scispace - formally typeset
Search or ask a question

Showing papers on "Information privacy published in 1986"


Proceedings ArticleDOI
01 Nov 1986
TL;DR: In this article, the functions of the government in the CoFi85 election scheme were distributed to untrusted parties without giving up any of the previously attained properties of robustness or veriability.
Abstract: In this paper, we distribute the functions of the government in the cryptographic election scheme of [CoFi85]. In so doing, we are able to achieve privacy of individual votes in a much stronger sense without giving up any of the previously attained properties of robustness or veriability. This gives an electronic mechanism for holding a large-scale election amongst untrusted parties which is far more useful in “realworld” applications than the previous scheme.

215 citations


Proceedings ArticleDOI
07 Apr 1986
TL;DR: It is demonstrated that in fact the addition of noise may introduce quite serious biases in the responses given to user queries.
Abstract: A number of mechanisms have been proposed for protecting the privacy of individual records in statistical databases. One such method is to perturb the data by adding random noise. It has been previously thought that this method, although increasing estimation variance, produces unbiased estimates. This paper demonstrates that in fact the addition of noise may introduce quite serious biases in the responses given to user queries.

29 citations



Journal ArticleDOI
TL;DR: The Privacy Act (88 Stat. 1896; 5 U.S.C. 552a) as mentioned in this paper codifies principles of fair information use which agencies must meet in handling personal information, as well as rights for individuals who are the subjects of that information.
Abstract: All modern governments collect detailed personal information on citizens and residents, including information on financial activities, criminal charges, government subsidized loans, employment status and earnings, and, increasingly, medical treatments and costs. Such information is needed by governments to administer vast arrays of social welfare programs as well as more traditional activities of revenue collection and maintenance of law and order. Democratic governments balance their uses of personal information with requirements to be open to the people and accountable to legislatures and law, as well as with legal protections of individual privacy. In the United States, the computerization of government record systems, which began in the 1960s, drew new attention to tensions between individuals' interests in the privacy of personal information and the federal government's collection and use of such information. Policy debates within Congress, executive agencies, and other interested groups centered on questions about the meaning of privacy, the impact of computers, and the formalization of relations between individuals and agencies. In 1974, Congress passed the Privacy Act (88 Stat. 1896; 5 U.S.C. 552a) codifying principles of fair information use which agencies must meet in handling personal information, as well as rights for individuals who are the subjects of that information. To ensure agency compliance with these principles, the Act enables individuals to bring civil and criminal suits if information is willfully and intentionally handled in violation of the Act. Now, at least two generations of information technology have become available to federal agencies, offering new means for improving the effectiveness and efficiency of data collection and program management, but also undermining the goal of the Privacy Act to protect individuals by controlling information about them.

19 citations


Proceedings ArticleDOI
02 Nov 1986

14 citations


Proceedings ArticleDOI
05 Feb 1986
TL;DR: The technique is applied to the 1980 U.S. Census Database and is found to be effective as a compromise tool and may be able to identify high privacy risk databases, and possibly to reduce that degree of risk.
Abstract: Statistical databases seek to provide accurate aggregate information to legitimate users, while protecting the confidentiality of individuals' information. This study develops, defines, and applies a statistical technique for the compromise of confidential information in a statistical database. Attribute Correlational Modeling (ACM) recognizes that the information contained in a statistical database represents real world statistical phenomena. As such, ACM utilizes the correlational behavior existing among the database attributes in order to compromise confidential information. The technique is applied to the 1980 U.S. Census Database and is found to be effective as a compromise tool. The contribution of the study is additional knowledge of the degree of security of confidential statistical databases. Knowledge of additional threats to security may lead to the eventual ability to identify high privacy risk databases, and possibly to reduce that degree of risk.

12 citations


Journal ArticleDOI
TL;DR: In this paper, a review of accelerating trends in the development and distribution of information is presented, arguing that the promises of the information age and the "television of abundance" brings not the emancipation of diversity, but the rapid disintegration of an already weakened right to privacy that threatens the very foundations of participatory democracy.
Abstract: This essay reviews accelerating trends in the development and distribution of information. It argues that the promises of the information age and the “television of abundance” brings not the emancipation of diversity, but the rapid disintegration of an already weakened right to privacy that threatens the very foundations of participatory democracy. After reviewing emerging technologies for the delivery of information and entertainment, this article examines the dramatically improved technology for combining information from a variety of diverse sources to construct models of audience segments which are then used for the delivery of specialized propaganda. Contemporary privacy law, as well as regulations agreed to as part of cable franchise agreements, are seen to be inadequate because of their limited scope. While the increase in public concern with privacy is portrayed as positive, the tendency of privacy protections to focus on “individually identifiable information” is seen as ignoring trends in the co...

12 citations


01 Jan 1986
TL;DR: The right of privacy in the United States was recognized as a fundamental human right in the early 1890s as discussed by the authors, however, there was no compelling call for a sector in the law that recognized privacy as one of these basic rights and the need to protect it legally.
Abstract: THE GOVERNANCE OF THE United States is founded on the principle of individualism-a recognition of the basic rights of human beings. Prior to 1890, however, there was no compelling call for a sector in the law that recognized the “right of privacy” as one of these basic rights and the need to protect it legally. There were, of course, many elements in laws governing the United States that dealt with aspects of social behavior which might result in the loss or dimunition of an individual’s privacy, but they were not contained in the law under the rubric “privacy.” An understanding of the development of privacy in tort law may aid in thinking about the growing problems of dealing with the right of privacy, if it exists, in the new information age. The language of discontent seems endemic in American society. It led to the Revolution, and in recent years inflamed many individuals and groups to engage in civil disobedience, to test laws deemed averse to individualism and to demand legal protection in the face of actual or potential offensive inroads by government agencies on the individuals’ alleged right to be let alone. The language is strident and repeatedly reported in the news media. Hence it would seem unusual to think that the existence of a right to be let alone should ever be questioned and yet it has been. In part the argument is an issue of legal philosophy. In part, also, the issue is raised by the conflict between the proponents of the utility of the new computer-telecommunications technologies and those who fear the potential for these technologies to invade or reduce

10 citations



01 Dec 1986
TL;DR: The authors discusses broad perspectives an historical trends on worker monitoring and current work-evaluation monitoring, and describes a variety of federal-agency monitoring practices. But they focus on worker evaluation.
Abstract: This report discusses broad perspectives an historical trends on worker monitoring,and current work-evaluation monitoring. It also describes a variety of federal-agency monitoring practices.

9 citations


Journal ArticleDOI
TL;DR: In the case of population-based health research disclosure of patient information without the explicit patient consent should be seriously considered and this disclosure should only be permitted if an institutional board has studied the project plans of the investigators and has carefully watched the privacy aspects of their studies.

01 Jan 1986
Abstract: INFORNATION to all living organisms. How we use that IS INTEGRAL information determines how we live and function and how our societies evolve. Information is essential to the operation and survival of national governments. Each nation has information policies that are supported by a web of laws, administrative regulations, customs, and beliefs. Within the past quarter century, many nations have developed increasingly explicit and restrictive information policies that are implemented in order to maintain their own political, cultural, and economic status. To understand the reasons for the formation and implementation of a specific nation’s information policy we must, among other things, acquire a broad view of that nation’s history and traditions. In short, we must know the context out of which specific policies arise. But this knowledge alone will not be sufficient. Nations do not make information policies based solely on their own history and values. A nation’s information policy is also made in response to and in anticipation of other nations’ information policy; prevailing economic, social, and political conditions; and the current state of technology. In this overview we will explore the broader context from which information policies emerge by describing the important factors affecting information policy-making. First we will review the evolution and application of copyright law and the regulations affecting media and

Patent
23 Dec 1986
TL;DR: In this paper, the authors propose to convert a privacy information part to other information having no contradictory feeling and output by providing an output change part for changing the privacy information to the information of superordinate concept having no secrecy.
Abstract: PURPOSE: To convert a privacy information part to other information having no contradictory feeling and output by providing an output change part for changing the privacy information to the information of superordinate concept having no secrecy when the privacy information is included in a document designated in an input part. CONSTITUTION: A management part 1 reads the document designated through the input part 2 from a document storing part 3, examines whether the privacy information is included or not in the read document and feeds the read document directly to an output part 7 when the privacy information is not included in the document. When the privacy information is included in the document, a reading decision part 5 decides whether the qualification of a reader is complete or not from an inputted password through the input part 2 and directly outputs the read document when the qualification is complete. When the qualification is not complete, the output change part 6 changes the privacy information part to the information of the high-order concept having no secrecy, and outputs. In such a way, its own document has to contradictory feeling but the natural document high in the secrecy can be outputted. COPYRIGHT: (C)1988,JPO&Japio


01 Jan 1986
TL;DR: In this paper, Przuacy is used here to encapsulate the broad social value of privacy in the context of government data collection, use, and disclosure of information on identifiable individuals.
Abstract: THECONTINUOUS TENSION BETWEEN bureaucratic values and democratic control has been complicated in recent years by the rapid development of information technology and by its application to the agencies of government. As sophisticated computer and communications equipment has been introduced into public agencies, so information has become far easier to collect, store, manipulate, and disseminate. On the one hand, this has enhanced the management, decision-making, and analytical capabilities of governmental organizations. However, the advantages that contemporary data-processing techniques have brought are offset by certain dangers. In particular, the immense capability to control vast quantities of personal information on individual citizens has generated a worldwide concern about the potential for bureaucratic surveillance and about the consequent erosion of personal privacy. The gradual realization of these dangers over the last twenty years has motivated most Western democracies to provide a policy response in the form of “privacy” or “data-protection” laws. Data-protection laws are confined to that aspect of privacy protection that arises from the collection, use, and disclosure of information on identifiable individuals. Przuacy is used here to encapsulate the broad social value ra ther than

Journal ArticleDOI
Willis H. Ware1
TL;DR: The future world will be so tightly stitched together by its information threads that a combination of approaches to protecting privacy will be essential.

Book ChapterDOI
01 Jan 1986
TL;DR: An extended critique of fear that computers are a threat to privacy and the argument is that although computers will, in fact, do away with privacy, privacy is not the absolute value it is often thought to be.
Abstract: An extended critique of fear that computers are a threat to privacy. The argument is that although computers will, in fact, do away with privacy, privacy is not the absolute value it is often thought to be. The destruction of privacy will not create an inhuman but a more humane society.


Journal ArticleDOI
TL;DR: One of the greatest challenges facing today's automated business is the protection of data, one often-ignored aspect of which is privacy of information.
Abstract: One of the greatest challenges facing today's automated business is the protection of data, one often-ignored aspect of which is privacy of information. Because data exists in many forms on many types of media, managers must be familiar with the threats to privacy and must implement security controls that are adequate against all types of risk.

Book ChapterDOI
01 Jan 1986
TL;DR: The Open System Interconnection standard describes a model for communication among application processes at different computer installations (formalised as “open systems”) and possible ancilliary services provide security such as: user authentication, data privacy, data authentication, access control, protection against forgery and repudiation.
Abstract: The Open System Interconnection standard (ref1) describes a model for communication among application processes at different computer installations (formalised as “open systems”). Possible ancilliary services provide security such as: user authentication , data privacy, data authentication, access control, protection against forgery and repudiation. Work is going on at present in standards committees to produce a security appendix to the OSI model. OSI security services and protocols should then follow.






Journal ArticleDOI
John D. McCamus1
TL;DR: In this article, the authors compare the approaches taken in federal legislation in Canada and the U.S. and conclude that the former scheme permits undue sensitivity to privacy protection concerns to undermine the access scheme.

Journal Article
TL;DR: In this article, the authors argue that based on precedents set with the regulation of radio and television, technologically uninformed government officials are passing laws without adequate attention to First Amendment freedoms and civil liberties.
Abstract: DECISIONS BEING MADE NOW have the potential of creating a society in which all forms of communications are free or a society in which restrictions on access to information are imposed by legislators and other government officials. Unfortunately, based on precedents set with the regulation of radio and television, technologically uninformed government officials are passing laws without adequate attention to First Amendment freedoms and civil liberties.


Book
01 Jan 1986
TL;DR: The dallaspinballproject.com as discussed by the authors is a free e-book search engine for audiobooks, including classics and out-of-print books, with easy to navigate interface.
Abstract: The dallaspinballproject.com is your search engine for PDF files. Open library is a high quality resource for free e-books books.It is known to be world's largest free Books platform. You can easily search by the title, author and subject.Our collection is of more than 150,000 free Books.The dallaspinballproject.com is home to thousands of free audiobooks, including classics and out-of-print books. We have designed the website with easy to navigate interface.

26 Sep 1986
TL;DR: In this paper, the history of monitoring work and the legal framework which applies to employee privacy rights and associate4d issues of worker protection are described and discussed. But the authors do not discuss the role of the third party in monitoring work.
Abstract: This report describes the history of monitoring work and the legal framework which applies to employee privacy rights and associate4d issues of worker protection