Abstract
The extent and scope of intelligence activities are expanding in response to technological and economic transformations of the past decades. Intelligence efforts involving aggregated data from multiple public and private sources combined with past abuses of domestic intelligence functions have generated significant concerns among privacy advocates and citizens about the protection of individual civil liberties and information privacy from corporate and governmental misuse. In the information age, effective regulation and oversight are key components in the legitimacy and success of government domestic intelligence activities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Regan, P.M.: Old issues, new context: Privacy, information collection, and homeland security. Gov. Info. Qtly. 21, 481–497 (2004)
Kuhn, M.: Federal Dataveillance: Implications for Constitutional Privacy Protections. LFB Scholarly Publishing, LLC, New York (2007)
Caudill, E.M., Murphy, P.: Consumer Online Privacy: Legal and Ethical Issues. Jl. Pub. Ply. & Mrtg. 19(1), 7–19 (Spring 2002)
Westin, A.F.: Social and Political Dimensions of Privacy. J. Soc. Iss. 59(2), 431–453 (2003)
Collins, H.: Survey: Employee Data More Vulnerable Than Constituent Data. Gov. Tech., November 14 (2008), http://www.govtech.com/gt/560506?topic=117671
Milberg, S.J., Smith, H.J., Burke, S.: Information Privacy: Corporate Management and National Regulation. Org. Sci. 11(1), 35–57 (2002)
Clarke, R.: Introduction to Dataveillance and Information Privacy, and Definitions of Terms (2006), http://www.anu.edu.au/people/Roger.Clarke/DV/Intro.html
De Rosa, M.: Privacy in the Age of Terror. T. Wash. Qtly. 26(3), 27–41 (2003)
Select Committee to Study Government Operations with Respect to Intelligence Activities. Intelligence Activities and the Rights of Americans (1976)
The IRS’s 287 Billion Dollar Man. Time (April 7, 1975), http://www.time.com/time/magazine/article/0,9171,917244,00.html?promoid=googlep
McNeil, P.: The Evolution of the U.S. Intelligence Community – An Historical Overview. In: Johnson, L., Wirtz, J. (eds.) Intelligence and National Security, pp. 1–20. Oxford University Press, New York (2008)
Anton, A.I., Qingfend, H., Baumer, D.: Inside JetBlue’s Privacy Policy Violations. IEEE Sec. Priv. (November/December 2004)
Reylea, H.C.: Privacy and Civil Liberties Oversight Board: New Independent Agency Status. In: CRS Report for Congress (No. RL 34385), July 21. Congressional Research Service, Washington (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mace, R.R. (2009). Intelligence, Dataveillance, and Information Privacy. In: Gal, C.S., Kantor, P.B., Lesk, M.E. (eds) Protecting Persons While Protecting the People. ISIPS 2008. Lecture Notes in Computer Science, vol 5661. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10233-2_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-10233-2_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10232-5
Online ISBN: 978-3-642-10233-2
eBook Packages: Computer ScienceComputer Science (R0)