U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

PRIVACY AND COMPUTERS - BIBLIOGRAPHY - 1969-1978

NCJ Number
63905
Author(s)
S DEIGHTON
Date Published
1978
Length
93 pages
Annotation
APPROXIMATELY 250 CITATIONS OF MATERIALS PUBLISHED FROM 1969-1978 ON THE USE OF COMPUTERS FOR STORAGE OF CONFIDENTIAL OR PERSONAL INFORMATION ARE GIVEN IN THIS BIBLIOGRAPHY.
Abstract
INCREASED INFORMATION GATHERING IN BOTH THE PRIVATE AND GOVERNMENT SECTORS HAS ENCHANCED THE POSSIBILITY OF INVADING PERSONAL PRIVACY. COMPUTERS DID NOT CREATE THIS PROBLEM, BUT THEY DO FACILITATE THE MANIPULATION OF DATA, THEREBY MAKING MISUSE EASIER. THIS BIBLIOGRAPHY IS OF SPECIAL USE TO HEALTH CARE PROFESSIONALS, LAWYERS, LEGISLATORS, AND MEMBERS OF THE COMPUTER INDUSTRY. INCLUDED ARE BOOKS, CONFERENCE PROCEEDINGS, AND JOURNAL ARTICLES. THE CITATIONS ARE ANNOTATED AND ORGANIZED INTO FOUR GENERAL SUBJECT AREAS. THE FIRST SECTION CONCERNS THREATS TO PRIVACY. THERE ARE REFERENCES RELATIVE TO PRIVACY IN THE SOCIAL CONTEXT, THE PRIVACY INVASION DEBATE IN THE UNITED STATES, AND THE GENERAL USE OF DATA BASES AND COMPUTER NETWORKS. THE SECOND GROUP OF LISTINGS RELATES TO SPECIFIC AREAS OF CONCERN FOR USERS, INCLUDING MEDICAL RECORDS, PUBLIC ADMINISTRATION, LAW ENFORCEMENT, BUSINESS COMPUTING SYSTEMS, AND PERSONNEL RECORDS. THE LEGAL ASPECTS OF PRIVACY INVASION AND INFORMATION ON CURRENT LEGISLATION IN THE UNITED STATES, EUROPE, AND AUSTRALIA ARE GIVEN IN THE THIRD SECTION. FINALLY, REFERENCES PERTAINING TO THE RESPONSIBILITY OF THE COMPUTER INDUSTRY IN THE PROTECTION OF PRIVACY AS WELL AS SPECIFIC PROTECTION METHODS, SUCH AS, RESTRICTED ACCESS, PERSONNAL IDENTIFICATION, AND ENCRYPTION ARE PRESENTED. THE BIBLIOGRAPHY ALSO CONTAINS AN AUTHOR INDEX. (JMB)