Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Keys to Privacy in the Digital Information Age

Keys to Privacy in the Digital Information Age With dramatic increases in reliance on digital media for communications, the need for comprehensive protection of privacy in these media grows. The scope of the digital communications revolution of which we stand only at the very beginning, poses major new challenges for those concerned about protecting communications privacy. Communication which is carried on paper through the mail system, or over the wirebased public telephone network is relatively secure from random intrusion by others. But the same communication traveling over a wireless communication system, or in a digital format, is vulnerable to being intercepted by relatively inexpensive, easytoobtain technology. If designed and deployed properly, communications technology has the potential to actually support and enhance the level of privacy that we all enjoy. But if, in the design process, privacy concerns are slighted, whether consciously or not, privacy may be compromised. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Internet Research Emerald Publishing

Keys to Privacy in the Digital Information Age

Internet Research , Volume 2 (4): 4 – Apr 1, 1992

Loading next page...
 
/lp/emerald-publishing/keys-to-privacy-in-the-digital-information-age-CeTKX9tpek
Publisher
Emerald Publishing
Copyright
Copyright © Emerald Group Publishing Limited
ISSN
1066-2243
DOI
10.1108/eb047267
Publisher site
See Article on Publisher Site

Abstract

With dramatic increases in reliance on digital media for communications, the need for comprehensive protection of privacy in these media grows. The scope of the digital communications revolution of which we stand only at the very beginning, poses major new challenges for those concerned about protecting communications privacy. Communication which is carried on paper through the mail system, or over the wirebased public telephone network is relatively secure from random intrusion by others. But the same communication traveling over a wireless communication system, or in a digital format, is vulnerable to being intercepted by relatively inexpensive, easytoobtain technology. If designed and deployed properly, communications technology has the potential to actually support and enhance the level of privacy that we all enjoy. But if, in the design process, privacy concerns are slighted, whether consciously or not, privacy may be compromised.

Journal

Internet ResearchEmerald Publishing

Published: Apr 1, 1992

There are no references for this article.