default search action
Michael G. Michael
Person information
- affiliation: University of Wollongong, NSW, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j22]Michael G. Michael, Katina Michael:
Capitalism and the Enchanted Screen: Myths and Allegories in the Digital Age - Aleks Wansbrough (London, U.K.: Bloomsbury Publishing, 2021, 232 pp.). IEEE Technol. Soc. Mag. 41(2): 10-13 (2022)
2010 – 2019
- 2017
- [j21]Katina Michael, Anas Aloudat, Michael G. Michael, Christine Perakslis:
You Want to Do What with RFID?: Perceptions of radio-frequency identification implants for employee identification in the workplace. IEEE Consumer Electron. Mag. 6(3): 111-117 (2017) - [j20]Katina Michael, Michael G. Michael, Jai C. Galliot, Rob Nicholls:
Socio-Ethical Implications of Implantable Technologies in the Military Sector [Guest Editorial]. IEEE Technol. Soc. Mag. 36(1): 7-9 (2017) - [j19]Kallistos Ware, Michael G. Michael, Katina Michael:
Religion, Science, and Technology: An Interview with Metropolitan Kallistos Ware [Interview]. IEEE Technol. Soc. Mag. 36(1): 20-26 (2017) - 2016
- [j18]Katherine Albrecht, Katina Michael, Michael G. Michael:
The Dark Side of Video Games: Are you addicted? IEEE Consumer Electron. Mag. 5(1): 107-113 (2016) - [j17]Michael G. Michael:
The Paradox of the Uberveillance Equation [Commentary]. IEEE Technol. Soc. Mag. 35(3): 14-20 (2016) - [j16]Ramona Pringle, Katina Michael, Michael G. Michael:
Unintended Consequences of Living with AI: The Paradox of Technological Potential?Part II [Guest Editorial]. IEEE Technol. Soc. Mag. 35(4): 17-21 (2016) - 2015
- [j15]Michael G. Michael, Katina Michael, Christine Perakslis:
Überveillance, the Web of Things, and People: What is the culmination of all this surveillance? IEEE Consumer Electron. Mag. 4(2): 107-113 (2015) - [j14]Katina Michael, Michael G. Michael:
Apple Watch Temptation: Just visit the App Store. IEEE Consumer Electron. Mag. 4(4): 120-122 (2015) - [j13]Roba Abbas, Katina Michael, Michael G. Michael, Rob Nicholls:
Key government agency perspectives on location based services regulation. Comput. Law Secur. Rev. 31(6): 736-748 (2015) - [j12]Greg Adamson, Ronald R. Kline, Katina Michael, Michael G. Michael:
Wiener's Cybernetics Legacy and the Growing Need for the Interdisciplinary Approach [Scanning Our Past]. Proc. IEEE 103(11): 2208-2214 (2015) - [j11]Michael G. Michael, Katina Michael:
Resistance Is Not Futile, nil desperandum [Editorial]. IEEE Technol. Soc. Mag. 34(3): 10-13 (2015) - 2014
- [j10]Katina Michael, Michael G. Michael:
The Packbots Are Coming: Boosting security at the 2014 FIFA World Cup. IEEE Consumer Electron. Mag. 3(3): 59-61 (2014) - [j9]Roba Abbas, Katina Michael, Michael G. Michael:
The regulatory considerations and ethical dilemmas of location-based services (LBS): A literature review. Inf. Technol. People 27(1): 2-20 (2014) - 2013
- [j8]Katina Michael, Michael G. Michael:
No limits to watching? Commun. ACM 56(11): 26-28 (2013) - [j7]Roba Abbas, Katina Michael, Michael G. Michael, Rob Nicholls:
Sketching and validating the location-based services (LBS) regulatory framework in Australia. Comput. Law Secur. Rev. 29(5): 576-589 (2013) - 2012
- [j6]Karl D. Stephan, Katina Michael, Michael G. Michael, Laura Jacob, Emily P. Anesta:
Social Implications of Technology: The Past, the Present, and the Future. Proc. IEEE 100(Centennial-Issue): 1752-1781 (2012) - [j5]Michael G. Michael, Katina Michael:
Privacy¿The Times They Are A-Changin' [Introduction]. IEEE Technol. Soc. Mag. 31(4): 20-21 (2012) - [p1]Katina Michael, Michael G. Michael:
Implementing 'Namebers' Using Microchip Implants: The Black Box Beneath The Skin. This Pervasive Day 2012: 163-206 - 2011
- [j4]Roba Abbas, Katina Michael, Michael G. Michael, Anas Aloudat:
Emerging Forms of Covert Surveillance Using GPS-Enabled Devices. J. Cases Inf. Technol. 13(2): 19-33 (2011) - [j3]Katina Michael, Michael G. Michael:
The social and behavioural implications of location-based services. J. Locat. Based Serv. 5(3-4): 121-137 (2011) - 2010
- [j2]Michael G. Michael, Katina Michael:
Toward a State of Überveillance. IEEE Technol. Soc. Mag. 29(2): 9-16 (2010) - [c8]Michael G. Michael:
Demystifying the number of the beast in the book of revelation: Examples of ancient cryptology and the interpretation of the "666" conundrum. ISTAS 2010: 23-41 - [c7]Sarah Jean Fusco, Katina Michael, Michael G. Michael:
Using a social informatics framework to study the effects of location-based social networking on relationships between people: A review of literature. ISTAS 2010: 157-171 - [c6]Katina Michael, Michael G. Michael:
The diffusion of RFID implants for access control and epayments: A case study on Baja Beach Club in Barcelona. ISTAS 2010: 242-252 - [c5]Amal Graafstra, Katina Michael, Michael G. Michael:
Social-technical issues facing the humancentric RFID implantee sub-culture through the eyes of Amal Graafstra. ISTAS 2010: 498-516
2000 – 2009
- 2009
- [c4]Angelo Friggieri, Katina Michael, Michael G. Michael:
The legal ramifications of microchipping people in the United States of America- A state legislative comparison. ISTAS 2009: 1-8 - [c3]Rodney Ip, Katina Michael, Michael G. Michael:
Location and interactive services not only at your fingertips but under your skin. ISTAS 2009: 1-7 - 2008
- [j1]Michael G. Michael, Sarah Jean Fusco, Katina Michael:
A research note on ethics in the emerging age of überveillance. Comput. Commun. 31(6): 1192-1199 (2008) - 2006
- [c2]Katina Michael, Andrew McNamee, Michael G. Michael:
The Emerging Ethics of Humancentric GPS Tracking and Monitoring. ICMB 2006: 34 - [c1]Katina Michael, Andrew McNamee, Michael G. Michael, Holly Tootell:
Location-based intelligence - modeling behavior in humans using GPS. ISTAS 2006: 1-8
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint