ROGER CLARKE’S MAIN PUBLICATIONS
DATA SURVEILLANCE and INFORMATION PRIVACY

© Xamax Consultancy Pty Ltd,  1995-2016
Photo of Roger Clarke

This document lists my main papers in this particular area, in reverse chronological order. This page is updated to 31 December 2016. Papers since then are indexed on my What's New Page.

Separate documents provide:


2016

'Dataveillance Law: Modalities, Categories and Examples' Presentation at Asia Privacy Scholars Network Conference, 14 December 2016, Slide-Set at http://www.rogerclarke.com/DV/DVL.pdf

'Risks Inherent in The Digitalisation of the Individual: A Research Agenda' Working Paper, Xamax Consultancy Pty Ltd, December 2016, PrePrint at http://www.rogerclarke.com/DV/InDigR.html

'Inadequacies in the UK Cabinet Office's Data Science Ethical Framework' Euro. Data Protection L. 2, 4 (Dec 2016) 555-560, PrePrint at http://www.rogerclarke.com/DV/DSEFR.html

'Big Data Prophylactics' Working Paper, Xamax Consultancy Pty Ltd, November 2016, PrePrint at http://www.rogerclarke.com/DV/BDP.html

'Business Models for Secure Service Offerings by ISPs' Working Paper, Xamax Consultancy Pty Ltd, November 2016, PrePrint at http://www.rogerclarke.com/EC/BM-Notes-161110.pdf

'The Shape of PETs 2.0' Presentation at Uni Darmstadt, 28 November 2016, at http://www.rogerclarke.com/DV/PETs2S.html

'The Contested Semantics of 'Security' and the Current Challenges of Big Data and IoT' Working Paper, Xamax Consultancy Pty Ltd, November 2016, PrePrint at http://www.rogerclarke.com/DV/CSS.html

'PETs 2.0 - Getting it Right the Second Time Around ' Presentation at an event of Stiftung Datenschutz, 22 November 2016, at http://www.rogerclarke.com/DV/PET2-1611.html

'Researcher Perspective(s) and the Role of Perspective in Privacy-Related Research' Presentation at Uni Leipzig, 21 November 2016, at http://www.rogerclarke.com/SOS/PPL.html

'Census 2016' Supplementary Submission to Senate Committee, for the Australian Privacy Foundation, October 2016, at http://www.privacy.org.au/Papers/SCE-Census-SuppSub-161031.pdf

'Personal Data Markets: A Matter of Perspective' Working Paper, Xamax Consultancy Pty Ltd, September 2016, PrePrint at http://www.rogerclarke.com/SOS/PDMP.html

'Regulatory Failures in the Security Space: Some Current Cases' Working Paper, Xamax Consultancy Pty Ltd, August 2016, PrePrint at http://www.rogerclarke.com/DV/RFSS.html

'Can We Productise Secure eWorking Environments?' Workshop for 11th IFIP Summer School on Privacy and Identity Management, 21-26 August 2016, Karlstad, Sweden, at http://www.rogerclarke.com/DV/SeWE16.html

'Big Data Prophylactics How Negative Impacts Can, and Cannot, be Avoided' Opening Keynote, IFIP Summer School on Privacy and Identity Management, Karlstad, Sweden, 22 August 2016, at http://www.rogerclarke.com/DV/KS16.html

'Quality Assurance for Security Applications of Big Data', Proc. Euro. Intelligence and Security Informatics Conf. (EISIC), August 2016, Uppsala, Sweden, at http://www.rogerclarke.com/EC/BDQAS.html

'Federal Election Challenge 2016' For the Australian Privacy Foundation, June 2016, at https://www.privacy.org.au/Papers/ECF-2016-Scores.html

'Privacy Impact Assessments as a Control Mechanism for Australian National Security Initiatives'
Computer Law & Security Review 32, 3 (May-Jun 2016) 403–418, at http://www.rogerclarke.com/DV/IANS.html

'Data Availability and Use' Submission to the Productivity Commission, Xamax Consultancy Pty Ltd, May 2016, PrePrint at http://www.rogerclarke.com/EC/PCDUA.html

' Information Assurance and Security' Lectures for ANU Computer Science, April 2016, PrePrint at http://www.rogerclarke.com/II/NIS2410.html

'Census 2016 – Information Sheet' Working Paper, Xamax Consultancy Pty Ltd, March 2016, at http://www.rogerclarke.com/DV/Census-2016.html

'Safeguards against Unpleasant Cyberspace Behaviour: Targets not Victims, and Self-Help before Criminalisation ' Working Paper, Xamax Consultancy Pty Ltd, February 2016, PrePrint at http://www.rogerclarke.com/II/ECC.html

'A Framework for Analysing Technology's Negative and Positive Impacts on Freedom and Privacy' Datenschutz und Datensicherheit 40, 2 (February 2016) 79-83, http://www.rogerclarke.com/DV/Biel15-DuD.html

'Appropriate Regulatory Responses to the Drone Epidemic' Computer Law & Security Review 32, 1 (Jan-Feb 2016) 152-155, PrePrint at http://www.rogerclarke.com/SOS/Drones-PAR.html

'Big Data, Big Risks' Information Systems Journal 26, 1 (January 2016) 77-90, at http://www.rogerclarke.com/EC/BDBR.html


2015

'Commentary - Data, Analytics, Values, and Models' Working Paper, Xamax Consultancy Pty Ltd, December 2015, at http://www.rogerclarke.com/EC/BDAL.html

'Managing Drones' Safety and Privacy Impacts' Working Paper, Xamax Consultancy Pty Ltd, October 2015, at http://www.rogerclarke.com/SOS/Drones-SPI.html

'A Framework for Analysing Technology's Negative and Positive Impacts on Freedom and Privacy', Working Paper, Xamax Consultancy Pty Ltd, August 2015, at http://www.rogerclarke.com/DV/Biel15-DuD.html, plus Supporting Materials

'Privacy Impact Assessments as a Control Mechanism for Australian National Security Initiatives' Working Paper, August 2015, used as a basis for a segment on ABC Lateline, at http://www.rogerclarke.com/DV/IANS.html

'The Prospects of Easier Security for SMEs and Consumers' Computer Law & Security Review 31, 4 (August 2015) 538-552 PrePrint at http://www.rogerclarke.com/EC/SSACS.html

'Data Retention as Mass Surveillance: The Need for an Evaluative Framework', International Data Privacy Law 5, 2 (May 2015) 121-132, PrePrint at http://www.rogerclarke.com/DV/DRPS.html

'Political Freedom: Positive and Negative Effects of Mobile and Internet Applications' Working Paper for a seminar in Bielefeld, Xamax Consultancy Pty Ltd, March 2015, at http://www.rogerclarke.com/DV/Biel15.html

'Telecommunications Act s.313' Evidence to a Parliamentary Committee, for APF, March 2015, at http://www.rogerclarke.com/DV/TA313.html

'Big Data Quality: An Investigation using Quasi-Empirical Scenario Analysis' Proc. Bled eConference, 9 June 2015, PrePrint at http://www.rogerclarke.com/EC/BDSA.html

'Current Concerns about Media Standards' Working Paper, Xamax Consultancy Pty Ltd, February 2015, at http://www.rogerclarke.com/II/APC-150223.html

'Data Retention Aspects of the Telecommunications (Access and Interception) Act' Evidence to a Senate Committee, for APF, January 2015, at https://www.privacy.org.au/Papers/SLCA-TIAA-Notes-150202.pdf

'The Data Retention Bill' Evidence to a Parliamentary Committee, for APF, January 2015, at https://www.privacy.org.au/Papers/PJCIS-DataRet-Supp-150131.pdf

'Risk Management for Big Data Projects' ACS Seminar-Series nationwide, January 2015, Home-Page at http://www.rogerclarke.com/EC/BDRM.html


2014

'Quality Factors in Big Data and Big Data Analytics and Their Legal Implications' Presentation at a Privacy Experts Symposium: Bigger Data in a Smaller World, Centre for Commercial Law (Bond Uni), AustLII, CLPCommunity (UNSW), 12 December 2014, at http://www.rogerclarke.com/EC/BDLI.html

'Surveillance, Resilience and Democracy' Panelist's Comments at the Joint Final Event of the EU IRISS, RESPECT and SURVEILLE Projects, Brussels, 30 October 2014, at http://www.rogerclarke.com/DV/SRD14.html

'Handholding or Handsets: School-Children's Tablets and Privacy' Presentation, Subanci University, Istanbul, 27 October 2014, at http://www.rogerclarke.com/DV/PTEdP.html

'Privacy and Free Speech' Invited Presentation at the Australian Human Rights Commission Symposium on Free Speech, Sydney, 7 August 2014, at http://www.rogerclarke.com/DV/PFS-1408.html

'Managing Drones' Privacy and Civil Liberties Impacts' Presentation to the UAV Triple Zero Summit: Mobilising & Regulating Unmanned Aerial Vehicles in Emergency Response, 23 - 24 July 2014, Melbourne, at http://www.rogerclarke.com/SOS/Drones-PCLI.html

'Easy Privacy for Consumer-Oriented Social Media' Presentation at the 4th Asian Privacy Scholars Network Conference,
Meiji University, Tokyo, 10-11 July 2014, at http://www.rogerclarke.com/II/COSMP.html

'The Prospects for Consumer-Oriented Social Media' Bled eConference June 2014, and Organizacija 47, 4 (2014) 219-230,
PrePrint at http://www.rogerclarke.com/II/COSM-1402.html

'The Regulation of Point of View Surveillance: A Review of Australian Law' IEEE Technology & Society 33, 2 (Jun 2014) 40 - 46, at http://www.rogerclarke.com/DV/POVSRA.html

'Promise Unfulfilled: The Digital Persona Concept, Two Decades Later' Information Technology & People 27, 2 (Jun 2014) 182-207, PrePrint at http://www.rogerclarke.com/ID/DP12.html

'The Regulation of Civilian Drones' Impacts on Behavioural Privacy’ Computer Law & Security Review 30, 3 (June 2014) 286-305, PrePrint at http://www.rogerclarke.com/SOS/Drones-BP.html

'How to Promote PET Usage' Notes for a Panel on 'What are the key factors that can promote effective use of PETs?', Politics of Surveillance Workshop, University of Ottawa, 10 May 2014, at http://www.rogerclarke.com/DV/PETPromo-1405.html

'Key Factors in the Limited Adoption of End-User PETs' Panel-Session on 'Using Technologies: How Can We Better Promote Useable, Effective Privacy-Enhancing / Anti-Surveillance Technologies?' Politics of Surveillance Workshop, University of Ottawa, 8-10 May 2014, at http://www.rogerclarke.com/DV/UPETs-1405.html

'Privacy and Social Media: An Analytical Framework' Journal of Law, Information and Science 23, 1 (April 2014) 1-23, PrePrint at http://www.rogerclarke.com/DV/SMTD13.html

'Drones' Policy Statement for Australian Privacy Foundation, 31 March 2014, at https://www.privacy.org.au/Papers/PS-Drones.html

'Surveillance by the Australian Media, and Its Regulation' Surveillance & Society 12, 1 (Mar 2014) 89-107, PrePrint at at http://www.rogerclarke.com/DV/MSR.html

'Drones and Privacy' For a House of Representatives Standing Committee, 28 February 2014, at http://www.rogerclarke.com/SOS/Drones-HoR.html

'From Dataveillance to Ueberveillance', Interview with Michael G. Michael, Published as a Chapter in Michael K. & Michael M.G. (eds.) 'Uberveillance and the Social Implications of Microchip Implants: Emerging Technologies' IGI Global, 2014, pp. 18-31, PrePrint at http://www.rogerclarke.com/DV/DV13.html

'Location and Tracking of Mobile Devices' Presentation in the University of Southampton Faculty of Law, 27 January 2014, at http://www.rogerclarke.com/DV/LTMD-1401.html

'Security vs. Privacy Trade-Off Considered Harmful' Notes for a Panel Presentation at CPDP'14, Brussels, 23 January 2014, at http://www.rogerclarke.com/DV/SvsP.html

'Approaches to Impact Assessment' Notes for a Panel Presentation at CPDP'14, Brussels, 22 January 2014, at http://www.rogerclarke.com/SOS/IA-1401.html

'Social Media and Privacy: The Technical Requirements, and the Role of Law' Presentation at Bahçesehir Üniversitesi, Besiktas, 20 January 2014, at http://www.rogerclarke.com/II/COSML-1401.html

'The Nature of the Digital Persona and Its Implications for Data Protection Law' Presentation at Bahçesehir Üniversitesi, Besiktas, 20 January 2014, at http://www.rogerclarke.com/ID/DP14.html


2013

'Review of the OECD Security Guidelines: is the OECD Capable of Addressing Civil Society Concerns?' ITAC Newsletter, December 2013, at http://www.internetac.org/archives/1865

'Data Risks in the Cloud’ Journal of Theoretical and Applied Electronic Commerce Research 8, 3 (December 2013) 59-73, at http://www.rogerclarke.com/II/DRC.html

'Challenges Facing the OECD's Revised Security Guidelines', at http://www.rogerclarke.com/SOS/OECDS-1311.html (November)

'Serious Invasions of Privacy in the Digital Era', at http://www.rogerclarke.com/DV/SSRN-id2360928.pdf (Submission for APF, junior author, November)

'Surveillance by the Australian Media, and Its Regulation', at http://www.rogerclarke.com/DV/MSR.html (Revised Version, November)

'Regulation of Civilian Drones' Applications to Surveillance', at http://www.rogerclarke.com/SOS/Drones-BP.html (Drones Paper 4 of 4, October)

'Why Isn't Security Easier for SMEs and Consumers?', at http://www.rogerclarke.comEC/SSACS-13.html (October)

'International Data Privacy Standards: A Global Approach', at http://www.privacy.org.au/Papers/PS-IntlDP.pdf (Statement for APF, junior author, September)

'Cloud Computing Code', at http://www.xamax.com.au/EC/ACS-CloudCompProt-130812.pdf (August, Submission to ACS)

'Big Data's Big Unintended Consequences' IEEE Computer 46, 6 (June 2013) 46 - 53, at http://www.rogerclarke.com/DV/BigData-1303.html (second-named author, with M. Wigan)

'Location and Tracking of Mobile Devices: Überveillance Stalks the Streets' Comp. L. & Security Rev. 29, 3 (May-June) 2013 216-228, at http://www.rogerclarke.com/DV/LTMD.html (second-named author with Michael K.)

'Privacy and Social Media: An Analytical Framework', at http://www.rogerclarke.com/DV/SMTD13.html (Review Draft, May)

'From Dataveillance to Ueberveillance', at http://www.rogerclarke.com/DV/DV13.html (Interview / Book Chapter, May)

'Data Breach Notification', at http://www.privacy.org.au/Papers/APF-PS-DBN-Supp-130504.pdf (Supplementary Policy Statement for the APF, May)

'Privacy Impact Assessments', at http://www.privacy.org.au/Papers/PS-PIA.html (Policy Statement for the APF, April)

'Meta-Principles for Privacy Protection', at http://www.privacy.org.au/Papers/PS-MetaP.html (Policy Statement for the APF, April)

'Data Breach Notification', at http://www.privacy.org.au/Papers/PS-DBN.html (APF Policy Statement, April)

'The New Meaning of 'Point of View': Media Uses and Abuses of New Surveillance Tools', at http://www.rogerclarke.com/II/APC-130225.html (February, for the Australian Press Council)

'Consumer-Oriented Social Media: The Identification of Key Characteristics', at http://www.rogerclarke.com/II/COSM-1301.html (February)

'The Resilience of Society in the Face of Surveillance', at http://www.rogerclarke.com/DV/IRISSR.html (February, for the IRISS project)

'Whose Security? The Politics of Alternative Scope Definitions', at http://www.rogerclarke.com/EC/WS-1301.html (January, for Oxford University)

'State Surveillance and Its Governance', at http://www.rogerclarke.com/DV/SDS-1301.html (January, for a Panel at CDPD in Brussels)

'eConsumer Insecurity: Five Sensationalist Headlines, and Why They're True', at http://www.rogerclarke.com/EC/eCIS.html (January, for Uni of Koblenz WI Forum)

'The OAIC Guide to Information Security', at http://www.rogerclarke.com/DV/OAIC-ISGuide-130104.pdf (January)

'Information Security for Small and Medium-Sized Organisations' (January), at http://www.xamax.com.au/EC/ISInfo.pdf


2012

'Information Security' Policy Statement for the Australian Privacy Foundation, December 2012, at http://www.privacy.org.au/Papers/PS-Secy.html

'Privacy and Social Media Technology' Workshop Presentation, Meiji University, Tokyo, November 2012, at http://www.rogerclarke.com/II/PSMT-1211.html

'Consumer-Oriented Social Media as Market Opportunity' Keynote Presentation, Conference on Privacy in the Social Networked World, Meiji University, Tokyo, November 2012, at http://www.rogerclarke.com/II/COSMO-1211.html

'Why you should oppose a data breach notification law' OpEd Piece, itNews, October 2012, at http://www.rogerclarke.com/EC/DBNL-1211.html

'Location and Tracking of Mobile Devices: Überveillance Stalks the Streets' Xamax Consultancy Pty Ltd, October 2012, second-named author with Michael K., at http://www.rogerclarke.com/DV/LTMD.html

'The Challenging World of Privacy Advocacy' Short Invited Paper for IEEE Technology & Society, September 2012, at http://www.rogerclarke.com/DV/PAO-12.html

'The Regulation of Point of View Surveillance: A Review of Australian Law' Xamax Consultancy Pty Ltd, August 2012, at http://www.rogerclarke.com/DV/POVSRA.html

'Promise Unfulfilled: The Digital Persona Concept, Two Decades Later' Xamax Consultancy Pty Ltd, July 2012, at http://www.rogerclarke.com/ID/DP12.html

'Privacy as a Strategic Factor in Social Media: An Analysis Based on the Concepts of Trust and Distrust' Presentation at Roskilde University, June 2012, at http://www.rogerclarke.com/DV/SMTD.html

'Privacy and the Media - A Platform for Change?' Uni of WA Law Review 36, 1 (June 2012) 158-198, at ... http://www.rogerclarke.com/DV/PandM.html

'Privacy and the Media - A Normative Analysis' Xamax Consultancy Pty Ltd, March 2012, at http://www.rogerclarke.com/DV/PMN.html

'Substance Abuse Testing and the Workplace' Policy Statement for the Australian Privacy Foundation, March 2012, at http://www.privacy.org.au/Papers/SATW.html

'Auto-Enrolment of Electors' For the Australian Privacy Foundation, , February 2012, at http://www.privacy.org.au/Papers/JSCEM-AutoEnrol-120224.pdf

'The Regulation of Point-of-View Surveillance' Presentation to the International Workshop on Point of View Technologies in Law Enforcement, Sydney University, February 2012, at http://www.rogerclarke.com/DV/PoVSR.html

'Surveillance by the Australian Media, and Its Regulation' Presentation to a Conference on Surveillance, Sydney University, February 2012, at http://www.rogerclarke.com/DV/MSR.html

'Electoral Address Maintenance' For the Australian Privacy Foundation, February 2012, at http://www.privacy.org.au/Papers/JSCEM-120215.pdf

'The PCEHR Enabling Bills – Governance Issue' For the Australian Privacy Foundation, February 2012, at http://www.privacy.org.au/Papers/Sen-PCEHR-Bill-Supp-120214.pdf

'Policy Statement re Google Terms of Service' For the Australian Privacy Foundation, January 2012, at http://www.privacy.org.au/Papers/Google-TP12.html

'Public Advisory Statement re ABS Compulsory Surveys' For the Australian Privacy Foundation, January 2012, at http://www.privacy.org.au/Resources/ABSSurvAdvStmt-2012.html

‘PIAs in Australia: A Work-In-Progress Report’ Chapter 5 of Wright D. & deHert P. (eds.), ‘Privacy Impact Assessment’, Springer, 2012, at http://www.rogerclarke.com/DV/PIAsAust-11.html


2011

'An Appropriate Public Regulatory Body for Media Privacy' For the Australian Privacy Foundation, November 2011, at http://www.privacy.org.au/Papers/MediaInq-Sub-111118.pdf

'Location Privacy Under Dire Threat As Uberveillance Stalks The Streets' Precedent 108, November 2011, second-named author with Katina Michael

'Revised Policy Statement on Biometrics' For the Australian Privacy Foundation, October 2011, at http://www.privacy.org.au/Papers/Biometrics.html

'Patients forgotten in setting healthcare standard' Opinion, 'The Australian', 11 October 2011, at http://www.rogerclarke.com/EC/OzIT-Op-11011.html

'Security of eTrading' Course Materials for a Final-Semester CompSci unit at ANU, October 2011, at http://www.rogerclarke.com/EC/ETSecy.html

'Submission re Body Scanners' For the Australian Privacy Foundation and the CCLs, September 2011, at http://www.privacy.org.au/Papers/BS-PIA-Response-1109030.pdf

'You Are Where You've Been: The Privacy Implications of Location and Tracking Technologies' Journal of Location Based Services 5, 3-4 (December 2011) 138-155, first-named author with M.R. Wigan, at http://www.rogerclarke.com/DV/YAWYB-CWP.html

'Census 2011' Public Advisory Statement for the Australian Privacy Foundation, August 2011, at http://www.privacy.org.au/Resources/CensusAdvStmt-2011.html

'What To Do When an Organisation Asks for Too Much Personal Data' For the Australian Privacy Foundation, July 2011, at http://www.privacy.org.au/Resources/TooMuchData.html

'What To Do When an Organisation Asks You to Sign an Unfair Authorisation Form' For the Australian Privacy Foundation, July 2011, at http://www.privacy.org.au/Resources/UnfairAuth.html

'Stop Misrepresenting the Privacy Right of Action' Opinion Piece, Crikey Magazine, 1 August 2011, at http://www.rogerclarke.com/DV/OpEd-RoA-110727.html

'Policy Statement re a Privacy Right of Action' For the Australian Privacy Foundation, July 2011, at http://www.privacy.org.au/Papers/PRoA.html

'What Everyone Ought to Know About Passwords' Xamax Consultancy Pty Ltd, July 2011, at http://www.rogerclarke.com/II/Passwords.html

'Reactions to Mozilla's BrowserID Proposal' Xamax Consultancy Pty Ltd, July 2011, at http://www.rogerclarke.com/II/BrowserID-1107.html

'Policy Statement re Collection of Third Party Data Through Networks such as Wifi' For the Australian Privacy Foundation, May 2011, at http://www.privacy.org.au/Papers/PosData.html

'Policy Statement re Location and Tracking of Individuals through their Mobile Devices' For the Australian Privacy Foundation, May 2011, at http://www.privacy.org.au/Papers/LocData.html

'Cyber-Safety' Evidence and Testimony to the Joint Select Committee on Cyber-Safety's Inquiry into Cyber-Safety Issues Affecting Children and Young People, March 2011, at http://www.rogerclarke.com/II/CS-1103.html

'An Evaluation of Privacy Impact Assessment Guidance Documents' International Data Privacy Law 1, 2 (March 2011), at http://www.rogerclarke.com/DV/PIAG-Eval.html

'The State of Privacy in Queensland' Presentation for QCCL, Brisbane, March 2011, at http://www.rogerclarke.com/DV/QCCL-110315.html

'Security and Cloudsourcing' Presentation at a Cloud Computing Forum, Canberra, February 2011, at http://www.rogerclarke.com/EC/CCSec.html

'Policy Statement re Smart Grids and Smart Meters' For the Australian Privacy Foundation, February 2011, at http://www.privacy.org.au/Papers/SmartGrids-110215.html

'Checklist of Consumer Concerns re the Personally Controlled eHealth Record (PCEHR)' For the Australian Privacy Foundation, February 2011, at http://www.privacy.org.au/Papers/PCEHR-Privacy-110215.pdf

'The Effectiveness of Privacy Policy Statements' Chapter in 'Digital Business Security Development: Management Technologies' IGI Global, 2011, Eds. Kerr D., Gammack J. & Bryant K., pp. 84-111, at http://www.rogerclarke.com/EC/PPSE0812.html


2010

'Internet Users' Second-Party Exposure' Xamax Consultancy Pty Ltd, December 2010, at http://www.rogerclarke.com/EC/IU-SPE-1012.html

'An Evaluation of the Terms of Service and Privacy Policy of the LinkedIn Professional Networking Service' Xamax Consultancy Pty Ltd, December 2010, at http://www.rogerclarke.com/EC/LinkedIn-1012.html

'Submission to the Senate Inquiry into Online Privacy' For the Australian Privacy Foundation, November 2010, at http://www.privacy.org.au/Papers/Sen-OLP-Sub2-101130.pdf

'Policy Statement re Consultations' For the Australian Privacy Foundation, November 2010, at http://www.privacy.org.au/Papers/PS-Cons-101106.html

'GenY, iGens and Privacy; & Geolocation Privacy' Panel Position Statement, World Computer Congress, Brisbane, September 2010, at http://www.rogerclarke.com/DV/HCC-1009.html

'Civil Society Must Publish Standards Documents' Proc. Human Choice & Computers (HCC'10), IFIP World Congress, Brisbane, September 2010, at http://www.rogerclarke.com/DV/CSSD.html

'Computing Clouds on the Horizon? Benefits and Risks from the User's Perspective' Proc. 23rd Bled eConference, Slovenia, 21-23 June 2010, at http://www.rogerclarke.com/II/CCBR.html

'Cyborg Rights' Invited Keynote, Proc. IEEE Int'l Symposium on Technology and Society (ISTAS 2010), 7-9 June 2010, University of Wollongong, at http://www.rogerclarke.com/SOS/CyRts-1003.html

'Corporate Privacy Disasters' – new sections on 'Facebook 2004-10' and 'Google in 2009-10' Xamax Consultancy Pty Ltd, May 2010, at http://www.rogerclarke.com/DV/PrivCorp.html

'Initial Reactions to Google Buzz' Xamax Consultancy Pty Ltd, February 2010, at http://www.rogerclarke.com/II/GB-100211.html

'The Privacy Attitudes of the Millennial Generation' Xamax Consultancy Pty Ltd, February 2010, at http://www.rogerclarke.com/DV/MillGen.html


2009

'The National Broadband Network (NBN): Privacy Considerations' Xamax Consultancy Pty Ltd, December 2009, at http://www.rogerclarke.com/II/NBN-PC-0912.html

'Australian Privacy Medal Acceptance Speech' Xamax Consultancy Pty Ltd, November 2009, at http://www.rogerclarke.com/DV/APM-091112.html; and Nomination Form

'Surveillance in Speculative Fiction: Have Our Artists Been Sufficiently Imaginative?' Keynote Address at the Access & Privacy Workshop in Toronto on 27 October 2009, and a seminar at Cambridge Computer Laboratory on 2 November 2009, Xamax Consultancy Pty Ltd, October 2009, at http://www.rogerclarke.com/DV/SSF-0910.html

'Lessons from a Sufficiently Rich Model of (Id)entity, Authentication and Authorisation' Seminar at University of Toronto, Xamax Consultancy Pty Ltd, October 2009, at http://www.rogerclarke.com/ID/IdModel-UT-091026.html

'Policy Statement re Visual Surveillance' Australian Privacy Foundation, October 2009, at http://www.privacy.org.au/Papers/CCTV-0910.html

'Privacy Impact Assessments: The UK Experience' Proc. 31st Int'l Conf. Data Protection and Privacy Commissioners, Madrid, September 2009, at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1606762 (with Adam Warren, Robin Bayley, Colin Bennett, Andrew J. Charlesworth and Charles Oppenheim)

'Transport and Surveillance Aspects of Location-Based Services' Transportation Research Board 2105 (September 2009) 92-99 (second-named author, to Wigan M.)

'Policy Statement re eHealth Data and Health Identifier' Australian Privacy Foundation, August 2009, at http://www.privacy.org.au/Papers/eHealth-Policy-090828.pdf

'Consumer Acceptance of Potentially Intrusive Identity Authentication Mechanisms' Xamax Consultancy Pty Ltd, June 2009, at http://www.rogerclarke.com/EC/CAIdA-0906.html

'A Sufficiently Rich Model of (Id)entity, Authentication and Authorisation' Proc. IDIS 2009 - The 2nd Multidisciplinary Workshop on Identity in the Information Society, LSE, 5 June 2009, at http://www.rogerclarke.com/ID/IdModel-090605.html, and 'Glossary', at http://www.rogerclarke.com/ID/IdModelGloss.html

'It's Time for Guidelines on 'Privacy and the Media'' Online Opinion, 18 May 2008, at http://www.onlineopinion.com.au/view.asp?article=8914, Preprint at http://www.rogerclarke.com/DV/PM-0905.html

'The Covert Implementation of Mass Vehicle Surveillance in Australia' Proc. 4th Workshop on the Social Implications of National Security: Covert Policing, April 2009, ANU, at http://www.rogerclarke.com/DV/ANPR-Surv.html

'Privacy Impact Assessment: Its Origins and Development' Computer Law & Security Review 25, 2 (April 2009) 123-135, at http://www.rogerclarke.com/DV/PIAHist-08.html

'Policy Statement re Privacy and the Media' Australian Privacy Foundation, March 2009, at http://www.privacy.org.au/Papers/Media-0903.html


2008

'Dissidentity: The Political Dimension of Identity and Privacy' Identity in the Information Society 1, 1 (December, 2008) 221-228, at http://www.springerlink.com/content/273829u634861073/fulltext.pdf, Preprint at http://www.rogerclarke.com/DV/Dissidentity.html

'The Effectiveness of Privacy Policy Statements: A Pilot Study Against a Normative Template' Prepared as a chapter in 'Digital Business Security Development: Management Technologies' (Eds. Kerr D., Gammack J. & Bryant K.), December 2008, at http://www.rogerclarke.com/EC/PPSE0812.html

'Deep Packet Inspection: Its Nature and Implications' Commissioned for a publication by the Canadian Privacy Commissioner, November 2008, at http://www.rogerclarke.com/II/DPI08.html

'Privacy Policy Statement' Draft for the Association for Information Systems, October 2008 (lead-author, with Robert Davison and Cynthia Beath)

'Terminology Relevant to 'Identity in the Information Society'' Xamax Consultancy Pty Ltd, August 2008, at http://www.rogerclarke.com/DV/IdTerm.html

'Google StreetView' Policy Statement for the Australian Privacy Foundation, August 2008, at http://www.privacy.org.au/Papers/StreetView.html

'You Are Where You've Been: Location Technologies' Deep Privacy Impact' Invited Keynote at a Seminar on 'Location Privacy' at the University of N.S.W., 23 July 2008, at http://www.rogerclarke.com/DV/YAWYB-CWP.html

'You Are Where You've Been: Location Technologies' Deep Privacy Impact' Proc. Third Workshop on Social Implications of National Security, Canberra, 23-24 July 2008. Republished in Michael K. & Michael M.G. (2008) 'Australia and the New Technologies: Evidence Based Policy in Public Administration' Research Network Secure Australia, July 2008, pp. 100-114, at http://www.rogerclarke.com/DV/YAWYB-CW.html (first-named author, with Marcus Wigan)

'B2C Distrust Factors in the Prosumer Era', Invited Keynote, Proc. Collecter IberoAmerica eCommerce Conf., Madrid, June 2008, pp. 1-12, at http://www.rogerclarke.com/EC/Collecter08.html

'A Risk Assessment Framework for Mobile Payments' Proc. 21st Bled eCommerce Conf., June 2008, pp. 63-77, at http://www.rogerclarke.com/EC/MP-RAF.html

'Can Mobile Payments be Secure Enough?' Seminar at the Victoria University of Wellington, 1 May 2008, at http://www.rogerclarke.com/EC/MPS-080501.html

'(Id)Entities (Mis)Management: The Mythologies underlying the Business Failures' Invited Keynote for Identity Management in New Zealand, Wellington, April 2008, at http://www.rogerclarke.com/EC/IdMngt-0804.html

'Automated Number Plate Recognition (ANPR)' Policy Statement for the Australian Privacy Foundation, March 2008, at http://www.privacy.org.au/Papers/ANPR-0803.html

'Business Cases for Privacy-Enhancing Technologies' Chapter 7 in Subramanian R. (Ed.) 'Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions' IDEA Group, 2008, pp. 135-155, at http://www.rogerclarke.com/EC/PETsBusCase.html


2007

'The Campaign Against the Australian Government's Access Card' Pages for the Australian Privacy Foundation, January 2006 to December 2007, at http://www.privacy.org.au/Campaigns/ID_cards/HSAC.html

'Privacy Impact Assessment in Australian Contexts' Working Paper, Xamax Consultancy Pty Ltd, December 2007, at http://www.rogerclarke.com/DV/PIAAust.html

'Privacy Impact Assessment: Its Origins and Development' Working Paper, Xamax Consultancy Pty Ltd, December 2007, at http://www.rogerclarke.com/DV/PIAHist-08.html (co-authors Robin Bayley, Colin Bennett, Andrew Charlesworth & Adam Warren)

'Big Brother Google', Seminar for the ANU Department of Computer Science, September 2007, at http://www.rogerclarke.com/DV/Googacy-070919.html

'What 'Überveillance' Is, and What To Do About It' Invited Keynote at the 2nd RNSA Workshop on the Social Implications of National Security - From Dataveillance to Überveillance, 29 October 2007, University of Wollongong, at http://www.rogerclarke.com/DV/RNSA07.html

'Surveillance Vignettes' Supporting Material for the 2nd RNSA Workshop on the Social Implications of National Security - From Dataveillance to Überveillance, 29 October 2007, University of Wollongong, at http://www.rogerclarke.com/DV/SurvVign.html

'Health Records: Privacy Versus Quality of Care' , Panellist's Comments for an event run by the Health Informatics Network at the University of Melbourne, August 2007, at http://www.rogerclarke.com/EC/eHlthRecs-070814.html

'Security, Privacy & Reliability', Panellist's Comments at the AFR GovTech Conference, Canberra, August 2007, at http://www.rogerclarke.com/EC/GovTech07.html

'eCollaboration - Some Looming Impediments' Panellist's Comments at the Bled eCommerce Conference, June 2007, at http://www.rogerclarke.com/EC/eCollab-0706.html

'Google and Privacy' Seminar for the Koblenzer Wirtschaftsinformatik-Forum, at the University of Koblenz, May 2007, at http://www.rogerclarke.com/DV/Googacy-070524.html

'The National ID Scheme Proposal ­ Technology, Project Feasibility and Security Aspects' Presentation for a Roundtable at the Centre for Independent Studies, Sydney, April 2007, at http://www.rogerclarke.com/DV/AC-CIS-070404.html

'The Feasibility of Consumer Device Security' Submission to the Australian Securities and Investments Commission (ASIC) in relation to its Review of the Electronic Funds Transfer Code of Conduct, April 2007, at http://www.rogerclarke.com/II/ConsDevSecy.html


2006

'The Costs of 'National Security' to Privacy, and to Business' Invited Presentation at the Australian Information Security Association's Annual Seminar, Sydney, 24 November 2006, at http://www.rogerclarke.com/EC/NSC-0611.html

'Digital Privacy' Comments for a Panel-Session at the ACMA Information Communications Entertainment Conference, Canberra, 23-24 November 2006, at http://www.rogerclarke.com/DV/DigPriv-0611.html

'Towards an Understanding of the Web 2.0 Notion' Xamax Consultancy Pty Ltd, November 2006, at http://www.rogerclarke.com/EC/Web2C.html

'What's Google Really Up To?' Address in ECom-IComp Experts Address Series at the University of Hong Kong, 2 November 2006, at http://www.rogerclarke.com/EC/GoogleHK-0611.html

'Make Privacy a Strategic Factor - The Why and the How' Cutter IT Journal 19, 11 (October 2006), at http://www.rogerclarke.com/DV/APBD-0609.html

'Privacy and Corporations' Resource-Page, Xamax Consultancy Pty Ltd, 2 October 2006, at http://www.rogerclarke.com/DV/PrivCorp-0609.html

'What's 'Privacy'?' Xamax Consultancy Pty Ltd, Prepared for a Workshop at the Australian Law Reform Commission, 28 July 2006, at http://www.rogerclarke.com/DV/Privacy.html

'A Major Impediment to B2C Success is ... the Concept 'B2C'' Invited Keynote, Proc. ICEC'06, Fredericton NB, Canada, 14-16 August 2006, at http://www.rogerclarke.com/EC/ICEC06.html

'A Pilot Study of the Effectiveness of Privacy Policy Statements' Proc. 19th Bled eCommerce Conf., Slovenia, 5-7 June 2006, at http://www.rogerclarke.com/EC/PPSE0601.html

'Google Challenges Corporations, Consumers and the Law' Invited presentation to Institutt for rettsinformatikk, Oslo, 19 May 2006, at http://www.rogerclarke.com

'Google's Gauntlets' Computer Law & Security Report 22, 4 (July-August 2006) 287-297, at http://www.rogerclarke.com/II/Gurgle0604.html

'Social Impacts of Transport Surveillance' Proc.. RNSA Workshop on Social Implications of Information Security Measures upon Citizens and Business, Uni. of Wollongong, 29 May 2006. Published in Michael K. & Michael M.G. (Eds.) 'The Social Implications of Information Security Measures on Citizens and Business' Research Network Secure Australia, 2006, Chapter 2, pp. 27-44, at http://www.rogerclarke.com/DV/SITS-0604.html (second-named author, with Marcus Wigan)

'Smart Cards and Biometrics: Is a Nightmare-Free Australia Card Feasible?' Invited Presentation to the A.C.T. Society of Technology and the Law, Canberra, 23 March 2006, at http://www.rogerclarke.com/DV/ID-ACTSTL-0603.html

'Avoid the Mythologies of Identity Control and Rediscover a Sense of Balance and Proportion' Invited Presentation at Identity Management 2006, 7-8 March 2006, Sydney Convention & Exhibition Centre, at http://www.rogerclarke.com/EC/IdMngtMyths06.html

'National Identity Cards? Bust the Myth of 'Security über Alles'!' Invited Panel Presentation, 7th Annual Privacy & Security Conference of the Government of British Columbia, 9-10 February 2006, Victoria BC, at http://www.rogerclarke.com/DV/NatID-BC-0602.html

(Id)entities Management, and Nym Management, for People not just of People' Invited Panel Presentation, 7th Annual Privacy & Security Conference of the Government of British Columbia, 9-10 February 2006, Victoria BC, at http://www.rogerclarke.com/DV/IdMngt-BC-0602.html

'National Identity Schemes - The Elements' Xamax Consultancy Pty Ltd, 8 February 2006, at http://www.rogerclarke.com/DV/NatIDSchemeElms.html


2005

'Evaluation of Google's Privacy Statement against the Privacy Statement Template' Xamax Consultancy Pty Ltd, 20 December 2005, at http://www.rogerclarke.com/DV/PST-Google.html

'Privacy Statement Template' and 'About the Privacy Statement Template' Xamax Consultancy Pty Ltd, 19 December 2005, at http://www.rogerclarke.com/DV/PST.html

'Google - The Privacy Perspective' Invited short contribution to 'Google: Search or Destroy?', a discussion in the U.K.-based media outlet Open Democracy, at http://www.rogerclarke.com/II/GooglePriv0512.html

'Google - User Perspectives' Invited Presentation to a Seminar on 'Google: Infinite Library, Copyright Pirate, or Monopolist?', at the National Institute of Social Sciences and Law, A.N.U., Canberra, on 9 December 2005, at http://www.rogerclarke.com/II/Google0512.html

'Anti-Terrorism Bill (No. 2) 2005: Submission to the Senate Legal and Constitutional Committee' Xamax Consultancy Pty Ltd, 10 November 2005, at http://www.rogerclarke.com/DV/SubSenCTBill05.html

'Research for eGovernment: Key Issues' Invited Presentation to an EU Workshop in Brussels, October 2005, at http://www.rogerclarke.com/EC/eGovRes0510.html

'The Past, Present and Future of B2C eCommerce' Statement for a Panel Session in Sydney, September 2005, at http://www.rogerclarke.com/EC/B2C-0509.html

'P2P Technology and Its Strategic and Policy Implications' Invited Address in the ECom-IComp Experts Address Series at the University of Hong Kong, September 2005, at http://www.rogerclarke.com/EC/P2P-StratPol-0509.html

'Human-Artefact Hybridisation and the Digital Persona' Background Information for an Invited Presentation to the Ars Electronica 2005 Symposium on Hybrid - Living in Paradox, Linz, Austria, 2-3 September 2005, at http://www.rogerclarke.com/SOS/HAHDP0505.html

'P2P Technology and Its Implications' Seminar for ANU Dept of Computer Science, August 2005, at http://www.rogerclarke.com/EC/ANUSems.html#Sem16

'ABS's Proposals for Radical Alterations to the Census' Web-Page Updates for the Australian Privacy Foundation, August 2005, at http://www.privacy.org.au/Campaigns/Census/index.html

'Visual Surveillance and Privacy' Xamax Consultancy Pty Ltd, 8 August 2005, at http://www.rogerclarke.com/DV/VisSurv0508.html

'IDologists' by Rob O'Neill, in Next (Technology Insert in Sydney Morning Herald and Melbourne Age), 2 August 2005, © The Sydney Morning Herald, 2005, at http://www.rogerclarke.com/DV/IDologists050802.html

'MyKad - the Malaysian ID Card' Xamax Consultancy Pty Ltd, 19 July 2005, at http://www.rogerclarke.com/DV/MyKad.html

'National ID Card Proposals: Position Statement' July 2005, on behalf of the Australian Privacy Foundation, at http://www.privacy.org.au/Campaigns/ID_cards/NatIDScheme.html

'Resources on ID Cards' July 2005, on behalf of the Australian Privacy Foundation, at http://www.privacy.org.au/Campaigns/ID_cards/Resources.html

'ENUM Trials Create Serious Privacy Concerns' Xamax Consultancy Pty Ltd, 8 July 2005, at http://www.rogerclarke.com/DV/ENUM0507.html

'Trust Among Mobile Business Partners' Keynote Address for the 4th Int'l Conf. on Mobile Business, Sydney, July 2005, at http://www.rogerclarke.com/EC/MBusTrust.html

'Business Cases for Privacy-Enhancing Technologies' (Incomplete) Invited Paper presented to the Executive Session of PETS 2005 - 5th Workshop on Privacy-Enhancing Technologies, 2 June 2005, Cavtat, Croatia, at http://www.rogerclarke.com/EC/PETsBusCase.html

'Have We Learnt To Love Big Brother?' Invited paper prepared for Issues 72 (June 2005), at http://www.rogerclarke.com/DV/DV2005.html

'Census 2006: Report on the Consultative Processes' Submission to the Australian Statistician, on behalf of the Australian Privacy Foundation, 24 March 2006, at http://www.privacy.org.au/About/Census0503.html

'Census 2006' Submission to the Australian Statistician, on behalf of the Australian Privacy Foundation, 8 March 2006, at http://www.privacy.org.au/Papers/ABSCensus050316.pdf

'Submission to the Senate Legal and Constitutional Committee re its Inquiry into the Privacy Act 1988' Xamax Consultancy Pty Ltd, February 2005, at http://www.rogerclarke.com/DV/SenateReview0502.html

'Privacy Impact Assessments' Submission to the Victorian Privacy Commissioner on behalf of the Australian Privacy Foundation, February 2005, at http://www.privacy.org.au/Papers/OVPC-PIA-0502.rtf

'Privacy Impact Assessments' Submission to the Federal Privacy Commissioner on behalf of the Australian Privacy Foundation, February 2005, at http://www.privacy.org.au/Papers/OFPC-PIA-0502.rtf


2004

'Submission to the Review of the Private Sector Provisions of the Privacy Act 1988 (Cth), in particular the Issues Paper of October 2004' November 2004, at http://www.rogerclarke.com/DV/PActRev0412.html

'Identity Management? Or (Id)Entity Mismanagement?' Presentation for the ACS(Canberra) Branch Conference, November 2004, at http://www.rogerclarke.com/EC/ACSID0411.html

'Privacy: More Wobble-Board Than Balance-Beam' National Office for the Information Economy, September 2004, at http://www.rogerclarke.com/DV/Wobble.html

'Is eGovernment for People, or against People? Challenges to Personal Information Management Arising from eGovernment Business Models and Technology Trends' Invited Presentation to the Ontario Management Board Secretariat, June 2004, at http://www.xamax.com.au/EC/OPS0406.html

'Identity and Nymity: Public Policy Issues' Invited Presentation to the Government of Ontario Enterprise Architecture Conf., June 2004, at http://www.rogerclarke.com/EC/IdNymPPI.html

'The Concepts of (Id)entity, Nymity and Authentication' Invited Presentation at the University of Ottawa, June 2004, at http://www.rogerclarke.com/DV/UOttINA.html

'The Search for Balance: The Past, Present and Future of Privacy Impact Assessments' Invited Presentation at Queens University, Kingston Ontario, June 2004, at http://www.rogerclarke.com/DV/PIAPPF.html

'Identity Management; and PIAs' Invited Presentation at the Office of the Privacy Commissioner of Canada, June 2004, at http://www.rogerclarke.com/DV/OPCC0406.html

'Biometric Insecurity' Invited Presentation to the AusCERT Conference, Gold Coast, May 2004, at http://www.rogerclarke.com/DV/AusCERT0405.html

'Identity Management: The Technologies, Their Business Value, Their Problems, Their Prospects' Xamax Consultancy Pty Ltd, March 2004, available for fee from http://www.xamax.com.au/EC/IdMngt.html

'Submissions re Passport Biometrics', on behalf of the Australian Privacy Foundation (co-authored, February-March), of 17 February, 25 February, 2 March, and 15 March

'N.S.W Guidelines for the Operation of Personal Data Systems' Re-typed version of 1977, February 2004, at http://www.rogerclarke.com/DV/NSWPCGs.html

'Australian Govt Tries To Make Face-Recognition Look Good' Working Paper, February 2004, at http://www.rogerclarke.com/DV/SmartGate040207.html

'SmartGate: A Face Recognition Trial at Sydney Airport' enhanced version, Working Paper, February 2004, at http://www.rogerclarke.com/DV/SmartGate.html

'A History of Privacy Impact Assessments' Working Paper, February 2004, at http://www.rogerclarke.com/DV/PIAHist.html

'Very Black 'Little Black Books'' Working Paper, February 2004, at http://www.rogerclarke.com/DV/ContactPITs.html


2003

Submission to Queensland Transport in relation to the Proposed Smartcard-Based Driver's Licence, November 2003, at http://www.rogerclarke.com/DV/QTDL0311.html

'Wireless Transmission and Mobile Technologies' Revised Working Paper, 18 October 2003, at http://www.rogerclarke.com/EC/WMT.html

'Information Privacy in a Globally Networked Society: Implications for IS Research' Commun. Assn for Infor. Syst. (12, 2003) 341-365 341 (R. M. Davison, R. Clarke, H.J. Smith, D. Langford, and B. Kuo), at http://www.rogerclarke.com/DV/cais0310.pdf

'Why Biometrics Must Be Banned' Abstract of a Presentation at the Baker & McKenzie Cyberspace Law & Policy Centre Conference on 'State Surveillance after September 11', Sydney, 8 September 2003, at http://www.rogerclarke.com/DV/Biom030908.html, plus PowerPoint slides

'Identification and Authentication Fundamentals' Notes prepared as an introduction to a session on 'Authentication and Identification: New Paradigms', at the Conference on 'State Surveillance after September 11' , at U.N.S.W. on 8 September 2003, at http://www.rogerclarke.com/DV/CLPC030908.html

'Authentication Re-visited: How Public Key Infrastructure Could Yet Prosper' Proc. 16th Bled Electronic Commerce Conf., Bled, Slovenia, 9-11 June 2003, at http://www.rogerclarke.com/EC/Bled03.html

'Privacy on the Move: The Impacts of Mobile Technologies on Consumers and Citizens' Abstract prepared for the Information Privacy + M-Commerce Symposium, Queen's University, Kingston Ontario, 31 May 2003, at http://www.rogerclarke.com/DV/MPrivacy.html

'Mobile Technologies' Notes prepared for the Information Privacy + M-Commerce Symposium, Queen's University, Kingston Ontario, 31 May 2003, at http://www.rogerclarke.com/EC/MTechno.html

'Dataveillance - 15 Years On' Invited Presentation at the Privacy Issues Forum run by the New Zealand Privacy Commissioner, Wellington, 28 March 2003, at http://www.rogerclarke.com/DV/DVNZ03.html, together with a slide-set)

'Why I'm Not Going to CFP 2003' 13 March 2003, at http://www.rogerclarke.com/DV/NotesCFP03.html

Enhanced versions of Resource Pages for the Australian Privacy Foundation's site, February-April 2003:

'ENUM - A Case Study in Social Irresponsibility' Revised Version of 9 March 2003, published in Privacy Law & Policy Reporter 9, 10 (March 2003) 181-18, at http://www.rogerclarke.com/DV/enumISOC02.html

'SmartGate: A Face Recognition Trial at Sydney Airport' Working Paper revision of 23 February 2003, at http://www.rogerclarke.com/DV/SmartGate.html

'Biometrics in Airports: How To, and How Not To, Stop Mahommed Atta and Friends' Working Paper revision of 23 February 2003, at http://www.rogerclarke.com/DV/BioAirports.html

'The Scope for Privacy-Sensitive Biometric Architecture' Working Paper revision of 23 February 2003, at http://www.rogerclarke.com/DV/BioArch.html


2002

'Information Privacy in a Globally Networked Society: Implications for Research' Panellist's Statement for ICIS'2002, Barcelona, December 2002, Panel on Information Privacy in a Globally Networked Society: Implications for I.S., at http://www.rogerclarke.com/DV/ICIS2002.html, including slide-set

'ENUM - A Case Study in Social Irresponsibility', Invited Presentation to the ISOC-AU Forum on New Protocols and Standards-Setting in Australia , 3 December 2002, at http://www.rogerclarke.com/DV/enumISOC02.html, supported by a primary slide-set, and a supporting slide-set used as a 'play within a play'

'Techno-Reality and Techno-Literature' Presentation to Hawker College, Canberra, November 2002, comprising a slide-set, to support A 'Future Trace' on Dataveillance: The Anti-Utopian and Cyberpunk Literary Genres

'Digital Property Rights vs. Human Rights: Desperate Publishing Houses Are Demanding A New Dark Ages' Invited Presentation to the A.C.S. (S.A.) Conference on Ubiquitous Computing: Trends, Tricks And Traps , Adelaide, 31 October - 1 November 2002, at http://www.rogerclarke.com/II/ACSSA02.html, plus slide-set

'W(h)ither PKI?' Presentation to the China Information Technology and Law Centre, Departments of Law and CSIS, University of Hong Kong, 25 September 2002, at http://www.rogerclarke.com/II/HKPKI02.html

'The Mythology of Consumer Identity Authentication', Statement for a Panel Session on 'Understanding e-Business: Can we remain anonymous in the marketplace?' 24th Int'l Conf. of Data Protection & Privacy Commissioners, Cardiff UK, 9-11 September 2002, at http://www.rogerclarke.com/DV/AnonDPPC02.html, plus PowerPoint slides

'Research Use of Personal Data' Comments to a Panel Session of the National Scholarly Communications Forum on 'Privacy: Balancing the Needs of Researchers and the Individual's Right to Privacy under the New Privacy Laws', Australian Archives, 9 August 2002, at http://www.rogerclarke.com/DV/NSCF02.html

'eAuthentication: Where's the Public Interest?', Presentation to Baker & McKenzie CyberLaw and Policy Centre, UNSW, 11 July 2002, at http://www.rogerclarke.com/EC/eAuthCPLC020711.html, plus PowerPoint slides

'e-Consent: A Critical Element of Trust in e-Business' Proc. 15th Bled Electronic Commerce Conf., Bled, Slovenia, 17-19 June 2002, at http://www.rogerclarke.com/EC/eConsent.html, plus PowerPoint slides

'Biometrics Inadequacies & Threats & Privacy-Protective Architecture' significantly revised set of PowerPoint slides, presentation at Uni. of Hong Kong, May 2002

Notes on Computers, Freedom & Privacy Conference, San Francisco, 16-19 April 2002, at http://www.rogerclarke.com/DV/NotesCFP02.html

'Biometrics Inadequacies & Threats & Privacy-Protective Architecture', Presentation to Computers, Freedom & Privacy, San Francisco, 16-19 April 2002, at http://www.rogerclarke.com/DV/NotesCFP02.html#BiomRC, plus PowerPoint slides

'Why Do We Need PKI? Authentication Re-visited' Working Paper, January 2002, at http://www.rogerclarke.com/EC/PKIRW02.html


2001

'The Re-Invention of Public Key Infrastructure' Review Draft of 22 December 2001, at http://www.rogerclarke.com/EC/PKIReinv.html

'Authentication: A Sufficiently Rich Model to Enable e-Business' Review Draft of 26 December 2001, at http://www.rogerclarke.com/EC/AuthModel.html

'Beyond the Alligators of 21/12/2001, There's a Public Policy Swamp' Proc. Privacy.au, Marcus Evans Conferences, Sydney, 23-24 October 2001, at http://www.rogerclarke.com/DV/PPSwamp.html

'Trust in the Context of e-Business' 1 October 2001, at http://www.rogerclarke.com/EC/Trust.html

'Authentication Technologies and Their Privacy Implications: Technology and Policy Foundations' Support materials for an invited presentation to the Symposium on 'Authentication Technologies and Their Privacy Implications', run by the Computer Science and Telecommunications Board (CSTB) of the National Academy of Sciences, Dulles Hyatt, Washington DC, 3-4 October 2001, at http://www.rogerclarke.com/II/NASATPI01.html

'e-Business: Consumer Perspectives' Notes for a presentation to ASCPA (ACT) on 9 September 2001, at http://www.rogerclarke.com/EC/CPAIT01.html

'Can Digital Signatures and Public Key Infrastructure Be of Any Use in the Health Care Sector ???' Notes for a Panel Session on 'PKI in Health' at the Health Informatics Conference, Canberra, 30 July 2001, at http://www.rogerclarke.com/EC/PKIHlth01.html

'Certainty of Identity: A Fundamental Misconception, and a Fundamental Threat to Security' Proc. Seminar on eSecurity and eCrime, UNSW Continuing Legal Education Programme, Sydney, 19-20 July 2001. Republished in Privacy Law & Policy Reporter 8, 3 (September 2001) 63-65, 68, at http://www.rogerclarke.com/DV/IdCertainty.html

'Research Challenges in Emergent e-Health Technologies' Notes to accompany a Panel Session on 'Research Challenges in Emergent e-Health Technologies', IFIP TC8 Conference on 'Developing a dynamic, integrative, multi-disciplinary research agenda in E-Commerce / E-Business', Salzburg, 22-23 June 2001, at http://www.rogerclarke.com/EC/eHlthRes.html

'Trust in Cyberspace: What eCommerce Doesn't Get' Proc. U.N.S.W. Continuing Legal Education Seminar on 'Cyberspace Regulation: eCommerce and Content', 25 May 2001, Sydney, at http://www.rogerclarke.com/EC/TrustCLE01.html

'The Fundamental Inadequacies of Conventional Public Key Infrastructure' Proc. Conf. ECIS'2001, Bled, Slovenia, 27-29 June 2001, at http://www.rogerclarke.com/II/ECIS2001.html

'Biometrics and Privacy' 15 April 2001, at http://www.rogerclarke.com/DV/Biometrics.html

'Meta-Brands' Privacy Law & Policy Reporter 7, 11 (May 2001), at http://www.rogerclarke.com/DV/MetaBrands.html

'Privacy as a Means of Engendering Trust in Cyberspace' UNSW L. J. 24, 1 (July 2001) 290-297, at http://www.rogerclarke.com/DV/eTrust.html

'Invasiveness of the Body-Snatchers' The Canberra Times, Wednesday 28 March 2001, p.11,, at http://www.rogerclarke.com/DV/BodyParts.html

'P3P Re-visited' Privacy Law & Policy Reporter 7, 10 (April 2001), at http://www.rogerclarke.com/DV/P3PRev.html

'Why Would M-Marketing be Trusted by Consumers and Small Enterprises??' Powerpoint slides for AMTA Congress, Sydney, 27 February 2000, at http://www.rogerclarke.com/EC/AMTA01.ppt

'Of Trustworthiness and Pets: What Lawyers Haven't Done for e-Business' Invited Address to the 5th Biennial Pacific Rim Computer Law Conference - Global e-Business Legal Issues for the 21st Century', Sydney, 22-24 February 2001, at http://www.rogerclarke.com/EC/PacRimCL01.html

'Roger Clarke's PITs and PETs Resources Site' February 2001, at http://www.rogerclarke.com/DV/PITsPETsRes.html

'Introducing PITs and PETs: Technologies Affecting Privacy' Privacy Law & Policy Reporter 7, 9 (March 2001), at http://www.rogerclarke.com/DV/PITsPETs.html

'While You Were Sleeping ... Surveillance Technologies Arrived', Australian Quarterly 73, 1 (January-February 2001) 10-14, at http://www.rogerclarke.com/DV/AQ2001.html

'Introduction to Information Security' February 2001, at http://www.rogerclarke.com/EC/IntroSecy.html


2000

'Technologies of Mass Observation', 'Mass Observation Movement' Forum, Treasury Theatre, Melbourne, 26 October 2000, at http://www.rogerclarke.com/DV/MassObsT.html

'Interview re Biometrics', September 2000, at http://www.rogerclarke.com/DV/BiometixIview.html

'Submission to the Inquiry into the Privacy Amendment (Private Sector) Bill 2000' by the Senate Legal and Constitutional Legislation Committee, September 2000, at http://www.rogerclarke.com/DV/SenatePBSub2000.html

'Supplementary Submission to the Inquiry into e-Privacy' by the Senate Select Committee on Information Technologies, August 2000, at http://www.rogerclarke.com/DV/SenateeP2.html

'Supplementary Submission to the Inquiry into e-Privacy' by the Senate Select Committee on Information Technologies, July 2000, at http://www.rogerclarke.com/DV/SenateeP.html

'How to Ensure That Privacy Concerns Don't Undermine e-Transport Investments', Proc. AIC e-Transport Conf., Melbourne, July 2000, July 2000, at http://www.rogerclarke.com/EC/EC/eTP.html

'File-Discovery and File-Sharing Technologies (aka Peer-to-Peer or P2P): MP3, Napster and Friends, and Their Impact on Music E-Publishing' July 2000, at http://www.rogerclarke.com/EC/FDST.html

'Key Design Issues in Marketspaces for Intellectual Property Rights' Proc. 13th International EC Conf., Bled, Slovenia, 19-21 June 2000, at http://www.rogerclarke.com/EC/Bled2K.html (with Peter Higgs and Gillian Dempsey)

'Famous Nyms', June 2000, at http://www.rogerclarke.com/DV/FamousNyms.html

'Privacy Laws of the World', May 2000, at http://www.rogerclarke.com/DV/PrivacyLaws.html

'Submission to the Inquiry into the Privacy Amendment (Private Sector) Bill 2000' by the House of Representatives Legal and Constitutional Committee, May 2000, at http://www.rogerclarke.com/DV/HoRSub2000.html

'E-Consent: A Key Issue in the New E-Context' KPMG Conference, Barossa Valley, May 2000, PowerPoint slides

'Notes on Computers, Freedom & Privacy Conference', Toronto, April 2000, at http://www.rogerclarke.com/DV/NotesCFP2K.html

'Privacy Requirements of Public Key Infrastructure' Proc. IIR Conf., Canberra, March 2000, and PowerPoint slides, at http://www.rogerclarke.com/DV/PKI2000.html

'Privacy Bill needs much more work', the Australian Computer Society column of The Australian, 15 February 2000, at http://www.rogerclarke.com/DV/ACS000215.html

'Notes on Privacy by Design', January 2000, at http://www.rogerclarke.com/DV/CFP2000.html

'Beyond the OECD Guidelines: Privacy Protection for the 21st Century', January 2000, at http://www.rogerclarke.com/DV/PP21C.html

'Submission to the Commonwealth Attorney-General, re: 'A privacy scheme for the private sector: Release of Key Provisions' of 14 December 1999', January 2000, at http://www.rogerclarke.com/DV/PAPSSub0001.html

'Privacy Laws: Resources', January 2000, at http://www.rogerclarke.com/DV/PrivacyLaws.html


1999

'The Packer / PBL / Acxiom InfoBase', November 1999, at http://www.rogerclarke.com/DV/InfoBase99.html

'Submission to the Treasury Taskforce on Industry Self-Regulation', November 1999, at http://www.rogerclarke.com/EC/SubCons991123.html

'Letter re Mooted TFN Extensions', November 1999, at http://www.rogerclarke.com/DV/TFN991119.html

'Ethics and the Internet: The Cyberspace Behaviour of People, Communities and Organisations', Proc. 6th Annual Conf. Aust. Association for Professional and Applied Ethics, Canberra, October 1999; Revised version forthcoming in J. Prof'l and Applied Ethics, at http://www.rogerclarke.com/II/IEthics99.html

'Resources for Workplace Privacy', September 1999, at http://www.rogerclarke.com/DV/Workplace.html

'Relevant Characteristics of Person-Location and Person-Tracking Technologies', September 1999, at http://www.rogerclarke.com/DV/PLTApp.html

'Person-Location and Person-Tracking: Technologies, Risks and Policy Implications' Proc. 21st International Conf. Privacy and Personal Data Protection, Hong Kong, September 1999. Revised version published in Info. Techno. & People 14, 1 (2001) 206-231, at http://www.rogerclarke.com/DV/PLT.html

'Current Developments in Internet Privacy', Proc. IIR Conf. Data Protection and Information Privacy, August 1999, Sydney, at http://www.rogerclarke.com/DV/ICurr9908.html

'Identification, Authentication and Anonymity in a Legal Context', Proc. IFIP User Identification & Privacy Protection Conference, Stockholm, June 1999, at http://www.rogerclarke.com/DV/AnonLegal.html (primary author A. Smith). Republished in Computer Law & Security Report 16, 2 (March/April 2000) CLSR 95-101

'Anonymous, Pseudonymous and Identified Transactions: The Spectrum of Choice', Proc. IFIP User Identification & Privacy Protection Conference, Stockholm, June 1999, at http://www.rogerclarke.com/DV/UIPP99.html

'The Willingness of Net-Consumers to Pay: A Lack-of-Progress Report', Proc. 12th International Bled EC Conf., Slovenia, June 1999, at http://www.rogerclarke.com/EC/WillPay.html

'Computers, Freedom and Privacy Conference - Personal Notes, April 1999, at http://www.rogerclarke.com/DV/NotesCFP99.html

'Privacy-Enhancing and Privacy-Sympathetic Technologies - Resources', April 1999, at http://www.rogerclarke.com/DV/PEPST.html (April 1999)

'The Legal Context of Privacy-Enhancing and Privacy-Sympathetic Technologies', presentation at AT&T Research Labs, Florham Park NJ, 5 April 1999, at http://www.rogerclarke.com/DV/Florham.html

'Internet Privacy Concerns Confirm the Case for Intervention', Communications of the ACM, 42, 2 (February 1999) 60-67, at http://www.rogerclarke.com/DV/CACM99.html


1998

'A History of Privacy in Australia: Current Developments', December 1998, at http://www.rogerclarke.com/DV/OzCurrent.html

'A History of Privacy in Australia', December 1998, at http://www.rogerclarke.com/DV/OzHistory.html

'Second Submission to ACCC re ADMA's Request for Approval of a Unilaterally-Prepared Code of Practice', for the Australian Competition and Consumer Commission, December 1998, at http://www.rogerclarke.com/DV/ACCC-ADMA-2.html

'Submission to ACCC re ADMA's Request for Approval of a Unilaterally-Prepared Code of Practice', for the Australian Competition and Consumer Commission, October 1998, at http://www.rogerclarke.com/DV/ACCC-ADMA.html

'Reference List: Surveys of Privacy Attitudes' rev. August 1998, http://www.rogerclarke.com/DV/Surveys.html

'Supplementary Submission to the Senate Legal and Constitutional References Committee's Inquiry Into Privacy and the Private Sector' 5 August 1998 , at http://www.rogerclarke.com/DV/SLCCPteSupp.html

'Public Submission re the Victorian Data Protection Bill' 31 July 1998, at http://www.rogerclarke.com/DV/VicDPSub.html

'Submission to the Senate Legal and Constitutional References Committee's Inquiry Into Privacy and the Private Sector' 7 July 1998, at http://www.rogerclarke.com/DV/SLCCPte.html

'Information Privacy On the Internet: Cyberspace Invades Personal Space' Telecommunication Journal of Australia 48, 2 (May/June1998), at http://www.rogerclarke.com/DV/IPrivacy.html

'Public Key Infrastructure: Position Statement', May 1998, at http://www.rogerclarke.com/DV/PKIPosn.html

'Confidentiality Provisions for Information Provided During the Course of Consultations', May 1998, at http://www.rogerclarke.com/DV/ConsConf.html

'Platform for Privacy Preferences: A Critique' (April 1998), Privacy Law & Policy Reporter 5, 3 (August 1998) 46-48, at http://www.rogerclarke.com/DV/P3PCrit.html

'Platform for Privacy Preferences: An Overview' (April 1998), Privacy Law & Policy Reporter 5, 2 (July 1998) 35-39, at http://www.rogerclarke.com/DV/P3POview.html

'Smart Card Technical Issues Starter Kit', for Centrelink (April 1998), at http://www.rogerclarke.com/DV/SCTISK.html

'Serious Flaws in the National Privacy Principles', Privacy Law & Policy Reporter 4, 9 (March 1998), at http://www.rogerclarke.com/DV/NPPFlaws.html

'Direct Marketing and Privacy', Proc. AIC Conf. on the Direct Distribution of Financial Services, Sydney, 24 February 1998, at http://www.rogerclarke.com/DV/DirectMkting.html

'Privacy Impact Assessments', Notes of 10 February 1998, at http://www.rogerclarke.com/DV/PIA.html


1997

'Smart Move by the Smart Card Industry - Part II', Privacy Law & Policy Reporter 4, 5 (October 1997), pp.97-98 at http://www.rogerclarke.com/DV/SMSC2.html

'Information Systems Audit & Information Privacy', October 1997, http://www.rogerclarke.com/DV/Audit.html

'Privacy Advocates and the Privacy Commissioner's Discussion Paper of August 1997 Regarding (Self-)Regulation of the Private Sector', October 1997, at http://www.rogerclarke.com/DV/AdvPC.html

'Instrumentalist Futurism: A Tool for Examining I.T. Impacts and Implications', October 1997, at http://www.rogerclarke.com/DV/InstFut.html

'Privacy On the Internet: Threats, Countermeasures and Policy' IBC 1997 Australian Privacy Forum, Sydney, 21-22 October 1997, at http://www.rogerclarke.com/DV/Internet.html

'Beyond 'Fair Information Practices: A New Paradigm for 21st-Century Privacy Protection', Sketch of September 1997, at http://www.rogerclarke.com/DV/BeyondFIP.html

'Chip-Based ID: Promise and Peril', for the International Conference on Privacy, Montreal (September 1997), at http://www.rogerclarke.com/DV/IDCards97.html

'Introduction and Definitions' (August 1997), at http://www.rogerclarke.com/DV/Intro.html

Promises and Threats in Electronic Commerce (August 1997), at http://www.rogerclarke.com/EC/Quantum.html

Public Interests on the Electronic Frontier, Invited Address to IT Security '97, 14 & 15 August 1997, Rydges Canberra (August 1997), http://www.rogerclarke.com/II/IIRSecy97.html

Five Most Vital Privacy Issues, Invited Comments to Michel Venne, for the Montreal Daily, Le Devoir, prior to the International Conference on Privacy, Montreal (July 1997), at http://www.rogerclarke.com/DV/VitalPriv.html

'Data Surveillance: Theory, Practice and Policy', submitted to the ICIS Dissertation Competition (July 1997), at http://www.rogerclarke.com/DV/ICIS97.html

Serious Dangers in the Commonwealth Government's Current Outsourcing Policy (July 1997), at http://www.rogerclarke.com/DV/ClthOutsrcing.html

'Privacy and Public Registers', Proc. IIR Conference on Data Protection and Privacy, Boulevard Hotel, Sydney, 12-13 May 1997, at http://www.rogerclarke.com/DV/PublicRegisters.html

'Customer Profiling and Privacy: Implications for the Finance Industry', AIC Conference on Customer Profiling for Financial Services, Sydney (May 1997), http://www.rogerclarke.com/DV/CustProfFin.html

Privacy and E-Lists (May 1997), at http://www.rogerclarke.com/DV/E-Lists.html

Protecting Your Privacy On the Internet, Seminar on 'Consumer Protection on the Internet', The Policy Network, Mitchell Library, Sydney (April 1997), http://www.rogerclarke.com/DV/Internet.html

Privacy Implications of Digital Signatures, IBC Conference on Digital Signatures, Sydney (with Graham Greenleaf, March 1997), at http://www.rogerclarke.com/DV/DigSig.html

Exemptions from General Principles Versus Balanced Implementation of Universal Principles, at http://www.rogerclarke.com/DV/Except.html (February 1997)

'Flaws in the Glass; Gashes in the Fabric: Deficiencies in the Australian Privacy-Protective Regime' Invited Address to Symposium on 'The New Privacy Laws', Queen Victoria Ballroom, George St, Sydney, 19 February 1997 , at http://www.rogerclarke.com/DV/Flaws.html

'Cookies' February 1977, at http://www.rogerclarke.com/II/Cookies.html

'Spam' February 1977, at http://www.rogerclarke.com/II/Spam.html

'What Do People Really Think? MasterCard's Survey of the Australian Public's Attitudes to Privacy' Privacy Law & Policy Report 3,9 (January 1997) , at http://www.rogerclarke.com/DV/MCardSurvey.html


1996

'Identification, Anonymity and Pseudonymity in Consumer Transactions: A Vital Systems Design and Public Policy Issue', Conference on 'Smart Cards: The Issues', Sydney, 18 October 1996, at http://www.rogerclarke.com/DV/AnonPsPol.html

'Initial Reactions to the Commonwealth Attorney-General's Discussion Paper of September 1996 on Privacy Protection in the Private Sector' (September 1996), at http://www.rogerclarke.com/DV/ClthPte.html

'Federal Privacy Legislation in Australia' (September 1996), at http://www.rogerclarke.com/DV/FedLeg.html

'The Information Infrastructure is a Super Eye-Way', a Book Review of Simon Davies book 'Monitor', Privacy Law & Policy Reporter 3, 5 (August 1996), at http://www.rogerclarke.com/DV/Monitor.html

'Privacy Issues in Smart Card Applications in the Retail Financial Sector', in 'Smart Cards and the Future of Your Money', Australian Commission for the Future, June 1996, pp.157-184. At http://www.rogerclarke.com/DV/ACFF.html

'Trails in the Sand' (May 1996), at http://www.rogerclarke.com/DV/Trails.html

'Privacy, Dataveillance, Organisational Strategy' (the original version was a Keynote Address for the I.S. Audit & Control Association Conf. (EDPAC'96), Perth, 28 May 1996). At http://www.rogerclarke.com/DV/PStrat.html

Cryptography in Plain Text', published in Privacy Law & Policy Reporter 3, 4 (May 1996) 24-27, 30-33. At http://www.rogerclarke.com/II/CryptoSecy.html

'Crypto-Confusion: Mutual Non-Comprehension Threatens Exploitation of the GII' Privacy Law & Policy Reporter 3, 4 (May 1996). At http://www.rogerclarke.com/II/CryptoConf.html

'Smart move by the smart card industry: The Smart Card Industry's Code of Conduct' Privacy Law & Policy Reporter 2, 10 (January 1996) 189-191, 195. At http://www.rogerclarke.com/DV/SMSC.html


1995

An Overview of the author's doctoral supplication, entitled 'Data Surveillance: Theory, Practice & Policy' (August 1995), at http://www.rogerclarke.com/DV/PhD.html#Intro

'When Do They Need to Know 'Whodunnit?': The Justification for Transaction Identification; The Scope for Transaction Anonymity and Pseudonymity' Proc. Conf. Computers, Freedom & Privacy, San Francisco, 31 March 1995. At http://www.rogerclarke.com/DV/PaperCFP95. Revised version published as 'Transaction Anonymity and Pseudonymity' Privacy Law & Policy Reporter 2, 5 (June/July 1995) 88-90

'Clients First or Clients Last? The Commonwealth Government's IT Review' Privacy Law & Policy Reporter 2, 4 (April / May 1995). At http://www.rogerclarke.com/DV/CFCL.html

'Computer Matching by Government Agencies: The Failure of Cost/Benefit Analysis as a Control Mechanism' Information Infrastructure & Policy 4,1 (March 1995) 29-65. At http://www.rogerclarke.com/DV/MatchCBA.html

'A Normative Regulatory Framework for Computer Matching' Journal of Computer and Information Law XIII,4 (Summer 1995) 585-633, at http://www.rogerclarke.com/DV/MatchFrame.html


1994

Special Issue of Information Technology & People 7, 4 (1994) on 'Identification Technologies'. Preface at http://weber.ucsd.edu/~pagre/identification.html

'Human Identification in Information Systems: Management Challenges and Public Policy Issues' Info. Technology & People 7,4 (December 1994). At http://www.rogerclarke.com/DV/HumanID.html

'Dataveillance by Governments: The Technique of Computer Matching' Information Technology & People 7,2 (December 1994) 46-85. Abstract at http://www.rogerclarke.com/DV/MatchIntro.html

'Information Technology: Weapon of Authoritarianism or Tool of Democracy?' Proc. World Congress, Int'l Fed. of Info. Processing, Hamburg, September 1994. At http://www.rogerclarke.com/DV/PaperAuthism.html

'The Digital Persona and Its Application to Data Surveillance' The Information Society 10,2 (June 1994). At http://www.rogerclarke.com/DV/DigPersona.html

'The Eras of Dataveillance' (March 1994). At http://www.rogerclarke.com/DV/NotesDVEras.html

'Dataveillance: Delivering 1984' Chapter in Green L. & Guinery R. (Eds.) 'Framing Technology: Society, Choice and Change' Allen & Unwin, Sydney, 1994. At http://www.rogerclarke.com/DV/PaperPopular


1993

Position Statement for a Privacy Panel at the International Conference on Information Systems, Orlando FL (December 1993). At http://www.rogerclarke.com/DV/PanelITProf'l.html

'Profiling: A Hidden Challenge to the Regulation of Dataveillance' Int'l J. L. & Inf. Sc. 4,2 (December 1993). At http://www.rogerclarke.com/DV/PaperProfiling.html. A shorter version was published as 'Profiling and Its Privacy Implications' Australasian Privacy Law & Policy Reporter 1,6 (November 1994). At http://www.rogerclarke.com/DV/AbstractProfiling.html

'Matches Played Under Rafferty's Rules: The Parallel Data Matching Program Is Not Only Privacy-Invasive But Economically Unjustifiable As Well' Working Paper (Nov 1993). At http://www.rogerclarke.com/DV/PaperMatchPDMP.html. Versions published in Privacy Law & Policy Reporter 1,1 (February 1994), and in Policy (Autumn 1994)

'Best Practice Guidelines for Controls Over the Security of Personal Data', for the Australian National Audit Office (September 1993), overview at http://www.rogerclarke.com/DV/PDSecy.html

'Computer Matching and Digital Identity', Proc. Conf. Computers, Freedom & Privacy, San Francisco, March 1993, at http://www.rogerclarke.com/DV/CFP93.html

'A 'Future Trace' on Dataveillance: Trends in the Anti-Utopia / Science Fiction Genre' (March 1993) At http://www.rogerclarke.com/DV/NotesAntiUtopia.html

'Why the Public Is Scared of the Public Sector' (February 1993), at http://www.rogerclarke.com/DV/PaperScared.html


1992

'Keeping Confidential Information on a Database with Multiple Points of Access: Technological and Organisational Measures' Seminar on Unauthorised Release of Government Information, N.S.W. Independent Commission Against Corruption, Sydney, 12 October 1992. Republished as 'Privacy Needs More Than Good Intentions' in Prof'l Comp. (November 1992). At http://www.rogerclarke.com/DV/PaperICAC.html

'Balancing Benefits Against Risks in the Proposed Health Communications Network' Seminar of the Australian Medical Informatics Ass., Perth (Oct 1992). At http://www.rogerclarke.com/DV/PaperHCN.html

'LEAN Times Ahead: The Proposed Law Enforcement Access Network' Policy 7,6 (Winter 1992). At http://www.rogerclarke.com/DV/PaperLEAN.html

'Computer Matching in Government: A Normative Regulatory Framework' Working Paper (August 1992) 110 pp. (which eventually resulted in three publications)

'The Resistible Rise of the Australian National Personal Data System' Software L. J. 5,1 (January 1992). At http://www.rogerclarke.com/DV/SLJ.html


Selected Publications Prior to 1992

'The Tax File Number Scheme: A Case Study of Political Assurances and Function Creep' Policy 7,4 (Summer 1991). At http://www.rogerclarke.com/DV/PaperTFN.html

During 1989-90, a series of papers was prepared under consultancy assignments for the Commonwealth Privacy Commissioner, on:

During the period 1985-1990, several Policy Papers were prepared for the Australian Computer Society, on:

'Social Implications of IT - The Professional's Role' Austral. Comp. J. 22,2 (May 1990)

'Current Health Care Information Privacy Issues' Presentation to the Australian Medical Informatics Association, Perth, April 1990. At http://www.rogerclarke.com/DV/PaperMedical.html

'The Privacy Act 1988 as an Implementation of the OECD Data Protection Guidelines', 66 pp. (June 1989). At http://www.rogerclarke.com/DV/PActOECD.html

The Commonwealth Privacy Act 1988: Interpretation and Annotations from the Information Systems Perspective', 73 pp. (March 1989). Abstract at http://www.rogerclarke.com/DV/AbstractPrivacyAct.html

'The OECD Data Protection Guidelines: A Template for Evaluating Information Privacy Law and Proposals for Information Privacy Law' Working Paper (25pp.) (October 1989). At http://www.rogerclarke.com/DV/PaperOECD.html

'The Information Privacy Principles of the Australian Privacy Act 1988: An Unofficial Short Form' (February 1989). At http://www.rogerclarke.com/DV/IPPsUnofficial.html

'The Commonwealth Privacy Act 1988: A Personal Summary' (February 1989). At http://www.rogerclarke.com/DV/PaperPrivacyActShort.html

'Consumer Credit Reporting and Information Privacy Regulation' Policy Paper for the Australian Computer Society (February 1989). At http://www.rogerclarke.com/DV/PaperCredit.html

Economic, Legal and Social Implications of Information Technology' MIS Qtly 12,4 (December 1988) 517-9, at http://www.rogerclarke.com/DV/ELSIC.html

'Information Technology and Dataveillance' Comm. ACM 31,5 (May 1988) Re-published in C. Dunlop and R. Kling (Eds.), 'Controversies in Computing', Academic Press, 1991, at http://www.rogerclarke.com/DV/CACM88.html

''Just Another Piece of Plastic for Your Wallet': The Australia Card' Prometheus 5,1 June 1987 Republished in Computers & Society 18,1 (January 1988), with an Addendum in Computers & Society 18,3 (July 1988). At http://www.rogerclarke.com/DV/OzCard.html

'Australian Proposals to Implement the OECD Data Protection Guidelines' Working Paper (January 1988)

'Aspects of the Australian Law Reform Commission's Information Privacy Proposals' J. L. Inf. Sci. 2,1 Aug 1986 (with G.W. Greenleaf)

'Impact on Practitioners of the Australian Law Reform Commission's Information Privacy Proposals' Austral. Comp. J. 17,2 May 1985

'Database Retrieval Technology and Subject Access Principles' Austral. Comp. J. 16,1 February, 1984 (with G.W. Greenleaf)

During 1974-76, a series of papers was prepared for the N.S.W. Privacy Committee., including:



xamaxsmall.gif missing
The content and infrastructure for these community service pages are provided by Roger Clarke through his consultancy company, Xamax.

From the site's beginnings in August 1994 until February 2009, the infrastructure was provided by the Australian National University. During that time, the site accumulated close to 30 million hits. It passed 50 million in early 2015.

Sponsored by Bunhybee Grasslands, the extended Clarke Family, Knights of the Spatchcock and their drummer
Xamax Consultancy Pty Ltd
ACN: 002 360 456
78 Sidaway St, Chapman ACT 2611 AUSTRALIA
Tel: +61 2 6288 6916

Created: 15 February 1995 - Last Amended: 31 December 2016 by Roger Clarke - Site Last Verified: 15 February 2009
This document is at www.rogerclarke.com/DV/RogersBibl.html
Mail to Webmaster   -    © Xamax Consultancy Pty Ltd, 1995-2013   -    Privacy Policy