scispace - formally typeset
Search or ask a question

Showing papers on "Information privacy published in 1968"


01 Jan 1968
TL;DR: In this article, a general discussion is given of privacy aspects of utilizing computers in banking, and a discussion of how to utilize computers in the banking process is presented. But no privacy aspects are discussed.
Abstract: : A general discussion is given of privacy aspects of utilizing computers in banking

8 citations


Journal ArticleDOI
TL;DR: The author is not convinced that message encryption is workable in the context of public information services, and believes Identification of the originating station of a message by the common carrier would be valuable in protecting information services from much of the annoying "vandalism."
Abstract: Short queuiIlg delays can be re~dily tolerated. (3) Me,.sages will be typically .~hort. Many internal messages will be concerned with updating operations on distributed data bases. We argued earlier that the unit of ~tlteration will tend to be small, leading to messages that are as brief as the economics of communication will allow. (4) ~'he common carrier should be responsible for message security with significant but limited liability. The security of messages sent between information systems via the internal public network is an important and serious problem. It is much more degrading on the efficiency of data processing equipment to ascertain the validity of a mes-s~tge tlhan it is on humans. Existing systems solve the message security problem by employing leased lines. Although message encryption is a useful technique where the communicating parties are able to make prior arrangements , the author is not convinced that this is workable in the context of public information services. Identification of the originating station of a message by the common carrier would be valuable in protecting information services from much of the annoying \"vandalism.\" Conclusion Grcenburger has stated [7] that \"... it is clear that information utilities will be enterprises of considerable size.\" Yet it is not clear to which organizational entity of Table I he refers. Parkhill [8] favors \"... a structure in which the federal government and eventually the United Nations would own and operate all general-information utilities .... \" Any sizable shift toward regulated monopoly or government ownership would unavoidably rob the information industry of creativity and initiative. If we are to avoid the specter of a \"Federal Information System,\" we mu~,~t ensure an environment in which private ventures may flourish, and competition among alternatives is truly present. The issues involved are worthy of intense public discussion-to determine what actions by government are required, and when such actions would be appropriate. design of a computer for time sharing applications. Prec. Letters to the Editor-continued from Page 294 (On using a graphic input tablet) by any fast simultaneous equations algorithm. Only if two points are quite close or three lie nearly in line is there any danger of inversion error. The linear transformations required to get the image from the unit square into any rectangular portion of the display screen are trivial arid are left to the reader. While high-minded individuals debate the potential future misuse of computer-based information systems, maj …

2 citations


BookDOI
01 May 1968
TL;DR: The document points out the dangers to the privacy and reputation of individuals through uncontrolled and accelerated use of automatic and electronic data processing systems.
Abstract: : The document points out the dangers to the privacy and reputation of individuals through uncontrolled and accelerated use of automatic and electronic data processing systems.

1 citations


Journal ArticleDOI
TL;DR: By the year 2000, Americans could have computers and robots in the home-and virtually no privacy, according to the discussions of the Commission On The Year 2000.
Abstract: By the year 2000, Americans could have computers and robots in the home?and virtually no privacy. This prediction is part of the discussions of the Commission On The Year 2000, which were published in the summer issue of Daedalus, the Journal of the American Academy of Arts and Sciences.1 The implications of this technological attack on privacy are reflected in the increasing interest in the protection of this vital right. The computer-electronics industry has recognized this issue, and has addressed itself to it on many occasions, including many professional gatherings.2 Businessmen are also concerned with the inherent implications,3 and many governmental agencies are studying the possibility of controls of some type. The Federal Communications Commission, for example, has initiated a public inquiry into the computer-communications interface.4 One of the specific items of response to the FCC inquiry is ``privacy and security.''

1 citations