scispace - formally typeset
Search or ask a question

Showing papers on "Information privacy published in 1988"


Journal ArticleDOI
TL;DR: The legal and legislative compromises have been reached in order to address differing goals, and what forms future privacy issues may take as mentioned in this paper, focusing first on the political origins of the USA's current laws governing privacy and the telephone, then on novel privacy issues arising out of new telecommunications technologies.

17 citations


Journal ArticleDOI
TL;DR: Our information societies are evolving into surveillance societies, as we near the year 2000 The various automated databases now in existence make possible fairly integrated monitoring of individuals in Western countries The proliferation of such information banks in both the public and private sectors, rather than the existence of any single one of them, poses the fundamental challenge to privacy interests.

13 citations


Journal ArticleDOI
TL;DR: The production of social statistics has been challenged in certain West European nations by the “privacy issue” and those responsible for statistical data have traditionally safeguarded their records, but have had to deal with the sociopolitical environment through legislative liaisons, lawyers, and advertising agencies.
Abstract: The production of social statistics has been challenged in certain West European nations by the “privacy issue.” Privacy advocates contend thatcomputerized data files containing information about individuals endanger personal privacy and other civil liberties. The privacy issue has taken two forms: anti-census campaigns and data protection systems. Although those responsible for statistical data have traditionally safeguarded their records, they areoften drawn into this issue. Increasingly, they have had to deal with the sociopolitical environment through legislative liaisons, lawyers, and advertising agencies. They have also had to revise data collection and processing procedures. In some situations, they have had to suspend censuses and surveys.

7 citations


Journal ArticleDOI
01 Mar 1988
TL;DR: It is concluded that new computer and telecommunications applications have undermined the goal of the Act that individuals be able to control information about themselves.
Abstract: This article examines the technological changes that have occurred in information processing since the passage of the Privacy Act in 1974 and concludes that new computer and telecommunications applications have undermined the goal of the Act that individuals be able to control information about themselves.

6 citations



Proceedings ArticleDOI
12 Dec 1988
TL;DR: The progress of work at University College of London in implementing a prototype model of a privacy-enhanced messaging (PEM) system is reported and several potential refinements to the model are suggested for future development.
Abstract: The progress of work at University College of London in implementing a prototype model of a privacy-enhanced messaging (PEM) system is reported. The design of model is specified by the DARPANET IAB Privacy Task Force RFC 1040. The model is one which provides privacy, integrity, and authentication of messages transmitted in a typical electronic-mail system. The design and implementation experience of the prototype model is set out and several potential refinements to the model are suggested for future development. >

4 citations



Journal ArticleDOI
TL;DR: There no longer exists the freedom to refuse public information concerning personal data, but rather the freedom resides in the ability to control the use made of personal data inserted in a computer program.

3 citations




Proceedings ArticleDOI
01 Jan 1988
TL;DR: The results of a survey designed to determine the relative importance of some of the most important information management issues are reported in this paper, where the survey technique is described, and the issues that emerged are discussed.
Abstract: The results are reported of a survey designed to determine the relative importance of some of the most important information management issues. The survey technique is described, and the issues that emerged are discussed. >

Journal ArticleDOI
TL;DR: It is essential that the larger issue of the establishment of a de facto national database, containing personal information on most Americans, be addressed.


Journal ArticleDOI
TL;DR: In this paper, the authors explore some ways in which the study of open government and privacy protection can be brought more firmly into the mainstream of investigation and teaching by students of politics and public administration.
Abstract: The purpose of this article is to explore some ways in which the study of open government and privacy protection can be brought more firmly into the mainstream of investigation and teaching by students of politics and public administration. 1 It should not be surprising that open government and pri vacy protect i on be cons i dered together. In a previous article on open government in this journal, Michael Hunt rightly included, but did not elaborate upon, the question of individuals' right to inspect personal files held on them by the government. 2 There are important conceptual and practi ca 1 reasons for look i ng joi nt 1 y at open government and privacy protection. On a conceptual level, they both concern information and its role in political, governmental and social 1 ife. Information is the nodal concept, and both subjects are about information flows and the rules, laws, controls, powers, and conflicts concerning these flows. Some writers subsume the two subjects under the label 'information law': a set of rules and practices concerning information handling, particularly in an age of information/communication technology. In view of our particular interests in policy-making and public administration, perhaps we should alter this term to 'information policy', still embracing both subjects.


Journal ArticleDOI
TL;DR: The evolution of data protection laws within countries and international organizations that have enacted such laws are discussed, and the scope, major provisions, and enforcement components of the laws are compared.
Abstract: This is the second of three articles addressing the critical issue of abusive data collection and usage practices and their effect on personal privacy. The first article, which appeared in consecutive issue 17 of Library Hi Tech, discussed the individual under assault. This article discusses the evolution of data protection laws within countries and international organizations that have enacted such laws, and compares the scope, major provisions, and enforcement components of the laws.

Proceedings ArticleDOI
R.R. Henning1
12 Dec 1988
TL;DR: An overview of the database security requirements for both the private and government sectors is presented and it is concluded that both sectors require database management systems capable of supporting secrecy and integrity policies.
Abstract: An overview of the database security requirements for both the private and government sectors is presented. It is concluded that both sectors require database management systems (DBMSs) capable of supporting secrecy and integrity policies. However, the government counts secrecy as the more important consideration because its data affects the lives and privacy of every citizen. The private sector considers integrity considerations more important because corrupt data undermines corporate strategies. The primary difference between the two sectors is that a global policy for secrecy in the government sector was well-established before computers came along, and that a similar global integrity policy has never truly existed. In the private sector, individual integrity policies for corporations are a fact of life. Corporate secrecy policies are enforced through physical security measures. The difference between the two sectors is one of scale, not requirements. >