Open Journal Systems

Information Privacy, Data Surveillance and Security--How Aus-tralian Privacy Law Fully Plays Its Role in the Age of Big Data

Jiexin Zang(University of New South Wales)

Abstract

Privacy and the protection of privacy is a common topic studied by many scholars. From the very beginning of human culture, people have personal privacy, which is not willing for them to be unveiled by others. With the development of information technology, especially the internet, knowledge and information are dealt by internet users in conscious or unconscious way, and personal information has been rapidly and quickly distributed and disseminated all over the world. Personal data can be collected by hackers or interlinks from the website, internet not only provides people an era with internet links, but also an age with information collections, a big data age. With the background of big data, this essay tries to put forward the correlative relationship between the protection of information privacy and the privacy law in Australia. It first has an overview of the concepts of information privacy and data surveillance under the background of big data, then highlights the importance of data security in the age of big data; with a literature review on the development of Australian privacy acts, it further claims that privacy acts or regulations by the federal or states provided strong support for the protection of personal data. Then relationship between the protection information privacy and the need of judicial guarantee is further studied for thorough methods or regimes in data protection. 

With these points studied, this essay aims to highlight the importance of data protection and information privacy. On the other hand, it aims to provide awareness for readers the vital role privacy laws can play in the protection of people’s personal information and emphases the importance of a continuous evolution for privacy law system in the age of big data.

Keywords

A big data age; The protection of information privacy; The privacy law in Australia

Full Text:

PDF

References

Abdul Raman Saad & Associates Malaysia, Information Privacy and Data Protec-tion A Proposed Model for the Kingdom Of Saudi Arabia.

Agranoff, M. H., 1993, Controlling the Threat to Personal Privacy, Journal of In-formation Systems Management.

Australian Law Reform Commission, Privacy, Report No 22, 1983.

Banisar, David, and S. G. Davies., 1999, Global Trends in Privacy Protection: An International Survey of Privacy, Data Protection, and Surveillance Laws and Devel-opments. John Marshall Journal of Computer & Information Law XVIII.1.

Burdon M, Telford P., 2010, The Conceptual Basis of Personal Information in Australian Privacy Law. Social Science Electronic Publishing, 17(4):1-27.

Clark R., 2000, Current Developments in Internet Privacy.

Clarke, Roger., 1991, Information Technology and Dataveillance. Roger Clarke's IT and Dataveillance. Xamax Consultancy Pty Ltd, Canberra. 25th, May. 2016. .

David Lindsay, 2005, An Exploration of the Conceptual Basis of Privacy and the Implications for the Future of Australian Privacy Law,Melbourne University Law Re-view, Melbourne, 131-153.

Dialogues in Human Geography.Guarda, P., 2009. Data Protection, Information Privacy, and Security Measures: an Essay on the European and the Italian Legal Frameworks. Social Science Electronic Publishing.

Geo-Journal; M. Batty, 2013, ‘Big Data, Smart Cities and City Planning,’ 3(3).

G. PASCUZZI,, 2006, Il diritto dell’era digitale, 2nd ed., Bologna.

Hewett W G, Whitaker J., 2002, Data protection and privacy: the Australian leg-islation and its implications for IT professionals. Logistics Information Management, 15(5-6):369-376.

Laurence Ashworth, 2001, Clinton Free, Marketing Dataveillance and Digital Privacy: Using Theories of Justice to Understand Consumers' Online Privacy Con-cerns, Journal of Business Ethics, June 13.

Lord Falconer of Thoroton., 2001, Privacy law and medical research [let-ter]. Times May 17:21.

J. Bentham, 1791, Panopticon: Postscript, Part II, London: Mews - gate, pp. 29-95.

John Stuart Mill, 1991, ‘On Liberty’ in John Gray (ed), On Liberty and Other Es-says 5, 13–14.

Joseph Donahue, Nicholas Whittemore, Ashley Heerman, Ethical Issues of Data Surveillance.

Organisation for Economic Co-operation and Development, 1980, OECD Guide-lines on the Protection of Privacy and Transborder Flows of Personal Data (Paris: OECD).

R. Kitchin, 2013, ‘The Real-Time City?’ Big Data and Smart Urbanism’ 79.

Nature.Big Data[EB/OL].26th, May, 2016.

Robert Post, 2001, Three Concepts of Privacy, Georgetown Law Journal2087, 2095.

Science. Special online collection: Dealing with data[EB/OL].26th, May, 2016,

S. D. WARREN, L. D. BRANDEIS, 1890, The Right to Privacy, Harv. L. Rev. 193.

Securely Protect Yourself Against Cyber Trespass Act (SPY ACT), 2005, H.R. 29, 109th Cong.

Sir James Fitzjames Stephen, 1967, Liberty, Equality, Fraternity (first published 1873, 1967 ed) 160.

P. GUARDA, 2004, Agenti software e sicurezza informatica. Diritto E Tecnolo-gie Evolute Del Commercio Elettronico, 2004.



DOI: http://dx.doi.org/10.26549/jetm.v3i1.1168

Refbacks

  • There are currently no refbacks.
Copyright © 2019 jiexin zang Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
  • :+65-62233778 QQ:2249355960 :contact@s-p.sg