Donn B. Parker

Learn More
  • Carter K, Buxton, +11 authors F Tivoli
  • 1993
In this paper we have focused on technical solutions, rather than social, cultural or policy solutions for protecting privacy in ubiquitous computing environments. We have argued that this is an important design focus, and offered a framework as guidance. That being said, it is interesting that the framework has also highlighted the way in which cultural(More)
Information technology trade publications report increasing information security losses, questionable risk management and risk assessments, and underfunding and understaffing. Government departments receive low grades in security. Legislators react by adopting draconian laws such as Sarbanes-Oxley. The poor state of information security derives from a(More)
The background and motivation for the adoption by the ACM Council on November 11, 1966, of a set of Guidelines for Professional Conduct in Information Processing are described. A brief history is given of ethical codes in other professions. Some reasons for and against adoption of ethical rules are considered, and several sections of the ACM Guidelines are(More)
From the perspective of an information security researcher and consultant who studied crime for 40 years, this brief history of computer crime delves into study methods and presents findings from many years of National Science Foundation and US department of justice grant-supported research and business support at SRI International
search Staff of The Rand Corporation. In 1967 he brought the issue of computer security to the attention of the technical field by organizing a special session on the subject at the Spring Joint Computer Conference. Subsequently he chaired a Defense Science Board committee, which took the first comprehensive look anywhere in Government at computer security.(More)