Matches in Harvard for { <http://id.lib.harvard.edu/aleph/001218524/catalog> ?p ?o. }
Showing items 1 to 24 of
24
with 100 items per page.
- catalog contributor b1706268.
- catalog created "[1971]".
- catalog date "1971".
- catalog date "[1971]".
- catalog dateCopyrighted "[1971]".
- catalog description "Bibliography: p. 261-269.".
- catalog description "pt. 1. The Cybernetic Revolution -- The New Technology -- Time Sharing, Information Systems, and Networking -- The Information-Based Society -- pt. 2. The New Technology's Threat to Personal Privacy -- The Individual's Loss of Control over Personal Information -- Cybernetics as an Instrument of Surveillance -- The Psychological Effects of a Dossier Society -- pt. 3. The Changing Face of Information Handling Privacy in the Crucible -- The Rise, Fall, and Resurrection of the National Data Center -- Computers, Credit Bureaus, and the Checkless, Cashless Society-The Credibility Gap -- Measuring Your I.Q., Ability, and Personality by Computer-The Testing Game -- The Little Red Schoolhouse Goes Electronic -- Regulating the Flow of Information-The Need for a Broad Perspective -- pt. 4. Through the Microscope Darkly-The Handling of Personal Information by the Federal Government: Current Practice -- Data Collection and Confidentiality-The Census Bureau Model -- Tranfers of Information Among Fderal Agencies -- Federal-State-Local Transfers of Information -- The Federal Government and the Public-The Freedom of Information Act -- Information in Transit-Wiretapping and the Crime Control Act -- pt. 5. The Law Relating to Privacy-A Thing of Threads and Patches -- The Genesis of the Common Law of Privacy -- The Present Common Law of Privacy -- The Constitutional Law of Privacy-Policies in Conflict -- Privacy on a Societal Scale-The Need for a Balance -- pt. 6. The Quest for a New Legal Framework -- Old Wine in New Bottles-"Property" Theories of Privacy -- Information Trusts and Related Theories -- Federal Privacy Legislation -- Federal Administrative Regulation -- pt. 7. How to Live With the Computer Without Becoming Neurotic-Safeguarding the Privacy of Computerized Information -- Technical Methods of Protection-The Quest for Mechanical Security -- Procedural Methods of Improving Security -- Controls on Imput, Output, and Storage -- Managing the Information Managers.".
- catalog extent "xiv, 333 p.".
- catalog hasFormat "Assault on privacy.".
- catalog isFormatOf "Assault on privacy.".
- catalog issued "1971".
- catalog issued "[1971]".
- catalog language "eng".
- catalog publisher "Ann Arbor, Univ. of Michigan Press".
- catalog relation "Assault on privacy.".
- catalog spatial "United States.".
- catalog subject "323.49".
- catalog subject "Information storage and retrieval systems.".
- catalog subject "Information technology.".
- catalog subject "JC599.U5 M49".
- catalog subject "Privacy, Right of United States.".
- catalog tableOfContents "pt. 1. The Cybernetic Revolution -- The New Technology -- Time Sharing, Information Systems, and Networking -- The Information-Based Society -- pt. 2. The New Technology's Threat to Personal Privacy -- The Individual's Loss of Control over Personal Information -- Cybernetics as an Instrument of Surveillance -- The Psychological Effects of a Dossier Society -- pt. 3. The Changing Face of Information Handling Privacy in the Crucible -- The Rise, Fall, and Resurrection of the National Data Center -- Computers, Credit Bureaus, and the Checkless, Cashless Society-The Credibility Gap -- Measuring Your I.Q., Ability, and Personality by Computer-The Testing Game -- The Little Red Schoolhouse Goes Electronic -- Regulating the Flow of Information-The Need for a Broad Perspective -- pt. 4. Through the Microscope Darkly-The Handling of Personal Information by the Federal Government: Current Practice -- Data Collection and Confidentiality-The Census Bureau Model -- Tranfers of Information Among Fderal Agencies -- Federal-State-Local Transfers of Information -- The Federal Government and the Public-The Freedom of Information Act -- Information in Transit-Wiretapping and the Crime Control Act -- pt. 5. The Law Relating to Privacy-A Thing of Threads and Patches -- The Genesis of the Common Law of Privacy -- The Present Common Law of Privacy -- The Constitutional Law of Privacy-Policies in Conflict -- Privacy on a Societal Scale-The Need for a Balance -- pt. 6. The Quest for a New Legal Framework -- Old Wine in New Bottles-"Property" Theories of Privacy -- Information Trusts and Related Theories -- Federal Privacy Legislation -- Federal Administrative Regulation -- pt. 7. How to Live With the Computer Without Becoming Neurotic-Safeguarding the Privacy of Computerized Information -- Technical Methods of Protection-The Quest for Mechanical Security -- Procedural Methods of Improving Security -- Controls on Imput, Output, and Storage -- Managing the Information Managers.".
- catalog title "The assault on privacy: computers, data banks, and dossiers [by] Arthur R. Miller.".
- catalog type "text".