Information technology and dataveillance

@article{Clarke1988InformationTA,  title={Information technology and dataveillance},  author={Roger A. Clarke},  journal={Commun. ACM},  year={1988},  volume={31},  pages={498-512},  url={https://api.semanticscholar.org/CorpusID:6826824}}
  • R. Clarke
  • Published inCACM1 May 1988
  • Computer Science
  • Commun. ACM
Data surveillance is now supplanting conventional surveillance techniques. With this trend come new monitoring methods such as personal dataveillance and mass dataveillance that require more

Figures from this paper

705 Citations

Personal data protection in the age of mass surveillance

We present a solution to data ownership in the surveillance age in the form of an ethically sustainable framework for managing personal and person-derived data. This framework is based on the concept

Toward a State of Überveillance

Uberveillance is an emerging concept, and neither its application nor its power have yet fully arrived; however, Roger Clarke's 1988 dataveillance concept has been prevalent.

ICT and Dataveillance

Thetechnology cooption model provides a middle range theory for empirical analysis by identifying the key elements of technology cooption and their proposed links and the role of the stakeholders in such cooption.

Article Surveillance by the Australian Media, and its Regulation

The print and broadcast media make extensive use of surveillance in order to gather information for publication. It is vital to democracy that they do so. A proportion of the media’s surveillance

Surveillance by the Australian Media, and Its Regulation

The print and broadcast media make extensive use of surveillance in order to gather information for publication. It is vital to democracy that they do so. A proportion of the media's surveillance

Now you [don’t] see me: how have new legislation and changing public awareness of the UK surveillance state impacted OSINT investigations?

Open-source intelligence (OSINT) gathering and analysis techniques are used by investigators from a variety of fields, owing to their accessibility and exceptional capacity for corroboration. It ha...

Big data, surveillance, and migration: a neo-republican account

A non-domination-based ethics of digital surveillance and mobility is proposed, in which the legitimacy of these technologies depends on their avoidance of the arbitrary use of power.

Surveillance monitoring and information assurance work systems

    P. Goldschmidt
    Computer Science, Engineering
    2010 IEEE International Symposium on Technology…
  • 2010
Support and assurance of surveillance monitoring, and compliance verification knowledge management of surveillance results is supported by tracking the parameters monitored by the existing information assurance monitoring infrastructure and operating work systems, and using that data/knowledge to create useful and actionable information.

Surveillance

Outbreaks meeting the provincial confirmed COVID-19 and respiratory infection outbreak in institutions and public hospitals 2 definitions are included in this report.

Consentful surveillance: supporting user understanding and control

It is argued that, although surveillance and surveillance-like practices can provide value to users, they should be done ‘consentfully’ as a way of empowering individuals and applying consumer preference to the market.
...

82 References

Documentary Identification and Mass Surveillance in the United States

Reliance on documentary identification such as computer records, identification cards, and official papers is an essential feature of life in today's advanced industrial societies. This paper

The government needs computer matching to root out waste and fraud

L'adaptation informatique couvre de nombreux processus utilises pour detecter les erreurs de paiement, augmenter la perception des dettes et identifier les pratiques de subvention et d'acquisition

Data quality and due process in large interorganizational record systems

The quality of data in one important interorganizational system—the criminal-record system of the United States—is examined.

Database Retrieval Technology and Subject Access Principles

This very early paper on Australian data privacy laws considers how subject access principles would be applicable to information systems using free text retrieval systems, in response to an earlier

Security without identification: transaction systems to make big brother obsolete

The large-scale automated transaction systems of the near future can be designed to protect the privacy and maintain the security of both individuals and organizations.

Computer matching is a serious threat to individual rights

Les agences du gouvernement emploient cette technique d'adaptation de fichiers sans rapport d'individuels pour identifier les violateurs de loi suspectes.

Computers and the information society

This book discusses computers and the human Imagination, as well as other topics, including artificial intelligence, robotics, and more.

Databanks in a free society

This is the report of the first nationwide, factual study of what the use of computers is actually doing to recordkeeping processes in the United States, and what the growth of large-scale databanks mean for the citizen's constitutional rights to privacy and due process.

Dossier Society: Value Choices in the Design of National Information Systems

The Dossier Society: Value Choices in the Design of National Information Systems Development of Integrated Criminal Justice Expert System is a guide to the development of integrated criminal justice expert system design.

Electronic funds transfer system: the continuing need for privacy legislation

Resistance to accepting the cashless society may be well-founded and major concerns of financial institutions and the private sector include both control of the system and invasion of privacy.
...

Related Papers

Showing 1 through 3 of 0 Related Papers