Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

Professor Katina Michael

Automatic Identification

Articles 1 - 10 of 10

Full-Text Articles in Physical Sciences and Mathematics

Emerging Forms Of Covert Surveillance Using Gps-Enabled Devices, Roba Abbas, Katina Michael, M.G. Michael, Anas Aloudat Jun 2011

Emerging Forms Of Covert Surveillance Using Gps-Enabled Devices, Roba Abbas, Katina Michael, M.G. Michael, Anas Aloudat

Professor Katina Michael

This paper presents the real possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non-traditional covert surveillance within a community setting, resulting in community members engaging in the covert observation of family, friends, or acquaintances. This paper investigates five stakeholder relationships using scenarios to demonstrate the potential socio-ethical implications that tracking and monitoring people will have on society at large. The five stakeholder types explored in this paper include: (i) husband-wife (partner-partner), (ii) parent-child, (iii) employer-employee, (iv) friend-friend, and (v) stranger-stranger. Mobile technologies such as mobile camera phones, global positioning system data loggers, …


Heaven And Hell: Visions For Pervasive Adaptation, Ben Paechter, Jeremy Pitt, Nikola Serbedzijac, Katina Michael, Jennifer Willies, Ingi Helgason Jun 2011

Heaven And Hell: Visions For Pervasive Adaptation, Ben Paechter, Jeremy Pitt, Nikola Serbedzijac, Katina Michael, Jennifer Willies, Ingi Helgason

Professor Katina Michael

With everyday objects becoming increasingly smart and the “info-sphere” being enriched with nanosensors and networked to computationally-enabled devices and services, the way we interact with our environment has changed significantly, and will continue to change rapidly in the next few years. Being user-centric, novel systems will tune their behaviour to individuals, taking into account users’ personal characteristics and preferences. But having a pervasive adaptive environment that understands and supports us “behaving naturally” with all its tempting charm and usability, may also bring latent risks, as we seamlessly give up our privacy (and also personal control) to a pervasive world of …


Demonstrating The Potential For Covert Policing In The Community: Five Stakeholder Scenarios, Roba Abbas, Katina Michael, M.G. Michael Dec 2010

Demonstrating The Potential For Covert Policing In The Community: Five Stakeholder Scenarios, Roba Abbas, Katina Michael, M.G. Michael

Professor Katina Michael

This paper presents the real possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non traditional covert policing within a community setting, resulting in community members engaging in covert policing of family, friends, or acquaintances. This paper investigates five stakeholder relationships using scenarios to demonstrate the potential socio-ethical implications that tracking and monitoring people will have on society at large. The five stakeholder types explored in this paper include: (i) husband-wife (partner-partner), (ii) parent-child, (iii) employer-employee, (iv) friend-friend, and (v) stranger-stranger. Mobile technologies such as mobile camera phones, global positioning system data loggers, …


Overcoming Visibility Issues In A Small-To-Medium Retailer Using Automatic Identification And Data Capture Technology: An Evolutionary Approach, Dane Hamilton, K. Michael, Samuel F. Wamba May 2009

Overcoming Visibility Issues In A Small-To-Medium Retailer Using Automatic Identification And Data Capture Technology: An Evolutionary Approach, Dane Hamilton, K. Michael, Samuel F. Wamba

Professor Katina Michael

The aim of this paper is to review the inventory control practices of a small-to-medium retailer, in order to identify common challenges these organizations experience with respect to automated data capture (ADC) and the implementation of an enterprise wide information system. The study explores a single case of a hardware store in a regional town of NSW, Australia. Four semi-structured interviews were conducted with employees of a small-to-medium retailer focusing on issues related to inventory control including: delivery discrepancies, the checking and sorting of orders, locating stock and goods, loss prevention, customer purchasing and point of sale processing and replenishment. …


The Privacy-Value-Control Harmonization For Rfid Adoption In Retail, Ben D. Renegar, K. Michael Dec 2008

The Privacy-Value-Control Harmonization For Rfid Adoption In Retail, Ben D. Renegar, K. Michael

Professor Katina Michael

Privacy concerns have, at least in part, impeded the adoption of radio frequency identification (RFID) in retail. The adoption of other automatic identification (auto-ID) applications shows that consumers often are willing to trade their privacy or their control of personal information against some value afforded by the application. In this paper, the interplay between privacy, value, and control is examined through a literature survey of four auto-ID applications: mobile phone, electronic toll collection, e-passports, and loyalty programs. The consumer value proposition for the use of RFID in retail is investigated through an online survey exploring end-user perceptions. The results of …


Historical Lessons On Id Technology And The Consequences Of An Unchecked Trajectory, Katina Michael, M G. Michael May 2008

Historical Lessons On Id Technology And The Consequences Of An Unchecked Trajectory, Katina Michael, M G. Michael

Professor Katina Michael

This paper traces the use of identification techniques throughout the ages and focuses on the growing importance of citizen identification by governments. The paper uses a historical approach beginning with manual techniques such as tattoos, through to more recent automatic identification (auto-ID) techniques such as smart cards and biometrics. The findings indicate that identification techniques born for one purpose have gradually found their way into alternate applications, and in some instances have been misused altogether. There is also strong evidence to suggest that governments are moving away from localized identification schemes to more global systems based on universal lifetime identifiers.


The Hybridization Of Automatic Identification Techniques In Mass Market Applications: Towards A Model Of Coexistence, Katina Michael, M. G. Michael, Holly Tootell, V. Baker May 2008

The Hybridization Of Automatic Identification Techniques In Mass Market Applications: Towards A Model Of Coexistence, Katina Michael, M. G. Michael, Holly Tootell, V. Baker

Professor Katina Michael

The number and type of automatic identification technologies in the market have grown since the bar code was introduced in the retail sector in the late 1960s. This paper studies the selection environment of auto-ID and defines, describes and gives examples of three main patterns of innovation: migration, integration, and convergence. The findings indicate that technology adoption is not always about choosing the dominant design but about how to future-proof an auto-ID implementation. Enterprises wishing to adopt auto-ID techniques need to be aware that technology is not static, auto-ID techniques are not stand-alone, and consumers may have wide-ranging requirements for …


National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael May 2008

National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael

Professor Katina Michael

This special issue of Prometheus is dedicated to the theme of the Social Implications of National Security Measures on Citizens and Business. National security measures can be defined as those technical and non-technical measures that have been initiated as a means to curb breaches in national security, irrespective of whether these might occur by nationals or aliens in or from outside the sovereign state. National security includes such government priorities as maintaining border control, safeguarding against pandemic outbreaks, preventing acts of terror, and even discovering and eliminating identification fraud. Governments worldwide are beginning to implement information and communication security techniques …


Microchip Implants For Humans As Unique Identifiers: A Case Study On Verichip, Katina Michael, M G. Michael, Rodney Ip May 2008

Microchip Implants For Humans As Unique Identifiers: A Case Study On Verichip, Katina Michael, M G. Michael, Rodney Ip

Professor Katina Michael

Microchip implants for humans are not new. The installation of pacemakers in humans and a great number of other medical innovations for prosthesis are now considered straightforward procedures. Today we have even realised the potential for microchip implants to be embedded inside the body of humans for the purpose of acting as unique lifetime identifiers (ULI). Tiny radiofrequency identification (RFID) devices are now being utilised to store a unique 16-digit identification number.


Trends In The Selection Of Automatic Identification Technology In Electronic Commerce Applications, Katina Michael May 2008

Trends In The Selection Of Automatic Identification Technology In Electronic Commerce Applications, Katina Michael

Professor Katina Michael

Since the 1970s, automatic identification (auto-ID) technologies have been evolving to revolutionise the way people live and work. Previous research has not addressed auto-ID technological innovation as a field of study, despite its growing importance on consumer, business and government electronic commerce (EC) applications. This paper is specifically concerned with five auto-ID technologies, bar codes, magnetic-stripe card, smart card, biometrics and radiofrequency identification (RF/ID) tags and transponders. Using multiple embedded case studies and applying the fundamental concepts of the systems of innovation (SI) approach, the overall aim is to understand the selection environment of the auto-ID industry. The results show …