scispace - formally typeset
Search or ask a question

Showing papers on "Privacy software published in 1977"


Journal ArticleDOI
TL;DR: Privacy and secrecy both involve boundaries and the denial of access to others; however, they differ in the moral content of the behavior which is concealed.
Abstract: Privacy and secrecy both involve boundaries and the denial of access to others; however, they differ in the moral content of the behavior which is concealed. Privacy is consensual where secrecy is not; that is, there is a “right to privacy” but no equivalent “right to secrecy.” Those stigmatized or disadvantaged social groups who have little or no access to privacy utilize secrecy to conceal their behavior. The private family and the secret homosexual world are examples of groups which utilize privacy and secrecy, respectively.

100 citations


Journal ArticleDOI
TL;DR: The paper explores the psychological significance of preserving privacy in each of these three senses, the ways in which different kinds of research may threaten privacy in Each case, the requirements for minimizing or counteracting such threats, and the conditions under which research representing a certain degree of invasion of privacy can nevertheless be justified.
Abstract: Social and psychological research generates three kinds of concerns about invasion of participants' privacy: that public exposure of their views and actions may have damaging consequences for them; that the procedures used to elicit information may deprive them of control over their self-presentation; and that the research may probe into areas that constitute their private space, overstepping the customary boundary between self and environment. The paper explores the psychological significance of preserving privacy in each of these three senses, the ways in which different kinds of research may threaten privacy in each case, the requirements for minimizing or counteracting such threats, and the conditions under which research representing a certain degree of invasion of privacy can nevertheless be justified.

53 citations



Book ChapterDOI
TL;DR: A survey of the privacy problem as it arises in computerized personal information record-keeping systems in the United States and in other countries is analyzed.
Abstract: Publisher Summary This chapter analyzes a survey of the privacy problem as it arises in computerized personal information record-keeping systems in the United States and in other countries. Apart from discussing the electronic computer technology and its applications in personal information record-keeping systems, the chapter also examines the nature of legislative measures that have been enacted to curb potential invasions of privacy. The chapter presents a historical overview of the privacy problem from the early years of its identification to the more recent years of action to bring about effective solutions, and discusses a set of principles that form the basis of privacy protection in the United States in the enacted as well as in the still pending legislation. The technical questions that must be handled satisfactorily by organizations maintaining personal information record-keeping systems are described. The chapter also analyzes a special situation in personal information files maintained for research purposes by scientists, and the costs of privacy protection requirements.

6 citations


Journal Article

3 citations


Proceedings ArticleDOI
18 Apr 1977
TL;DR: This paper summarizes the methods available for insuring privacy and security in data bases and develops: 1) guidelines for developing a security action plan, 2) techniques for evaluating the security features of a data base system, and 3) methods for implementing effective procedural and administrative controls.
Abstract: Popular definitions of privacy and security have often been given as:Privacy-- the rights of individuals regarding the collection, storage, use and dissemination of personal information pertaining to them.Security-- the protection of data from accidental or intentional but unauthorized access, modification, destruction or disclosure. These popular definitons are largely a result of privacy protection legislation, including 1) the fair credit reporting act of 1969, 2) the family educational rights and privacy act of 1974, 3) the privacy act of 1974, 4) state privacy protection laws, and 5) the pending right of privacy act (HR1984) which is the most comprehensive, and potentially the most costly of all.As pertains to data base systems the following generalized definitions are more appropriate: Privacy-- The confidentiality of data regarding individuals, financial conditions of an enterprise, criteria for business decisions, design specifications of products, customers of an enterprise or other data which may be thought of as a corporate asset.Security-- The control of the computer information environment to accommodate information privacy through assurances that all authorized modifications are reflected and unauthorized modifications are prohibited, and accidental or intentional but unauthorized access is prohibited.This paper summarizes the methods available for insuring privacy and security in data bases and develops: 1) guidelines for developing a security action plan, 2) techniques for evaluating the security features of a data base system, and 3) methods for implementing effective procedural and administrative controls. More detail concerning these guidelines and techniques is included in Appendix A of these proceedings.

2 citations


Proceedings ArticleDOI
13 Jun 1977
TL;DR: The microprocessor was used to selectively encrypt information entered at the terminal before transmission to the host computer so that the protected information never appears in plaintext form at the hostComputer.
Abstract: This paper reports on an experiment performed by the METREK Division of The MITRE Corporation from November 1975 through August 1976. The purpose of the experiment was to determine how effectively a low cost microcomputer could provide privacy protection to a user of a time-shared computer system. The microprocessor was used to selectively encrypt information entered at the terminal before transmission to the host computer so that the protected information never appears in plaintext form at the host computer. The advantages and disadvantages of this approach along with the operational details of the experimental system are presented.

2 citations