"It was a bright cold day in April and the clock was striking thirteen ...".
It is almost mandatory to quote Orwell's "Nineteen Eighty Four" when writing about this topic - the above lines are the opening phrase of that work and some of Orwell's predictions are uncomfortably near fulfillment. Many new inter-related aspects of privacy have arisen in the last few years, some of which have been briefly discussed before by the author [1].
Get full access to this article
View all access options for this article.
References
1.
A.E. Cawkell , The paperless revolution: forces controlling the introduction of electronic information systems, Reprinted in: T. Forester (ed., The Microelectronics Revolution (Blackwell, Oxford, 1980).
2.
Wireless World84 (1511, 1512) (1978) 38-42;69-74.
3.
A.S. Madans , Developments under the Freedom of Information Act 1979, Duke Law J.1980( 1980) 139-169.
4.
H. Peterson , After five years: an assessment of the amended US Freedom of Information Act, Amer. Archivist43 (2) (1980) 161-168.
5.
The government's protection racket, Financial Times (July 21, 1978).
6.
J. Michael , The politics of secrecy, the secrecy of politics , Social Audit1 ( 1973) 53-64.
7.
T. Huff, Thinking clearly about privacy, Washington Law Rev.55 (1980) 777-794.
8.
A.E. Cawkell , A communications primer Part 3. Data communication protocols and networks, Inform. Technol. and People1(6) (1981) 129-151.
D. Campbell , Big Buzby is watching you, New Statesman (Feb. 1, 1980).
11.
G. Salton , A progress report on information privacy and data security, J. Amer. Soc. Inform. Sci.31(2) (1980) 75-83.
12.
M. Walker , P. Large and D. Pallister, Someone to watch over you. Our lives at their fingertips. Big brother arrived yesterday. The Guardian (Sept. 22, 23 and 24, 1980).
13.
M. McCafferty , The Right to Know, Aslib bibliography No. 1 (Aslib, London, 1976).
14.
N. Nisenoff et al., The privacy of computerized records - the Swedish experience and possible US policy impacts, Information Processing and Management15 (1979 ) 205-211.
15.
Fritz W. Hondius, Computers: data privacy. IEEE Spectrum17(3) (1980) 67-70.
16.
The Home Office, report of the committee on data protection (Chairman Sir Norman Lindop), Cmnd 7341 (HMSO, London, 1978).
17.
Report of a meeting on Computers and Privacy, Paper circulated by Parliamentary Computer Forum (now Pitcom) Dec. 17th, 1979.
18.
J McNeil, The Consultant (Futura, London1979).
19.
W. Diffie and M.E. Hellman, Privacy and authentication: an introduction to cryptography, Proc. IEEE67(3) (1979) 397-427.
20.
R. Sugarman et a]., On foiling computer crime, IEEE Spectrum16(7) (1979) 31-41.
21.
S.S. Walker, The advent of trusted computer operating systems, Proc. AFIPS Natronal Computer Conference, Anaheim CA (AFIPS Press, Arlington, 1980) pp. 655-665.
22.
R.E. Jacobson , Satellite business systems and the concept of the dispersed enterprise - an end to national sovereighty, Media Culture and Society1 (1979 ) 235-253.
23.
French pull the plug on Prestel, Computer Weekly (June 28, 1979).
24.
M. Rutherford , The Unesco threat to press freedom, Financial Times (December 19th, 1980).
25.
W.P. Dizard , The U.S. position - DBS and free flow, J. Communication30(2) (1980) 157-168.
26.
N. Dunn, Us. vs. Them, Computer Decisions11(2) (1979) 24-30.
27.
I. de Sola Pool and R.J. Solomon, The regulation of transborder data flows , Telecommunications Policy3(3) (1979) 176-191.
28.
I. de Sola Pool, Exporting data - latest paranoia (Review of J. Freese, International dataflow)Telecommunications Policy4(4) ( 1980) 314.
29.
R. Boyes , Political row brews over private TV for West Germany, Financial Times (March 31st, 1980 ).