article

Protecting privacy

Abstract

No abstract available.

References

  1. 1 ACM Code of Professional Conduct, Ethical Consideration 5.1.Google ScholarGoogle Scholar
  2. 2 Proposed FBI crime computer system raises questions on accuracy, privacy: Report warns of potential risk data bank poses to civil liberties. Washington Post (Feb. 13, 1991).Google ScholarGoogle Scholar
  3. 3 Report of the Secretary's Advisory Committee on automated persona} data systems. U.S. Dept. of Health, Education and Welfare. Records, Computers and the Rights of Citizens. 1973.Google ScholarGoogle Scholar
  4. 4 Rosenberg, R. The role of computer scientists in privacy policy. Inf. Tech. Q. IX, 2, 24 (Summer 1990).Google ScholarGoogle Scholar
  5. 5 Winner, L. A victory for computer populism. Tech. Rev. (May/June 1991), 66.Google ScholarGoogle Scholar

Index Terms

  1. Protecting privacy

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!