skip to main content
article
Free Access

Information technology and dataveillance

Published:01 May 1988Publication History
Skip Abstract Section

Abstract

Data surveillance is now supplanting conventional surveillance techniques. With this trend come new monitoring methods such as personal dataveillance and mass dataveillance that require more effective safeguards and a formal policy framework.

References

  1. 1 Ackroyd, C., Margolis, K., Rosenhead, J., and Shallice, T. The Technology of Political Control. Penguin Books, New York, 1977.Google ScholarGoogle Scholar
  2. 2 Askin, F. SurveilIance: The social science perspective. Columbia Hum. Rights Law Rev. 4, 1 (Winter 1972), (see also the remainder of the issue).Google ScholarGoogle Scholar
  3. 3 Australian Science and Technology Council, Towards a Cashless Society. ASTEC, Canberra Australia, May 1986.Google ScholarGoogle Scholar
  4. 4 Bramford, J. The Puzzle Palace. Penguin Books, New York, 1983.Google ScholarGoogle Scholar
  5. 5 Brenton, M. The Privacy Invaders. Coward-McCann, 1964.Google ScholarGoogle Scholar
  6. 6 Burnham, D. The Rise of the Computer State. Random House/Weidenfeld and Nicolson, 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7 Campbell, D., and Connor, S. On the Record. Michael Joseph, 1986.Google ScholarGoogle Scholar
  8. 8 Chaum, D. Security without identification: Transaction systems to make Big Brother obsolete. Commun. ACM 28, 10 (Oct. 1985), 1030-1044. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9 Clarke, R.A. lust another piece of plastic for your wallet: The Australia card scheme. Prometheus 5, 1 (June 1987}, 29-45.Google ScholarGoogle ScholarCross RefCross Ref
  10. 10 Clarke, R.A. Judicial understanding of information technology.Google ScholarGoogle Scholar
  11. 11 Cowen, Z. The Private Man. Australian Broadcasting Commission, 1969.Google ScholarGoogle Scholar
  12. 12 Crispin A. Who's Watching You. Penguin Books, New York, 1981,Google ScholarGoogle Scholar
  13. 13 Donner, F.J. The Age of Surveillance. Knopf, New York, 1980.Google ScholarGoogle Scholar
  14. 14 Early, P. Big Brother makes a date. San Francisco Exam. (Oct. 12, 1986).Google ScholarGoogle Scholar
  15. 15 Ellul, J. The Technological Society. Knopf, New York, 1964.Google ScholarGoogle Scholar
  16. 16 Greenberg, D.H., and Wolf, D.A. Is wage matching worth all the trouble? Public Welfare (Winter 1985), 13-20.Google ScholarGoogle Scholar
  17. 17 Greenleaf, G.W., and Clarke, R.A. Database retrieval technology and subject access principles. Aust. Comput. {. 16, I (Feb. 1984), 27-32.Google ScholarGoogle Scholar
  18. 18 Greenleaf, G.W., and Clarke, R.A. Aspects of the Australian Law Reform Commission's information privacy proposals. J. Law and Inf. Sci. 2, 1 (Aug. 1986), 83-110.Google ScholarGoogle Scholar
  19. 19 Gross, M.L. The Brain Watchers. Signet, 1963.Google ScholarGoogle Scholar
  20. 20 Hoffman, L.J., Ed. Computers and Privacy in the Next Decade. Academic Press, New York, 1980. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. 21 Huxley, A. Brave New World. Penguin Books, New York, 1975 (originally published in 1932).Google ScholarGoogle Scholar
  22. 22 Kircher, J. A history of computer matching in federal government programs. Computerworld (Dec. 14, 1981).Google ScholarGoogle Scholar
  23. 23 Kling, R. Automated welfare client-tracking and service integration: The political economy of computing. Commun. ACM 21, 6 (June 1978), 484-493. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. 24 Kling, R. Value conflicts and social choice in electronic funds transfer system developments. Commun. ACM 21, 8 (Aug. 1978), 642-657. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. 25 Kusserow, R.P. The government needs computer matching to root out waste and fraud. Commun. ACM 27, 6 (June 1984}, 542-545. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. 26 Langan, K.J. Computer matching programs: A threat to privacy? Co tumbia J. Law Sac. Probl. 15, 2 (1979).Google ScholarGoogle Scholar
  27. 27 Laudon, K.C. Computers and Bureaucratic Reform. Wiley, New York, 19'74.Google ScholarGoogle Scholar
  28. 28 Laudon, K.C. Complexity in large federal databanks. Soc./Trans. (May 1979).Google ScholarGoogle Scholar
  29. 29 Laudon, K.C. Problems of accountability in federal databanks. In Proceedings of the American Association for the Advancement of Science (May). American Association for the Advancement of Science, 1979.Google ScholarGoogle Scholar
  30. 30 Laudom K.C. Data quality and due process in large interorganizational record systems. Commun. ACM 29. 1 (Jan. 1986), 4-12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. 31 Laudon. K.C. Dossier Society, Value Choices in the Design of National Injormation Systems. Columbia University Press, New York, 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. 32 Long, E.V. The Intruders. Praeger, New York, 1967.Google ScholarGoogle Scholar
  33. 33 Marx, G.T. The new surveillance. Technol. Rev. (May-June 1985).Google ScholarGoogle Scholar
  34. 34 Marx, G.T. I'll be watching you: Reflections on the new surveillance. Dissent (Winter 1985).Google ScholarGoogle Scholar
  35. 35 Marx, G.T., and Reichman, N. Routinising the discovery of secrets. Am. Behav. Sci. 27, 4 (Mar.-Apr. 1984), 423-452.Google ScholarGoogle Scholar
  36. 36 Miller, A.R. The Assault on Privacy. Mentor, 1972.{Google ScholarGoogle Scholar
  37. 37 Neier, A. Dossier. Stein and Day, 1974.Google ScholarGoogle Scholar
  38. 38 New South Wales Privacy Committee. Guidelines for the Operation of Personal Data Systems. NSWPC, Sydney, Australia, 1977.Google ScholarGoogle Scholar
  39. 39 Office of Management and Budget. Guidelines to Agencies on Conductin~t Automated Matching Programs. OMB, Mar. 1979.Google ScholarGoogle Scholar
  40. 40 Office of Management and Budget. Computer Matching Guidelines. OMB, May 1982.Google ScholarGoogle Scholar
  41. 41 Office of Management and Budget President's Commission for Integrity and Efficiency. Model Control System for Conducting Computer Matching Projects Involving Individual Privacy Data. OMB/PCIE, 1983.Google ScholarGoogle Scholar
  42. 42 Office of Technology Assessment. Federal government information technology: Electronic surveillance and civil liberties. OTA-CIT-293, U.S. Congress, Washington, D.C., Oct. 1985.Google ScholarGoogle Scholar
  43. 43 Office of Technology Assessment. Federal government information technology: Electronic record systems and individual privacy. OTA- CIT-296, U.S. Congress, Washington, D.C., June 1986.Google ScholarGoogle Scholar
  44. 44 Organisation for Economic Cooperation and Development. Guidelines for the Protection of Privacy and Transborder Flows of Personal Da'ta. OECD, Paris, France, 1980.Google ScholarGoogle Scholar
  45. 45 Orwell, G. 1984. Penguin Books, New York, 1972 (originally published in 1948).{Google ScholarGoogle Scholar
  46. 46 O:~ford Dictionary. Vol. X 1933, p. 248.Google ScholarGoogle Scholar
  47. 47 Packard, V. The Naked Society. McKay, New York, 1964.Google ScholarGoogle Scholar
  48. 48 Privacy Protection Study Commission. Personal Privacy in an Information Society. U.S. Government Printing Office, Washington, D.C., July 1977.Google ScholarGoogle Scholar
  49. 49 Raines, J.C. Attack on Privacy. Judson Press, 1974.Google ScholarGoogle Scholar
  50. 50 Reichman, N., and Marx, G.T. Generating organisational disputes: The impact of computerization. In Proceedings of the I,aw and Society Association Conference (San Diego, Calif., June 6-9). Law and Society Association, 1985.Google ScholarGoogle Scholar
  51. 51 Rodota, S. Privacy and data surveillance: Growing public concern. Inf. Stud. 10, OECD, Paris, France, 1976.Google ScholarGoogle Scholar
  52. 52 Rosenberg, J.M. The Death of Privacy. Random House, 1969.Google ScholarGoogle Scholar
  53. 53 Rosenberg, R.S. Computers and the Information Society. Wiley, New York, 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. 54 Roszak, T. The Cult of Information. Pantheon, 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. 55 Rule, J.B. Private Lives and Public Surveillance: Social Control in the Computer Age. Schocken Books, 1974.Google ScholarGoogle Scholar
  56. 56 Rule, J.B. Value Choices in E.F.T.S. Office of Telecommunications Policy, Washington, D.C., 1975.Google ScholarGoogle Scholar
  57. 57 Rule, J.B. 1984-The ingredients of totalitarianism. In 1984 Revisited-Totalitarianism in Our Century. Harper and Row, New York, 1983, pp. 166-179.{Google ScholarGoogle Scholar
  58. 58 Rule, J.B. Documentary identification and mass surw:illance in the United States5 Sac. Probl. 31,222 (1983).Google ScholarGoogle ScholarCross RefCross Ref
  59. 59 Rule, J.B., McAdam, D., Stearns, L. and Uglow, D. The Politics of Privacy. New American Library, 1980.Google ScholarGoogle Scholar
  60. 60 Russell, B. Authority and the Individual. George Allen and Unwin, 1949.Google ScholarGoogle Scholar
  61. 61 Shaltuck, J. Computer matching is a serious threat to individual rights. Commun. ACM 27, 6 (June 1984), 538-541. Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. 62 Stone, M.G. Computer Privacy. Anbar, 1968.Google ScholarGoogle Scholar
  63. 63 Thom, J. and Thorne. P. Privacy legislation and the right of access. Aust. Comput. J. 15, 4 (Nov. 1983), 145-150.Google ScholarGoogle Scholar
  64. 64 Thompson, A.A. A Big Brother in Britain Today. Michael Joseph, 1970.Google ScholarGoogle Scholar
  65. 65 U.S. Dept. of Health and Human Services. Computer Matching in State Administered Benefit Programs: A Manager's Guide to Decision-Making. HEW, Washington, D.C., 1983.Google ScholarGoogle Scholar
  66. 66 U.S. Dept. of Health and Human Services. Computer Matching in State Administered Benefit Programs. HEW, Washington, D.C., June 1984.Google ScholarGoogle Scholar
  67. 67 U.S. Dept. of Health, Education and Welfare, Secretary's Advisory Committee on Automated Personal Data Systems. Re:'ords, Computers and the Rights of Citizens. MIT Press, Cambridge, Mass., 1973.Google ScholarGoogle Scholar
  68. 68 U.S. Federal Advisory Committee on False Identifical. ion. The Criminal Use of False Identification. FACFI, Washington, D.C., 1976.Google ScholarGoogle Scholar
  69. 69 U.S. Senate. Oversight of Computer Matching to Detect Fraud and Mismanagement in Government Programs. U.S. Senate, Washington, D.C., 1982.Google ScholarGoogle Scholar
  70. 70 Warner, M., and Stone, M. The Data Bank Society: Organisations, Computers and Social Freedom. George Allen and Unwin, 1970.Google ScholarGoogle Scholar
  71. 71 Webster's 3rd Edition. 1976, p. 2302.Google ScholarGoogle Scholar
  72. 72 Weeramantry, C.G. The Slumbering Sentinels: Law and Human Rights in the Wake of Technology. Penguin Books. New York, 1983.Google ScholarGoogle Scholar
  73. 73 Wessell, M.R. Freedom's Edge: The Computer Threat to Society. Addison-Wesley, Reading, Mass., 1974.Google ScholarGoogle Scholar
  74. 74 Westin, A.F. Privacy and Freedom. Atheneum, New York, 1967.Google ScholarGoogle Scholar
  75. 75 Westin, A.F., Ed. Information Technology in a Democracy. Harvard University Press, Cambridge, Mass., 1971. Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. 76 Westin, A.F., and Baker, M. Databanks in a Free Society. Quadrangle, New York. 1974.Google ScholarGoogle Scholar
  77. 77 Yestingsmeier, J. Electronic funds transfer systems: 'the continuing need for privacy legislation. Comput. Sac. 13.4 (Winter 1984), 5-9. Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. 78 Zamyatin, Y. We. Penguin Books, New York, 1983 (originally published in Russian, 1920).Google ScholarGoogle Scholar

Index Terms

  1. Information technology and dataveillance

              Recommendations

              Reviews

              John W. Fendrich

              This paper discusses the issues of surveillance in society. It emphasizes the ways information technology (IT) influences and stimulates surveillance. Definitions of surveillance, dataveillance, personal surveillance, and mass surveillance are presented. The author attempts to maintain a detached point of view, not claiming that surveillance is evil or undesirable. However, he asserts that IT is being applied to surveillance techniques with few guidelines or restraints and with limited regard to correctness, cost, or effectiveness. He calls for a harnessing of IT's decentralized potential in surveillance, and for more recognition of the implications of the application of IT in surveillance for a human-oriented society. The paper identifies many interesting issues and problems; however, it does not offer an effective, practical methodology to deal with the concerns it raises. The paper provides an introductory overview and review of the opinions and case studies provided in its long list of references. It is appropriate for information technologists and anyone interested in the social and ethical implications of applied information technology. The study of this paper could be the basis for personal reflection on strategies to address the issues it raises. I hope that, with the spate of papers of this genre, methodologies that combine IT and social values will be forthcoming that are adaptive to organizations and individuals and that meet their requirements.

              Access critical reviews of Computing literature here

              Become a reviewer for Computing Reviews.

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              • Published in

                cover image Communications of the ACM
                Communications of the ACM  Volume 31, Issue 5
                May 1988
                114 pages
                ISSN:0001-0782
                EISSN:1557-7317
                DOI:10.1145/42411
                Issue’s Table of Contents

                Copyright © 1988 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 1 May 1988

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • article

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader