Information technology and dataveillance

Data surveillance is now supplanting conventional surveillance techniques. With this trend come new monitoring methods such as personal dataveillance and mass dataveillance that require more effective safeguards and a formal policy framework.

[1]  V. Packard,et al.  The Naked Society , 1964 .

[2]  Myron Brenton The privacy invaders , 1964 .

[3]  Robert Boguslaw,et al.  Privacy and Freedom , 1968 .

[4]  L. Hoffman Computers and Privacy in the Next Decade , 1980 .

[5]  Z Cowen The private man. , 1971, The Medical journal of Australia.

[6]  Gary T. Marx,et al.  Routinizing the Discovery of Secrets , 1984 .

[7]  Roger Clarke,et al.  JUST ANOTHER PIECE OF PLASTIC FOR YOUR WALLET: THE ‘AUSTRALIA CARD’ SCHEME , 1987 .

[8]  W. Dutton : Dossier Society: Value Choices in the Design of National Information Systems , 1988 .

[9]  Kenneth C. Laudon,et al.  Data quality and due process in large interorganizational record systems , 1986, CACM.

[10]  D. Burnham The rise of the computer state , 1983 .

[11]  John C. Raines Attack on privacy , 1974 .

[12]  Richard S. Rosenberg Computers and the information society , 1986 .

[13]  Ralph W. Thomas,et al.  The Oxford Dictionary , 1907 .

[14]  Rob Kling,et al.  Automated welfare client-tracking and service integration: the political economy of computing , 1978, CACM.

[15]  Richard P. Kusserow The government needs computer matching to root out waste and fraud , 1984, CACM.

[16]  Jerry Martin Rosenberg,et al.  The death of privacy , 1969 .

[17]  Theodore Roszak Cult of Information , 1986 .

[18]  A. Westin,et al.  The assault on privacy , 1971 .

[19]  James B. Rule,et al.  Documentary Identification and Mass Surveillance in the United States , 1983 .

[20]  Jonathan Rosenhead,et al.  The technology of political control , 1977 .

[21]  James Bamford,et al.  The Puzzle Palace , 1982 .

[22]  David Chaum,et al.  Security without identification: transaction systems to make big brother obsolete , 1985, CACM.

[23]  Crispin Aubrey,et al.  Who's Watching You? , 1981 .

[24]  James A. Thom,et al.  Privacy Legislation and the Right of Access , 1983, Aust. Comput. J..

[25]  Colin J. Bennett Federal government information technology: Electronic record systems and individual privacy , 1988 .

[26]  Michael Batty,et al.  The Cult of Information , 1988 .

[27]  A. D. RITCHIE Authority and the Individual , 1949, Nature.

[28]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[29]  Rob Kling,et al.  Value conflicts and social choice in electronic funds transfer system developments , 1981, CSOC.

[30]  Michael A. Baker,et al.  Databanks in a free society , 1973, CSOC.

[31]  Martin L. Gross,et al.  The Brain Watchers , 1962 .

[32]  Antony Allert Thompson Big Brother in Britain today , 1970 .

[33]  Records, Computers and the Rights of Citizens , 1973 .

[34]  J. Rule Private Lives and Public Surveillance; Social Control in the Computer Age , 1974 .

[35]  C. G. Weeramantry,et al.  The slumbering sentinels : law and human rights in the wake of technology , 1984 .

[36]  Howard Falk,et al.  The Technological Society , 1965 .

[37]  G. W. Greenleaf,et al.  Database Retrieval Technology and Subject Access Principles , 1984, Aust. Comput. J..

[38]  Jan Yestingsmeier,et al.  Electronic funds transfer system: the continuing need for privacy legislation , 1984, CSOC.

[39]  A. Westin Information technology in a democracy , 1971 .

[40]  K. Laudon Dossier Society: Value Choices in the Design of National Information Systems , 1988 .

[41]  Milton R. Wessel Freedom's edge: The computer threat to society , 1974 .

[42]  M J Helquist Public policy issues , 1990, AIDS.