{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,8]],"date-time":"2024-08-08T10:38:37Z","timestamp":1723113517144},"reference-count":43,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[2012,12,1]],"date-time":"2012-12-01T00:00:00Z","timestamp":1354320000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Law & Security Review"],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1016\/j.clsr.2012.09.003","type":"journal-article","created":{"date-parts":[[2012,11,17]],"date-time":"2012-11-17T10:02:03Z","timestamp":1353146523000},"page":"613-626","source":"Crossref","is-referenced-by-count":36,"title":["Constructing a surveillance impact assessment"],"prefix":"10.1016","volume":"28","author":[{"given":"David","family":"Wright","sequence":"first","affiliation":[]},{"given":"Charles D.","family":"Raab","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.clsr.2012.09.003_bib1","unstructured":"28th International conference of data protection and privacy commissioners, closing communiqu\u00e9, London, 2\u20133 November 2006. http:\/\/www.edps.europa.eu\/EDPSWEB\/webdav\/site\/mySite\/shared\/Documents\/Cooperation\/Conference_int\/06-11-03_London_Communique_EN.pdf."},{"key":"10.1016\/j.clsr.2012.09.003_bib2","author":"Agence France Presse (AFP)"},{"key":"10.1016\/j.clsr.2012.09.003_bib4","series-title":"The governance of privacy: policy instruments in global perspective","author":"Bennett","year":"2006"},{"key":"10.1016\/j.clsr.2012.09.003_bib5","author":"BBC News"},{"issue":"5","key":"10.1016\/j.clsr.2012.09.003_bib6","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1145\/42411.42413","article-title":"Information technology and dataveillance","volume":"31","author":"Clarke","year":"1988","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.clsr.2012.09.003_bib7","series-title":"Introduction to dataveillance and information privacy, and definitions of terms","author":"Clarke","year":"1997"},{"key":"10.1016\/j.clsr.2012.09.003_bib8","series-title":"Surveillance & crime","author":"Coleman","year":"2011"},{"key":"10.1016\/j.clsr.2012.09.003_bib9","article-title":"Google China cyberattack part of vast espionage campaign, experts say","author":"Eunjung Cha","year":"2010","journal-title":"The Washington Post"},{"key":"10.1016\/j.clsr.2012.09.003_bib10","author":"European Commission"},{"key":"10.1016\/j.clsr.2012.09.003_bib11","unstructured":"European Group on Ethics in Science and New Technologies (EGE), Ethics of Information and Communication Technologies, Opinion of the European Group on Ethics in Science and New Technologies to the European Commission, No. 26, Brussels; 22 Feb 2012."},{"key":"10.1016\/j.clsr.2012.09.003_bib12","series-title":"Directive 2006\/24\/EC on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002\/58\/EC","author":"European Parliament and the Council","year":"2006"},{"key":"10.1016\/j.clsr.2012.09.003_bib13","unstructured":"Finn Rachel, Wright David, Friedewald Michael. Seven types of privacy. In Gutwirth Serge, Leenes Ronald, De Hert Paul, et\u00a0al., editors. European data protection: coming of age? Dordrecht: Springer, forthcoming."},{"key":"10.1016\/j.clsr.2012.09.003_bib14","series-title":"Internet and surveillance","year":"2011"},{"key":"10.1016\/j.clsr.2012.09.003_bib15","article-title":"Why does the U.K.'s new internet surveillance plan cost nearly $4 billion?","author":"Gallagher","year":"2012","journal-title":"Slate"},{"key":"10.1016\/j.clsr.2012.09.003_bib16","series-title":"Assessing the impact of CCTV","author":"Gill","year":"2005"},{"issue":"4","key":"10.1016\/j.clsr.2012.09.003_bib17","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1080\/00071310020015280","article-title":"The surveillant assemblage","volume":"51","author":"Haggerty","year":"2000","journal-title":"British Journal of Sociology"},{"key":"10.1016\/j.clsr.2012.09.003_bib18","series-title":"Health information and quality authority, guidance on privacy impact assessment in health and social care","year":"2010"},{"key":"10.1016\/j.clsr.2012.09.003_bib19","series-title":"Privacy impact assessment handbook","author":"Information Commissioner's Office (ICO)","year":"2009"},{"key":"10.1016\/j.clsr.2012.09.003_bib20","article-title":"More demands on cell carriers in surveillance","author":"Lichtblau","year":"2012","journal-title":"The New York Times"},{"key":"10.1016\/j.clsr.2012.09.003_bib21","first-page":"179","article-title":"An exploration of the conceptual basis of privacy and the implications for the future of Australian privacy law","volume":"29","author":"Lindsay","year":"2005","journal-title":"Melbourne University Law Review"},{"issue":"3","key":"10.1016\/j.clsr.2012.09.003_bib22","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1080\/019722498128809","article-title":"Ethics for the new surveillance","volume":"14","author":"Marx","year":"1998","journal-title":"The Information Society"},{"issue":"1","key":"10.1016\/j.clsr.2012.09.003_bib23","doi-asserted-by":"crossref","first-page":"9","DOI":"10.24908\/ss.v1i1.3391","article-title":"What's new about the \u2018new surveillance\u2019? Classifying for change and continuity","volume":"1","author":"Marx","year":"2002","journal-title":"Surveillance & Society"},{"issue":"2","key":"10.1016\/j.clsr.2012.09.003_bib24","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1177\/1362480697001002003","article-title":"The viewer society: Michel Foucault's \u2018Panopticon\u2019 revisited","volume":"1","author":"Mathiesen","year":"1997","journal-title":"Theoretical Criminology"},{"key":"10.1016\/j.clsr.2012.09.003_bib25","series-title":"The maximum surveillance society: the rise of closed circuit television","author":"Norris","year":"1999"},{"key":"10.1016\/j.clsr.2012.09.003_bib26","article-title":"Original \u2018echelon\u2019 secret UK\u2013US spookery treaty published","author":"Page","year":"2010","journal-title":"The Register"},{"key":"10.1016\/j.clsr.2012.09.003_bib27","series-title":"Surveillance and security: a dodgy relationship","author":"Peissl","year":"2002"},{"key":"10.1016\/j.clsr.2012.09.003_bib28","unstructured":"Raab Charles D. Researching the regulation of surveillance. Paper presented at the conference on the new surveillance \u2013 a critical analysis of research and methods in surveillance studies. Centre for Technology and Society, Technical University of Berlin, Berlin, 30 November\u20131 December 2006."},{"issue":"4","key":"10.1016\/j.clsr.2012.09.003_bib29","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1080\/019722498128719","article-title":"The distribution of privacy risks: who needs protection?","volume":"14","author":"Raab","year":"1998","journal-title":"The Information Society"},{"key":"10.1016\/j.clsr.2012.09.003_bib30","series-title":"Privacy impact assessment","first-page":"363","article-title":"Surveillance: extending the limits of privacy impact assessment","author":"Raab","year":"2012"},{"issue":"4","key":"10.1016\/j.clsr.2012.09.003_bib31","doi-asserted-by":"crossref","first-page":"497","DOI":"10.24908\/ss.v8i4.4185","article-title":"Response to Bennett: also in defence of privacy","volume":"8","author":"Regan","year":"2011","journal-title":"Surveillance & Society"},{"key":"10.1016\/j.clsr.2012.09.003_bib32","series-title":"Understanding privacy","author":"Solove","year":"2008"},{"issue":"1","key":"10.1016\/j.clsr.2012.09.003_bib33","doi-asserted-by":"crossref","first-page":"120","DOI":"10.24908\/ss.v1i1.3397","article-title":"Privacy is not an antidote to surveillance","volume":"1","author":"Stalder","year":"2002","journal-title":"Surveillance & Society"},{"key":"10.1016\/j.clsr.2012.09.003_bib34","series-title":"Privacy impact assessment handbook","author":"Stewart","year":"2007"},{"key":"10.1016\/j.clsr.2012.09.003_bib35","author":"Surveillance Studies Network (SSN)"},{"key":"10.1016\/j.clsr.2012.09.003_bib36","series-title":"A guide to preparing Treasury Board submissions","author":"Treasury Board of Canada Secretariat","year":"2002"},{"key":"10.1016\/j.clsr.2012.09.003_bib37","author":"The Telegraph"},{"key":"10.1016\/j.clsr.2012.09.003_bib38","author":"Treasury Board of Canada Secretariat"},{"key":"10.1016\/j.clsr.2012.09.003_bib39","series-title":"Privacy impact assessments: the Privacy Office official guidance","author":"[US] Department of Homeland Security","year":"2010"},{"key":"10.1016\/j.clsr.2012.09.003_bib40","series-title":"Crime prevention effects of closed circuit television: a systematic review","author":"Welsh","year":"2002"},{"issue":"1","key":"10.1016\/j.clsr.2012.09.003_bib41","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/j.clsr.2011.11.007","article-title":"The state of the art in privacy impact assessment","volume":"28","author":"Wright","year":"2012","journal-title":"Computer Law & Security Review"},{"key":"10.1016\/j.clsr.2012.09.003_bib42","author":"Wright"},{"key":"10.1016\/j.clsr.2012.09.003_bib43","series-title":"Privacy impact assessment","year":"2012"},{"issue":"4","key":"10.1016\/j.clsr.2012.09.003_bib44","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1016\/j.clsr.2010.05.007","article-title":"Sorting out smart surveillance","volume":"26","author":"Wright","year":"2010","journal-title":"Computer Law & Security Review"}],"container-title":["Computer Law & Security Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0267364912001719?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0267364912001719?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,7,5]],"date-time":"2019-07-05T18:52:14Z","timestamp":1562352734000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0267364912001719"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":43,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2012,12]]}},"alternative-id":["S0267364912001719"],"URL":"https:\/\/doi.org\/10.1016\/j.clsr.2012.09.003","relation":{},"ISSN":["0267-3649"],"issn-type":[{"value":"0267-3649","type":"print"}],"subject":[],"published":{"date-parts":[[2012,12]]}}}