mirror of
https://github.com/Decentralized-ID/decentralized-id.github.io.git
synced 2024-12-24 06:39:31 -05:00
52 lines
2.2 KiB
HTML
52 lines
2.2 KiB
HTML
|
---
|
||
|
title: "⏲-dataviellance"
|
||
|
---
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
<div class="info">
|
||
|
<div class="info__guild-icon-container">
|
||
|
<img class="info__guild-icon" src="https://cdn.discordapp.com/icons/616897166283243543/fed1a99d5577f89157a00758c170d3d6.png" />
|
||
|
</div>
|
||
|
<div class="info__metadata">
|
||
|
<div class="info__guild-name">DID History</div>
|
||
|
<div class="info__channel-name">⏲-dataviellance</div>
|
||
|
|
||
|
<div class="info__channel-topic"></div>
|
||
|
|
||
|
<div class="info__channel-message-count">2 messages</div>
|
||
|
|
||
|
</div>
|
||
|
</div>
|
||
|
|
||
|
<div class="chatlog">
|
||
|
<div class="chatlog__message-group">
|
||
|
<div class="chatlog__author-avatar-container">
|
||
|
<img class="chatlog__author-avatar" src="https://cdn.discordapp.com/avatars/331870764024332288/02e4a4bf5a6afba4a9d2a0b741a3b286.png" />
|
||
|
</div>
|
||
|
<div class="chatlog__messages">
|
||
|
<span class="chatlog__author-name" title="⧉infominer#2551">⧉infominer</span>
|
||
|
<span class="chatlog__timestamp">05-Sep-19 05:47 PM</span>
|
||
|
|
||
|
<div class="chatlog__content">
|
||
|
<span class="markdown"><a href="http://www.rogerclarke.com/DV/CACM88.html">http://www.rogerclarke.com/DV/CACM88.html</a></span>
|
||
|
|
||
|
</div>
|
||
|
|
||
|
|
||
|
|
||
|
<div class="chatlog__content">
|
||
|
<span class="markdown">The concept of 'dataveillance' is introduced, and defined as the systematic monitoring of people's actions or communications through the application of information technology. Dataveillance's origins are traced, and an explanation provided as to why it is becoming the dominant means of monitoring individuals and populations.
|
||
|
|
||
|
The paper identifies, classifies and describes the various dataveillance techniques. It then examines the benefits, and especially the dangers, arising from dataveillance. It considers the intrinsic and extrinsic controls that act to keep the application of dataveillance under control, and suggests some appropriate policy measures.</span>
|
||
|
|
||
|
</div>
|
||
|
|
||
|
|
||
|
|
||
|
</div>
|
||
|
</div>
|
||
|
</div>
|
||
|
|