scispace - formally typeset
Search or ask a question

Showing papers on "Information privacy published in 1990"


Journal Article
TL;DR: A restricted access theory of privacy is developed and defended in this article, which is based on the nonintrusion theory and the freedom to act theory, but is open to counterexamples.
Abstract: The concept of privacy is a widely accepted legal and moral notion but has uncertain legal and philosophical foundations. Prominent legal accounts, such as the nonintrusion theory and the freedom to act theory, are inadequate. The control of information theory and the undocumented personal knowledge theory are philosophically better accounts but are open to counterexamples. A restricted access theory of privacy is developed and defended

83 citations



Book
03 Jan 1990

30 citations


Proceedings ArticleDOI
02 Dec 1990
TL;DR: The initial design of SuperForms, an automated system for designing, filling out, routing, and tracking business forms, is described, and the security-enhanced features include user authentication and encryption for privacy.
Abstract: The initial design of SuperForms, an automated system for designing, filling out, routing, and tracking business forms, is described. SuperForms is shown to be able to: create high-quality screen images for blank forms from paper copies by scanning and image processing; fill out forms quickly and accurately using an interactive user interface that includes error checking, help menus, user profiles, and automated calculations; use public-key cryptography to append multiple digital signatures to forms; route and track forms through a network; add annotations; and to receive automatic reminders when action on forms is due. The security-enhanced features include user authentication and encryption for privacy. >

13 citations



Journal ArticleDOI
TL;DR: This Note explores the privacy concerns arising out of the collection and retention of extremely personal information in a central database.
Abstract: Genetic identification tests -- better known as DNA profiling -- currently allow criminal investigators to connect suspects to physical samples retrieved from a victim or the scene of a crime. A controversial yet acclaimed expansion of DNA analysis is the creation of a massive databank of genetic codes. This Note explores the privacy concerns arising out of the collection and retention of extremely personal information in a central database. The potential for unauthorized access by those not investigating a particular crime compels the implementation of national standards and stringent security measures.

9 citations


Proceedings ArticleDOI
07 May 1990
TL;DR: The basics of privacy protection, examples of the new technologies, and the need for new privacy laws are discussed.
Abstract: Information privacy deals with protecting individuals against potential violations of their rights due to collection, storage, and use of personal information by the government and private sector organizations. The privacy protection laws enacted in the 1970s are inadequate and limited in scope. New applications of computer-communications technology involving personal information are now emerging for the decade of the 1990s and create new potentials for privacy violations. The basics of privacy protection, examples of the new technologies, and the need for new privacy laws are discussed. >

8 citations


Journal Article

6 citations


Book
01 Apr 1990
TL;DR: A carefully researched revision of an earlier edition of "Your Right to Privacy" documents the major assaults on privacy that have occurred since the advent of the computer age as mentioned in this paper. But weak privacy laws give us very little control over who sees those records.
Abstract: This carefully researched revision of an earlier edition of "Your Right to Privacy "documents the major assaults on privacy that have occurred since the advent of the computer age. Now our activities are recorded and the data stored in huge computer systems operated by corporations and government agencies, but weak privacy laws give us very little control over who sees those records. They explore privacy issues in connection with electronic surveillance results; drug and AIDS testing and polygraph tests; and government and private sector use of personal data, including bank, medical, employee, credit, video store, library, and social service records. A special chapter explains how private investigators gain access to personal records.

6 citations


Journal ArticleDOI
TL;DR: The current Australian legal, administrative and professional standards for individual rights to confidentiality and privacy of health records are examined and guidance is offered for the use of personal information in research.
Abstract: The current Australian legal, administrative and professional standards for individual rights to confidentiality and privacy of health records are examined and guidance is offered for the use of personal information in research. The implications of recently introduced privacy legislation for the conduct of research in Australia are discussed. Acquired immunodeficiency syndrome (AIDS) is cited as an example of the complex issues which face researchers and administrative bodies in balancing the privacy rights of individuals and the broader public interest.

6 citations


07 Nov 1990
TL;DR: The treatment of non-poor patients in hospitals creates a conflict between the privacy expectations of the patients and the historical traditions and administrative convenience of the hospital, and one possible solution includes consensus standards for data privacy.
Abstract: The treatment of non-poor patients in hospitals creates a conflict between the privacy expectations of the patients and the historical traditions and administrative convenience of the hospital. Resolution of this problem requires a sophisticated theory of privacy, and one possible solution includes consensus standards for data privacy.



Proceedings Article
07 Nov 1990
TL;DR: The treatment of non-poor patients in hospitals creates a conflict between the privacy expectations of the patients and the historical traditions and administrative convenience of the hospital as discussed by the authors, which requires a sophisticated theory of privacy, and one possible solution includes consensus standards for data privacy.
Abstract: The treatment of non-poor patients in hospitals creates a conflict between the privacy expectations of the patients and the historical traditions and administrative convenience of the hospital. Resolution of this problem requires a sophisticated theory of privacy, and one possible solution includes consensus standards for data privacy.



Proceedings ArticleDOI
R.R. Liebscher1
02 Dec 1990
TL;DR: It is shown that several countries follow different marketing strategies for the introduction of pan-European ISDN, and a summary of installations and planned international ISDN connectivity for the various countries is presented.
Abstract: The integrated services digital network (ISDN) is considered to be very important for the integration of the European community. The various actions taken to achieve the pan-European ISDN are described. It is shown that several countries follow different marketing strategies for the introduction. These strategies are characterized for France, Germany, and other European countries, and a summary of installations and planned international ISDN connectivity for the various countries is presented. >

Proceedings ArticleDOI
02 Dec 1990
TL;DR: It is concluded that this approach provides a practical basis for network security for unclassified but sensitive traffic for commercial, government, and military users.
Abstract: Requirements for secure communication measures which have been brought about by fundamental changes in communication networks are outlined A security architecture and protocols that offer an efficient and effective security solution for military and commercial applications are discussed An implementation of this architecture, intended to secure information in X25 data networks, is described It is concluded that this approach provides a practical basis for network security for unclassified but sensitive traffic for commercial, government, and military users >



Journal ArticleDOI
TL;DR: The clash of moralities between the right to privacy, the need to know and FOI legislation is explored and it is explored that it is impossible to sum up in a formula a single correct approach to the political and social issues involved in access to information.
Abstract: Examines the impact of technology, particularly information technology (including mechanisms such as eavesdropping devices), on privacy and on freedom of access to information. Reviews the evolution of the concept of privacy, particularly the legal aspect.The clash of moralities between the right to privacy, the need to know and FOI legislation is explored “…it is impossible to sum up in a formula a single correct approach to the political and social issues involved in access to information.”This paper was originally delivered at a plenary session of the First National Conference of ALIA in Perth WA in October 1990. It is reproduced here with the kind permission of the author, and of the Conference Organisers.

01 Jan 1990
TL;DR: The primary purpose of this report is to create a greater awareness of the current lack of personal information privacy and of how the government allows (and in some cases encourages) abuses ofpersonal information to occur.
Abstract: Financial records, medical records, corporate personnel files, police records, and many other types of data are kept: on most Americans and are stored in computerized systems. The potential of misuse of the information stored on these systems has caused concern in the minds of some. Unfortunately, the abuse of t:his information already occurs in very real and farreaching ways. Improper employment pract:ices. dissemination of personal information, and even surveillance of private citizens through the abuse of these systems have become all-tao-common event:s in America today. This paper studies bot:h the pot:ential for information abuse and cases where abuses of this sort already occur. Possible solut:ions to this problem, as suggested by various aut:horities, are also surveyed. The primary purpose of this report is to create a greater awareness of the current: lack of personal information privacy. This paper was derived from a class project for CS 590s, taught by Professor Eugene Spafford at Purdue Universit:y in the Spring of 1990. Introduction Financial records, medical records, corporate personnel files, police records, and many other types of data are kept on most Americans and are stored in computerized systems. The potential of misuse of the information stored on thes.e systems has caused concern in the minds of some. Unfortunately, the abuse of tllis information already occurs in very real and far-reaching ways. Improper employment practices, dissemination of personal information, and even surveillance of private citizens through the abuse of these systems have become all-too-common event.s in America today. There is a need for great.er awareness of t.his problem and of how the government allows (and in some cases encourages) abuses of personal information to occur. Once one understands the problem, then one can attempt to find a solution, if indeed a solution exists.

Proceedings ArticleDOI
21 Oct 1990
TL;DR: It is concluded that new communication technologies will have far reaching effects in the success of corporations in an information-intensive environment and business strategists need to comprehend the capabilities of emerging communication systems in order to deal effectively with the issues of privacy and information security.
Abstract: The authors emphasize the need to formulate strategies to exploit the wide-ranging services offered by these systems. It is pointed out that information transfer and manipulation are increasingly becoming the key factor in successful business decisions. As information becomes extremely valuable, it becomes pertinent to have a long-term strategy for information technology, and to ensure that it adapts well to the corporate objectives and culture. It is concluded that new communication technologies will have far reaching effects in the success of corporations in an information-intensive environment. Business strategists need to comprehend the capabilities of emerging communication systems in order to deal effectively with the issues of privacy and information security. >