[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article
Free access

Information technology and dataveillance

Published: 01 May 1988 Publication History

Abstract

Data surveillance is now supplanting conventional surveillance techniques. With this trend come new monitoring methods such as personal dataveillance and mass dataveillance that require more effective safeguards and a formal policy framework.

References

[1]
Ackroyd, C., Margolis, K., Rosenhead, J., and Shallice, T. The Technology of Political Control. Penguin Books, New York, 1977.
[2]
Askin, F. SurveilIance: The social science perspective. Columbia Hum. Rights Law Rev. 4, 1 (Winter 1972), (see also the remainder of the issue).
[3]
Australian Science and Technology Council, Towards a Cashless Society. ASTEC, Canberra Australia, May 1986.
[4]
Bramford, J. The Puzzle Palace. Penguin Books, New York, 1983.
[5]
Brenton, M. The Privacy Invaders. Coward-McCann, 1964.
[6]
Burnham, D. The Rise of the Computer State. Random House/Weidenfeld and Nicolson, 1983.
[7]
Campbell, D., and Connor, S. On the Record. Michael Joseph, 1986.
[8]
Chaum, D. Security without identification: Transaction systems to make Big Brother obsolete. Commun. ACM 28, 10 (Oct. 1985), 1030-1044.
[9]
Clarke, R.A. lust another piece of plastic for your wallet: The Australia card scheme. Prometheus 5, 1 (June 1987}, 29-45.
[10]
Clarke, R.A. Judicial understanding of information technology.
[11]
Cowen, Z. The Private Man. Australian Broadcasting Commission, 1969.
[12]
Crispin A. Who's Watching You. Penguin Books, New York, 1981,
[13]
Donner, F.J. The Age of Surveillance. Knopf, New York, 1980.
[14]
Early, P. Big Brother makes a date. San Francisco Exam. (Oct. 12, 1986).
[15]
Ellul, J. The Technological Society. Knopf, New York, 1964.
[16]
Greenberg, D.H., and Wolf, D.A. Is wage matching worth all the trouble? Public Welfare (Winter 1985), 13-20.
[17]
Greenleaf, G.W., and Clarke, R.A. Database retrieval technology and subject access principles. Aust. Comput. {. 16, I (Feb. 1984), 27-32.
[18]
Greenleaf, G.W., and Clarke, R.A. Aspects of the Australian Law Reform Commission's information privacy proposals. J. Law and Inf. Sci. 2, 1 (Aug. 1986), 83-110.
[19]
Gross, M.L. The Brain Watchers. Signet, 1963.
[20]
Hoffman, L.J., Ed. Computers and Privacy in the Next Decade. Academic Press, New York, 1980.
[21]
Huxley, A. Brave New World. Penguin Books, New York, 1975 (originally published in 1932).
[22]
Kircher, J. A history of computer matching in federal government programs. Computerworld (Dec. 14, 1981).
[23]
Kling, R. Automated welfare client-tracking and service integration: The political economy of computing. Commun. ACM 21, 6 (June 1978), 484-493.
[24]
Kling, R. Value conflicts and social choice in electronic funds transfer system developments. Commun. ACM 21, 8 (Aug. 1978), 642-657.
[25]
Kusserow, R.P. The government needs computer matching to root out waste and fraud. Commun. ACM 27, 6 (June 1984}, 542-545.
[26]
Langan, K.J. Computer matching programs: A threat to privacy? Co tumbia J. Law Sac. Probl. 15, 2 (1979).
[27]
Laudon, K.C. Computers and Bureaucratic Reform. Wiley, New York, 19'74.
[28]
Laudon, K.C. Complexity in large federal databanks. Soc./Trans. (May 1979).
[29]
Laudon, K.C. Problems of accountability in federal databanks. In Proceedings of the American Association for the Advancement of Science (May). American Association for the Advancement of Science, 1979.
[30]
Laudom K.C. Data quality and due process in large interorganizational record systems. Commun. ACM 29. 1 (Jan. 1986), 4-12.
[31]
Laudon. K.C. Dossier Society, Value Choices in the Design of National Injormation Systems. Columbia University Press, New York, 1986.
[32]
Long, E.V. The Intruders. Praeger, New York, 1967.
[33]
Marx, G.T. The new surveillance. Technol. Rev. (May-June 1985).
[34]
Marx, G.T. I'll be watching you: Reflections on the new surveillance. Dissent (Winter 1985).
[35]
Marx, G.T., and Reichman, N. Routinising the discovery of secrets. Am. Behav. Sci. 27, 4 (Mar.-Apr. 1984), 423-452.
[36]
Miller, A.R. The Assault on Privacy. Mentor, 1972.{
[37]
Neier, A. Dossier. Stein and Day, 1974.
[38]
New South Wales Privacy Committee. Guidelines for the Operation of Personal Data Systems. NSWPC, Sydney, Australia, 1977.
[39]
Office of Management and Budget. Guidelines to Agencies on Conductin~t Automated Matching Programs. OMB, Mar. 1979.
[40]
Office of Management and Budget. Computer Matching Guidelines. OMB, May 1982.
[41]
Office of Management and Budget President's Commission for Integrity and Efficiency. Model Control System for Conducting Computer Matching Projects Involving Individual Privacy Data. OMB/PCIE, 1983.
[42]
Office of Technology Assessment. Federal government information technology: Electronic surveillance and civil liberties. OTA-CIT-293, U.S. Congress, Washington, D.C., Oct. 1985.
[43]
Office of Technology Assessment. Federal government information technology: Electronic record systems and individual privacy. OTA- CIT-296, U.S. Congress, Washington, D.C., June 1986.
[44]
Organisation for Economic Cooperation and Development. Guidelines for the Protection of Privacy and Transborder Flows of Personal Da'ta. OECD, Paris, France, 1980.
[45]
Orwell, G. 1984. Penguin Books, New York, 1972 (originally published in 1948).{
[46]
O:~ford Dictionary. Vol. X 1933, p. 248.
[47]
Packard, V. The Naked Society. McKay, New York, 1964.
[48]
Privacy Protection Study Commission. Personal Privacy in an Information Society. U.S. Government Printing Office, Washington, D.C., July 1977.
[49]
Raines, J.C. Attack on Privacy. Judson Press, 1974.
[50]
Reichman, N., and Marx, G.T. Generating organisational disputes: The impact of computerization. In Proceedings of the I,aw and Society Association Conference (San Diego, Calif., June 6-9). Law and Society Association, 1985.
[51]
Rodota, S. Privacy and data surveillance: Growing public concern. Inf. Stud. 10, OECD, Paris, France, 1976.
[52]
Rosenberg, J.M. The Death of Privacy. Random House, 1969.
[53]
Rosenberg, R.S. Computers and the Information Society. Wiley, New York, 1986.
[54]
Roszak, T. The Cult of Information. Pantheon, 1986.
[55]
Rule, J.B. Private Lives and Public Surveillance: Social Control in the Computer Age. Schocken Books, 1974.
[56]
Rule, J.B. Value Choices in E.F.T.S. Office of Telecommunications Policy, Washington, D.C., 1975.
[57]
Rule, J.B. 1984-The ingredients of totalitarianism. In 1984 Revisited-Totalitarianism in Our Century. Harper and Row, New York, 1983, pp. 166-179.{
[58]
Rule, J.B. Documentary identification and mass surw:illance in the United States5 Sac. Probl. 31,222 (1983).
[59]
Rule, J.B., McAdam, D., Stearns, L. and Uglow, D. The Politics of Privacy. New American Library, 1980.
[60]
Russell, B. Authority and the Individual. George Allen and Unwin, 1949.
[61]
Shaltuck, J. Computer matching is a serious threat to individual rights. Commun. ACM 27, 6 (June 1984), 538-541.
[62]
Stone, M.G. Computer Privacy. Anbar, 1968.
[63]
Thom, J. and Thorne. P. Privacy legislation and the right of access. Aust. Comput. J. 15, 4 (Nov. 1983), 145-150.
[64]
Thompson, A.A. A Big Brother in Britain Today. Michael Joseph, 1970.
[65]
U.S. Dept. of Health and Human Services. Computer Matching in State Administered Benefit Programs: A Manager's Guide to Decision-Making. HEW, Washington, D.C., 1983.
[66]
U.S. Dept. of Health and Human Services. Computer Matching in State Administered Benefit Programs. HEW, Washington, D.C., June 1984.
[67]
U.S. Dept. of Health, Education and Welfare, Secretary's Advisory Committee on Automated Personal Data Systems. Re:'ords, Computers and the Rights of Citizens. MIT Press, Cambridge, Mass., 1973.
[68]
U.S. Federal Advisory Committee on False Identifical. ion. The Criminal Use of False Identification. FACFI, Washington, D.C., 1976.
[69]
U.S. Senate. Oversight of Computer Matching to Detect Fraud and Mismanagement in Government Programs. U.S. Senate, Washington, D.C., 1982.
[70]
Warner, M., and Stone, M. The Data Bank Society: Organisations, Computers and Social Freedom. George Allen and Unwin, 1970.
[71]
Webster's 3rd Edition. 1976, p. 2302.
[72]
Weeramantry, C.G. The Slumbering Sentinels: Law and Human Rights in the Wake of Technology. Penguin Books. New York, 1983.
[73]
Wessell, M.R. Freedom's Edge: The Computer Threat to Society. Addison-Wesley, Reading, Mass., 1974.
[74]
Westin, A.F. Privacy and Freedom. Atheneum, New York, 1967.
[75]
Westin, A.F., Ed. Information Technology in a Democracy. Harvard University Press, Cambridge, Mass., 1971.
[76]
Westin, A.F., and Baker, M. Databanks in a Free Society. Quadrangle, New York. 1974.
[77]
Yestingsmeier, J. Electronic funds transfer systems: 'the continuing need for privacy legislation. Comput. Sac. 13.4 (Winter 1984), 5-9.
[78]
Zamyatin, Y. We. Penguin Books, New York, 1983 (originally published in Russian, 1920).

Cited By

View all
  • (2024)Dijital Medya Ortamında Rızanın Algoritmik İnşası: Eleştirel Algoritma Çalışmaları Perspektifinde Bir TartışmaYeni Medya Dergisi10.55609/yenimedya.1424585Online publication date: 6-Jun-2024
  • (2024)Navigating Virtual Realities and Hybrid Spaces in the Tron Cinematic LandscapeStudies on Cinematography and Narrative in Film10.4018/979-8-3693-1958-1.ch002(19-41)Online publication date: 31-May-2024
  • (2024)Santé numériqueAnthropologie et Santé10.4000/11r3328Online publication date: 2024
  • Show More Cited By

Recommendations

Reviews

John W. Fendrich

This paper discusses the issues of surveillance in society. It emphasizes the ways information technology (IT) influences and stimulates surveillance. Definitions of surveillance, dataveillance, personal surveillance, and mass surveillance are presented. The author attempts to maintain a detached point of view, not claiming that surveillance is evil or undesirable. However, he asserts that IT is being applied to surveillance techniques with few guidelines or restraints and with limited regard to correctness, cost, or effectiveness. He calls for a harnessing of IT's decentralized potential in surveillance, and for more recognition of the implications of the application of IT in surveillance for a human-oriented society. The paper identifies many interesting issues and problems; however, it does not offer an effective, practical methodology to deal with the concerns it raises. The paper provides an introductory overview and review of the opinions and case studies provided in its long list of references. It is appropriate for information technologists and anyone interested in the social and ethical implications of applied information technology. The study of this paper could be the basis for personal reflection on strategies to address the issues it raises. I hope that, with the spate of papers of this genre, methodologies that combine IT and social values will be forthcoming that are adaptive to organizations and individuals and that meet their requirements.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 31, Issue 5
May 1988
114 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/42411
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 May 1988
Published in CACM Volume 31, Issue 5

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1,043
  • Downloads (Last 6 weeks)199
Reflects downloads up to 11 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Dijital Medya Ortamında Rızanın Algoritmik İnşası: Eleştirel Algoritma Çalışmaları Perspektifinde Bir TartışmaYeni Medya Dergisi10.55609/yenimedya.1424585Online publication date: 6-Jun-2024
  • (2024)Navigating Virtual Realities and Hybrid Spaces in the Tron Cinematic LandscapeStudies on Cinematography and Narrative in Film10.4018/979-8-3693-1958-1.ch002(19-41)Online publication date: 31-May-2024
  • (2024)Santé numériqueAnthropologie et Santé10.4000/11r3328Online publication date: 2024
  • (2024)AĞ TOPLUMUNDA POST-DEMOKRATİK GÖZETİM, MİLLÎ KİMLİK, VATANDAŞLIK VE EGEMENLİK İLİŞKİSİKocaeli Üniversitesi Sosyal Bilimler Dergisi10.35343/kosbed.1490392Online publication date: 25-Jun-2024
  • (2024)Synced ads: effects of mobile ad size and timingFrontiers in Communication10.3389/fcomm.2024.13433159Online publication date: 25-Mar-2024
  • (2024)Towards Integrated and Quality-Assured Health Service Delivery: Creating A Prototype of Health Smart Card in the PhilippinesSSRN Electronic Journal10.2139/ssrn.4795588Online publication date: 2024
  • (2024)Becoming (In)Visible: Self-Assertion and Disappearance of the Self in Contemporary Surveillance NarrativesZeitschrift für Anglistik und Amerikanistik10.1515/zaa-2023-204372:1(47-63)Online publication date: 8-Mar-2024
  • (2024)Shaping the techno-social landscape of corrections: How values, technology, and culture influence the design of correctional service delivery applicationsJournal of Criminology10.1177/2633807624125553057:3(294-312)Online publication date: 5-Jun-2024
  • (2024)Role-based privacy cynicism and local privacy activism: How data stewards navigate privacy in higher educationBig Data & Society10.1177/2053951724124066411:2Online publication date: 3-Apr-2024
  • (2024)Critical data studies meets discard studies: Waste data reflectivity in digital urban waste tracking systemConvergence: The International Journal of Research into New Media Technologies10.1177/13548565241288452Online publication date: 7-Oct-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media