The authors point out that queries to the system compute raw statistics for a query set. Questioners with prior knowledge of a given individual can divide their queries into parts such that when reassembled into a special characteristic, formulas will isolate the proprietary information about the individual. These formulas are called trackers, The paper reviews the literature on the extent and limits of trackers, provides excellent information to show how they can extract individualized information and so subvert the confidentiality of database files. The paper also reviews individual trackers and defines ranges within which they work, and shows how statistical responses to queries do compromise confidentiality of information, positively or negatively; positively if the individual falls into the given category and negatively if not. The authors then proceed to develop a general tracker and show how it can be applied within restricted subranges to extract individualized information. Under conditions where this fails, they show how a double tracker can be used. In general, trackers for most statistical database systems exist within the database, or can be easily obtained, thereby compromising the confidentiality of the data.
{"title":"Review of \"Instructional Message Design: Principles from the Behavioral Sciences, by Malcolm Fleming and W. Howard Levie\", Educational Technology Publications, Inc.","authors":"David R. Kniefel, Michael J. D'Amore","doi":"10.1145/1103009.1103013","DOIUrl":"https://doi.org/10.1145/1103009.1103013","url":null,"abstract":"The authors point out that queries to the system compute raw statistics for a query set. Questioners with prior knowledge of a given individual can divide their queries into parts such that when reassembled into a special characteristic, formulas will isolate the proprietary information about the individual. These formulas are called trackers, The paper reviews the literature on the extent and limits of trackers, provides excellent information to show how they can extract individualized information and so subvert the confidentiality of database files. The paper also reviews individual trackers and defines ranges within which they work, and shows how statistical responses to queries do compromise confidentiality of information, positively or negatively; positively if the individual falls into the given category and negatively if not. The authors then proceed to develop a general tracker and show how it can be applied within restricted subranges to extract individualized information. Under conditions where this fails, they show how a double tracker can be used. In general, trackers for most statistical database systems exist within the database, or can be easily obtained, thereby compromising the confidentiality of the data.","PeriodicalId":129356,"journal":{"name":"ACM Sigsoc Bulletin","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124309539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This report is composed of four sections:-1) a description scheme for documentation centers and 2) descriptions of information retrieval systems at three European data archives-a)SSI~C One of the more interesting aspects of the "description scheme" presented in the report is that it can also be used, as the author points out, as a "checklist" of areas to be covered in setting up a data archive-a "prescriptive scheme", as Soergel calls it. The functiQns detailed in this part of the report are not confined to information retrieval. A partial listing of the general table of contents gives an idea of the nature and range of topics considered: .Organization of the documentation center (Institutional structure, personnel, purpose, hardware and software used) .Collection and acquisition procedures (What is gathered and how) • Users of the doctunentation center .Information storage and retrieval (Classification and keying of information and pointers to information) .Training and consultant functions .Research functions .Cooperation with other institutions For information concerning the three data archives described, the interested reader should consult the report directly, as the range and detail of the contents preclude effective summary in this space. Further, the individual reader's intentions will dictate what topics, and in what degree of detail, will be relevant. The archiving institutes covered are affiliated with the Universities of Essex, Cologne, and Amsterdam, respectively, and all rely on the computational facilities of these "parent" institutions. Copies of the report may be obtained from:
{"title":"Review of \"Report of the Information Retrieval Systems of 3 European Data Archives, by Dagobert Soergel\", Zentralarchive fur empirische Socialforschung, 1969","authors":"B. Eckerson","doi":"10.1145/1103251.1103255","DOIUrl":"https://doi.org/10.1145/1103251.1103255","url":null,"abstract":"This report is composed of four sections:-1) a description scheme for documentation centers and 2) descriptions of information retrieval systems at three European data archives-a)SSI~C One of the more interesting aspects of the \"description scheme\" presented in the report is that it can also be used, as the author points out, as a \"checklist\" of areas to be covered in setting up a data archive-a \"prescriptive scheme\", as Soergel calls it. The functiQns detailed in this part of the report are not confined to information retrieval. A partial listing of the general table of contents gives an idea of the nature and range of topics considered: .Organization of the documentation center (Institutional structure, personnel, purpose, hardware and software used) .Collection and acquisition procedures (What is gathered and how) • Users of the doctunentation center .Information storage and retrieval (Classification and keying of information and pointers to information) .Training and consultant functions .Research functions .Cooperation with other institutions For information concerning the three data archives described, the interested reader should consult the report directly, as the range and detail of the contents preclude effective summary in this space. Further, the individual reader's intentions will dictate what topics, and in what degree of detail, will be relevant. The archiving institutes covered are affiliated with the Universities of Essex, Cologne, and Amsterdam, respectively, and all rely on the computational facilities of these \"parent\" institutions. Copies of the report may be obtained from:","PeriodicalId":129356,"journal":{"name":"ACM Sigsoc Bulletin","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114983328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A small (104 pages ) but very useful book titled "An Introduction to Data Management in the Behavioral and Social Sciences" by Sheldon Blockman and Kenneth M. Goldstein (Wiley, 1971) should be brought to the attention of SIGSOC members. It includes chapters on how to punch data cards and layout questionnaires with card punching in mind, and introduction to FORMAT statements, and examples of typical statistical packages (BMD and P-STAT are singled out). I find it a useful book to recommend to people beginning to work on dessertation research projects. I could also be useful in a programming course aimed at social scientists.
由Sheldon Blockman和Kenneth M. Goldstein (Wiley, 1971)撰写的一本篇幅不大(104页)但非常有用的书《行为和社会科学中的数据管理导论》应该引起SIGSOC成员的注意。它包括关于如何打孔数据卡和在考虑打卡的情况下布局问卷的章节,以及FORMAT语句的介绍,以及典型统计软件包的示例(BMD和P-STAT被挑选出来)。我觉得这是一本很有用的书,可以推荐给那些开始从事甜点研究项目的人。在面向社会科学家的编程课程中,我也可以派上用场。
{"title":"Review of \"Berkely Transposed File Statistical System (\"PICKLE\"), Version 1 User's Manual-Edition 2\", Survey Research Center, 1971","authors":"L. Trygg","doi":"10.1145/1103251.1103254","DOIUrl":"https://doi.org/10.1145/1103251.1103254","url":null,"abstract":"A small (104 pages ) but very useful book titled \"An Introduction to Data Management in the Behavioral and Social Sciences\" by Sheldon Blockman and Kenneth M. Goldstein (Wiley, 1971) should be brought to the attention of SIGSOC members. It includes chapters on how to punch data cards and layout questionnaires with card punching in mind, and introduction to FORMAT statements, and examples of typical statistical packages (BMD and P-STAT are singled out). I find it a useful book to recommend to people beginning to work on dessertation research projects. I could also be useful in a programming course aimed at social scientists.","PeriodicalId":129356,"journal":{"name":"ACM Sigsoc Bulletin","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116424575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recent years have seen important advances in computational linguistics and artificial intelligence. Although many problems remain, the goal of providing limited English-processing facilities for non-technical computer users is within sight. By the end of the decade, numerous systems providing limited coverage of "natural language" will be available for business and home use. Several systems (e.g. TQA [16]) have already become operational. One system (ROBOT [7]) has been supporting natural language inputs in a dozen or so different commercial database applications for at least three years. Many other systems have been developed to the prototype stage and will soon be able to be transferred, with varying degrees of effort, from a research to a production environment. Each system tends to provide special features of its own, and the future prospects for database, office, instructional, and other environments are quite exciting.
{"title":"How shall we evaluate prototype natural language processors","authors":"B. Ballard","doi":"10.1145/1015579.810956","DOIUrl":"https://doi.org/10.1145/1015579.810956","url":null,"abstract":"Recent years have seen important advances in computational linguistics and artificial intelligence. Although many problems remain, the goal of providing limited English-processing facilities for non-technical computer users is within sight. By the end of the decade, numerous systems providing limited coverage of \"natural language\" will be available for business and home use. Several systems (e.g. TQA [16]) have already become operational. One system (ROBOT [7]) has been supporting natural language inputs in a dozen or so different commercial database applications for at least three years. Many other systems have been developed to the prototype stage and will soon be able to be transferred, with varying degrees of effort, from a research to a production environment. Each system tends to provide special features of its own, and the future prospects for database, office, instructional, and other environments are quite exciting.","PeriodicalId":129356,"journal":{"name":"ACM Sigsoc Bulletin","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115670875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Computer Age is nearly upon us. That's when the ordinary worker and householder find that they have to use a computer regularly during the course of their day. Making the Computer Age a reality has been, and continues to be, another White Man's Burden. The White Man, in this case, is not necessarily white or male, but his burden is as real to him now as it was to the Victorian Englishman.
{"title":"The computer age and the White Man's burden","authors":"Diana Patterson","doi":"10.1145/1103312.1103313","DOIUrl":"https://doi.org/10.1145/1103312.1103313","url":null,"abstract":"The Computer Age is nearly upon us. That's when the ordinary worker and householder find that they have to use a computer regularly during the course of their day. Making the Computer Age a reality has been, and continues to be, another White Man's Burden. The White Man, in this case, is not necessarily white or male, but his burden is as real to him now as it was to the Victorian Englishman.","PeriodicalId":129356,"journal":{"name":"ACM Sigsoc Bulletin","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124093717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
examples are presented which further exemplify the principle and its application. Specific references are provided for all principles except those few which are the authors' inferences based on research literature. The book is well organized around the defined principles and provides the reader with a general understanding of the currently demonstrated process and variables which can be manipulated within the instructional environment.
{"title":"Review of \"The Network Nation: Human Communication via Computer, by S. R. Hiltz and M. Turoff\", Addison-Wesley Publishing Co.","authors":"Allene Roberts","doi":"10.1145/1103009.1103014","DOIUrl":"https://doi.org/10.1145/1103009.1103014","url":null,"abstract":"examples are presented which further exemplify the principle and its application. Specific references are provided for all principles except those few which are the authors' inferences based on research literature. The book is well organized around the defined principles and provides the reader with a general understanding of the currently demonstrated process and variables which can be manipulated within the instructional environment.","PeriodicalId":129356,"journal":{"name":"ACM Sigsoc Bulletin","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130316072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
15 Prof. Turoff and his associate Prof. Hiltz have wrapped it all up in a comprehensive book that records the early development of computerized conferencing systems, describes their current and potential use, predicts their societal impact, examines the policy issues, and advances the notion that we are moving towards the "network nation." Placed in a broader context, computerized conferencing is one manifestation of the transition from the industrial machine age to the computer age. The technical matters in the book deal primarily with operational and environmental scenarios. The details of programming and machine technology are given minimum expression; it is taken for granted that the technology is available, will constantly improve, and that it will be used as needed. The authors examine the use of computerized conferencing for business, organizational communications, science and technology, research activities, the general public, and the disadvantaged. The only criticism I have with the presentation is that the basic arguments for computerized conferencing tend to be repeated (in different form) for each of the groups studied. This may be appropriate if only single chapters are read, but the reader going through the whole book may find the repetition a bit tedious. Also presented are perspectives on the cultural, sociological and psychological factors involved in exchanging messages in the terminal/computer environment. Although many of the presentations are qualitative, an effort to show quantitative studies concerning the behavior of people in a computerized environment (and how they might react to other conferees that they may have never seen) has been made. The net conclusion of the authors concerning the future of computerized conferencing is virtually all positive; some negative factors are considered, but they are overshadowed by the convenience, efficiency, low cost and pleasure expected with the use of conferencing systems. The authors have chosen an entertaining method to let them speculate about life in the network nation: interspersed throughout the book are editions of the "Boswash Times"-a hypothetical newspaper that reports stories about life and times in the computerized world of the future. The July 14, 1995 issue, for example, covers a story in which a computerized conferencing (CC) system is named as a co-respondent in a divorce suit because the wife "indulges in hours of wanton interaction" with the machine, neglecting her husband and children. The overall message is that CC will be as common as sliced bread and jogging. For the most part I …
{"title":"Review of \"An input system designed to aid users of interactive graphics, by Bernard C. Levrat, Jurge Harms, Christian Pellegrini, Maurice Wenger, and Robert M. Aiken\"","authors":"J. Bennett","doi":"10.1145/1103009.1103015","DOIUrl":"https://doi.org/10.1145/1103009.1103015","url":null,"abstract":"15 Prof. Turoff and his associate Prof. Hiltz have wrapped it all up in a comprehensive book that records the early development of computerized conferencing systems, describes their current and potential use, predicts their societal impact, examines the policy issues, and advances the notion that we are moving towards the \"network nation.\" Placed in a broader context, computerized conferencing is one manifestation of the transition from the industrial machine age to the computer age. The technical matters in the book deal primarily with operational and environmental scenarios. The details of programming and machine technology are given minimum expression; it is taken for granted that the technology is available, will constantly improve, and that it will be used as needed. The authors examine the use of computerized conferencing for business, organizational communications, science and technology, research activities, the general public, and the disadvantaged. The only criticism I have with the presentation is that the basic arguments for computerized conferencing tend to be repeated (in different form) for each of the groups studied. This may be appropriate if only single chapters are read, but the reader going through the whole book may find the repetition a bit tedious. Also presented are perspectives on the cultural, sociological and psychological factors involved in exchanging messages in the terminal/computer environment. Although many of the presentations are qualitative, an effort to show quantitative studies concerning the behavior of people in a computerized environment (and how they might react to other conferees that they may have never seen) has been made. The net conclusion of the authors concerning the future of computerized conferencing is virtually all positive; some negative factors are considered, but they are overshadowed by the convenience, efficiency, low cost and pleasure expected with the use of conferencing systems. The authors have chosen an entertaining method to let them speculate about life in the network nation: interspersed throughout the book are editions of the \"Boswash Times\"-a hypothetical newspaper that reports stories about life and times in the computerized world of the future. The July 14, 1995 issue, for example, covers a story in which a computerized conferencing (CC) system is named as a co-respondent in a divorce suit because the wife \"indulges in hours of wanton interaction\" with the machine, neglecting her husband and children. The overall message is that CC will be as common as sliced bread and jogging. For the most part I …","PeriodicalId":129356,"journal":{"name":"ACM Sigsoc Bulletin","volume":"327 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113958640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}