scispace - formally typeset
Search or ask a question

Showing papers on "Information privacy published in 1977"


Journal ArticleDOI
TL;DR: Privacy and secrecy both involve boundaries and the denial of access to others; however, they differ in the moral content of the behavior which is concealed.
Abstract: Privacy and secrecy both involve boundaries and the denial of access to others; however, they differ in the moral content of the behavior which is concealed. Privacy is consensual where secrecy is not; that is, there is a “right to privacy” but no equivalent “right to secrecy.” Those stigmatized or disadvantaged social groups who have little or no access to privacy utilize secrecy to conceal their behavior. The private family and the secret homosexual world are examples of groups which utilize privacy and secrecy, respectively.

100 citations


Journal ArticleDOI
TL;DR: The paper explores the psychological significance of preserving privacy in each of these three senses, the ways in which different kinds of research may threaten privacy in Each case, the requirements for minimizing or counteracting such threats, and the conditions under which research representing a certain degree of invasion of privacy can nevertheless be justified.
Abstract: Social and psychological research generates three kinds of concerns about invasion of participants' privacy: that public exposure of their views and actions may have damaging consequences for them; that the procedures used to elicit information may deprive them of control over their self-presentation; and that the research may probe into areas that constitute their private space, overstepping the customary boundary between self and environment. The paper explores the psychological significance of preserving privacy in each of these three senses, the ways in which different kinds of research may threaten privacy in each case, the requirements for minimizing or counteracting such threats, and the conditions under which research representing a certain degree of invasion of privacy can nevertheless be justified.

53 citations



Journal ArticleDOI
TL;DR: In this paper, the status of personnel psychology with regard to its concern with issues of individual privacy and reviews legislative activities in the privacy area relevant to the profession is examined, arguing that both personnel psychologists and the legislative sector have taken a narrow view of privacy, one that ignores the broader aspects of employee and applicant attitudes toward selection and assessment procedures and the impact of these procedures on individual privacy.
Abstract: This article examines the status of personnel psychology with regard to its concern with issues of individual privacy and reviews legislative activities in the privacy area relevant to the profession. It is argued that both personnel psychologists and the legislative sector have taken a narrow view of privacy, one that ignores the broader aspects of employee and applicant attitudes toward selection and assessment procedures and the impact of these procedures on individual privacy. Within this broader perspective, some research and practice needs are considered, as well as factors mitigating attention to these issues by the personnel psychologist.

24 citations


Journal ArticleDOI
TL;DR: In this article, the authors define a definition of the right to privacy and develop some general reasons for protecting the right of privacy in the context of values education, and establish general criteria for judging the extent to which values education curricula violate privacy.
Abstract: Values education is occasionally attacked as violative of the privacy rights of students and others. Stipulating a definition of the right to privacy, the author develops some general reasons for protecting the right to privacy. General criteria for judging the extent to which values education curricula violate privacy are established and applied to two approaches to values education. One conclusion is that not all approaches to values education should be seen as violative of privacy rights.

14 citations



Journal ArticleDOI
TL;DR: In this paper, the authors examined the United States Supreme Court's decisions in cases whose determinations rested on assumptions about the psychological dimensions of privacy and found that the Court and lawyers failed to appropriately define privacy and utilize social science theory and data.
Abstract: A rational system of justice requires consistent scientific input. As part of a project to understand how social science knowledge can be incorporated into the legal process, decisions of the United States Supreme Court were examined in cases whose determinations rested on assumptions about the psychological dimensions of privacy. It was found that the Court and lawyers failed to appropriately define privacy and utilize social science theory and data. Suggestions to remedy the gap between law and social science are discussed.

12 citations


Journal ArticleDOI
TL;DR: Professor Vuori's paper, first presented at the fourth Medico-legal Conference in Prague in the spring of this year, deals with the problem of the maintenance of confidentiality in computerized health records.
Abstract: Professor Vuori's paper, first presented at the fourth Medico-legal Conference in Prague in the spring of this year, deals with the problem of the maintenance of confidentiality in computerized health records. Although more and more information is required, the hardware of the computer systems is so sophisticated that it would be very expensive indeed to 'break in' and steal from a modern data bank. Those concerned with programming computers are becoming more aware of their responsibilities concerning confidentiality and privacy, to the extent that a legal code of ethics for programmers is being formulated. They are also aware that the most sensitive of all relationships--the doctor-patient relationship--could be in danger if they failed to maintain high standards of integrity. An area of danger is where administrative boundaries between systems must be crossed--say between those of health and employment. Protection of privacy must be ensured by releasing full information about the type of data being stored, and by maintaining democratic control over the establishment of information systems.

9 citations


Book ChapterDOI
TL;DR: A survey of the privacy problem as it arises in computerized personal information record-keeping systems in the United States and in other countries is analyzed.
Abstract: Publisher Summary This chapter analyzes a survey of the privacy problem as it arises in computerized personal information record-keeping systems in the United States and in other countries. Apart from discussing the electronic computer technology and its applications in personal information record-keeping systems, the chapter also examines the nature of legislative measures that have been enacted to curb potential invasions of privacy. The chapter presents a historical overview of the privacy problem from the early years of its identification to the more recent years of action to bring about effective solutions, and discusses a set of principles that form the basis of privacy protection in the United States in the enacted as well as in the still pending legislation. The technical questions that must be handled satisfactorily by organizations maintaining personal information record-keeping systems are described. The chapter also analyzes a special situation in personal information files maintained for research purposes by scientists, and the costs of privacy protection requirements.

6 citations


Journal ArticleDOI
TL;DR: The individual's “right to privacy,” “privilege” and its exceptions, and examples of court decisions related to these issues are discussed.
Abstract: Conflict between the individual's “right to privacy” and the public's “right to know” is increasing as insurance companies and other third parties are demanding more information about patients and clients and data banks are storing it for retrieval and later use. Social workers are ethically bound to protect the privacy of their relationships with patients and clients and the confidentiality of their communications. But there are situations in which the obligation to society is deemed greater than the individual's right to privacy, and even in states in which their patients' and clients' communications are granted privilege by law, the social worker can be required by law to divulge confidential information or risk being held in contempt of court. This paper will discuss the individual's “right to privacy,” “privilege” and its exceptions, and present examples of court decisions related to these issues.

5 citations




Journal ArticleDOI
TL;DR: Privacy is a problem of many dimensions, even for the limited context in which this conference will examine it, but one set in a much broader information policy issue.
Abstract: : Privacy is a problem of many dimensions, even for the limited context in which this conference will examine it. It is a complex issue, but one set in a much broader information policy issue.

Journal ArticleDOI
TL;DR: For instance, the authors assesses the evidence underlying this generalization, describes a recent urban mass media campaign that did apparently make a difference in public opinion and discusses why media campaigns can sometimes be effective.
Abstract: I Joseph Klapper. 77w Eflecrr of Mass Communicorion (New York: The Free P m . IW). 1 Herbert H. Hyman and Paul 6. Shcatrley. \"Some Reasons Why Information Campaigns Fail.\" Public Opinion Quurrerly. I1:412423(1947). 'The clauic work on laboratory communication cxperimenu is Carl 1. Hovhnd. Irving L. Janis and H.H. Kellcy. Commwicorwn and Persuasion (New Haven. Connecticut: Yak University P m . 1953). For an attempt t o synthesize the laboratory suarun with the field failures. see Carl 1. Hovland. 'Reconciling Conflicting Results Derived from ExprimcnUl and Survey Studies of Attitude Change.\" AmerLon Psychologirl. 148-17 (1959). Evaluations of corporate adveniaing a m p i g n a typiuUy lack one or more of the following mcthodobgical c h c n u : bcfore-md-after measure mcnts. prohability sample. or purely field uttingb Src. for instance. Roben C. Gnu. David W. Bartg+a and Jeffrey L. Pcich. 'Measuring Corporate Image Ad Effects,\" Journal ofAdwriising Research, 12,615-22 (1972). 'Shirley A. S u r and Hekn M. Hughes. 'Report on an Edualiorvl ampaign: Thc Cincinnati Plan for the United Naliona.\" Amnicm Joumol ofSociolo#y. 55:3894Ml(1950). Klapper, in The Effects of Mass Communications', says no, and two prominent public opinion scholars explained why back in 1947.2 This article assesses the evidence underlying this generalization, describes a recent urban mass media campaign that did apparently make a difference in public opinion and discusses why media campaigns can sometimes be effective. Although there have been numerous laboratory tests of various communications' persuasive and informational impact-many of which have yielded positive results-there are very few before-and-after sample-survey assessments of mass media campaign effects.) Indeed, when one seeks out the empirical basis for the conclusion that mass media campaigns do not make a difference, about all there is to be found is one study: an evaluation of the 19471948 United Nations campaign in Cincinnati.4 There also have been a few mass media campaigns that have reported an impact, although all of them occurred in smaller cities. An evaluation of a


Proceedings ArticleDOI
18 Apr 1977
TL;DR: This paper summarizes the methods available for insuring privacy and security in data bases and develops: 1) guidelines for developing a security action plan, 2) techniques for evaluating the security features of a data base system, and 3) methods for implementing effective procedural and administrative controls.
Abstract: Popular definitions of privacy and security have often been given as:Privacy-- the rights of individuals regarding the collection, storage, use and dissemination of personal information pertaining to them.Security-- the protection of data from accidental or intentional but unauthorized access, modification, destruction or disclosure. These popular definitons are largely a result of privacy protection legislation, including 1) the fair credit reporting act of 1969, 2) the family educational rights and privacy act of 1974, 3) the privacy act of 1974, 4) state privacy protection laws, and 5) the pending right of privacy act (HR1984) which is the most comprehensive, and potentially the most costly of all.As pertains to data base systems the following generalized definitions are more appropriate: Privacy-- The confidentiality of data regarding individuals, financial conditions of an enterprise, criteria for business decisions, design specifications of products, customers of an enterprise or other data which may be thought of as a corporate asset.Security-- The control of the computer information environment to accommodate information privacy through assurances that all authorized modifications are reflected and unauthorized modifications are prohibited, and accidental or intentional but unauthorized access is prohibited.This paper summarizes the methods available for insuring privacy and security in data bases and develops: 1) guidelines for developing a security action plan, 2) techniques for evaluating the security features of a data base system, and 3) methods for implementing effective procedural and administrative controls. More detail concerning these guidelines and techniques is included in Appendix A of these proceedings.





01 Jun 1977
TL;DR: The influence of privacy legislation in the following areas was considered: Management, Data: Accuracy and Flow, Hardware, Software and Cost, certain recommendations for implementation of legislative requirements and problems created by existing regulations are discussed.
Abstract: : This thesis researched the effect major legislation in the area of individual privacy has on the computer industry Definitions and current legislation are discussed Specifically, the influence of privacy legislation in the following areas was considered: Management, Data: Accuracy and Flow, Hardware, Software and Cost Certain recommendations for implementation of legislative requirements and problems created by existing regulations are discussed (Author)