580 Protection of Privacy

نویسنده

  • Gio Wiederhold
چکیده

Balyard had stopped off at the local personnel office for the name of a representative American in the neighborhood. The personnel machines had considered the problem and ejected the card of E. R. B. Hagstrohm, who was statistically average in every respect save for the number of his initials: his age (36), his height (5'7"), his weight (148 lbs.), his years of marriage (11), his I.Q. (83), the number of his children (2: 1 m.9; 1 f.6), his car (3 yr. old Chev. 2 dr. sed.), the number of his bedrooms (2), his education There are two aspects to the issue of protection of data. We will try to cope with both of them in this chapter. The first, and commonly understood, aspect is that we wish to deny access to data to those people who do not have a right to access these data. This is also commonly referred as the protection of privacy for personal data and maintenance of security for governmental or corporate data. The second, but equally important, aspect of protection is that we have to guarantee access to all relevant data to those people who exercise their access privilege properly. This means that owners of databases also have the responsibility to protect the data entrusted to them. Part of this responsibility means that there has to be a reliable computer operation. The other aspect is that data has to be protected from exposure, vandalism, or alteration. 579 580 Protection of Privacy Some examples may help to define the scope of the protection problem. Individual Privacy In order to estimate the next month's operational cost at the Consolidated Iron Works, a program is written which uses personnel data to extrapolate costs from wages, normal working hours, and outstanding vacation days. Lucy Brown, who prepares the report, should not have access to the staff's psychiatric histories, which are kept on-line with the personnel data. Professional Privacy Fred Fierce, a manager of the Widget Division of Everything International Corporation, has access to all operational data of the Widget factory which have been collected into the corporate database. Fred is in personal competition with the manager, Shelley Smart, of the Gadget Division, since he feels a promotion is imminent. Should they have access to each other's data? How can we distinguish similar data from different sources? If we cannot guarantee that we can keep divisional data separate, there will …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks

The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...

متن کامل

Analysis and Evaluation of Privacy Protection Behavior and Information Disclosure Concerns in Online Social Networks

Online Social Networks (OSN) becomes the largest infrastructure for social interactions like: making relationship, sharing personal experiences and service delivery. Nowadays social networks have been widely welcomed by people. Most of the researches about managing privacy protection within social networks sites (SNS), observes users as owner of their information. However, individuals cannot co...

متن کامل

The mediating role of workplace deviant behavior among nurses in the relationship between organizational justice and privacy protection

Introduction: The violation of patients’ privacy in psychiatric hospitals by nurses can seriously harm them. Therefore, the present study aimed to examine the relationship between organizational justice and violation of patients’ privacy with regard to the deviant behavior of nurses in psychiatric hospitals in Isfahan, Iran.   Methods: The present research is an applicable descriptive-correlati...

متن کامل

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

Relationship between Spiritual Attitude and Protecting Patient Privacy in Nursing Students in Khoy

Background and Objectives: Protection of patient privacy consider as one of the fundamental requirements in professional morality, maintenance of individual dignity, and Patient-centered in the spiritual care system of nurses. This study aimed to explore the relationship between spiritual attitude and Protection of patient privacy in students at Khoy university of medical sciences in 2018. Met...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001