The assault on privacy: computers, data banks, and dossiers [by] Arthur R. Miller.

By: Material type: TextTextPublication details: Ann Arbor, University of Michigan Press [1971]Description: xiv, 333 p. 24 cmSubject(s): DDC classification:
  • 323.49
LOC classification:
  • JC599.U5 M49
Contents:
pt. 1. The Cybernetic Revolution -- The New Technology -- Time Sharing, Information Systems, and Networking -- The Information-Based Society -- pt. 2. The New Technology's Threat to Personal Privacy -- The Individual's Loss of Control over Personal Information -- Cybernetics as an Instrument of Surveillance -- The Psychological Effects of a Dossier Society -- pt. 3. The Changing Face of Information Handling Privacy in the Crucible -- The Rise, Fall, and Resurrection of the National Data Center -- Computers, Credit Bureaus, and the Checkless, Cashless Society-The Credibility Gap -- Measuring Your I.Q., Ability, and Personality by Computer-The Testing Game -- The Little Red Schoolhouse Goes Electronic -- Regulating the Flow of Information-The Need for a Broad Perspective -- pt. 4. Through the Microscope Darkly-The Handling of Personal Information by the Federal Government: Current Practice -- Data Collection and Confidentiality-The Census Bureau Model -- Tranfers of Information Among Fderal Agencies -- Federal-State-Local Transfers of Information -- The Federal Government and the Public-The Freedom of Information Act -- Information in Transit-Wiretapping and the Crime Control Act -- pt. 5. The Law Relating to Privacy-A Thing of Threads and Patches -- The Genesis of the Common Law of Privacy -- The Present Common Law of Privacy -- The Constitutional Law of Privacy-Policies in Conflict -- Privacy on a Societal Scale-The Need for a Balance -- pt. 6. The Quest for a New Legal Framework -- Old Wine in New Bottles-"Property" Theories of Privacy -- Information Trusts and Related Theories -- Federal Privacy Legislation -- Federal Administrative Regulation -- pt. 7. How to Live With the Computer Without Becoming Neurotic-Safeguarding the Privacy of Computerized Information -- Technical Methods of Protection-The Quest for Mechanical Security -- Procedural Methods of Improving Security -- Controls on Imput, Output, and Storage -- Managing the Information Managers.
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Books (30-Day Checkout) Books (30-Day Checkout) Nash Library General Stacks JC599.U5M49 1 Available 33710000404520

Bibliography: p. 261-269.

WAR, NEWBERY,

pt. 1. The Cybernetic Revolution -- The New Technology -- Time Sharing, Information Systems, and Networking -- The Information-Based Society -- pt. 2. The New Technology's Threat to Personal Privacy -- The Individual's Loss of Control over Personal Information -- Cybernetics as an Instrument of Surveillance -- The Psychological Effects of a Dossier Society -- pt. 3. The Changing Face of Information Handling Privacy in the Crucible -- The Rise, Fall, and Resurrection of the National Data Center -- Computers, Credit Bureaus, and the Checkless, Cashless Society-The Credibility Gap -- Measuring Your I.Q., Ability, and Personality by Computer-The Testing Game -- The Little Red Schoolhouse Goes Electronic -- Regulating the Flow of Information-The Need for a Broad Perspective -- pt. 4. Through the Microscope Darkly-The Handling of Personal Information by the Federal Government: Current Practice -- Data Collection and Confidentiality-The Census Bureau Model -- Tranfers of Information Among Fderal Agencies -- Federal-State-Local Transfers of Information -- The Federal Government and the Public-The Freedom of Information Act -- Information in Transit-Wiretapping and the Crime Control Act -- pt. 5. The Law Relating to Privacy-A Thing of Threads and Patches -- The Genesis of the Common Law of Privacy -- The Present Common Law of Privacy -- The Constitutional Law of Privacy-Policies in Conflict -- Privacy on a Societal Scale-The Need for a Balance -- pt. 6. The Quest for a New Legal Framework -- Old Wine in New Bottles-"Property" Theories of Privacy -- Information Trusts and Related Theories -- Federal Privacy Legislation -- Federal Administrative Regulation -- pt. 7. How to Live With the Computer Without Becoming Neurotic-Safeguarding the Privacy of Computerized Information -- Technical Methods of Protection-The Quest for Mechanical Security -- Procedural Methods of Improving Security -- Controls on Imput, Output, and Storage -- Managing the Information Managers.