Managing Privacy: Information Technology and Corporate by H. Jeff Smith

By H. Jeff Smith

the continuing revolution in digital details expertise increases serious questions on our correct to privateness. As extra own info is accrued and saved at breathtaking velocity, company the USA is faced with the moral and useful problems with the best way to deal with the knowledge in its databases: how should still it's safeguarded and who must have entry to it? In Managing Privacy, Jeff Smith examines the rules of firms similar to insurance firms, banks, and bank card corporations that often strategy scientific, monetary, and purchaser facts. in keeping with Smith, many businesses lack accomplished rules regulating the entry to and distribution of private info, and the place said rules do exist, real practices frequently clash. Few enterprises are keen to develop into leaders within the improvement of such regulations, as an alternative formulating privateness guidance basically after being harassed by means of shoppers, the media, or legislators. Smith argues that as details expertise advances, either companies and society as a complete needs to alter their ways to privateness safety, and he provides particular feedback for constructing such policies.

Originally released in 1994.

A UNC Press Enduring variation -- UNC Press Enduring variations use the newest in electronic know-how to make on hand back books from our wonderful backlist that have been formerly out of print. those variants are released unaltered from the unique, and are awarded in cheap paperback codecs, bringing readers either ancient and cultural value.

Show description

Read Online or Download Managing Privacy: Information Technology and Corporate America PDF

Similar computer information theory books

Security and Privacy in User Modeling (Human–Computer Interaction Series)

User-adaptive (or "personalized") platforms take person personality­ istics in their present clients under consideration and adapt their habit ac­ cordingly. numerous empirical stories reveal their advantages in components like schooling and coaching, on-line support for advanced software program, dynamic info supply, provision of laptop entry to individuals with dis­ skills, and to a point details retrieval.

A Computable Universe:Understanding and Exploring Nature as Computation

This quantity, with a foreword by way of Sir Roger Penrose, discusses the principles of computation with regards to nature. It makes a speciality of major questions: what's computation? How does nature compute? The members are world-renowned specialists who've contributed to shaping a state of the art computational figuring out of the universe.

Biometrics in the New World: The Cloud, Mobile Technology and Pervasive Identity

This publication takes a clean examine biometrics and identification administration, extending the discussion past technical issues, and exploring many of the broader societal and philosophical facets surrounding using biometric functions. good points: offers a quick background of the improvement of biometrics, and describes a few of the popularly held misconceptions surrounding the know-how; investigates the demanding situations and chances of biometrics throughout 3rd occasion infrastructures and on cellular computing units; presents information on biometric structures layout; explores the mechanisms essential to let id intelligence, together with logging mechanisms, info communications and information codecs; discusses such utilization matters as collaboration frameworks, and messaging and knowledge translation; examines the influence of biometric applied sciences on society, masking problems with privateness and consumer components; stories the present scenario in id administration, and predicts the place those tendencies may well take us sooner or later.

Physical-Layer Security for Cooperative Relay Networks (Wireless Networks)

This e-book offers physical-layer defense as a promising paradigm for reaching the information-theoretic secrecy required for instant networks. It explains how instant networks are tremendous liable to eavesdropping assaults and discusses more than a few protection innovations together with information-theoretic protection, synthetic noise aided defense, security-oriented beamforming, and variety assisted defense methods.

Additional info for Managing Privacy: Information Technology and Corporate America

Sample text

Download PDF sample

Rated 4.35 of 5 – based on 14 votes