Abstract
Data surveillance is now supplanting conventional surveillance techniques. With this trend come new monitoring methods such as personal dataveillance and mass dataveillance that require more effective safeguards and a formal policy framework.
- 1 Ackroyd, C., Margolis, K., Rosenhead, J., and Shallice, T. The Technology of Political Control. Penguin Books, New York, 1977.Google Scholar
- 2 Askin, F. SurveilIance: The social science perspective. Columbia Hum. Rights Law Rev. 4, 1 (Winter 1972), (see also the remainder of the issue).Google Scholar
- 3 Australian Science and Technology Council, Towards a Cashless Society. ASTEC, Canberra Australia, May 1986.Google Scholar
- 4 Bramford, J. The Puzzle Palace. Penguin Books, New York, 1983.Google Scholar
- 5 Brenton, M. The Privacy Invaders. Coward-McCann, 1964.Google Scholar
- 6 Burnham, D. The Rise of the Computer State. Random House/Weidenfeld and Nicolson, 1983. Google ScholarDigital Library
- 7 Campbell, D., and Connor, S. On the Record. Michael Joseph, 1986.Google Scholar
- 8 Chaum, D. Security without identification: Transaction systems to make Big Brother obsolete. Commun. ACM 28, 10 (Oct. 1985), 1030-1044. Google ScholarDigital Library
- 9 Clarke, R.A. lust another piece of plastic for your wallet: The Australia card scheme. Prometheus 5, 1 (June 1987}, 29-45.Google ScholarCross Ref
- 10 Clarke, R.A. Judicial understanding of information technology.Google Scholar
- 11 Cowen, Z. The Private Man. Australian Broadcasting Commission, 1969.Google Scholar
- 12 Crispin A. Who's Watching You. Penguin Books, New York, 1981,Google Scholar
- 13 Donner, F.J. The Age of Surveillance. Knopf, New York, 1980.Google Scholar
- 14 Early, P. Big Brother makes a date. San Francisco Exam. (Oct. 12, 1986).Google Scholar
- 15 Ellul, J. The Technological Society. Knopf, New York, 1964.Google Scholar
- 16 Greenberg, D.H., and Wolf, D.A. Is wage matching worth all the trouble? Public Welfare (Winter 1985), 13-20.Google Scholar
- 17 Greenleaf, G.W., and Clarke, R.A. Database retrieval technology and subject access principles. Aust. Comput. {. 16, I (Feb. 1984), 27-32.Google Scholar
- 18 Greenleaf, G.W., and Clarke, R.A. Aspects of the Australian Law Reform Commission's information privacy proposals. J. Law and Inf. Sci. 2, 1 (Aug. 1986), 83-110.Google Scholar
- 19 Gross, M.L. The Brain Watchers. Signet, 1963.Google Scholar
- 20 Hoffman, L.J., Ed. Computers and Privacy in the Next Decade. Academic Press, New York, 1980. Google ScholarDigital Library
- 21 Huxley, A. Brave New World. Penguin Books, New York, 1975 (originally published in 1932).Google Scholar
- 22 Kircher, J. A history of computer matching in federal government programs. Computerworld (Dec. 14, 1981).Google Scholar
- 23 Kling, R. Automated welfare client-tracking and service integration: The political economy of computing. Commun. ACM 21, 6 (June 1978), 484-493. Google ScholarDigital Library
- 24 Kling, R. Value conflicts and social choice in electronic funds transfer system developments. Commun. ACM 21, 8 (Aug. 1978), 642-657. Google ScholarDigital Library
- 25 Kusserow, R.P. The government needs computer matching to root out waste and fraud. Commun. ACM 27, 6 (June 1984}, 542-545. Google ScholarDigital Library
- 26 Langan, K.J. Computer matching programs: A threat to privacy? Co tumbia J. Law Sac. Probl. 15, 2 (1979).Google Scholar
- 27 Laudon, K.C. Computers and Bureaucratic Reform. Wiley, New York, 19'74.Google Scholar
- 28 Laudon, K.C. Complexity in large federal databanks. Soc./Trans. (May 1979).Google Scholar
- 29 Laudon, K.C. Problems of accountability in federal databanks. In Proceedings of the American Association for the Advancement of Science (May). American Association for the Advancement of Science, 1979.Google Scholar
- 30 Laudom K.C. Data quality and due process in large interorganizational record systems. Commun. ACM 29. 1 (Jan. 1986), 4-12. Google ScholarDigital Library
- 31 Laudon. K.C. Dossier Society, Value Choices in the Design of National Injormation Systems. Columbia University Press, New York, 1986. Google ScholarDigital Library
- 32 Long, E.V. The Intruders. Praeger, New York, 1967.Google Scholar
- 33 Marx, G.T. The new surveillance. Technol. Rev. (May-June 1985).Google Scholar
- 34 Marx, G.T. I'll be watching you: Reflections on the new surveillance. Dissent (Winter 1985).Google Scholar
- 35 Marx, G.T., and Reichman, N. Routinising the discovery of secrets. Am. Behav. Sci. 27, 4 (Mar.-Apr. 1984), 423-452.Google Scholar
- 36 Miller, A.R. The Assault on Privacy. Mentor, 1972.{Google Scholar
- 37 Neier, A. Dossier. Stein and Day, 1974.Google Scholar
- 38 New South Wales Privacy Committee. Guidelines for the Operation of Personal Data Systems. NSWPC, Sydney, Australia, 1977.Google Scholar
- 39 Office of Management and Budget. Guidelines to Agencies on Conductin~t Automated Matching Programs. OMB, Mar. 1979.Google Scholar
- 40 Office of Management and Budget. Computer Matching Guidelines. OMB, May 1982.Google Scholar
- 41 Office of Management and Budget President's Commission for Integrity and Efficiency. Model Control System for Conducting Computer Matching Projects Involving Individual Privacy Data. OMB/PCIE, 1983.Google Scholar
- 42 Office of Technology Assessment. Federal government information technology: Electronic surveillance and civil liberties. OTA-CIT-293, U.S. Congress, Washington, D.C., Oct. 1985.Google Scholar
- 43 Office of Technology Assessment. Federal government information technology: Electronic record systems and individual privacy. OTA- CIT-296, U.S. Congress, Washington, D.C., June 1986.Google Scholar
- 44 Organisation for Economic Cooperation and Development. Guidelines for the Protection of Privacy and Transborder Flows of Personal Da'ta. OECD, Paris, France, 1980.Google Scholar
- 45 Orwell, G. 1984. Penguin Books, New York, 1972 (originally published in 1948).{Google Scholar
- 46 O:~ford Dictionary. Vol. X 1933, p. 248.Google Scholar
- 47 Packard, V. The Naked Society. McKay, New York, 1964.Google Scholar
- 48 Privacy Protection Study Commission. Personal Privacy in an Information Society. U.S. Government Printing Office, Washington, D.C., July 1977.Google Scholar
- 49 Raines, J.C. Attack on Privacy. Judson Press, 1974.Google Scholar
- 50 Reichman, N., and Marx, G.T. Generating organisational disputes: The impact of computerization. In Proceedings of the I,aw and Society Association Conference (San Diego, Calif., June 6-9). Law and Society Association, 1985.Google Scholar
- 51 Rodota, S. Privacy and data surveillance: Growing public concern. Inf. Stud. 10, OECD, Paris, France, 1976.Google Scholar
- 52 Rosenberg, J.M. The Death of Privacy. Random House, 1969.Google Scholar
- 53 Rosenberg, R.S. Computers and the Information Society. Wiley, New York, 1986. Google ScholarDigital Library
- 54 Roszak, T. The Cult of Information. Pantheon, 1986. Google ScholarDigital Library
- 55 Rule, J.B. Private Lives and Public Surveillance: Social Control in the Computer Age. Schocken Books, 1974.Google Scholar
- 56 Rule, J.B. Value Choices in E.F.T.S. Office of Telecommunications Policy, Washington, D.C., 1975.Google Scholar
- 57 Rule, J.B. 1984-The ingredients of totalitarianism. In 1984 Revisited-Totalitarianism in Our Century. Harper and Row, New York, 1983, pp. 166-179.{Google Scholar
- 58 Rule, J.B. Documentary identification and mass surw:illance in the United States5 Sac. Probl. 31,222 (1983).Google ScholarCross Ref
- 59 Rule, J.B., McAdam, D., Stearns, L. and Uglow, D. The Politics of Privacy. New American Library, 1980.Google Scholar
- 60 Russell, B. Authority and the Individual. George Allen and Unwin, 1949.Google Scholar
- 61 Shaltuck, J. Computer matching is a serious threat to individual rights. Commun. ACM 27, 6 (June 1984), 538-541. Google ScholarDigital Library
- 62 Stone, M.G. Computer Privacy. Anbar, 1968.Google Scholar
- 63 Thom, J. and Thorne. P. Privacy legislation and the right of access. Aust. Comput. J. 15, 4 (Nov. 1983), 145-150.Google Scholar
- 64 Thompson, A.A. A Big Brother in Britain Today. Michael Joseph, 1970.Google Scholar
- 65 U.S. Dept. of Health and Human Services. Computer Matching in State Administered Benefit Programs: A Manager's Guide to Decision-Making. HEW, Washington, D.C., 1983.Google Scholar
- 66 U.S. Dept. of Health and Human Services. Computer Matching in State Administered Benefit Programs. HEW, Washington, D.C., June 1984.Google Scholar
- 67 U.S. Dept. of Health, Education and Welfare, Secretary's Advisory Committee on Automated Personal Data Systems. Re:'ords, Computers and the Rights of Citizens. MIT Press, Cambridge, Mass., 1973.Google Scholar
- 68 U.S. Federal Advisory Committee on False Identifical. ion. The Criminal Use of False Identification. FACFI, Washington, D.C., 1976.Google Scholar
- 69 U.S. Senate. Oversight of Computer Matching to Detect Fraud and Mismanagement in Government Programs. U.S. Senate, Washington, D.C., 1982.Google Scholar
- 70 Warner, M., and Stone, M. The Data Bank Society: Organisations, Computers and Social Freedom. George Allen and Unwin, 1970.Google Scholar
- 71 Webster's 3rd Edition. 1976, p. 2302.Google Scholar
- 72 Weeramantry, C.G. The Slumbering Sentinels: Law and Human Rights in the Wake of Technology. Penguin Books. New York, 1983.Google Scholar
- 73 Wessell, M.R. Freedom's Edge: The Computer Threat to Society. Addison-Wesley, Reading, Mass., 1974.Google Scholar
- 74 Westin, A.F. Privacy and Freedom. Atheneum, New York, 1967.Google Scholar
- 75 Westin, A.F., Ed. Information Technology in a Democracy. Harvard University Press, Cambridge, Mass., 1971. Google ScholarDigital Library
- 76 Westin, A.F., and Baker, M. Databanks in a Free Society. Quadrangle, New York. 1974.Google Scholar
- 77 Yestingsmeier, J. Electronic funds transfer systems: 'the continuing need for privacy legislation. Comput. Sac. 13.4 (Winter 1984), 5-9. Google ScholarDigital Library
- 78 Zamyatin, Y. We. Penguin Books, New York, 1983 (originally published in Russian, 1920).Google Scholar
Index Terms
- Information technology and dataveillance
Recommendations
Dataveillance imaginaries and their role in chilling effects online
Highlights- Self-inhibition due to dataveillance is defined as chilling effects of dataveillance.
- Dataveillance imaginaries affect internet users’ self-inhibition of digital communication.
- Dataveillance imaginaries include actors, workings, ...
AbstractThe automatic tracing and analysis of personal data on the internet is a common occurrence. So far, the extent of internet users’ sense of such dataveillance and reactions to it remain obscure. This article explores 1) internet users’ ...
Comments