Clarke et al., 1997 - Google Patents
Data Surveillance: Theory, Practice & PolicyClarke et al., 1997
View PDF- Document ID
- 5930898048315353459
- Author
- Clarke R
- et al.
- Publication year
External Links
Snippet
Data surveillance is the systematic use of personal data systems in the investigation or monitoring of the actions or communications of one or more persons. This collection of papers was the basis for a supplication under Rule 28 of the ANU's Degree of Doctor of …
- 238000004458 analytical method 0 abstract description 28
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
- G06F19/322—Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6232—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
- G06K9/6247—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Clarke | Human Identification in Information Systems: Management Challenges andPublic Policy Issues | |
US11928681B2 (en) | System and method for confidentially sharing information across a computer network | |
Alterman | ``A piece of yourself'': Ethical issues in biometric identification | |
Garfinkel | Database nation: The death of privacy in the 21st century | |
Sobel | The Demeaning of Identity and Personhood in National Indentification Systems | |
US20120131657A1 (en) | Apparatus and Method for Authenticated Multi-User Personal Information Database | |
Finch | What a tangled web we weave: Identity theft and the internet | |
Beynon-Davies | Personal identity management in the information polity: the case of the UK national identity card | |
Sweeney | Protecting job seekers from identity theft | |
Clarke | Data Surveillance: Theory, Practice & Policy | |
Black | Legislating US data privacy in the context of national identification numbers: models from South Africa and the United Kingdom | |
Michael et al. | Historical lessons on ID technology and the consequences of an unchecked trajectory | |
Clarke | Authentication: A sufficiently rich model to enable e-business | |
Kodl et al. | Human Identity, Human Identification and Human Security | |
Grijpink | Chain-computerisation for better privacy protection: A new approach to developing non-intrusive information infrastructures that improve privacy protection | |
Harbitz et al. | Dictionary for civil registration and identification | |
Eaton | The privacy card: A low cost strategy to combat terrorism | |
Wuchek | Conspiracy Theory: Big Brother Enters the Brave New World of Health Care Reform | |
Michael et al. | The proliferation of identification techniques for citizens throughout the ages | |
AU2000240683B2 (en) | Apparatus and method for assuring the integrity of a multi-user personal information database | |
Hart | The conjurer's new card trick and the illusion of privacy: a discussion of the privacy and transparency issues associated with the proposed Australian Government health and social services access card. | |
Lips et al. | Identity management in e-Government service provision | |
Australian et al. | Proof of id required? Getting identity management right | |
Mattatia | An Overview of Some Electronic Identification Use Cases in Europe | |
Thibodeau | Identity Documentation and Verification |