scispace - formally typeset
Search or ask a question

Showing papers on "Information privacy published in 1978"


Book
01 Jan 1978
TL;DR: Bloustein this article argued that group privacy is essential to a properly functioning social structure, and warned that it would be disastrous if this principle were neglected as part of an overreaction to the misuse of group confidences that characterized the Nixon era.
Abstract: In exploring a series of problems associated with privacy and the First Amendment, Bloustein defines individual and group privacy, distinguishing them from each other and related concepts. He also identifies the public interest in individual privacy as individual integrity or liberty, and that of group privacy as the integrity of social structure. The legal protection afforded each of these forms of privacy is illustrated at length, as is the clash between them and the constitutional guarantees of the First Amendment and the citizen's general right to know. In his final essay, Bloustein insists that the concept of group privacy is essential to a properly functioning social structure, and warns that it would be disastrous if this principle were neglected as part of an overreaction to the misuse of group confidences that characterized the Nixon era.

30 citations


Proceedings Article
13 Sep 1978
TL;DR: This paper discusses computer privacy and data security, which deals with the managerial procedures and technological safeguards applied to computer hardware, software, and data to assure against accidental or deliberate unauthorized access to and the dissemination of computer system data.
Abstract: Computer security deals with the managerial procedures and technological safeguards applied to computer hardware, software, and data to assure against accidental or deliberate unauthorized access to and the dissemination of computer system data. Computer privacy, on the other hand, is concerned with the moral and legal requirements to protect data from unauthorized access and dissemination. The issues involved in computer privacy are therefore political decisions regarding who may have access to what and who may disseminate what, whereas the issues involved in computer security are procedures and safeguards for enforcing the privacy decisions. The motivations for security and privacy can be found in the desire for secrecy in military affairs, for nondisclosure in industrial applications, and for information-sharing in modern society. These motivations have become particularly acute where computers are used since computers play a major and important role in processing and storing of information. This paper discusses computer privacy and data security. Other issues such as operational security, physical security, hardware security, and operating system security are discussed in [1,2,3] and will not be included here.

11 citations



Journal ArticleDOI
TL;DR: The risks and opportunities of federal involvement; problems of privacy, the gap between the information rich and the poor, and the prospect of "digital democracy" are discussed in this paper, with a focus on privacy.
Abstract: The risks and opportunities of Federal involvement; problems of privacy, the gap between the information rich and the poor, and the prospect of “digital democracy.”

5 citations


Proceedings ArticleDOI
13 Nov 1978
TL;DR: Privacy issues are discussed and topics in the security fields of cryptography, database inference and operating systems are re viewed.
Abstract: The related fields of privacy and security are examined. Privacy issues are discussed and topics in the security fields of cryptography, database inference and operating systems are re viewed.

5 citations




Journal ArticleDOI
TL;DR: An overview of the basic issues in privacy protection is presented, the implementation of privacy protection requirements are discussed, and certain special problems that arise in extending privacy protection to international data processing systems are examined.

3 citations


Proceedings Article
13 Sep 1978

2 citations


Journal ArticleDOI
01 Sep 1978
TL;DR: The right to privacy is based on a belief in the essential dignity and worth of the individual Modern technological devices along with advances in the behavioral sciences can threaten the privacy of students Fortunately, invasions of privacy in education have not been widespread However, sufficient violations have been noted to warrant specific legislation and to promote a sharp increase in attention to procedures that will ensure protection of individual privacy as mentioned in this paper.
Abstract: The right to privacy is based on a belief in the essential dignity and worth of the individual Modern technological devices, along with advances in the behavioral sciences, can threaten the privacy of students Fortunately, invasions of privacy in education have not been widespread However, sufficient violations have been noted to warrant specific legislation and to promote a sharp increase in attention to procedures that will ensure protection of individual privacy Technology that can reveal innermost thoughts and motives, or can change basic values and behaviors, must be used judiciously and only by qualified professionals under strictly controlled conditions Education involves individuals, and educational experimentation is human experimentation The educator must safeguard the privacy of students and their families

2 citations












Journal ArticleDOI
TL;DR: This work wanted to discover if, "people would be willing to take limited action to protect their privacy if they were presented with a method", and "people are generally aware of infringement on their privacy but feel helpless to stop it".
Abstract: The right to privacy is becoming one of the key issues of our times. The single biggest threat to individual privacy is the "computer data bank". It has only been since the mid-sixties that personal privacy and the computer data bank have collided. Furthermore, it has only been since the early seventies that legislation has begun to react to the expanding infringement on privacy. Even today many people are not accurately informed on the issue.My main thesis is, "people are generally aware of infringement on their privacy but feel helpless to stop it". Secondly, I wanted to discover if, "people would be willing to take limited action to protect their privacy if they were presented with a method". This is my supporting hypothesis. I combined field work, through questionnaire, with library research.This paper is divided into three parts. First I will give a relatively brief background on the privacy issue. Then I will discuss the information and work surrounding my field study. Finally, I will give my conclusions and recommendations for the future.




Proceedings ArticleDOI
13 Nov 1978
TL;DR: Implementation of privacy protection requirements involves numerous technical considerations that are discussed in this paper, which may turn out to be technically infeasible or economically unacceptable and protection provided may be largely illusory.
Abstract: Laws now in effect in the United States grant certain privacy rights to individual citizens vis-a-vis federal agencies, state government agencies in several states, and certain organizations in the private sector that maintain personal information on them in automated record-keeping systems. Pending are bills to extend privacy protection to the entire private sector. Implementation of privacy protection requirements involves numerous technical considerations that are discussed in this paper. Unless these technical aspects and their limitations are taken into account when the privacy protection requirements are legislated, implementation of the requirements may turn out to be technically infeasible or economically unacceptable and, correspondingly, protection provided may be largely illusory.