Filters








366 Hits in 8.2 sec

Resiliency of the computerized society

Rein Turn, Eric J. Novotny
1983 Proceedings of the May 16-19, 1983, national computer conference on - AFIPS '83  
ACKNOWLEDGMENTS The authors are grateful for permission from the AFIPS Governmental Activities Committee (J. Gosden  ...  Regularly reported in the media were cases of computer crime, violations of individual privacy in computerized record-keeping systems, ineffective and unreliable computer applications, and problems in  ...  Swedish vulnerability review and the OECD workshop, and examines the resiliency and vulnerability of the United States as a computerized society.  ... 
doi:10.1145/1500676.1500718 dblp:conf/afips/TurnN83 fatcat:e6e5kjksvvdblpwmgddsz6gcqq

Reviewing Privacy in an Information Society

Spiros Simitis
1987 University of Pennsylvania law review  
The commitment to privacy reflects specific experiences, concerns, and expectations.  ...  Second, smart cards 4 and videotex 15 make it possible to record and reconstruct individual activities in minute detail.  ... 
doi:10.2307/3312079 fatcat:cs2dwigdofhdnkmuwxbdoz474a

DNA researchers question Senate bill's security provisions

Jocelyn Kaiser
2021 Science  
The increased digitalization of organizations, driven by the rapid adoption of technologies such as cloud computing and data analytics, has increased the importance of data as an input to commerce, impacting  ...  Yet, whatever the motivation, as this report demonstrates, the costs of these policies are significant, not just for the global economy, but for the nations that "shoot themselves in the foot" by using  ...  ABOUT THE AUTHOR Nigel Cory is a trade policy analyst at ITIF.  ... 
doi:10.1126/science.372.6548.1253 pmid:34140366 fatcat:nngbg2mu7jfgdcgoxkgtawwxhu

Innovation by Policy: A Study of the Electronic Passport

Chris Bronk
2007 Social Science Research Network  
Without this honest exchange, any understanding of how the computerized passport-a product of technology created through public policy-will impact society would be fundamentally unsound.  ...  Shutting down VWP was hugely unappealing on cost grounds, loss of economic activity and the possible negative impact on the United States' bilateral relations with member countries.  ...  An imperfect solution to a daunting problem, the e-passport represents the path from problem to policy and policy to technology.  ... 
doi:10.2139/ssrn.1557728 fatcat:3blljbri5fcjjmtkixcxseuopy

Writings for Archivists, 1991

Kevin Corbitt, David Klaassen
1993 The American Archivist  
Automating the archives: a beginner's guide. Chicago: Society of American Archivists, 1991. 8 pp. 427. Etching, Christopher. The impact of computerization on archival finding aids.  ...  "The computerization of government information: does it circumvent public access under the Freedom of Information Act and the Depository Library Program?"  ... 
doi:10.17723/aarc.56.4.94q8620q23066213 fatcat:wrepnainzbgaxm7hfwhpyvvt7a

E-Commerce and Information Privacy: Privacy Policies as Personal Information Protectors

Corey A. Ciocchetti
2007 American Business Law Journal  
This committee, through the HEW REPORT (a 346-page document), ''produced the first portrait of information gathering and its impact on personal privacy ever provided by the U.S. government.''  ...  The problem was defined as the invasion of privacy by computers and evoked images of 1984, the 'Computerized Man,' and a dossier society.  ...  Each of the seven information headers listed above are crucial for a policy to be effective and the EPPAA would require these headers to be included in the second and third layers of every company policy  ... 
doi:10.1111/j.1744-1714.2007.00031.x fatcat:ho7ctotx5bcdffghfjnluf3oo4

Clinical Practice Settings Associated with GPs Who Take on Patients with Mental Disorders

Marie-Josée Fleury, Jean-Marie Bamvita, Denise Aubé, Jacques Tremblay
2010 Healthcare Policy | Politiques de Santé  
For more than 35 years the Foundation has brought experience, commitment, and a rigorous, balanced approach to the problems that affect the health and health care of those it serves.  ...  As the nation's largest philanthropy devoted exclusively to improving the health and health care of all Americans, the Foundation works with a diverse group of organizations and individuals to identify  ...  Acknowledgement: The authors are grateful to The Wall Street Journal Online/ Harris Interactive Health Care Poll for releasing previously unavailable data on the demographics of EHR and PHR use cited in  ... 
doi:10.12927/hcpol.2010.21785 fatcat:b5lcerfkg5d45eq6436uskuree

Applications of New Technologies in Travel Surveys [chapter]

Jean Wolf
2006 Travel Survey Methods  
During the past three years, GPS-based methods for augmenting traditional travel surveys have been implemented in numerous regions and states across the U.S.  ...  Pilot studies conducted in London and Sydney to evaluate the usefulness of wearable GPS loggers have showed the great potential for capturing person-based trips for all modes of travel.  ...  David Forkenbrock, Director of the Public Policy Center at the University of Iowa, is an expert in road pricing policies and implementation.  ... 
doi:10.1108/9780080464015-029 fatcat:omq6ertp65gljnilqilgpdqv7y

Lessons Learned Too Well

A. Michael Froomkin
2011 Social Science Research Network  
U.S. anti-anonymity policies not only enable repressive policies abroad but also place at risk the safety of anonymous communications that Americans may someday need.  ...  This Article traces the global development of technologies and regulations hostile to online anonymity, beginning with the early days of the Internet.  ...  experience of being watched and recorded.  ... 
doi:10.2139/ssrn.1930017 fatcat:jtlf7mbinfe55pvdwlig7b2k7a

The Right to Information and Privacy: Balancing Rights and Managing Conflicts

David Banisar
2011 Social Science Research Network  
Office of the U.S.  ...  of privacy and what is sensitive personal information vary among countries and individuals on the basis of past experiences and cultural understandings.  ...  for peer-to-peer learning by grounding WBI's work in the distillation and dissemination of practitioner experiences.  ... 
doi:10.2139/ssrn.1786473 fatcat:tgq4gunuizebnf653mwkp7f4xa

Confidentiality and Disclosure Limitation [chapter]

Stephen E. Fienberg
2005 Encyclopedia of Social Measurement  
The third example is the Longitudinal Employer-Household Dynamics data, which links state unemployment insurance records for workers and firms to a wide variety of censuses and surveys at the U.S.  ...  The third example is the Longitudinal Employer-Household Dynamics data, which links state unemployment insurance records for workers and firms to a wide variety of censuses and surveys at the U.S.  ...  The desire to allow policy makers and researchers to leverage the rich linked data has been held back, however, by the concerns of citizens and businesses about privacy.  ... 
doi:10.1016/b0-12-369398-5/00053-0 fatcat:hpccyuacgneotgfw3utvingauq

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1994 Software engineering notes  
Proliferation of spy viruses predicted (S 21 2:21) $SP Risks in the British Data Protection Act (S 12 1) SP Concern over privacy of Swedish Databank (S 11 5) SP Discussion on computer privacy and search-and-match  ...  If you cannot find the book in a bookstore, it is on amazon.com, or call A-W within the U.S. at 1-800-822-6339 -or if you are outside of the U.S., 1-617-944-3770 and ask for International Orders.  ...  Programming competency and the use of FORTH (R 20 49-53) + Spark, an attempt at a "safe" Ada subset (S 14 1) + Viper and formal methods used in Australian railroad switching (S 14 5) + Benefits of computer  ... 
doi:10.1145/181610.181612 fatcat:qfzxpio6tfgl5nmbevta334afi

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1996 Software engineering notes  
Proliferation of spy viruses predicted (S 21 2:21) $SP Risks in the British Data Protection Act (S 12 1) SP Concern over privacy of Swedish Databank (S 11 5) SP Discussion on computer privacy and search-and-match  ...  If you cannot find the book in a bookstore, it is on amazon.com, or call A-W within the U.S. at 1-800-822-6339 -or if you are outside of the U.S., 1-617-944-3770 and ask for International Orders.  ...  Programming competency and the use of FORTH (R 20 49-53) + Spark, an attempt at a "safe" Ada subset (S 14 1) + Viper and formal methods used in Australian railroad switching (S 14 5) + Benefits of computer  ... 
doi:10.1145/381790.381797 fatcat:kcxte3luzrg57ms3gwwbqzs5ji

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1992 Software engineering notes  
Proliferation of spy viruses predicted (S 21 2:21) $SP Risks in the British Data Protection Act (S 12 1) SP Concern over privacy of Swedish Databank (S 11 5) SP Discussion on computer privacy and search-and-match  ...  If you cannot find the book in a bookstore, it is on amazon.com, or call A-W within the U.S. at 1-800-822-6339 -or if you are outside of the U.S., 1-617-944-3770 and ask for International Orders.  ...  Programming competency and the use of FORTH (R 20 49-53) + Spark, an attempt at a "safe" Ada subset (S 14 1) + Viper and formal methods used in Australian railroad switching (S 14 5) + Benefits of computer  ... 
doi:10.1145/134292.134293 fatcat:ayrwcbvvljhrdeav5kvrxaycs4

A Survey of Research on Retail Central Bank Digital Currency

John Kiff, Jihad Alwazir, Sonja Davidovic, Aquiles Farias, Ashraf Khan, Tanai Khiaonarong, Majid Malaika, Hunter Monroe, Nobu Sugimoto, Hervé Tourpe, Peter Zhou
2020 IMF Working Papers  
This paper examines key considerations around central bank digital currency (CBDC) for use by the general public, based on a comprehensive review of recent research, central bank experiments, and ongoing  ...  It looks at the reasons why central banks are exploring retail CBDC issuance, policy and design considerations; legal, governance and regulatory perspectives; plus cybersecurity and other risk considerations  ...  Some central banks, such as the Swedish Riksbank, are suggesting a review of the concept itself: what does "legal tender" in a digitalized economy imply and does require possible legal amendments to the  ... 
doi:10.5089/9781513547787.001 fatcat:dp3olkbtabffbpbsa7k6f32j3i
« Previous Showing results 1 — 15 out of 366 results