The protection of personal privacy rights is rapidly emerging as one of the l most volatile and intractable problems of the computer age. Ominous reports tolling the death knell of privacy frequently appear in the media, while polls show that a vast majority of Americans are extremely disquieted by this steady evaporation of their personal privacy. Survey data reveal that 80 percent of Americans believe that they have lost control over their personal data (Louis Harris, 1993). The primary reason for this deep concern is that information has become a commodity which can be sold and exchanged quite easily. This has given rise to a new industry of data brokers collecting data from many different sources for the purpose of developing targeted mailing lists for their clients. Those sources might include census data, driver information from the Department of Motor Vehicles (DMV), magazine subscription lists, or credit bureau reports. Almost every time a person orders a catalogue, makes a charitable contribution, purchases something with a credit card or through mail order, that person's name and personal data becomes part of a list that can be rented or sold. Prior to the widespread use of computer technology, our personal information had no real tangible value beyond the immediate transaction. When data was provided by consumers there was no opportunity for its profitable reuse. Hence the information remained with the recipient and was considered to be proprietary and off limits for any secondary utilization. But now, thanks to data storage and retrieval capabilities, the information does have some commercial value, and the issue of who owns and controls that information has considerable saliency. In this review article we will briefly consider the reasons behind this erosion of privacy and examine why privacy has been such a significant value in the
[1]
C. Gould.
The Information Web
,
2019
.
[2]
Michael P. Thompson.
Some Tools for Teaching Leadership/Leadership Without Easy Answers Ronald A. Heifetz/Catalytic Leadership Jeffrey S. Luke/How to be a Star at Work: Nine Breakthrough Strategies You Need to Succeed Robert E. Kelly
,
1998
.
[3]
Priscilla M. Regan,et al.
Privacy Issues and the Creation of Campaign Mailing Lists
,
1995,
Inf. Soc..
[4]
A. Branscomb.
Who Owns Information?: From Privacy To Public Access
,
1994
.
[5]
Kenneth C. Laudon,et al.
Markets and privacy
,
1993,
CACM.
[6]
Willis H. Ware,et al.
The New Faces of Privacy
,
1993,
Inf. Soc..
[7]
Pamela Samuelson,et al.
Legally speaking: is information property?
,
1991,
CACM.
[8]
J. Finnis,et al.
Natural Law and Natural Rights
,
1980
.
[9]
Arthur Raphael Miller,et al.
Personal Privacy in the Computer Age: The Challenge of a New Technology in an Information-Oriented Society
,
1969
.
[10]
W. Friedmann,et al.
Oxford Essays in Jurisprudence.
,
1961
.
[11]
W. N. Hohfeld,et al.
Fundamental Legal Conceptions
,
1923
.
[12]
Louis D. Brandeis,et al.
The Right to Privacy
,
1890
.
[13]
R. Kling.
Computerization and Controversy
,
1997
.
[14]
Lawrence C. Becker,et al.
Property Rights : Philosophic Foundations
,
1977
.
[15]
A. Westin.
Privacy and freedom
,
1970
.