[1] Rule J.B. 'Private Lives and Public Surveillance: Social Control in the Computer Age' Schocken Books, 1974
[2] Laudon K.C. 'Computers and Bureaucratic Reform' Wiley, New York, 1974
[3] Smith R.E.(Ed.) 'Privacy Journal' monthly since November 1974
4 Smith, R.E.(Ed) 'Privacy Journal Compilation of State and Federal privacy Laws' updated annually
[5] Westin A.F. & Baker M. 'Databanks in a Free Society' Quadrangle, 1974
[6] Kling R. 'Automated Welfare Client Tracking and Welfare Service Integration: The Political Economy of Computing' Comm ACM 21,6 (June 1978) 484-93
[7] Rule J.B., McAdam D., Stearns L. & Uglow D. 'The Politics of Privacy' New American Library, 1980
8 Burnham D. 'The Rise of the Computer State' Random House, New York, 1983
[9] Rule J.B. 'Documentary Identification and Mass Surveillance in the United States' 31 Social Problems 222 (1983)
[10] Marx G.T. & Reichman N. 'Routinising the Discovery of Secrets' Am. Behav. Scientist 27,4 (Mar/Apr 1984) 423-452
11 Marx G.T. 'Surveillance: A Dangerous Game Played With Matches' Abacus 4,1 (Fall, 1986) 60-64
[12] Roszak T. 'The Cult of Information' Pantheon 1986
[13] OTA 'Federal Government Information Technology: Electronic Record Systems and Individual Privacy' OTA-CIT-296, U.S. Govt Printing Office, Washington DC, Jun 1986
[14] Laudon K.C. 'Dossier Society: Value Choices in the Design of National Information Systems' Columbia U.P., 1986b
[15] Clarke R.A. 'Just Another Piece of Plastic for Your Wallet: The Australia Card'. Prometheus 5,1 June 1987a Republished in Computers & Society 18,1 (January 1988), with an Addendum in Computers & Society 18,3 (July 1988)
[16] Flaherty D.H.'Protecting Privacy in Surveillance Societies' Uni. of North Carolina Press, 1989
17 Bennett C. 'Regulating Privacy: Data Protection and Public Policy in Europe and the United States' Cornell University Press, New York, 1992
[18] Westin A.F. 'Privacy and Freedom' Atheneum, 1967
19 Westin A.F. (ed.) 'Information Technology in a Democracy' Harvard U.P., 1971
[20] 'Records, Computers and the Rights of Citizens' U.S. Dept of Health, Education & Welfare, Secretary's Advisory Committee on Automated Personal Data Systems, MIT Press, Cambridge Mass., 1973
[21] Westin A.F. & Baker M. (1974) op.cit.
[22] 'The Criminal Use of False Identification' U.S. Federal Advisory Committee on False Identification, Washington DC, 1976
[23] 'Personal Privacy in an Information Society' Privacy Protection Study Commission, U.S. Govt. Printing Office, July 1977
[24] 'Guidelines for the Operation of Personal Data Systems'
New South Wales Privacy Committee, Sydney, 1977
[25] Sir Norman Lindop 'Report of the Committee on Data Protection' Cmnd 7341, HMSO, London (December 1978)
[26] 'Guidelines for the Protection of Privacy and Transborder Flows of Personal Data' Organisation for Economic Cooperation and Development, Paris, 1980
[27] 'Guidelines to Agencies on Conducting Automated Matching Programs' Office of Management and Budget March, 1979; 'Privacy Act of 1974: Supplemental Guidance for Matching Programs' 44 Fed. Reg. 23, 138, 1979
[28] 'Computer Matching Guidelines' Office of Management and Budget , May 1982; 'Privacy Act of 1974: Revised Supplemental Guidance for Conducting Matching Programs' 47 Fed. Reg. 21, 656, 1982
[29] 'Model Control System for Conducting Computer Matching Projects Involving Individual Privacy Data' Office of Management and Budget & President's Commission for Integrity & Efficiency 1983
[30] 'Privacy' Australian Law Reform Commission, Sydney, Report No. 22 (1983)
31 'Computer Matching in State Administered Benefit Programs: A Manager's Guide to Decision-Making' Dept. of Health and Human Services, 1983; 'Inventory of State Computer Matching Technology' Dept. of Health and Human Services, 1983; 'Nationwide Impact of Verifying Resources by Matching Recipients of Public Assistance with Bank Records' Dept. of Health and Human Services, 1983
[32] 'Computer Matching in State Administered Benefit Programs' U.S. Dept. of Health and Human Services, June 1984
[33] Kusserow R.P. 'The Government Needs Computer Matching to Root out Waste and Fraud' Comm ACM 27,6 (June 1984) 542-545; 'Computer Matching in State-Administered Benefit Programs' Dept. of Health & Human Services, Office of Inspector-General (June 1984)
[34] Shattuck J. 'Computer Matching is a Serious Threat to Individual Rights' Comm ACM 27,6 (June 1984) 538-541
[35] Laudon K.C. op.cit.
[36] OTA op.cit.
[37] 'Review of Systems for Dealing with Fraud on the Commonwealth' Aust. Govt. Publ. Service (March 1987)
[38] 'Data Matching Review: A Resource Document for Notification of the Privacy Commissioner of Proposed Data Matches' Privacy Commissioner, 112 Kent, Ottowa, Canada (July 1989)
[39] O'Connor K. Paper for the Communications & Media Law Association, available from the Privacy Commissioner, Human Rights & Equal Opportunities Commission, G.P.O. Box 5218, Sydney, 26 April 1990
[40] 'Data Matching in Commonwealth Administration: Discussion Paper and Draft Guidelines' Privacy Commissioner, Human Rights & Equal Opportunities Commission, G.P.O. Box 5218, Sydney, Australia (October 1990) (56 pp.)
[41] Clarke R.A. 'Computer Matching and Digital Identity' Proc. Conf. Computers, Freedom & Privacy, Ass. Comp. Machinery, San Francisco, March 1993
[42] Clarke R.A. ibid.
[43] Office of Management and Budget March, 1979, op.cit.
[44] Office of Management and Budget March, 1982, op.cit.
[45] Office of Management and Budget & President's Commission for Integrity & Efficiency 1983op.cit.
[46] 'Computer Matching in State Administered Benefit Programs: A Manager's Guide to Decision-Making' Dept. of Health and Human Services, 1983; 'Inventory of State Computer Matching Technology' Dept. of Health and Human Services, 1983; 'Nationwide Impact of Verifying Resources by Matching Recipients of Public Assistance with Bank Records' Dept. of Health and Human Services, 1983
[47] 'Action Needed to Reduce, Account For, and Collect Overpayments to Federal Retirees' Comptroller General of the United States, General Accounting Office, Washington DC, 1983a
[48] 'Computer Matches Identify Potential Unemployment Benefit Overpayments' Comptroller General of the United States, General Accounting Office, Washington DC, 1983b
[49] 'GAO Observations on the Use of Tax Return Information for Verification in Entitlement Programs' Comptroller General of the United States, General Accounting Office, Washington DC, 1984a
[50] 'Better Wage-Matching Systems and Procedures Would Enhance Food Stamp Program Integrity' General Accounting Office, Washington DC, 1984b
[51] Dept. of Health and Human Services, 1983 op.cit.
[52] Kusserow R.P.1984 op.cit.
[53] Greenberg D.H.&Wolf D.A. 'Is Wage Matching Worth All the Trouble?' Public Welfare (Winter 1985) 13-20
[54] Greenberg D.H. & Wolf D.A. (with Pfiester J.) 'Using Computers to Combat Welfare Fraud: The Operation and Effectiveness of Wage Matching' Greenwood Press Inc., Oct 1986
[55] 'A Central Wage File for Use by Federal Agencies: Benefits and Concerns' General Accounting Office, GAO/HRD-85-31 (May 1985)
[56] 'Social Security: Pensions Data Useful for Detecting Supplemental Security Payment Errors' General Accounting Office, GAO/HRD-86-32, Mar 1986a, 14 pp.
[57] 'Computer Matching: Assessing Its Costs and Benefits' General Accounting Office, GAO/PEMD-87-2, Nov 1986b, 102 pp.
[58] 'Computer Matching: Factors Influencing the Agency Decision-Making Process' General Accounting Office, GAO/PEMD-87-3BR, Nov 1986c, 30 pp.
[59] OTA 1986 op.cit.
[60] Holden N., Burghardt J.A. & Ohls J.C. 'Final Report for the Evaluation of the Illinois On-Line Cross-Match Demonstration' Mathematica Policy Research, Sep. 11 1987, for U.S. Dept. of Health and Human Services, Office of Family Assistance
[61] 'Welfare Eligibility: Deficit Reduction Act Income Verification Issues' General Accounting Office, GAO/HRD-87-79FS, May 1987, 93 pp.
[62] 'Veterans' Pensions: Verifying Income with Tax Data Can Identify Significant Payment Problems' General Accounting Office, GAO/HRD-88-24, Mar 1988, 100 pp.
[63] Greenberg D. & Yudd R. 'Food Stamp Program Operations Study: Computer Matching: A Review of Exemplary State Practices in the FSP' The Urban Institute, 2100 M St NW, Washington DC 20037, for the U.S. Dept. of Agriculture, Food and Nutrition Service, July 1989
[64] 'Veterans' Benefits: VA Needs Death Information From Social Security to Avoid Erroneous Payments' General Accounting Office, GAO/HRD-90-110, Jul 1990b, 14 pp.
[65] 'Federal Benefit Payments: Agencies Need Death Information From Social Security to Avoid Erroneous Payments' General Accounting Office, GAO/HRD-91-3, Feb 1991a, 23 pp.
[66] 'Welfare Benefits: States Need Social Security's Death Data to Avoid Payment Error or Fraud' General Accounting Office, GAO/HRD-91-73, Apr 1991c, 13 pp.
[67] Clarke R.A. (1993) op.cit.
[68] Rule J.B. (1974) op.cit.
[69] Kling, R. (1978) op.cit.
[70] Langan K.J. 'Computer Matching Programs: A Threat to Privacy?' Columbia J. of Law and Social Problems 15,2 (1979)
[71] Rule J.B.et al. (1980) op.cit.
[72] Kirchner J. 'Privacy: A history of computer matching in federal government programs' Computerworld (December 14, 1981)
[73] Burnham D. (1983) op.cit.
[74] Marx G.T. & Reichman N. (1984) op.cit.
[75] Shattuck J. (1984) op.cit.
[76] Reichman N. & Marx G.T. 'Generating Organisational Disputes: The Impact of Computerization' Proc. Law & Society Ass. Conf., San Diego, June 6-9, 1985
[77] Laudon K.C. (86) op.cit.
[78] OTA (1986) op.cit.
[79] Clarke R.A. (1988) op.cit.
[80] Davies S. 'Big Brother: Australia's Growing Web of Surveillance' Simon & Schuster, Sydney, 1992
[81] 'Data-Matching Program (Assistance and Tax): Report on Progress' Department of Social Security and the Data Matching Agency, Canberra, Australia, October 1991
[82] Senator S. Ervin, 1971 Senate Hearings into Federal Data Banks, Computers and the Bill of Rights, quoted in Laudon K.C. (1986) op.cit., (p.357).
[83] Roszak T. (1986) op.cit., (pp.186-7).
84 'Data Matching Review: A Resource Document for Notification of the Privacy Commissioner of Proposed Data Matches' Privacy Commissioner, 112 Kent, Ottowa, Canada (July 1989) (p.4).
85 'Privacy' Aust. L. Reform Comm., Sydney, Report No. 22 (1983)
86 OTA (1986) op.cit., p.40
87 'Data Matching in Commonwealth Administration: Discussion Paper and Draft Guidelines' Privacy Commissioner, Human Rights & Equal Opportunities Commission, G.P.O. Box 5218, Sydney, Australia (October 1990) p.vi
88 O'Connor K. (1990) op.cit.
[89] quoted in Berman J. & Goldman J. 'A Federal Right of Information Privacy: The Need for Reform' Benton Foundation Project on Communications & Information Policy Options, 1776 K Street NW, Washington DC 20006, 1989, p.15
[90] Laudon K.C. (1986) op.cit., (pp.255, 133).
[91] OTA (1986) op.cit. (pp.57-58).
92 Marx G.T. & Reichman N. (1984) op.cit., (p.436).
[93] Roszak T. (1986) op.cit.
[94] OTA (1986) op.cit. (p.40).
[95] GAO (1988) op.cit., (pp.23, 18, 28).
[96] Testimony of the Food Research and Action Center in 'Computer Matching and Privacy Protection Amendments of 1990: Hearing Before the Government Information, Justice and Agriculture Subcommittee on H.R. 5450, September 11, 1990' U.S. Government Printing Office, 1991, p.50
[97] Kusserow R.P. (1984) op.cit. (p.10).
[98] Clarke R.A. (1988) op.cit..
99 'Data-Matching Program (Assistance and Tax): Report on Progress' Department of Social Security and the Data Matching Agency, Canberra, Australia, October 1992, p.73
100 ibid., pp.51,73-4
[101] New South Wales Privacy Committee (1977) op.cit.
[102] Neumann [1976-] Risks Forum, in ACM Software Eng. Notes, since 1,1 (1976); also on UseNet, as Comp.Risks
103 OTA (1986) op.cit., (p.26).
[104] OTA (1986) op.cit., (pp.52-53).
[105] Laudon K.C. (1986) 'Data Quality and Due Process in Large Interorganisational Record Systems' Comm. ACM 29,1 (January 1986) 4-11
[106] Laudon K.C. (1986) op.cit., (p.139-143).
[107] Clarke R.A. 'Computer Matching in the Social Security Administration' Working Paper available from the author (January 1992)
[108] Roszak T. (1986) op.cit., (pp.87,95,98,118,120).
[109] Clarke R.A. 'Human Identification in Information Systems: Management Challenges and Public Policy Issues' Forthcoming, Information Technology & People
[110] Henderson L. 'Case Study in Data Integrity: Australian Passports Office' Working Paper available from the author, Department of Commerce, Aust. National Uni. (March 1992).
[111] Clarke R.A. (1987) op.cit..
[112] Clarke R.A. 'The Resistible Rise of the National Personal Data System' Software L.J. 5,1 (February 1992c)
[113] Aust. Govt. Publ. Service (1987) op.cit.
[114] Laudon K.C. (1986) op.cit., (p.376).
[115] Henderson L. (1992) op.cit.
[116] GAO (1988) op.cit., (p.5).
[117] Shattuck J. (1984) op.cit.
[118] GAO (1986) op.cit., (p.3).
[119] GAO (1990) op.cit., (p.4).
[120] GAO (1991) op.cit., (p.7).
[121] 'SSA Matching Operations Report: October 1990 - March 1991' Office of Program Integrity and Reviews, Social Security Administration, Pub. No. 31-004, March 1991a
[122] GAO (1991) op.cit., (p.4).
[123] Clarke R.A. 'Computer Matching by Government Agencies: The Failure of Cost/Benefit Analysis as a Control Mechanism' Forthcoming, Informatization and the Public Sector
[124] Laudon K.C. (1986) op.cit., (pp.384-90).
[125] Flaherty D.H. (1989) op.cit., (pp.359-407).
[126] Rule J.B. (1973) op.cit.
[127] Rule J.B. et al (1980) op.cit.
[128] Bennett C. (1992) op.cit., (pp.96-101).
[129] Smith R.E. (1974) op.cit.
130 Flaherty D.H. (1986) op.cit.
[131] Madsen W. 'Handbook of Personal Data Protection' MacMillan Publishers, London, 1992
[132] HEW (1973) op.cit.
[133] Laudon K.C. (1986) op.cit., (p.6).
[134] Privacy Protection Study Commission (1977) op.cit.
[135] Rule J.B.et al (1980) op.cit. (pp.75, 110).
[136] 'Amended Proposal for a Council Directive Concerning the Protection of Individuals in Relation to the Processing of Personal Data' European Community, Brussells, OJ No L 123, 8 May 1992
[137] Shattuck J. (1984) op.cit., (p.540).
[138] New South Wales Privacy Committee (1977) op.cit.
[139] Rule J.B.et al (1980) op.cit. (p.120).
[140] Marx G.T. (1986) op.cit., (p.48).
141 Australian Law Reform Commission (1983) op.cit.
[142] OTA (1986) op.cit. (pp.57-59, 113-122).
[143] Flaherty D.H. (1989) op.cot., (esp. pp.359-407).
[144] Laudon K.C. (1986) op.cit., (p.383).
[145] Privacy Protection Study Commission (1977) op.cit.
[146] Australian Law Reform Commission (1983) op.cit.
[147] Laudon K.C. (1986) op.cit., (pp.382-4).
[148] Flaherty D.H. (1989) op.cit.
[149] Laudon K.C. (1986) op.cit. , (p.384).
[150] OTA (1986) op.cit.
[151] Laudon K.C. (1986) op.cit., (p.400).
[152] ibid., (p.385).
[153] Kusserow R.P. 1984 op.cit. (pp.33-40).
[154] Privacy Commissioner of Canada (1989) op.cit.
[155] Privacy Commissioner of Australia (1990) op.cit.
[156] Clarke (1994) op.cit.
[157] OTA (1986) op.cit., p.4
[158] Thom J. & Thorne P. 'Privacy Legislation and the Right of Access' Austral. Comp. J. 15,4 (November 1983) 145-150
[159] Greenleaf G.W. & Clarke R.A. 'Database Retrieval Technology and Subject Access Principles' Aust. Comp. J. 16,1 (Feb, 1984)
[160] Westin A.F. 'Privacy and Freedom' Atheneum, 1967; Westin A.F. (ed.) 'Information Technology in a Democracy' Harvard U.P., 1971; Westin A.F. & Baker M. 'Databanks in a Free Society' Quadrangle, 1974
[161] Clarke (1993) op.cit..