skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 63905 Find in a Library
Title: PRIVACY AND COMPUTERS - BIBLIOGRAPHY - 1969-1978
Author(s): S DEIGHTON
Corporate Author: Institution of Electrical Engineers
United Kingdom
Date Published: 1978
Page Count: 93
Sponsoring Agency: Institution of Electrical Engineers
London, WC2R OBL, England
Type: Bibliography
Format: Document
Language: English
Country: United Kingdom
Annotation: APPROXIMATELY 250 CITATIONS OF MATERIALS PUBLISHED FROM 1969-1978 ON THE USE OF COMPUTERS FOR STORAGE OF CONFIDENTIAL OR PERSONAL INFORMATION ARE GIVEN IN THIS BIBLIOGRAPHY.
Abstract: INCREASED INFORMATION GATHERING IN BOTH THE PRIVATE AND GOVERNMENT SECTORS HAS ENCHANCED THE POSSIBILITY OF INVADING PERSONAL PRIVACY. COMPUTERS DID NOT CREATE THIS PROBLEM, BUT THEY DO FACILITATE THE MANIPULATION OF DATA, THEREBY MAKING MISUSE EASIER. THIS BIBLIOGRAPHY IS OF SPECIAL USE TO HEALTH CARE PROFESSIONALS, LAWYERS, LEGISLATORS, AND MEMBERS OF THE COMPUTER INDUSTRY. INCLUDED ARE BOOKS, CONFERENCE PROCEEDINGS, AND JOURNAL ARTICLES. THE CITATIONS ARE ANNOTATED AND ORGANIZED INTO FOUR GENERAL SUBJECT AREAS. THE FIRST SECTION CONCERNS THREATS TO PRIVACY. THERE ARE REFERENCES RELATIVE TO PRIVACY IN THE SOCIAL CONTEXT, THE PRIVACY INVASION DEBATE IN THE UNITED STATES, AND THE GENERAL USE OF DATA BASES AND COMPUTER NETWORKS. THE SECOND GROUP OF LISTINGS RELATES TO SPECIFIC AREAS OF CONCERN FOR USERS, INCLUDING MEDICAL RECORDS, PUBLIC ADMINISTRATION, LAW ENFORCEMENT, BUSINESS COMPUTING SYSTEMS, AND PERSONNEL RECORDS. THE LEGAL ASPECTS OF PRIVACY INVASION AND INFORMATION ON CURRENT LEGISLATION IN THE UNITED STATES, EUROPE, AND AUSTRALIA ARE GIVEN IN THE THIRD SECTION. FINALLY, REFERENCES PERTAINING TO THE RESPONSIBILITY OF THE COMPUTER INDUSTRY IN THE PROTECTION OF PRIVACY AS WELL AS SPECIFIC PROTECTION METHODS, SUCH AS, RESTRICTED ACCESS, PERSONNAL IDENTIFICATION, AND ENCRYPTION ARE PRESENTED. THE BIBLIOGRAPHY ALSO CONTAINS AN AUTHOR INDEX. (JMB)
Index Term(s): Computer privacy and security; Computer privacy and security laws; Data security; Personnel identification systems; Right of privacy
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=63905

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.