DOI:10.1145/42411.42413 - Corpus ID: 6826824
Information technology and dataveillance
@article{Clarke1988InformationTA, title={Information technology and dataveillance}, author={Roger A. Clarke}, journal={Commun. ACM}, year={1988}, volume={31}, pages={498-512}, url={https://api.semanticscholar.org/CorpusID:6826824}}- R. Clarke
- Published inCACM1 May 1988
- Computer Science
- Commun. ACM
Data surveillance is now supplanting conventional surveillance techniques. With this trend come new monitoring methods such as personal dataveillance and mass dataveillance that require more…
705 Citations
Figures from this paper
705 Citations
Personal data protection in the age of mass surveillance
- Antti HakkalaJ. Koskinen
- 2022
Computer Science, Law
We present a solution to data ownership in the surveillance age in the form of an ethically sustainable framework for managing personal and person-derived data. This framework is based on the concept…
Toward a State of Überveillance
- M. G. MichaelK. Michael
- 2010
Computer Science
Uberveillance is an emerging concept, and neither its application nor its power have yet fully arrived; however, Roger Clarke's 1988 dataveillance concept has been prevalent.
ICT and Dataveillance
- D. CoulthardS. Keller
- 2011
Computer Science, Sociology
Next Generation Data Technologies for Collective…
Thetechnology cooption model provides a middle range theory for empirical analysis by identifying the key elements of technology cooption and their proposed links and the role of the stakeholders in such cooption.
Article Surveillance by the Australian Media, and its Regulation
- R. Clarke
- 2014
Law, Political Science
The print and broadcast media make extensive use of surveillance in order to gather information for publication. It is vital to democracy that they do so. A proportion of the media’s surveillance…
Surveillance by the Australian Media, and Its Regulation
- R. Clarke
- 2014
Political Science, Law
The print and broadcast media make extensive use of surveillance in order to gather information for publication. It is vital to democracy that they do so. A proportion of the media's surveillance…
Now you [don’t] see me: how have new legislation and changing public awareness of the UK surveillance state impacted OSINT investigations?
- Anjuli R. K. Shere
- 2020
Political Science, Computer Science
Open-source intelligence (OSINT) gathering and analysis techniques are used by investigators from a variety of fields, owing to their accessibility and exceptional capacity for corroboration. It ha...
Big data, surveillance, and migration: a neo-republican account
- Alex Sager
- 2023
Political Science, Sociology
A non-domination-based ethics of digital surveillance and mobility is proposed, in which the legitimacy of these technologies depends on their avoidance of the arbitrary use of power.
Surveillance monitoring and information assurance work systems
- P. Goldschmidt
- 2010
Computer Science, Engineering
2010 IEEE International Symposium on Technology…
Support and assurance of surveillance monitoring, and compliance verification knowledge management of surveillance results is supported by tracking the parameters monitored by the existing information assurance monitoring infrastructure and operating work systems, and using that data/knowledge to create useful and actionable information.
Surveillance
- David Lyon
- 2022
Sociology, Political Science
Outbreaks meeting the provincial confirmed COVID-19 and respiratory infection outbreak in institutions and public hospitals 2 definitions are included in this report.
Consentful surveillance: supporting user understanding and control
- Richard C. GomerM. Schraefel
- 2016
Computer Science
It is argued that, although surveillance and surveillance-like practices can provide value to users, they should be done ‘consentfully’ as a way of empowering individuals and applying consumer preference to the market.
...
82 References
Documentary Identification and Mass Surveillance in the United States
- J. RuleD. McadamL. StearnsD. Uglow
- 1983
Sociology, Political Science
Reliance on documentary identification such as computer records, identification cards, and official papers is an essential feature of life in today's advanced industrial societies. This paper…
The government needs computer matching to root out waste and fraud
- R. Kusserow
- 1984
Business, Computer Science
CACM
L'adaptation informatique couvre de nombreux processus utilises pour detecter les erreurs de paiement, augmenter la perception des dettes et identifier les pratiques de subvention et d'acquisition…
Data quality and due process in large interorganizational record systems
- K. Laudon
- 1986
Computer Science, Law
CACM
The quality of data in one important interorganizational system—the criminal-record system of the United States—is examined.
Database Retrieval Technology and Subject Access Principles
- G. GreenleafRoger ClarkeRoger Clarke
- 1984
Computer Science, Law
This very early paper on Australian data privacy laws considers how subject access principles would be applicable to information systems using free text retrieval systems, in response to an earlier…
Security without identification: transaction systems to make big brother obsolete
- D. Chaum
- 1985
Computer Science
CACM
The large-scale automated transaction systems of the near future can be designed to protect the privacy and maintain the security of both individuals and organizations.
Computer matching is a serious threat to individual rights
- J. Shattuck
- 1984
Computer Science, Political Science
CACM
Les agences du gouvernement emploient cette technique d'adaptation de fichiers sans rapport d'individuels pour identifier les violateurs de loi suspectes.
Computers and the information society
- R. Rosenberg
- 1986
Computer Science, Law
This book discusses computers and the human Imagination, as well as other topics, including artificial intelligence, robotics, and more.
Databanks in a free society
- A. WestinMichael A. Baker
- 1973
Computer Science
This is the report of the first nationwide, factual study of what the use of computers is actually doing to recordkeeping processes in the United States, and what the growth of large-scale databanks mean for the citizen's constitutional rights to privacy and due process.
Dossier Society: Value Choices in the Design of National Information Systems
- K. Laudon
- 1986
Computer Science, Business
The Dossier Society: Value Choices in the Design of National Information Systems Development of Integrated Criminal Justice Expert System is a guide to the development of integrated criminal justice expert system design.
Electronic funds transfer system: the continuing need for privacy legislation
- J. Yestingsmeier
- 1984
Computer Science, Law
Resistance to accepting the cashless society may be well-founded and major concerns of financial institutions and the private sector include both control of the system and invasion of privacy.
...
Related Papers
Showing 1 through 3 of 0 Related Papers
