Contributors:
|
|
[Databases] [Recent Additions]
[Translate]
[Add a Link]
[Disclaimer]
- A 'Future Trace' on Dataveillance: The Anti-Utopian and Cyberpunk Literary Genres [Search]
Written by Roger Clarke
- Annotated Bibliography of Papers on Dataveillance and Privacy Papers [Search]
Writings by Roger Clarke (on Dataveillance and Information Privacy Homepage.
- Dataveillance - 15 Years On [Search]
This article reviews developments in the area of data surveillance or 'dataveillance' since mid-1980s. Written by Roger Clarke
- The Eras of Dataveillance [Search]
Written by Roger Clarke
- Information Technology and Dataveillance [Search]
The paper identifies, classifies and describes the various dataveillance techniques. It examines the benefits and the dangers, arising from dataveillance. It considers the intrinsic and extrinsic controls that act to keep the application of dataveillance under control, and suggests some appropriate policy measures. Written by Roger Clarke
- Lessons from the Australia Card - deux ex machina? [Search]
Article by Graham Greenleaf, Computer Law and Security Report Vol 3 No 6, March/April 1988. The Australian Labor Government's proposals for a national identification scheme,the pseudo-patriotically named `Australia Card', would have gone beyond being a mere identification scheme, and would have established the most powerfullocation system in Australia.
- Roger Clarke, "'Smart move by the smart card industry: The Smart Card Industry's Code of Conduct" (January 1996) PLPR 2, 10 189-191, 195. [Search]
Corporations and government agencies in many different sectors are currently considering applying chip-cards to their business needs. Many of these organisations recognise that the technology has significant implications for social values such as privacy, and for consumer acceptance of their products and services.
- Roger Clarke, "Profiling: A Hidden Challenge to the Regulation of Data Surveillance", Journal of Law and Information Science 4,2 (December 1993) [Search]
Profiling is a data surveillance technique which is little-understood and ill-documented, but increasingly used.
- Roger Clarke, "The Digital Persona and Its Application to Data Surveillance" The Information Society 10,2 (June 1994) [Search]
The digital persona is a model of the individual established through the collection, storage and analysis of data about that person. It is a very useful and even necessary concept for developing an understanding of the behaviour of the new, networked world.
- Roger Clarke, "Trails in the Sand " (1995) [Search]
The article is about the trails we leave and the uses made of them.
- Roger Clarke, 'Computer Matching by Government Agencies: The Failure of Cost/Benefit Analysis as a Control Mechanism [Search]
This paper reports on research into the extent to which the use of CBA has prevented unjustified uses of computer matching by government agencies in the United States and Australia.
- Stopping surveillance: Beyond 'efficiency' and the OECD [Search]
Article by Graham Greenleaf, 3 PLPR 148, December 1996 Eexplains the `efficiency criterion', and takes Rule's approach as the starting point for a critical analysis of development's in international privacy regulation since the 1970s, including the OECD privacy Guidelines, the Canadian Standards Association's Model Code and the EU privacy Directive (all of which are discussed later), and the Australian Privacy Charter
- While You Were Sleeping ... Surveillance Technologies Arrived [Search]
Article written by Roger Clarke for publication in Australian Quarterly 73, 1 (January-February 2001)
|