6 P. (2001), Divided by Information?, London: Demos.
Adkins B., Short P., Mead E., Owens R. and Heffernan M. (2002), Tenancy Databases in the Context of Tenure Management, Queensland: Australian Housing and Urban Research Institute.
Adler M. and Henman P. (2005), ‘Computerising the welfare state: an international comparison of computerisation in social security’, Information, Communication and Society, 8: 3, 315–42.
Australian Taxation Office (ATO) (2005), ATO Annual Report 2004–05, Canberra: ATO.
Australian Taxation Office (ATO) (2006), Making it Easier to Comply, Nat 9497–01.2006, Canberra: ATO.
Ball K. and Wilson D. (2000), ‘Power, control and computer based performance monitoring’, Organization Studies, 21: 4, 539–66.
Barnes A. (2004), ‘Diaries, dunnies and discipline’, Labour and Industry, 14: 3, 127–37.
Beck U. (1992), Risk Society, London: Sage.
Beck U. and Beck-Gernsheim E. (2002), Individualization, London: Sage.
Bovens M. and Zouridis S. (2002), ‘From street-level to system-level bureaucracies’, Public Administration Review, 62: 2, 174–84.
Bryson L. (1992), Welfare and the State, New York: St Martin's Press.
Cahill L. (1994), ‘Data-matching in the social security system’, Social Security Journal, June, 98–108.
Centrelink (2005), Centrelink Annual Report 2004–05, Canberra: Centrelink.
Clarke R. (1994), ‘Dataveillance: delivering “1984”’, in Green L. and Guinery R. (eds), Framing Technology, Sydney: Allen & Unwin.
Coleman R. and Sim J. (2000), ‘You'll never walk alone’, British Journal of Sociology, 51: 4, 623–40.
Cook D. (1989), Rich Law, Poor Law, Milton Keynes: Open University Press.
Cook D. (1991), ‘Social injustice’, in Adler M., Bell C., Clasen J. and Sinfield A. (eds), The Sociology of Social Security, Edinburgh: Edinburgh University Press.
Cruikshank B. (1999), The Will to Empower, New York: Cornell University Press.
Daly M. (2000), The Gender Division of Welfare, New York: Cambridge University Press.
de Parle J. (2004), American Dream, New York: Penguin Books.
Deacon A. (2003), ‘Levelling the playing field, activating the players’, Policy and Politics, 31: 2, 123–37.
Dean H. (1998), ‘The politics of fraud’, Editorial, Benefits, 21: 1.
Dean H. (2005), Social Policy, Bristol: Polity Press.
Department of Social Security (DSS) (1987), Annual Report, Canberra: AGPS.
Department of Employment, Workplace Relations and Small Business (DEWRSB) (1998), ‘Job seeker classification instrument’, DEWRSB, Canberra, downloaded from: http://www.workplace.gov.au/jsci
Dornan P. and Hudson J. (2003), ‘Welfare governance in the surveillance society: a positive-realistic cybercriticalist view’, Social Policy and Administration, 37: 5, 468–82.
Ehrenreich B. (2001), Nickel and Dimed: Undercover in Low-wage USA, London: Granta.
Elmer G. (2004), Profiling Machines: Mapping the Personal Information Economy, Cambridge, MA: MIT Press.
Fitzpatrick T. (2000), ‘Critical cyber policy: network technologies, massless citizens, virtual rights’, Critical Social Policy, 20: 3, 375–407.
Fitzpatrick T. (2005), New Theories of Welfare, Basingstoke: Palgrave Macmillan.
Foucault M. (1977), Discipline and Punish, New York: Vintage Books.
Fox Piven F. and Cloward R. A. (1971), Regulating the Poor, London: Tavistock.
Fraser N. and Gordon L. (1994), ‘A genealogy of dependency: tracing a keyword of the welfare state’, Signs, 19: 309–36.
Gandy O. Jr (1993), The Panoptic Sort, Boulder, CO: Westview.
Gandy O. Jr (2006), ‘Data-mining, surveillance, and discrimination in the post-9/11 environment’, in Haggerty K. D. and Ericson R. V. (eds), The New Politics of Surveillance and Visibility, Toronto: University of Toronto Press.
Gilbert N. (2002), Transformation of the Welfare State, New York: Oxford University Press.
Gilliom J. (2001), Overseers of the Poor, Chicago: University of Chicago Press.
Gittins R. (2006), ‘Demolishing a few of the super myths’, Sydney Morning Herald, 14 June.
Graham S. and Wood D. (2003), ‘Digitizing surveillance’, Critical Social Policy, 23: 2, 227–48.
Hacker J. S. (2002), The Divided Welfare State, Cambridge: Cambridge University Press.
Haggerty K. D. and Ericson R. V. (eds) (2006), The New Politics of Surveillance and Visibility, Toronto: University of Toronto Press.
Harvey D. (2006), Spaces of Global Capitalism, London: Verso.
Henman P. (2004), ‘Targeted!: population segmentation, electronic surveillance and governing the unemployed in Australia’, International Sociology, 19: 2, 173–91.
Henman P. (2005), ‘E-government, targeting and data profiling: policy and ethical issues of differential treatment’, Journal of E-government, 2: 1, 79–98.
Henman P. and Adler M. (2003), ‘Information technology and the governance of social security’, Critical Social Policy, 23: 2, 139–64.
Holland P., Pyman A. and Teicher J. (2005), ‘Negotiating the contested terrain of drug testing in the Australian workplace’, Journal of Industrial Relations, 47: 3, 326–38.
Irvine R. (2004), ‘Biomedical surveillance and the working body’, in Grbich C. (ed.), Health in Australia, 3rd edition, Sydney: Pearson Longman.
Karger H. (2005), Shortchanged, San Francisco: Berrett-Koehler.
Lyon D. (1994), The Electronic Eye, Minneapolis: University of Minnesota Press.
Lyon D. (2001), Surveillance Society, Philadelphia: Open University Press.
Lyon D. (ed.) (2003), Surveillance as Social Sorting, London: Routledge.
McDonald C., Marston G. and Buckley A. (2003), ‘Risk technology in Australia: the role of the job seeker classification instrument in employment services’, Critical Social Policy, 23: 498–525.
Mann K. (1992), The Making of an English ‘Underclass’?, Milton Keynes: Open University Press.
Nelkin D. and Andrews L. (2003), ‘Surveillance creep in the genetic age’, in Lyon D. (ed.), Surveillance as Social Sorting, London: Routledge.
Norris C. and Armstrong G. (1999), The Maximum Surveillance Society, Oxford: Berg.
Orwell G. (1974), Nineteen Eighty-Four, London: Secker & Warburg.
Overington C. (2007), ‘AWB's golden handshakes’, The Australian, 18 January, 1–2.
Pierson P. (ed.) (2001), The New Politics of the Welfare State, Oxford: Oxford University Press.
Sainsbury R. (1998), ‘Putting fraud into perspective’, Benefits, 21: 2–6.
Poster M. (1990), The Mode of Information, Cambridge: University of Chicago Press.
Seelig T. (2003), ‘Tenant lists, tenant risks’, Flinders Journal of Law Reform, 7: 1, 27–39.
Sinfield A. (2007), ‘Tax welfare’, in Powell M.. (ed.), Understanding the Mixed Economy of Welfare, Bristol: Policy Press.
Smyth P. (2006), ‘The historical context for action’, in McClelland A. and Smyth P. (eds), Social Policy in Australia, Oxford: Oxford University Press.
Sparke M. (2006), ‘A neoliberal nexus’, Political Geography, 25: 2, 151–80.
Speak S. and Graham S. (1999), ‘Service not included’, Environment and Planning A 31: 1985–2001.
Titmuss R. M. (1976 ), Essay on ‘The Welfare State’, 3rd edition, London: Allen & Unwin.
Toynbee P. (2003), Hard Work, London: Bloomsbury.
United Nations (2005), Global E-government Readiness Report 2005, New York: United Nations.
Webster F. (2002), Theories of the Information Society, 2nd edition, London: Routledge.
West D. M. (2005), ‘Global e-government 2005’, Brown University, Rhode Island, NY.
Williams F. (1999), ‘Good enough principles for welfare’, Journal of Social Policy, 28: 4, 667–87.
Wynhausen E. (2005), Dirt Cheap, Sydney: MacMillan.