Dataveillance: Difference between revisions
HeneryDave31 (talk | contribs) m Minor writing improvement. |
HeneryDave31 (talk | contribs) m Added a new reference and citation. Also fixed a spelling error in the second paragraph. |
||
Line 2: | Line 2: | ||
== Forms of Dataveillance == |
== Forms of Dataveillance == |
||
There are three types of dataveillance: ''personal dataveillance, mass dataveillance,'' and ''facilitiative mechanisms''. <ref name=":0">{{Cite journal|last=Clarke|first=Roger A.|year=1988|title=Information Technology and Dataveillance|journal=Communications of the ACM|volume=31|pages=498 - 511}}</ref> The forms of dataveillance are sepereated by the way data is collected as well as the number of being individuals associated with |
There are three types of dataveillance: ''personal dataveillance, mass dataveillance,'' and ''facilitiative mechanisms''. <ref name=":0">{{Cite journal|last=Clarke|first=Roger A.|year=1988|title=Information Technology and Dataveillance|journal=Communications of the ACM|volume=31|pages=498 - 511}}</ref> The forms of dataveillance are sepereated by the way data is collected, as well as the number of being individuals associated with it. |
||
''Personal Dataveillance:'' Personal dataveillance refers to the collection of a person's personal data. Personal dataveillance occurs when an individual's data causes a suspicion or has attracted attention.<ref name=":0" /> |
''Personal Dataveillance:'' Personal dataveillance refers to the collection of a person's personal data. Personal dataveillance occurs when an individual's data causes a suspicion or has attracted attention.<ref name=":0" /> |
||
Line 10: | Line 10: | ||
(REFER TO THE DEFINITIONS OF DATAVEILLANCE HERE. ID THE THREE TPYES. DO NOT PUT HOW THEY COLLECT INFO. USE THAT FOR A DIFFERENT SECTION?) |
(REFER TO THE DEFINITIONS OF DATAVEILLANCE HERE. ID THE THREE TPYES. DO NOT PUT HOW THEY COLLECT INFO. USE THAT FOR A DIFFERENT SECTION?) |
||
== |
== Benefits and Concerns == |
||
There are many concerns and benefits that are associated with dataveillance. Dataveillance can be useful for collecting and |
There are many concerns and benefits that are associated with dataveillance. Dataveillance can be useful for collecting and verifying data in ways that are benefical. For instance, personal dataveillance can be utilized by financial institutions to track fradualte purcahses or information on user accounts.<ref name=":0" /> For example, if a financial institution charges their client for a pruchase made outside of the state they reside and other purchases made on the same day it is likely that a fradulate charge has been issued to the client. |
||
On the other hand, there are many concerns that arise from |
On the other hand, there are many concerns that arise from dataveillance. Dataveillance assumes that our technologies and data are a true reflection of ourselves since the data that is being collected is often collected for predicting outcomes and even influence legistlation.<ref>{{Cite journal|last=Amoore|first=Louise|last2=Goede|first2=Marieke De|title=Governance, risk and dataveillance in the war on terror|url=http://link.springer.com/article/10.1007/s10611-005-1717-8|journal=Crime, Law and Social Change|language=en|volume=43|issue=2-3|pages=149–173|doi=10.1007/s10611-005-1717-8|issn=0925-4994}}</ref> For instance, if two people share the same name and live in the same city there is a chance that their data could be wrongfully sorted. Additionally, there is the lack of transparency with organizations and companies who collect and share someone's data.<ref name=":0" /> Despite organizations and companies tells individuals collect data about them those companies may not indicate with who they are sharing data with. |
||
{{dashboard.wikiedu.org sandbox}}{{student sandbox}} |
{{dashboard.wikiedu.org sandbox}}{{student sandbox}} |
Revision as of 19:19, 24 October 2016
Dataveillance
Forms of Dataveillance
There are three types of dataveillance: personal dataveillance, mass dataveillance, and facilitiative mechanisms. [1] The forms of dataveillance are sepereated by the way data is collected, as well as the number of being individuals associated with it.
Personal Dataveillance: Personal dataveillance refers to the collection of a person's personal data. Personal dataveillance occurs when an individual's data causes a suspicion or has attracted attention.[1]
Mass Dataveillance: Refers to the collection of data related to the
(REFER TO THE DEFINITIONS OF DATAVEILLANCE HERE. ID THE THREE TPYES. DO NOT PUT HOW THEY COLLECT INFO. USE THAT FOR A DIFFERENT SECTION?)
Benefits and Concerns
There are many concerns and benefits that are associated with dataveillance. Dataveillance can be useful for collecting and verifying data in ways that are benefical. For instance, personal dataveillance can be utilized by financial institutions to track fradualte purcahses or information on user accounts.[1] For example, if a financial institution charges their client for a pruchase made outside of the state they reside and other purchases made on the same day it is likely that a fradulate charge has been issued to the client.
On the other hand, there are many concerns that arise from dataveillance. Dataveillance assumes that our technologies and data are a true reflection of ourselves since the data that is being collected is often collected for predicting outcomes and even influence legistlation.[2] For instance, if two people share the same name and live in the same city there is a chance that their data could be wrongfully sorted. Additionally, there is the lack of transparency with organizations and companies who collect and share someone's data.[1] Despite organizations and companies tells individuals collect data about them those companies may not indicate with who they are sharing data with.
This is a user sandbox of Dataveillance. You can use it for testing or practicing edits. This is not the sandbox where you should draft your assigned article for a dashboard.wikiedu.org course. To find the right sandbox for your assignment, visit your Dashboard course page and follow the Sandbox Draft link for your assigned article in the My Articles section. |
This template should only be used in the user namespace.This template should only be used in the user namespace.
This is a user sandbox of Dataveillance. A user sandbox is a subpage of the user's user page. It serves as a testing spot and page development space for the user and is not an encyclopedia article. |
- This template should only be used in the user namespace.
- ^ a b c d Clarke, Roger A. (1988). "Information Technology and Dataveillance". Communications of the ACM. 31: 498–511.
- ^ Amoore, Louise; Goede, Marieke De. "Governance, risk and dataveillance in the war on terror". Crime, Law and Social Change. 43 (2–3): 149–173. doi:10.1007/s10611-005-1717-8. ISSN 0925-4994.