TITLE

Unintentional and Unbalanced Transparency

AUTHOR(S)
Booch, Grady
PUB. DATE
September 2011
SOURCE
IEEE Software;Sep2011, Vol. 28 Issue 5, p12
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Security and privacy are interdependent concepts. Each impacts the other, but to say that they are alternatives is a false dichotomy. Both are issues of human concern; their policies and their risks may be made manifest in software-intensive systems. Architecting a system that attends to the needs of security and privacy is possible and desirable, yet there are often unintended and unexpected consequences in so doing.
ACCESSION #
64345336

 

Related Articles

  • Privacy in a Wired World. Munro, Neil // National Journal;10/24/98, Vol. 30 Issue 43, p2498 

    Addresses the issue of privacy of personal data in computers in the United States. Efforts being taken by the government to solve privacy issues; Privacy guidelines of some organizations; Restrictive legislation for the health care industry. INSET: Look who's allied with the ACLU.

  • Pint of View. Lager, Marshall // CRM Magazine;Jan2011, Vol. 15 Issue 1, p42 

    The article offers the author's insights on the changes in the attitude of people in terms of personal data transmission. He says that various factors contributed to the way people divided their public and private lives including capitalism, social media, and vanity. He adds that consumers in...

  • La reina de las redes sociales. Parra, Raúl López // Revista Mexicana de Comunicacion;sep/oct2010, Vol. 23 Issue 123, p12 

    No abstract available.

  • Fotografie, die Feindin der Privatheit/Photography, the Enemy of Privacy. Müller-Pohle, Andreas // European Photography;Fall/Winter2011, Issue 90, p3 

    In this article the author offers insights on the degradation of privacy in the twentieth and twenty-first century. Particular focus is given to how individuals often participate in the destruction of their private sphere through the use of cell phones, the social networking website Facebook and...

  • REASONABLENESS MEETS REQUIREMENTS: REGULATING SECURITY AND PRIVACY IN SOFTWARE. Otto, Paul N. // Duke Law Journal;Nov2009, Vol. 59 Issue 2, p309 

    Software security and privacy issues regularly grab headlines amid fears of identity theft, data breaches, and threats to security. Policymakers have responded with a variety of approaches to combat such risk. Suggested measures include promulgation of strict rules, enactment of open-ended...

  • The Digital To Be or Not To Be: Privacy of Employees and the Use of Online Social Networks in the Recruitment Process. Moreira, Teresa Coelho // GSTF Journal of Law & Social Sciences;Apr2013, Vol. 2 Issue 2, p76 

    The world in general and Labour Law specifically has been suffering in the last years countless changes related with the enormous increase and development of the use of new information and communication technology in the Labour relationship. The use of new technologies of the Web 2.0, and most...

  • Filling the Breach. Goodman, Eduard // Canadian Underwriter;Nov2016, Vol. 83 Issue 11, p42 

    The article discusses details regarding Canada's new privacy law the federal breach notification law for which the insurance industry in the country needs to be prepared for. Topics include the possible provisions of the law which could change the data privacy landscape in the country, and the...

  • Do you know where your software is? Cimino, Daniela // Software Magazine;May97, Vol. 17 Issue 5, p28 

    Discusses how software vendors and customers can track their software as the software industry moves towards electronic distribution. How the electronic licensing technology works; Vendors using the electronic licensing; How a firm's Flexlm license management does the work; How to handle...

  • KEEP YOUR PC SAFE.  // Web User;9/19/2013, Issue 327, p16 

    The article presents questions and answers related to computer system software security including malware programs' safety on social networking websites Facebook and Twitter, advantages of a paid antivirus software to free one, and effectiveness of Bitdefender virus scanner, antivirus software.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics