World of ‘Under the Skin’ Payments, Technology & Innovation - The Future of Payments (2014)
  84. Ethical Issues and Challenges in Learning Analytics, NSW Learning Analytics Working Group (2014)
  85. We are becoming enslaved by our technology (with Alastair MacGibbon, Bernard Keane, Peter Singer, Antony Loewenstein, and Asher Wolf), IQ2 Debate: The Forum for Live Debate (2014)
  86. War robots and the 2014 World Cup – defenders off the field (with MG Michael), The Conversation: Science + Technology (2014)
  87. Panel Discussion: Using Crowdsourced Geosocial Intelligence for Civic Infrastructure Planning (with Etienne Turpin, Tomas Holderness, and Rohan Wickramasuriya Denagamage), UAV Triple Zero Summit (2014)
  88. The Consequences of Living and Breathing with Hyperconnectedness, Fundamentals of Collective Adaptive Systems (FoCAS): Summer School 2014 (2014)
  89. The Application of Geodemographic Data in Strategic Network Planning, Zhengzhou University (School of Information Engineering) (2014)
  90. MC for Budding Ideas: UOW Research Show Case, University of Wollongong (2014)
  91. Keynote: Online Private Search Engines (with Katherine Albrecht), ObjectConsulting: Big Day Out (2014)
  92. Careers in Engineering & ICT: Transforming Your Future, BiG Day In Wollongong (2014)
  93. Infrastructure planning through GeoSocial intelligence: using Twitter as a platform for rapid assessment and civic co-management during flooding in Jakarta (with Tomas Holderness and Etienne Turpin), Defining the Sensor Society Conference (2014)
  94.  “Someone(thing)” to Watch Over Me: Big Data = Big Issues (with M.G. Michael), Prime Minister & Cabinet, Australian Government (2014)
  95. The Socio-Ethical Implications of Wearable Technologies: Who’s Watching and Why, INTI Laureate (2014)
  96. Location-Enabled Social Media: (Consumer Privacy + Enterprise Security) < Government Control, DSTO Workshop (2014)
  97. War and Conflict 2.0, Q Symposium: Peace and Security in a Quantum Age (2014)
  98. Forum Proceedings from “UAVs: Pros vs Cons Symposium” in Toronto, Canada, June 2013, Unmanned Aerial Systems and Public Safety: Capabilities, Uses and Regulation (2014)
  99. The Social Implications of Technology and What You’re Going to Do About Them, Community College of City University (2014)
  100. Security Leaders Panel, 7th Annual Technology & Innovation – the Future of Security in Financial Services (2015)
  101. The Apple Watch heralds a brave new world of digital living (with MG Michael), The Conversation (2015)