Constructing a surveillance impact assessment

Abstract This paper describes surveillance impact assessment (SIA), a methodology for identifying, assessing and resolving risks, in consultation with stakeholders, posed by the development of surveillance systems. This paper appears to be the first such to elaborate an SIA methodology. It argues that the process of conducting an SIA should be similar to that of a privacy impact assessment (PIA), but that an SIA must take account of a wider range of issues, impacts and stakeholders. The paper categorises the issues and impacts to be considered in the conduct of an SIA and identifies the benefits of a properly conducted SIA.

[1]  R. Ericson,et al.  The surveillant assemblage. , 2000, The British journal of sociology.

[2]  Alastair H. F. Robertson The Limits of Voluntariness in Contract , 2005 .

[3]  Michael Friedewald,et al.  Seven Types of Privacy , 2013, European Data Protection.

[4]  David Lindsay An exploration of the conceptual basis of privacy and the implications for the future of Australian privacy law , 2005 .

[5]  Gary T. Marx,et al.  An Ethics For The New Surveillance , 1998, Inf. Soc..

[6]  Colin J. Bennett,et al.  The Distribution of Privacy Risks: Who Needs Protection? , 1998, Inf. Soc..

[7]  T. Mathiesen,et al.  The Viewer Society , 1997 .

[8]  Priscilla M. Regan Response to Bennett: Also in Defense of Privacy , 2011 .

[9]  M. Gill,et al.  Assessing the impact of CCTV , 2005 .

[10]  Michael Friedewald,et al.  Sorting out smart surveillance , 2010, Comput. Law Secur. Rev..

[11]  Gary T. Marx,et al.  What's New About the "New Surveillance"? Classifying for Change and Continuity. , 2002 .

[12]  David Wright,et al.  The state of the art in privacy impact assessment , 2012, Comput. Law Secur. Rev..

[13]  David Wright,et al.  Surveillance: Extending the Limits of Privacy Impact Assessment , 2012 .

[14]  Felix Stalder Privacy is not the Antidote to Surveillance. , 2009 .

[15]  Roger A. Clarke,et al.  Information technology and dataveillance , 1988, CACM.

[16]  Walter Peissl,et al.  Surveillance and Security - a Dodgy Relationship , 2002 .

[17]  Colin J. Bennett,et al.  The Governance of Privacy: Policy Instruments in Global Perspective , 2006 .

[18]  Brandon C. Welsh,et al.  Crime prevention effects of closed circuit television: a systematic review , 2002 .