[go: up one dir, main page]

Clarke et al., 1997 - Google Patents

Data Surveillance: Theory, Practice & Policy

Clarke et al., 1997

View PDF
Document ID
5930898048315353459
Author
Clarke R
et al.
Publication year

External Links

Snippet

Data surveillance is the systematic use of personal data systems in the investigation or monitoring of the actions or communications of one or more persons. This collection of papers was the basis for a supplication under Rule 28 of the ANU's Degree of Doctor of …
Continue reading at openresearch-repository.anu.edu.au (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • G06F19/32Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
    • G06F19/322Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6232Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
    • G06K9/6247Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis

Similar Documents

Publication Publication Date Title
Clarke Human Identification in Information Systems: Management Challenges andPublic Policy Issues
US11928681B2 (en) System and method for confidentially sharing information across a computer network
Alterman ``A piece of yourself'': Ethical issues in biometric identification
Garfinkel Database nation: The death of privacy in the 21st century
Sobel The Demeaning of Identity and Personhood in National Indentification Systems
US20120131657A1 (en) Apparatus and Method for Authenticated Multi-User Personal Information Database
Finch What a tangled web we weave: Identity theft and the internet
Beynon-Davies Personal identity management in the information polity: the case of the UK national identity card
Sweeney Protecting job seekers from identity theft
Clarke Data Surveillance: Theory, Practice & Policy
Black Legislating US data privacy in the context of national identification numbers: models from South Africa and the United Kingdom
Michael et al. Historical lessons on ID technology and the consequences of an unchecked trajectory
Clarke Authentication: A sufficiently rich model to enable e-business
Kodl et al. Human Identity, Human Identification and Human Security
Grijpink Chain-computerisation for better privacy protection: A new approach to developing non-intrusive information infrastructures that improve privacy protection
Harbitz et al. Dictionary for civil registration and identification
Eaton The privacy card: A low cost strategy to combat terrorism
Wuchek Conspiracy Theory: Big Brother Enters the Brave New World of Health Care Reform
Michael et al. The proliferation of identification techniques for citizens throughout the ages
AU2000240683B2 (en) Apparatus and method for assuring the integrity of a multi-user personal information database
Hart The conjurer's new card trick and the illusion of privacy: a discussion of the privacy and transparency issues associated with the proposed Australian Government health and social services access card.
Lips et al. Identity management in e-Government service provision
Australian et al. Proof of id required? Getting identity management right
Mattatia An Overview of Some Electronic Identification Use Cases in Europe
Thibodeau Identity Documentation and Verification