Abstract
This article first provides an overview of technology for monitoring and surveillance. From this overview it will become clear that the use of this type of technology is growing fast. At the same time, questions arise regarding its permissibility, in the light of legal and constitutions rights, such as the right to privacy. These questions are addressed here in the context of wider social developments. A conclusion that is reached is that with the increasing importance and use of surveillance technology, ‘monitoring the surveillors’ will become essential as well.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
American Government Accountability Office: Information Security, Radio Frequency Identification Technology in the Federal Government, WWW, http://www.gao.gov/new.items/d05551.pdf.
Budowle, B., Carmody, G, Chakraborty, R. & Monson, K. L.: Source attribution of a forensic DNA profile. In: Forensic Science Communications, July 2000, ISSN 1528-8005.
Jensen, M. C. & Meckling, W. H: The Nature of Man. In: Journal of Applied Corporate Finance 1994-2, p. 4–19.
Jam, A. K., Hong, L, Pankanti, S & Bolle, R.: An identity authentication system using fingerprints. In: Proceedings of the IEEE 85 (9) (1997) 1365–1388.
Mulder, R. V. De: The Digital Revolution: From Trias to Tetras Politica. In: Snellen, I. Th.M., Donk, W. B. H. J. van de (Eds.): Public Administration in an Information Age. Handbook, Amsterdam: lOS Press 1998, ISBN 9051993951.
Kerr, O. S.: Internet Surveillance Law After the USA Patriot Act: The Big Brother That Isn’t. In: Northwestern University Law Review, Vol. 97, 2003, http://ssrn.com/abstract=317501.
Solove, D. J.: Privacy and Power: Computer Databases and Metaphors for Information Privacy’. In: Stanford Law Review, 2001 Vol. 53, http://docs.law.gwu.edulfacweb/dsolove/Privacy-Power.pdf.
Rights and permissions
Copyright information
© 2006 Friedr. Vieweg & Sohn Verlag | GWV-Fachverlage GmbH, Wiesbaden
About this chapter
Cite this chapter
Kleve, P., De Mulder, R., van Noortwijk, K. (2006). The Impact of Monitoring Technology on the Law. In: ISSE 2006 — Securing Electronic Busines Processes. Vieweg. https://doi.org/10.1007/978-3-8348-9195-2_49
Download citation
DOI: https://doi.org/10.1007/978-3-8348-9195-2_49
Publisher Name: Vieweg
Print ISBN: 978-3-8348-0213-2
Online ISBN: 978-3-8348-9195-2
eBook Packages: Computer ScienceComputer Science (R0)