scispace - formally typeset
Search or ask a question

Showing papers on "Privacy software published in 1976"


Journal ArticleDOI
TL;DR: It is shown that intentional resolution can be achieved, but that it involves a radical change from the traditional approach to the process of user-database interaction.
Abstract: Traditionally, privacy protection in database systems is understood to be the control over what information a given user can get from a database. This paper is concerned with another, independent, dimension of privacy protection, the control over what a user is allowed to do with a piece of information supplied to him by the database. The ability to condition the supply of information on its intended use is called here “intentional resolution” of privacy protection.The practical importance of intentional resolution is demonstrated by several examples, and its realization is discussed. It is shown that intentional resolution can be achieved, but that it involves a radical change from the traditional approach to the process of user-database interaction. In particular, it appears to be necessary for the database to impose a certain amount of control over the internal behavior of users' programs which interact with it. A model for user-database interaction which admits such a control is developed.

27 citations


Book
01 Jan 1976

26 citations


Book ChapterDOI
01 Jan 1976
TL;DR: The preservation of privacy is almost a holy cause in the United States and, indeed, it is somewhat un-American not to come to the vigorous defense of privacy.
Abstract: Invasion of privacy is decried on the streets and discussed in academic halls. The preservation of privacy is almost a holy cause in the United States and, indeed, it is somewhat un-American not to come to the vigorous defense of privacy. The other side of the coin, namely, the possible harmful effects of maintaining privacy, is less often displayed.

6 citations


Proceedings ArticleDOI
John Salasin1
07 Jun 1976
TL;DR: This model posits that data systems pose various "threats" to privacy depending on the extent and manner in which the existence of such information systems hinders the ability of individuals or groups to provide feedback to systems which affect them.
Abstract: Concerns about individual privacy, specifically in relation to automated data systems containing personal information, are considered in terms of a feedback control system model. This model provides a framework which appears to relate many separate concerns which individuals or groups have expressed about privacy. It also provides a framework which may be suitable for analyzing legislation or regulations promulgated for the protection of privacy. The model may assist in defining needed research on the need for privacy, or on the impact of inadequate protection of privacy.The model posits that data systems pose various "threats" to privacy depending on the extent and manner in which the existence of such information systems hinders the ability of individuals or groups to provide feedback to systems which affect them.

2 citations


01 Jan 1976
TL;DR: Basic CASA database training involves an interactive, hands-on 2 hour web-based training session that gives basic level instruction on how to use and access the system.
Abstract: Overview: The CASA database is ready for the next stage of implementation. Access to the system is obtained by: Attending and Completing Basic CASA database training (refresher courses are also available). This training is scheduled by OCCF and offered by the CASA database design team. Activation of a login by OCCF Web-support. CASA database training involves an interactive, hands-on 2 hour web-based training session. The sessions are limited to a maximum of 4 participants per session. The training gives basic level instruction on how to use and access the system. If you haven't done so already, you can sign up by emailing occfwebsupport@fc.state.or.us. All users MUST sign and fax back a 2h systems user agreement form and HIPAA Confidentiality Agreement. OCCF web support will activate the CASA user once all forms are signed and received by OCCF. A fax cover sheet is included in this packet.

1 citations