Jump to content

Dataveillance: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
m Minor writing improvement.
m Added a new reference and citation. Also fixed a spelling error in the second paragraph.
Line 2: Line 2:


== Forms of Dataveillance ==
== Forms of Dataveillance ==
There are three types of dataveillance: ''personal dataveillance, mass dataveillance,'' and ''facilitiative mechanisms''. <ref name=":0">{{Cite journal|last=Clarke|first=Roger A.|year=1988|title=Information Technology and Dataveillance|journal=Communications of the ACM|volume=31|pages=498 - 511}}</ref> The forms of dataveillance are sepereated by the way data is collected as well as the number of being individuals associated with the data.
There are three types of dataveillance: ''personal dataveillance, mass dataveillance,'' and ''facilitiative mechanisms''. <ref name=":0">{{Cite journal|last=Clarke|first=Roger A.|year=1988|title=Information Technology and Dataveillance|journal=Communications of the ACM|volume=31|pages=498 - 511}}</ref> The forms of dataveillance are sepereated by the way data is collected, as well as the number of being individuals associated with it.


''Personal Dataveillance:'' Personal dataveillance refers to the collection of a person's personal data. Personal dataveillance occurs when an individual's data causes a suspicion or has attracted attention.<ref name=":0" />
''Personal Dataveillance:'' Personal dataveillance refers to the collection of a person's personal data. Personal dataveillance occurs when an individual's data causes a suspicion or has attracted attention.<ref name=":0" />
Line 10: Line 10:
(REFER TO THE DEFINITIONS OF DATAVEILLANCE HERE. ID THE THREE TPYES. DO NOT PUT HOW THEY COLLECT INFO. USE THAT FOR A DIFFERENT SECTION?)
(REFER TO THE DEFINITIONS OF DATAVEILLANCE HERE. ID THE THREE TPYES. DO NOT PUT HOW THEY COLLECT INFO. USE THAT FOR A DIFFERENT SECTION?)


== Use and Concerns ==
== Benefits and Concerns ==
There are many concerns and benefits that are associated with dataveillance. Dataveillance can be useful for collecting and verifinyg data in ways that are benefical. For instance, personal dataveillance can be utilized by financial institutions to track fradualte purcahses or information on user accounts.<ref name=":0" /> For example, if a financial institution charges their client for a pruchase made outside of the state they reside and other purchases made on the same day it is likely that a fradulate charge has been issued to the client.
There are many concerns and benefits that are associated with dataveillance. Dataveillance can be useful for collecting and verifying data in ways that are benefical. For instance, personal dataveillance can be utilized by financial institutions to track fradualte purcahses or information on user accounts.<ref name=":0" /> For example, if a financial institution charges their client for a pruchase made outside of the state they reside and other purchases made on the same day it is likely that a fradulate charge has been issued to the client.


On the other hand, there are many concerns that arise from personal dataveillance. Since personal dataveillance is focused on the personal data of an individual there is the chance that person's information could be wrongfully identified. For instance, if two people share the same name and live in the same city there is a chance that their data could be wrongfully sorted. Additionally, there is the lack of transparency with organizations and companies who collect and share someone's data.<ref name=":0" /> Despite organizations and companies tells individuals collect data about them those companies may not indicate with who they are sharing data with.
On the other hand, there are many concerns that arise from dataveillance. Dataveillance assumes that our technologies and data are a true reflection of ourselves since the data that is being collected is often collected for predicting outcomes and even influence legistlation.<ref>{{Cite journal|last=Amoore|first=Louise|last2=Goede|first2=Marieke De|title=Governance, risk and dataveillance in the war on terror|url=http://link.springer.com/article/10.1007/s10611-005-1717-8|journal=Crime, Law and Social Change|language=en|volume=43|issue=2-3|pages=149–173|doi=10.1007/s10611-005-1717-8|issn=0925-4994}}</ref> For instance, if two people share the same name and live in the same city there is a chance that their data could be wrongfully sorted. Additionally, there is the lack of transparency with organizations and companies who collect and share someone's data.<ref name=":0" /> Despite organizations and companies tells individuals collect data about them those companies may not indicate with who they are sharing data with.


{{dashboard.wikiedu.org sandbox}}{{student sandbox}}
{{dashboard.wikiedu.org sandbox}}{{student sandbox}}

Revision as of 19:19, 24 October 2016

Dataveillance

Forms of Dataveillance

There are three types of dataveillance: personal dataveillance, mass dataveillance, and facilitiative mechanisms. [1] The forms of dataveillance are sepereated by the way data is collected, as well as the number of being individuals associated with it.

Personal Dataveillance: Personal dataveillance refers to the collection of a person's personal data. Personal dataveillance occurs when an individual's data causes a suspicion or has attracted attention.[1]

Mass Dataveillance: Refers to the collection of data related to the

(REFER TO THE DEFINITIONS OF DATAVEILLANCE HERE. ID THE THREE TPYES. DO NOT PUT HOW THEY COLLECT INFO. USE THAT FOR A DIFFERENT SECTION?)

Benefits and Concerns

There are many concerns and benefits that are associated with dataveillance. Dataveillance can be useful for collecting and verifying data in ways that are benefical. For instance, personal dataveillance can be utilized by financial institutions to track fradualte purcahses or information on user accounts.[1] For example, if a financial institution charges their client for a pruchase made outside of the state they reside and other purchases made on the same day it is likely that a fradulate charge has been issued to the client.

On the other hand, there are many concerns that arise from dataveillance. Dataveillance assumes that our technologies and data are a true reflection of ourselves since the data that is being collected is often collected for predicting outcomes and even influence legistlation.[2] For instance, if two people share the same name and live in the same city there is a chance that their data could be wrongfully sorted. Additionally, there is the lack of transparency with organizations and companies who collect and share someone's data.[1] Despite organizations and companies tells individuals collect data about them those companies may not indicate with who they are sharing data with.

This template should only be used in the user namespace.This template should only be used in the user namespace.

This template should only be used in the user namespace.
  1. ^ a b c d Clarke, Roger A. (1988). "Information Technology and Dataveillance". Communications of the ACM. 31: 498–511.
  2. ^ Amoore, Louise; Goede, Marieke De. "Governance, risk and dataveillance in the war on terror". Crime, Law and Social Change. 43 (2–3): 149–173. doi:10.1007/s10611-005-1717-8. ISSN 0925-4994.