WorldCat Linked Data Explorer

http://worldcat.org/entity/work/id/137120840

Communications, computers and people

Impact of the computer technology of communications business is discussed as is the increase in creation of new types of computer systems resulting from widespread low-cost digital communications. SOCIAL CONSEQUENCES: Loss of the individual's right to privacy; unscrupulous individuals may use the information unlawfully; organized crime may misuse the information; 'inferential relational retrieval' techniques could draw chains of relationships between persons, organizations, and events; use of private detectives may increase to unearth derogatory information on political candidates and their associates for establishing thin chains of inferred relationships; creation of remote interrogation devices to interact with a file from a large number of points will cut costs of retrieval. PROPOSED SPECIFIC SAFEGUARDS: Provide for minimal cryptographic type of protection to communications lines that carry embarrassing data; never store file data in the complete 'clear'; make random external auditing of file operating programs standard practice; create sensible, precise ground rules on cross-system interrogation access for interconnected individual file systems; provide mechanisms to detect abnormal informational requests; build in provisions to record the source of requests for information interrogations; and audit information requests and inform authorities of suspected misuse of the system.

Open All Close All

http://schema.org/description

  • "Impact of the computer technology of communications business is discussed as is the increase in creation of new types of computer systems resulting from widespread low-cost digital communications. SOCIAL CONSEQUENCES: Loss of the individual's right to privacy; unscrupulous individuals may use the information unlawfully; organized crime may misuse the information; 'inferential relational retrieval' techniques could draw chains of relationships between persons, organizations, and events; use of private detectives may increase to unearth derogatory information on political candidates and their associates for establishing thin chains of inferred relationships; creation of remote interrogation devices to interact with a file from a large number of points will cut costs of retrieval. PROPOSED SPECIFIC SAFEGUARDS: Provide for minimal cryptographic type of protection to communications lines that carry embarrassing data; never store file data in the complete 'clear'; make random external auditing of file operating programs standard practice; create sensible, precise ground rules on cross-system interrogation access for interconnected individual file systems; provide mechanisms to detect abnormal informational requests; build in provisions to record the source of requests for information interrogations; and audit information requests and inform authorities of suspected misuse of the system."@en

http://schema.org/name

  • "Communications, computers and people"@en
  • "COMMUNICATIONS, COMPUTERS AND PEOPLE"@en