Information technology and dataveillance

  title={Information technology and dataveillance},
  author={Roger A. Clarke},
  journal={Commun. ACM},
  • R. Clarke
  • Published 1988
  • Computer Science, Business
  • Commun. ACM
Data surveillance is now supplanting conventional surveillance techniques. With this trend come new monitoring methods such as personal dataveillance and mass dataveillance that require more effective safeguards and a formal policy framework. 

Figures and Topics from this paper

Toward a State of Überveillance
Uberveillance is an emerging concept, and neither its application nor its power have yet fully arrived; however, Roger Clarke's 1988 dataveillance concept has been prevalent. Expand
ICT and Dataveillance
  • D. Coulthard, S. Keller
  • Business, Computer Science
  • Next Generation Data Technologies for Collective Computational Intelligence
  • 2011
Thetechnology cooption model provides a middle range theory for empirical analysis by identifying the key elements of technology cooption and their proposed links and the role of the stakeholders in such cooption. Expand
Article Surveillance by the Australian Media, and its Regulation
The print and broadcast media make extensive use of surveillance in order to gather information for publication. It is vital to democracy that they do so. A proportion of the media’s surveillanceExpand
Surveillance by the Australian Media, and Its Regulation
The print and broadcast media make extensive use of surveillance in order to gather information for publication. It is vital to democracy that they do so. A proportion of the media's surveillanceExpand
Now you [don’t] see me: how have new legislation and changing public awareness of the UK surveillance state impacted OSINT investigations?
Open-source intelligence (OSINT) gathering and analysis techniques are used by investigators from a variety of fields, owing to their accessibility and exceptional capacity for corroboration. It ha...
Surveillance monitoring and information assurance work systems
  • P. Goldschmidt
  • Engineering, Computer Science
  • 2010 IEEE International Symposium on Technology and Society
  • 2010
Support and assurance of surveillance monitoring, and compliance verification knowledge management of surveillance results is supported by tracking the parameters monitored by the existing information assurance monitoring infrastructure and operating work systems, and using that data/knowledge to create useful and actionable information. Expand
Consentful surveillance: supporting user understanding and control
Surveillance and surveillance-like practices are common on the free web services that we use. We argue that, although such practices can provide value to users, they should be done ‘consentfully’ asExpand
From Dataveillance to Datapulation : The Dark Side of Targeted Persuasive Technologies
HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching andExpand
Constructing a surveillance impact assessment
It is argued that the process of conducting an SIA should be similar to that of a privacy impact assessment (PIA), but that anSIA must take account of a wider range of issues, impacts and stakeholders. Expand
Big Data Surveillance: Introduction
The ambitious scope of such surveillance raises a host of important issues associated with the infrastructure for collecting and storing huge amounts of data as well as the techniques and technologies for putting it to use. Expand


Documentary Identification and Mass Surveillance in the United States
Reliance on documentary identification such as computer records, identification cards, and official papers is an essential feature of life in today's advanced industrial societies. This paperExpand
The government needs computer matching to root out waste and fraud
L'adaptation informatique couvre de nombreux processus utilises pour detecter les erreurs de paiement, augmenter la perception des dettes et identifier les pratiques de subvention et d'acquisitionExpand
Data quality and due process in large interorganizational record systems
The quality of data in one important interorganizational system—the criminal-record system of the United States—is examined. Expand
Database Retrieval Technology and Subject Access Principles
This very early paper on Australian data privacy laws considers how subject access principles would be applicable to information systems using free text retrieval systems, in response to an earlierExpand
Security without identification: transaction systems to make big brother obsolete
The large-scale automated transaction systems of the near future can be designed to protect the privacy and maintain the security of both individuals and organizations.
Computers and the information society
Computers Are Everywhere Computers and the Human Imagination Criticism and History The Business World Medicine and Computers Computers and Education Government and Computers Computers and the LawExpand
Databanks in a free society
This is the report of the first nationwide, factual study of what the use of computers is actually doing to recordkeeping processes in the United States, and what the growth of large-scale databanks mean for the citizen's constitutional rights to privacy and due process. Expand
Dossier Society: Value Choices in the Design of National Information Systems
Prof. Ken Laudon NYU Stern School of Business The industrial age was dependent on technologies that extracted value from the earth, . The boundaries which have defined and given integrity to socialExpand
Electronic funds transfer system: the continuing need for privacy legislation
Resistance to accepting the cashless society may be well-founded and major concerns of financial institutions and the private sector include both control of the system and invasion of privacy. Expand
During 1985–87 the Australian Government developed a proposal for a national identification scheme. With public concern about the scheme's implications increasing, the Australia Card Bill wasExpand