----------------------------Original message---------------------------- INFORMATION PRIVACY, SECURITY, AND DATA INTEGRITY ASIS 1997 Mid Year Meeting May 30 - June 3, 1997 Scottsdale, Arizona Preliminary Program We all rely on electronic data, secure, we hope, from compromise. Technology developments have surpassed social norms and ethics. Who owns data? How can we verify accuracy of data, and verify that data are authentic? What can you do when data about you are incorrect or misappropriated? What values for privacy, data sharing, and ethical responsibility will we need? How can you protect your organization and its information? These are the concerns of the 1997 ASIS Mid Year meeting. Following is the current (2/6/97) program of the 1997 ASIS Mid Year Meeting. For up-to-date information, session descriptions, schedule, registration information, and more, please see the ASIS Web site at <http://www.asis.org/midyear-97/> or contact ASIS at the address below. Special and Plenary Sessions * Online Privacy and Free Speech: The Munitions Laws & You -- What's Happening with Personal Information and Communications in the Digital Age? Janlori Goldman, Deputy Director/co-founder, Center for Democracy and Technology * Internet Security -- The Good the Bad and the Ugly Jeffrey I. Schiller is the Internet Engineering Steering group's (IESG) Area Director for Security and oversees security related Working Groups of the Internet Engineering Task Force (IETF). * Cyber Law, Lance Rose, Attorney; contributor to _Wired_ * Update on the World Intellectual Property Organization * Emerging Legal and Public Policy Issues in Developing the National Health Information Infrastructure. Kathleen A. Frawley Director of the Washington, D.C., Office of the American Health Information Management Association * Information Security, Privacy, and Data Integrity Bob Frankston, co-creator of Visicalc, advanced technology projects in the next generation of software at Microsoft. Michael Lesk, Computer Science Research Dept., Bellcore. Technical Program Sessions * Digital Electronic Security Tools in Assuring Data and Image Integrity * Electronic Course Reserves: Fair Use and Copyright Issues * Knowledge Management Databases: Managing Access and Security * Artists' Rights and Electronic Imagery * Protection and Rights Management Schemes for Digital Images * Information Security * International Differences in Information Policies * Privacy, Integrity and Security for the Holocaust Project Database * Privacy and Security Issues in Public Libraries * Issues in Information Privacy and Policy * Social Responsibility and Internet Resources * Policy Issues and Implications for Electronic Retrieval in "Public" Areas * Scientific Data Integrity: Problems and Solutions: Part 1: Biological Data; Part 2: Electronic Data Mgmt * Competitive Intelligence on the Internet: the Latest Techniques * Personal Privacy: an Oxymoron? * Quality of Knowledge -- Using AI Tools and Techniques in Data Mining * Accessing Government Information Continuing Education/Professional Development Saturday, May 31, 1997 * Copyright in an Electronic World , Mickie A. Voges, Chicago Kent School of Law * Preparing for the Explosion of JAVA on the World Wide Web, Micah Beck and Terry Moore, Univ. Tennessee Knoxville. Sunday June 1, 1997 * The Year 2000 Software Crisis: Practical Solutions (9:00 am -11:00am) David Eddy, Global Software , Carla Von Bernewitz, DoD Year 2000 Program Office , Dale Flecker, Harvard University * Harnessing New Technologies for Collaboration, (1:00pm to 5:00pm) Micah Beck and Terry Moore, Univ. Tennessee Knoxville * Introduction to Image Databases, Howard Besser, University of Michigan * Building the Virtual "Intranet" Knowledge Center, Howard McQueen, McQueen Associates * From Boolean/Thesaurus to Non/Boolean/ Free Text Searching: An Information Survey in Historical Perspective, Ev Brenner * Introduction to Computer and Network Security, Michael R. Leach, Harvard University Applied Physics Library, and Geoffrey W. McKim, McKim Group * Data Communications: Understanding the Basics, James E. Rush, Palinet * ASIS Leadership Development Program: Meeting Facilitation (10:00am - Noon) Bonnie Carroll, Information International Associates Tours Friday, May 30: Sedona & Oak Creek Canyon Saturday, May 31: * Frank Lloyd Wright's Taliesin West, * The Heard Museum, * Scottsdale Shopping Sunday, June 1: * Biosphere 2, * Scottsdale Shopping Tuesday, June 3: * An Evening in the Old West - Rawhide ASIS Conference Headquarters - The Radisson Resort Scottsdale Rates: $85.00 single or double occupancy. For reservations Call: (602) 991-3800 or 1(800) 333-3333 Radisson Resort Scottsdale, 7171 North Scottsdale Road, Scottsdale, AZ 85253-3696 American Society for Information Science 8720 Georgia Avenue, Suite 501 Silver Spring, MD 20910 FAX: (301) 495-0810 VOICE: (301) 495-0810 meetings @asis.org http://www.asis.org/ http://www.asis.org/midyear-97/index.html Richard Hill Executive Director, American Society for Information Science 8720 Georgia Avenue, Suite 501 Silver Spring, MD 20910 FAX: (301) 495-0810 Voice: (301) 495-0900 [log in to unmask] http://www.asis.org