Skip to main content

Intelligence, Dataveillance, and Information Privacy

  • Conference paper
Book cover Protecting Persons While Protecting the People (ISIPS 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5661))

Included in the following conference series:

  • 689 Accesses

Abstract

The extent and scope of intelligence activities are expanding in response to technological and economic transformations of the past decades. Intelligence efforts involving aggregated data from multiple public and private sources combined with past abuses of domestic intelligence functions have generated significant concerns among privacy advocates and citizens about the protection of individual civil liberties and information privacy from corporate and governmental misuse. In the information age, effective regulation and oversight are key components in the legitimacy and success of government domestic intelligence activities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Regan, P.M.: Old issues, new context: Privacy, information collection, and homeland security. Gov. Info. Qtly. 21, 481–497 (2004)

    Article  Google Scholar 

  2. Kuhn, M.: Federal Dataveillance: Implications for Constitutional Privacy Protections. LFB Scholarly Publishing, LLC, New York (2007)

    Google Scholar 

  3. Caudill, E.M., Murphy, P.: Consumer Online Privacy: Legal and Ethical Issues. Jl. Pub. Ply. & Mrtg. 19(1), 7–19 (Spring 2002)

    Google Scholar 

  4. Westin, A.F.: Social and Political Dimensions of Privacy. J. Soc. Iss. 59(2), 431–453 (2003)

    Article  Google Scholar 

  5. Collins, H.: Survey: Employee Data More Vulnerable Than Constituent Data. Gov. Tech., November 14 (2008), http://www.govtech.com/gt/560506?topic=117671

  6. Milberg, S.J., Smith, H.J., Burke, S.: Information Privacy: Corporate Management and National Regulation. Org. Sci. 11(1), 35–57 (2002)

    Article  Google Scholar 

  7. Clarke, R.: Introduction to Dataveillance and Information Privacy, and Definitions of Terms (2006), http://www.anu.edu.au/people/Roger.Clarke/DV/Intro.html

  8. De Rosa, M.: Privacy in the Age of Terror. T. Wash. Qtly. 26(3), 27–41 (2003)

    Article  Google Scholar 

  9. Select Committee to Study Government Operations with Respect to Intelligence Activities. Intelligence Activities and the Rights of Americans (1976)

    Google Scholar 

  10. The IRS’s 287 Billion Dollar Man. Time (April 7, 1975), http://www.time.com/time/magazine/article/0,9171,917244,00.html?promoid=googlep

  11. McNeil, P.: The Evolution of the U.S. Intelligence Community – An Historical Overview. In: Johnson, L., Wirtz, J. (eds.) Intelligence and National Security, pp. 1–20. Oxford University Press, New York (2008)

    Google Scholar 

  12. Anton, A.I., Qingfend, H., Baumer, D.: Inside JetBlue’s Privacy Policy Violations. IEEE Sec. Priv. (November/December 2004)

    Google Scholar 

  13. Reylea, H.C.: Privacy and Civil Liberties Oversight Board: New Independent Agency Status. In: CRS Report for Congress (No. RL 34385), July 21. Congressional Research Service, Washington (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mace, R.R. (2009). Intelligence, Dataveillance, and Information Privacy. In: Gal, C.S., Kantor, P.B., Lesk, M.E. (eds) Protecting Persons While Protecting the People. ISIPS 2008. Lecture Notes in Computer Science, vol 5661. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10233-2_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10233-2_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10232-5

  • Online ISBN: 978-3-642-10233-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics