scispace - formally typeset
Search or ask a question

Showing papers on "Information privacy published in 1972"



Proceedings ArticleDOI
05 Dec 1972
TL;DR: The nearly seven years of concern with data privacy and security in computerized information systems have produced a variety of hardware and software techniques for protecting sensitive information against unauthorized access or modification, but systematic procedures for cost-effective implementation of these safeguards are still lacking.
Abstract: The nearly seven years of concern with data privacy and security in computerized information systems have produced a variety of hardware and software techniques for protecting sensitive information against unauthorized access or modification. However, systematic procedures for cost-effective implementation of these safeguards are still lacking.

24 citations




Journal ArticleDOI
TL;DR: The protection of privacy in its relation to the statistical community will be considered here only with regard to the data programs of the federal government.
Abstract: The word statistics is used in two different senses. Statistics (plural) are facts and figures (data), while statistics (singular) is a methodology for obtaining and analyzing data as a basis for decision making. In this paper I will include as members of the statistical community two groups: professional statisticians who are concerned primarily with statistics as a methodology, and users of both statistical methodology and data made available by government agencies, industrial and business concerns, university research investigations, etc. The right of individual privacy in a democracy such as ours has been interpreted in a general way as "the right to be let alone." However, with the rapid development of informational technology made possible by the invention of the electronic computer, the basic attribute of an effective right of privacy has come to mean the individual's ability to control the circulation of information relating to him. I will be concerned exclusively with this notion and attribute of privacy. The individual's ability to control information relating to him is of concern in relation to both private data programs (e.g., programs based on a credit bureau's data bank) and official data programs (e.g., programs based on federal statistics obtained from routine government operations, censuses and surveys). In order to be specific, the protection of privacy in its relation to the statistical community will be considered here only with regard to the data programs of the federal government.

3 citations



Journal ArticleDOI
TL;DR: This article seeks to describe the problems raised by what has been colourfully described as the "age of Aquariums"! and to show how one solution proposed in Britain would cope with them.
Abstract: The problems raised by what has been colourfully described as the \"age of Aquariums\"! are apparent on both sides of the Atlantic. They stem from modern man's organization of the community in which he lives: a community in which there is both information overload and, thankfully, devices and systems perhaps as important for the development of mankind as the printing press has turned out to be.2 Of these devices by far the most important (at least in the context of this article) is the computer with its enormous capacity to receive, store and correlate many different pieces of information from many places geographically scattered (in theory) anywhere in the world. In the view of the present writer these problems are not merely technical but also they raise questions of political philosophy, and of administrative, legislative and legal technique. This article seeks to describe these problems and to show how one solution proposed in Britain would cope with them.

1 citations


Book
01 Jan 1972

1 citations


Proceedings ArticleDOI
05 Dec 1972
TL;DR: In this paper, those aspects of the problem of protecting privacy and security in information systems that are special to law enforcement are singled out.
Abstract: In this paper we will single out those aspects of the problem of protecting privacy and security in information systems that are special to law enforcement.

1 citations