Impact of the computer technology of communications business is discussed as is the increase in creation of new types of computer systems resulting from widespread low-cost digital communications. SOCIAL CONSEQUENCES: Loss of the individual's right to privacy; unscrupulous individuals may use the information unlawfully; organized crime may misuse the information; 'inferential relational retrieval' techniques could draw chains of relationships between persons, organizations, and events; use of private detectives may increase to unearth derogatory information on political candidates and their associates for establishing thin chains of inferred relationships; creation of remote interrogation devices to interact with a file from a large number of points will cut costs of retrieval. PROPOSED SPECIFIC SAFEGUARDS: Provide for minimal cryptographic type of protection to communications lines that carry embarrassing data; never store file data in the complete 'clear'; make random external auditing of file operating programs standard practice; create sensible, precise ground rules on cross-system interrogation access for interconnected individual file systems; provide mechanisms to detect abnormal informational requests; build in provisions to record the source of requests for information interrogations; and audit information requests and inform authorities of suspected misuse of the system.
"Impact of the computer technology of communications business is discussed as is the increase in creation of new types of computer systems resulting from widespread low-cost digital communications. SOCIAL CONSEQUENCES: Loss of the individual's right to privacy; unscrupulous individuals may use the information unlawfully; organized crime may misuse the information; 'inferential relational retrieval' techniques could draw chains of relationships between persons, organizations, and events; use of private detectives may increase to unearth derogatory information on political candidates and their associates for establishing thin chains of inferred relationships; creation of remote interrogation devices to interact with a file from a large number of points will cut costs of retrieval. PROPOSED SPECIFIC SAFEGUARDS: Provide for minimal cryptographic type of protection to communications lines that carry embarrassing data; never store file data in the complete 'clear'; make random external auditing of file operating programs standard practice; create sensible, precise ground rules on cross-system interrogation access for interconnected individual file systems; provide mechanisms to detect abnormal informational requests; build in provisions to record the source of requests for information interrogations; and audit information requests and inform authorities of suspected misuse of the system."@en
This is a placeholder reference for a Organization entity, related to a WorldCat Entity. Over time, these references will be replaced with persistent URIs to VIAF, FAST, WorldCat, and other Linked Data resources.
This is a placeholder reference for a Topic entity, related to a WorldCat Entity. Over time, these references will be replaced with persistent URIs to VIAF, FAST, WorldCat, and other Linked Data resources.
This is a placeholder reference for a Topic entity, related to a WorldCat Entity. Over time, these references will be replaced with persistent URIs to VIAF, FAST, WorldCat, and other Linked Data resources.
This is a placeholder reference for a Topic entity, related to a WorldCat Entity. Over time, these references will be replaced with persistent URIs to VIAF, FAST, WorldCat, and other Linked Data resources.
This is a placeholder reference for a Topic entity, related to a WorldCat Entity. Over time, these references will be replaced with persistent URIs to VIAF, FAST, WorldCat, and other Linked Data resources.
This is a placeholder reference for a Topic entity, related to a WorldCat Entity. Over time, these references will be replaced with persistent URIs to VIAF, FAST, WorldCat, and other Linked Data resources.