Syndetics cover image
Image from Syndetics

The assault on privacy: computers, data banks, and dossiers / [by] Arthur R. Miller.

By: Miller, Arthur Raphael, 1934-.
Material type: TextTextPublisher: Ann Arbor, University of Michigan Press [1971]Bibliography: Includes bibliographical references (pages 261-269).Description: xiv, 333 p. 24 cm.Content type: text Media type: unmediated Carrier type: volumeISBN: 9780472655007.Subject(s): Privacy, Right of -- United States | Information technologyDDC classification: 323.49
Contents:
pt. 1. The Cybernetic Revolution -- The New Technology -- Time Sharing, Information Systems, and Networking -- The Information-Based Society -- pt. 2. The New Technology's Threat to Personal Privacy -- The Individual's Loss of Control over Personal Information -- Cybernetics as an Instrument of Surveillance -- The Psychological Effects of a Dossier Society -- pt. 3. The Changing Face of Information Handling Privacy in the Crucible -- The Rise, Fall, and Resurrection of the National Data Center -- Computers, Credit Bureaus, and the Checkless, Cashless Society-The Credibility Gap -- Measuring Your I.Q., Ability, and Personality by Computer-The Testing Game -- The Little Red Schoolhouse Goes Electronic -- Regulating the Flow of Information-The Need for a Broad Perspective -- pt. 4. Through the Microscope Darkly-The Handling of Personal Information by the Federal Government: Current Practice -- Data Collection and Confidentiality-The Census Bureau Model -- Tranfers of Information Among Fderal Agencies -- Federal-State-Local Transfers of Information -- The Federal Government and the Public-The Freedom of Information Act -- Information in Transit-Wiretapping and the Crime Control Act -- pt. 5. The Law Relating to Privacy-A Thing of Threads and Patches -- The Genesis of the Common Law of Privacy -- The Present Common Law of Privacy -- The Constitutional Law of Privacy-Policies in Conflict -- Privacy on a Societal Scale-The Need for a Balance -- pt. 6. The Quest for a New Legal Framework -- Old Wine in New Bottles-"Property" Theories of Privacy -- Information Trusts and Related Theories -- Federal Privacy Legislation -- Federal Administrative Regulation -- pt. 7. How to Live With the Computer Without Becoming Neurotic-Safeguarding the Privacy of Computerized Information -- Technical Methods of Protection-The Quest for Mechanical Security -- Procedural Methods of Improving Security -- Controls on Imput, Output, and Storage -- Managing the Information Managers.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Two Weeks Davenport Library Circulating Collection Print-Circulating 323.49 M612 (Browse shelf(Opens below)) Available 34284001045814

Includes bibliographical references (pages 261-269).

pt. 1. The Cybernetic Revolution -- The New Technology -- Time Sharing, Information Systems, and Networking -- The Information-Based Society -- pt. 2. The New Technology's Threat to Personal Privacy -- The Individual's Loss of Control over Personal Information -- Cybernetics as an Instrument of Surveillance -- The Psychological Effects of a Dossier Society -- pt. 3. The Changing Face of Information Handling Privacy in the Crucible -- The Rise, Fall, and Resurrection of the National Data Center -- Computers, Credit Bureaus, and the Checkless, Cashless Society-The Credibility Gap -- Measuring Your I.Q., Ability, and Personality by Computer-The Testing Game -- The Little Red Schoolhouse Goes Electronic -- Regulating the Flow of Information-The Need for a Broad Perspective -- pt. 4. Through the Microscope Darkly-The Handling of Personal Information by the Federal Government: Current Practice -- Data Collection and Confidentiality-The Census Bureau Model -- Tranfers of Information Among Fderal Agencies -- Federal-State-Local Transfers of Information -- The Federal Government and the Public-The Freedom of Information Act -- Information in Transit-Wiretapping and the Crime Control Act -- pt. 5. The Law Relating to Privacy-A Thing of Threads and Patches -- The Genesis of the Common Law of Privacy -- The Present Common Law of Privacy -- The Constitutional Law of Privacy-Policies in Conflict -- Privacy on a Societal Scale-The Need for a Balance -- pt. 6. The Quest for a New Legal Framework -- Old Wine in New Bottles-"Property" Theories of Privacy -- Information Trusts and Related Theories -- Federal Privacy Legislation -- Federal Administrative Regulation -- pt. 7. How to Live With the Computer Without Becoming Neurotic-Safeguarding the Privacy of Computerized Information -- Technical Methods of Protection-The Quest for Mechanical Security -- Procedural Methods of Improving Security -- Controls on Imput, Output, and Storage -- Managing the Information Managers.

There are no comments on this title.

to post a comment.

Powered by Koha