Skip to main content

The Impact of Monitoring Technology on the Law

  • Chapter
  • 519 Accesses

Abstract

This article first provides an overview of technology for monitoring and surveillance. From this overview it will become clear that the use of this type of technology is growing fast. At the same time, questions arise regarding its permissibility, in the light of legal and constitutions rights, such as the right to privacy. These questions are addressed here in the context of wider social developments. A conclusion that is reached is that with the increasing importance and use of surveillance technology, ‘monitoring the surveillors’ will become essential as well.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. American Government Accountability Office: Information Security, Radio Frequency Identification Technology in the Federal Government, WWW, http://www.gao.gov/new.items/d05551.pdf.

  2. Budowle, B., Carmody, G, Chakraborty, R. & Monson, K. L.: Source attribution of a forensic DNA profile. In: Forensic Science Communications, July 2000, ISSN 1528-8005.

    Google Scholar 

  3. Jensen, M. C. & Meckling, W. H: The Nature of Man. In: Journal of Applied Corporate Finance 1994-2, p. 4–19.

    Google Scholar 

  4. Jam, A. K., Hong, L, Pankanti, S & Bolle, R.: An identity authentication system using fingerprints. In: Proceedings of the IEEE 85 (9) (1997) 1365–1388.

    Article  Google Scholar 

  5. Mulder, R. V. De: The Digital Revolution: From Trias to Tetras Politica. In: Snellen, I. Th.M., Donk, W. B. H. J. van de (Eds.): Public Administration in an Information Age. Handbook, Amsterdam: lOS Press 1998, ISBN 9051993951.

    Google Scholar 

  6. Kerr, O. S.: Internet Surveillance Law After the USA Patriot Act: The Big Brother That Isn’t. In: Northwestern University Law Review, Vol. 97, 2003, http://ssrn.com/abstract=317501.

  7. Solove, D. J.: Privacy and Power: Computer Databases and Metaphors for Information Privacy’. In: Stanford Law Review, 2001 Vol. 53, http://docs.law.gwu.edulfacweb/dsolove/Privacy-Power.pdf.

Download references

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Friedr. Vieweg & Sohn Verlag | GWV-Fachverlage GmbH, Wiesbaden

About this chapter

Cite this chapter

Kleve, P., De Mulder, R., van Noortwijk, K. (2006). The Impact of Monitoring Technology on the Law. In: ISSE 2006 — Securing Electronic Busines Processes. Vieweg. https://doi.org/10.1007/978-3-8348-9195-2_49

Download citation

  • DOI: https://doi.org/10.1007/978-3-8348-9195-2_49

  • Publisher Name: Vieweg

  • Print ISBN: 978-3-8348-0213-2

  • Online ISBN: 978-3-8348-9195-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics