书评《对隐私的侵犯》,作者阿瑟·r·米勒。密歇根大学出版社,1971年

T. C. Willoughby
{"title":"书评《对隐私的侵犯》,作者阿瑟·r·米勒。密歇根大学出版社,1971年","authors":"T. C. Willoughby","doi":"10.1145/1017625.1017632","DOIUrl":null,"url":null,"abstract":"If, from the title, the reader expects this book to be a muckraking examination of the impact of modern technology on privacy he will be quickly disabused. Assault o n Privacy is a careful, accurate and largely dispassionate vie w of the relationship between computers and privacy. Since the book is intended for a general audience the description s of computers and systems using computers will be old ha t to data processors. The chapters describing the tenuou s legal concept of privacy were of greatest interest to this reviewer and were well done. The chapter describin g psychological testing repeats the standard criticisms without asking whether tests better serve the testee than interviews or credentials. The efficiency expert favors a National Data Bank as a way of avoiding the unnecessary cost of maintaining som e 1500 separate federal government data banks. The human-ist rues the loss of privacy. Miller balances these concept s by suggesting that there is little privacy in the presen t arrangement and that the National Data Bank might b e viable if adequate legal safeguards were established. Every data processor using consumer files should read thi s book. First, because he is a consumer. Second, because h e needs to know the criticisms of his profession. Lastly, because if data processors understand the issues they may b e able to design efficient and private systems. Dear Sir , Though it may be a little late, I want to make som e comments on the Spring 1972 edition of DATA BASE. The article \"Performance Evaluation and the Managemen t of Information Services\" dealt with a lot of techniques fo r evaluating hardware (computer systems) and software. What I didn't find in the article : Many companies have t o compare Data Base Management Systems to make thei r choice of the systems which can be leased on the market. There was no comment at all on this special problem. Is i t already solved in the USA? In the literature available to m e I haven't found any article which extensively in practic e deals with the requirements for an ideal system (excep t perhaps DATA BASE, Vol. 3, No. 3 by Mr. Van Cour t Hare, Jr. and some standards like CODASYL \"Feature Analysis . . .\" or FRY/GOSDEN or DOWKANT), with the influence of the commercial problems to be solved, the analysi s and …","PeriodicalId":152518,"journal":{"name":"ACM Sigmis Database","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1972-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Review of \\\"The Assault on Privacy, by Arthur R. Miller.\\\" University of Michigan Press, 1971\",\"authors\":\"T. C. Willoughby\",\"doi\":\"10.1145/1017625.1017632\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"If, from the title, the reader expects this book to be a muckraking examination of the impact of modern technology on privacy he will be quickly disabused. Assault o n Privacy is a careful, accurate and largely dispassionate vie w of the relationship between computers and privacy. Since the book is intended for a general audience the description s of computers and systems using computers will be old ha t to data processors. The chapters describing the tenuou s legal concept of privacy were of greatest interest to this reviewer and were well done. The chapter describin g psychological testing repeats the standard criticisms without asking whether tests better serve the testee than interviews or credentials. The efficiency expert favors a National Data Bank as a way of avoiding the unnecessary cost of maintaining som e 1500 separate federal government data banks. The human-ist rues the loss of privacy. Miller balances these concept s by suggesting that there is little privacy in the presen t arrangement and that the National Data Bank might b e viable if adequate legal safeguards were established. Every data processor using consumer files should read thi s book. First, because he is a consumer. Second, because h e needs to know the criticisms of his profession. Lastly, because if data processors understand the issues they may b e able to design efficient and private systems. Dear Sir , Though it may be a little late, I want to make som e comments on the Spring 1972 edition of DATA BASE. The article \\\"Performance Evaluation and the Managemen t of Information Services\\\" dealt with a lot of techniques fo r evaluating hardware (computer systems) and software. What I didn't find in the article : Many companies have t o compare Data Base Management Systems to make thei r choice of the systems which can be leased on the market. There was no comment at all on this special problem. Is i t already solved in the USA? In the literature available to m e I haven't found any article which extensively in practic e deals with the requirements for an ideal system (excep t perhaps DATA BASE, Vol. 3, No. 3 by Mr. Van Cour t Hare, Jr. and some standards like CODASYL \\\"Feature Analysis . . .\\\" or FRY/GOSDEN or DOWKANT), with the influence of the commercial problems to be solved, the analysi s and …\",\"PeriodicalId\":152518,\"journal\":{\"name\":\"ACM Sigmis Database\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1972-12-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ACM Sigmis Database\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/1017625.1017632\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Sigmis Database","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1017625.1017632","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

如果从书名来看,读者希望这本书是对现代技术对隐私影响的揭露,那么他很快就会醒悟过来。《侵犯隐私》对电脑与隐私之间的关系进行了细致、准确、基本不带感情色彩的论述。由于本书是为普通读者编写的,所以对计算机和使用计算机的系统的描述将比对数据处理器的描述更陈旧。描述隐私的法律概念的章节是我最感兴趣的,而且写得很好。描述心理测试的章节重复了标准的批评,但没有问测试是否比面试或证书更好地服务于被测试者。效率专家倾向于国家数据库,因为这样可以避免维护大约1500个独立的联邦政府数据库的不必要成本。人文主义者对隐私的丧失感到遗憾。米勒平衡了这些概念,他提出,在目前的安排中几乎没有隐私,如果建立足够的法律保障,国家数据银行可能是可行的。每个使用消费者文件的数据处理器都应该阅读这本书。首先,因为他是一个消费者。第二,因为他需要知道他的职业所受到的批评。最后,因为如果数据处理人员了解这些问题,他们可能能够设计出高效且私有的系统。亲爱的先生,虽然现在可能有点晚,我想对1972年春季版的DATA BASE做一些评论。“信息服务的绩效评估与管理”一文中讨论了许多评估硬件(计算机系统)和软件的技术。我在文章中没有发现的是:许多公司不得不比较数据库管理系统,以便在市场上选择可以租用的系统。对这个特殊问题根本没有评论。这个问题在美国已经解决了吗?在我所能获得的文献中,我还没有发现任何一篇文章在实践中广泛地讨论了理想系统的需求(除了DATA BASE, Vol. 3, No. 3 by Mr. Van Cour t Hare, Jr.和一些标准,如CODASYL“Feature Analysis…”或FRY/GOSDEN或DOWKANT),以及要解决的商业问题的影响,分析和……
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Review of "The Assault on Privacy, by Arthur R. Miller." University of Michigan Press, 1971
If, from the title, the reader expects this book to be a muckraking examination of the impact of modern technology on privacy he will be quickly disabused. Assault o n Privacy is a careful, accurate and largely dispassionate vie w of the relationship between computers and privacy. Since the book is intended for a general audience the description s of computers and systems using computers will be old ha t to data processors. The chapters describing the tenuou s legal concept of privacy were of greatest interest to this reviewer and were well done. The chapter describin g psychological testing repeats the standard criticisms without asking whether tests better serve the testee than interviews or credentials. The efficiency expert favors a National Data Bank as a way of avoiding the unnecessary cost of maintaining som e 1500 separate federal government data banks. The human-ist rues the loss of privacy. Miller balances these concept s by suggesting that there is little privacy in the presen t arrangement and that the National Data Bank might b e viable if adequate legal safeguards were established. Every data processor using consumer files should read thi s book. First, because he is a consumer. Second, because h e needs to know the criticisms of his profession. Lastly, because if data processors understand the issues they may b e able to design efficient and private systems. Dear Sir , Though it may be a little late, I want to make som e comments on the Spring 1972 edition of DATA BASE. The article "Performance Evaluation and the Managemen t of Information Services" dealt with a lot of techniques fo r evaluating hardware (computer systems) and software. What I didn't find in the article : Many companies have t o compare Data Base Management Systems to make thei r choice of the systems which can be leased on the market. There was no comment at all on this special problem. Is i t already solved in the USA? In the literature available to m e I haven't found any article which extensively in practic e deals with the requirements for an ideal system (excep t perhaps DATA BASE, Vol. 3, No. 3 by Mr. Van Cour t Hare, Jr. and some standards like CODASYL "Feature Analysis . . ." or FRY/GOSDEN or DOWKANT), with the influence of the commercial problems to be solved, the analysi s and …
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信