System implications of information privacy

43Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.

Abstract

Recent advances in computer time-sharing technology promise information systems which will permit simultaneous on-line access to many users at remotely located terminals. In such systems, the question naturally arises of protecting one user's stored programs and data against unauthorized access by others. Considerable work has already been done in providing protection against accidental access due to hardware malfunctions or undebugged programs. Protection against deliberate attempts to gain access to private information, although recently discussed from a philosophical point of view, 1-4 has attracted only fragmentary technical attention. This paper presents a discussion of the threat to information privacy in non-military information systems, applicable counter-measures, and system implications of providing privacy protection.

Cite

CITATION STYLE

APA

Petersen, H. E., & Turn, R. (1967). System implications of information privacy. In AFIPS Conference Proceedings - 1967 Spring Joint Computer Conference, AFIPS 1967 (pp. 291–300). Association for Computing Machinery, Inc. https://doi.org/10.1145/1465482.1465526

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free