-
1
-
-
80052911935
-
Emerging forms of covert surveillance using GPS-enabled devices
-
Abbas, R. 2011. Emerging forms of covert surveillance using GPS-enabled devices. Journal of Cases on Information Technology, 13(2): 19-33.
-
(2011)
Journal of Cases on Information Technology
, vol.13
, Issue.2
, pp. 19-33
-
-
Abbas, R.1
-
2
-
-
84859348617
-
-
ABC News, 2008. Inquiry called into assassination conviction. ABC news [online], 6 June. Available from: [Accessed 3 August 2011]
-
ABC News, 2008. Inquiry called into assassination conviction. ABC news [online], 6 June. Available from: http://www.abc.net.au/news/2008-06-06/inquiry-called-into-assassination-conviction/2461870 [Accessed 3 August 2011]
-
-
-
-
3
-
-
84859352438
-
-
Ackerman, L., Kempf, J., and Miki, T., 2003. Wireless location privacy: law and policy in the US, EU and Japan [online]. Reston, VA: Internet Society, Internet Society Member Briefing 15. Available from: [Accessed 3 August 2011]
-
Ackerman, L., Kempf, J., and Miki, T., 2003. Wireless location privacy: law and policy in the US, EU and Japan [online]. Reston, VA: Internet Society, Internet Society Member Briefing 15. Available from: http://www.isoc.org/briefings/015/ [Accessed 3 August 2011]
-
-
-
-
4
-
-
33646153058
-
Protecting privacy against location-based personal identification
-
In: W. Jonker and M. Petkovic, eds., Heidelberg, Berlin: Springer Verlag
-
Bettini, C., Wang, X.S., and Jajodia, S., 2005. Protecting privacy against location-based personal identification. In: W. Jonker and M. Petkovic, eds. Secure data management. Lecture Notes in Computer Science, vol. 3674, Heidelberg, Berlin: Springer Verlag, 185-199
-
(2005)
Secure data management. Lecture Notes in Computer Science
, vol.3674
, pp. 185-199
-
-
Bettini, C.1
Wang, X.S.2
Jajodia, S.3
-
5
-
-
70349257509
-
Privacy in location-based applications: Research issues and emerging trends
-
New York, Heidelberg, Berlin: Springer-Verlag
-
Bettini, C., et al., eds., 2009. Privacy in location-based applications: research issues and emerging trends. Lecture Notes in Computer Science, vol. 5599, New York, Heidelberg, Berlin: Springer-Verlag
-
(2009)
Lecture Notes in Computer Science
, vol.5599
-
-
Bettini, C.1
-
6
-
-
0024011426
-
Information technology and dataveillance
-
Clarke, R. 1988. Information technology and dataveillance. Communications of the ACM, 31(5): 498-512.
-
(1988)
Communications of the ACM
, vol.31
, Issue.5
, pp. 498-512
-
-
Clarke, R.1
-
7
-
-
84953586760
-
Human identification in information systems: management challenges and public policy issues
-
Clarke, R. 1994. Human identification in information systems: management challenges and public policy issues. Information Technology and People, 7(4): 6-37.
-
(1994)
Information Technology and People
, vol.7
, Issue.4
, pp. 6-37
-
-
Clarke, R.1
-
8
-
-
84859366952
-
-
Clarke, R., 1999. Relevant characteristics of person-location and person-tracking technologies [online]. Canberra: Xamax Consultancy Pty Ltd. Available from: [Accessed 15 February 2009]
-
Clarke, R., 1999. Relevant characteristics of person-location and person-tracking technologies [online]. Canberra: Xamax Consultancy Pty Ltd. Available from: http://www.rogerclarke.com/DV/PLTApp.html [Accessed 15 February 2009]
-
-
-
-
9
-
-
84859348615
-
-
Clarke, R., 2000. Beyond the OECD guidelines: privacy protection for the 21st century [online]. Canberra: Xamax Consultancy Pty Ltd. Available from: [Accessed 15 February 2009]
-
Clarke, R., 2000. Beyond the OECD guidelines: privacy protection for the 21st century [online]. Canberra: Xamax Consultancy Pty Ltd. Available from: http://www.rogerclarke.com/DV/PP21C.html [Accessed 15 February 2009]
-
-
-
-
10
-
-
84986178228
-
Person location and person tracking - technologies, risks and policy implications
-
Clarke, R., 2001a. Person location and person tracking-technologies, risks and policy implications. Information Technology and People, 14 (2), 206-231
-
(2001)
Information Technology and People
, vol.14
, Issue.2
, pp. 206-231
-
-
Clarke, R.1
-
11
-
-
84859314931
-
-
Clarke, R., 2001b. Authentication: a sufficiently rich model to enable e-business [online]. Canberra: Xamax Consultancy Pty Ltd. Available from: [Accessed 15 February 2009]
-
Clarke, R., 2001b. Authentication: a sufficiently rich model to enable e-business [online]. Canberra: Xamax Consultancy Pty Ltd. Available from: http://www.rogerclarke.com/EC/AuthModel.html [Accessed 15 February 2009]
-
-
-
-
12
-
-
84859366967
-
-
Clarke, R., 2004. Identification and authentication fundamentals [online]. Canberra: Xamax Consultancy Pty Ltd, Available from: [Accessed 15 February 2009]
-
Clarke, R., 2004. Identification and authentication fundamentals [online]. Canberra: Xamax Consultancy Pty Ltd, Available from: http://www.rogerclarke.com/DV/IdAuthFundas.html [Accessed 15 February 2009]
-
-
-
-
13
-
-
84859314934
-
-
Clarke, R., 2006. What's 'privacy'? Prepared for a workshop at the Australian law reform commission [online], 28 July. Available from: [Accessed 15 February 2009]
-
Clarke, R., 2006. What's 'privacy'? Prepared for a workshop at the Australian law reform commission [online], 28 July. Available from: http://www.rogerclarke.com/DV/Privacy.html [Accessed 15 February 2009]
-
-
-
-
14
-
-
84859342864
-
What 'überveillance' is, and what to do about it
-
In: Michael K., Michael M.G., editors Wollongong: University of Wollongong
-
Clarke, R. 2007. "What 'überveillance' is, and what to do about it". In From dataveillance to überveillance and the realpolitik of the transparent society: proceedings of the second RNSA workshop on the social implications of national security, Edited by: Michael, K. and Michael, M.G. 27-46. Wollongong: University of Wollongong.
-
(2007)
From dataveillance to überveillance and the realpolitik of the transparent society: Proceedings of the second RNSA workshop on the social implications of national security
, pp. 27-46
-
-
Clarke, R.1
-
16
-
-
84859369886
-
The covert implementation of mass vehicle surveillance in Australia
-
In: S. Bronitt, C. Harfield, and K. Michael, eds, 7 April 2009, Canberra: National Europe Centre, ANU
-
Clarke, R., 2009a. The covert implementation of mass vehicle surveillance in Australia. In: S. Bronitt, C. Harfield, and K. Michael, eds. Proceedings of the fourth workshop on the social implications of national security: the social implications of covert policing, 7 April 2009. Canberra: National Europe Centre, ANU, 45-60
-
(2009)
Proceedings of the fourth workshop on the social implications of national security: The social implications of covert policing
, pp. 45-60
-
-
Clarke, R.1
-
17
-
-
84859358916
-
-
Clarke, R., 2009b. A sufficiently rich model of (Id)entity, authentication and authorisation. In: Proceedings of IDIS 2009 - the 2nd multidisciplinary workshop on identity in the information society, 5 June 2009, London School of Economics. Available from: [15 February 2009]
-
Clarke, R., 2009b. A sufficiently rich model of (Id)entity, authentication and authorisation. In: Proceedings of IDIS 2009-the 2nd multidisciplinary workshop on identity in the information society, 5 June 2009, London School of Economics. Available from: http://www.rogerclarke.com/ID/IdModel-090605.html [15 February 2009]
-
-
-
-
18
-
-
63849268056
-
-
Vermont, Victoria: Australian Road Research Board, Research Report ARR, 184
-
Daniel, M., Webber, M.J., and Wigan, M.R., 1990. Social impacts of new technologies for traffic management. Vermont, Victoria: Australian Road Research Board, Research Report ARR, 184
-
(1990)
Social impacts of new technologies for traffic management
-
-
Daniel, M.1
Webber, M.J.2
Wigan, M.R.3
-
19
-
-
84859352440
-
-
FGDC, 1998. Content standard for digital geospatial metadata [online]. Washington, DC: Federal Geographic Data Committee, FGDC-STD-001-1998. Available from [Accessed 12 June 2008]
-
FGDC, 1998. Content standard for digital geospatial metadata [online]. Washington, DC: Federal Geographic Data Committee, FGDC-STD-001-1998. Available from http://www.fgdc.gov/metadata/csdgm/ [Accessed 12 June 2008]
-
-
-
-
20
-
-
84859358914
-
-
GFW, 2011. Who is harmed by a "Real Names" policy?. Geek Feminism Wiki [online]. Available from: [Accessed 3 August 2011]
-
GFW, 2011. Who is harmed by a "Real Names" policy?. Geek Feminism Wiki [online]. Available from: http://geekfeminism.wikia.com/wiki/Who_is_harmed_by_a_%22Real_Names%22_policy%3F [Accessed 3 August 2011]
-
-
-
-
21
-
-
2342502819
-
Preserving privacy in environments with location-based applications
-
Ginger, M, Friday, A and Davies, N. 2003. Preserving privacy in environments with location-based applications. IEEE Pervasive Computing, 2(1): 56-64.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.1
, pp. 56-64
-
-
Ginger, M.1
Friday, A.2
Davies, N.3
-
22
-
-
84859348618
-
-
Graham, F., 2008. GPS gadgets can reveal more than your location. New scientist [online] 3 June. Available from: [Accessed 10 November 2011]
-
Graham, F., 2008. GPS gadgets can reveal more than your location. New scientist [online] 3 June. Available from: http://technology.newscientist.com/article/dn14052-gps-gadgets-can-reveal-more-than-your-location.html [Accessed 10 November 2011]
-
-
-
-
23
-
-
85018204196
-
-
Gruteser, M. and Grunwald, D., 2003. Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the MobiSys: the 1st international workshop on mobile commerce, 5-8 May 2003. San Francisco, CA: Usenix, 38-42. Available from: [Accessed 30 January 2004]
-
Gruteser, M. and Grunwald, D., 2003. Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the MobiSys: the 1st international workshop on mobile commerce, 5-8 May 2003. San Francisco, CA: Usenix, 38-42. Available from: http://www.usenix.org/events/mobisys03/ [Accessed 30 January 2004]
-
-
-
-
24
-
-
84859348620
-
-
Hu, Y.C. and Wang, H.J., 2005. A framework for location privacy in wireless networks [online]. Available from: [Accessed 3 August 2011]
-
Hu, Y.C. and Wang, H.J., 2005. A framework for location privacy in wireless networks [online]. Available from: http://research.microsoft.com/~helenw/papers/sigasia05.pdf [Accessed 3 August 2011]
-
-
-
-
25
-
-
84859366951
-
-
Keilthy, L., 2008. ANPR system performance. Parking trend international [online] June. Available from: [Accessed 3 August 2011]
-
Keilthy, L., 2008. ANPR system performance. Parking trend international [online] June. Available from: http://www.parkingandtraffic.co.uk/Measuring%20ANPR%20System%20Performance.pdf [Accessed 3 August 2011]
-
-
-
-
26
-
-
3042636289
-
Surveillance technology - privacy and social control
-
Kim, MC. 2004. Surveillance technology-privacy and social control. International Sociology, 19(2): 193-213.
-
(2004)
International Sociology
, vol.19
, Issue.2
, pp. 193-213
-
-
Kim, M.C.1
-
27
-
-
84859366955
-
-
Lettice, J., 2005. No hiding place? UK number plate cameras go national. The register [online] 24 March. Available from: [Accessed 3 August 2011]
-
Lettice, J., 2005. No hiding place? UK number plate cameras go national. The register [online] 24 March. Available from: http://www.theregister.co.uk/2005/03/24/anpr_national_system/ [Accessed 3 August 2011]
-
-
-
-
28
-
-
84859366954
-
-
Lewis, P., 2008. Fears over privacy as police expand surveillance project. The guardian [online] Monday 15 September. Available from: [Accessed 3 August 2011]
-
Lewis, P., 2008. Fears over privacy as police expand surveillance project. The guardian [online] Monday 15 September. Available from: http://www.guardian.co.uk/uk/2008/sep/15/civilliberties.police [Accessed 3 August 2011]
-
-
-
-
29
-
-
76649109067
-
The impacts of European privacy regime of locational technology development
-
Loenen, BV and Zevenbregen, JA. 2007. The impacts of European privacy regime of locational technology development. Journal of Location Based Services, 1(3): 165-178.
-
(2007)
Journal of Location Based Services
, vol.1
, Issue.3
, pp. 165-178
-
-
Loenen, B.V.1
Zevenbregen, J.A.2
-
30
-
-
84920619243
-
Schengen information system II: the balance between civil liberties, security and justice
-
In: Michael K., Michael M.G., editors 1st, Wollongong: University of Wollongong
-
Michael, K and Michael, MG. 2008. "Schengen information system II: the balance between civil liberties, security and justice". In Australia and the new technologies: evidence based policy in public administration, 1st, Edited by: Michael, K. and Michael, M.G. 173-182. Wollongong: University of Wollongong.
-
(2008)
Australia and the new technologies: Evidence based policy in public administration
, pp. 173-182
-
-
Michael, K.1
Michael, M.G.2
-
32
-
-
84859314922
-
-
OECD, 1980. Guidelines on the protection of privacy and transborder flows of personal data [online]. Paris: Organisation for Economic Cooperation and Development. Available from:, [Accessed 11 November 2011]
-
OECD, 1980. Guidelines on the protection of privacy and transborder flows of personal data [online]. Paris: Organisation for Economic Cooperation and Development. Available from: http://www.oecd.org/document/18/0,2340,en_2649_201185_1815186_1_1_1_1,00.html [Accessed 11 November 2011]
-
-
-
-
33
-
-
33751365834
-
Social impacts of transport surveillance
-
Wigan, MR and Clarke, R. 2006. Social impacts of transport surveillance. Prometheus, 24(4): 389-403.
-
(2006)
Prometheus
, vol.24
, Issue.4
, pp. 389-403
-
-
Wigan, M.R.1
Clarke, R.2
|