Print

Print


----------------------------Original message----------------------------
INFORMATION PRIVACY, SECURITY, AND DATA INTEGRITY
ASIS 1997 Mid Year Meeting
May 30 - June 3, 1997
Scottsdale, Arizona

Preliminary Program
        We all rely on electronic data, secure, we hope, from compromise.
Technology developments have surpassed social norms and ethics.  Who owns
data?  How can we verify accuracy of data, and verify that data are
authentic?  What can you do when data about you are incorrect or
misappropriated?  What values for privacy, data sharing, and ethical
responsibility will we need?  How can you protect your organization and its
information?  These are the concerns of the 1997 ASIS Mid Year meeting.

Following is the current (2/6/97) program of the 1997 ASIS
Mid Year Meeting.  For up-to-date information, session
descriptions, schedule, registration information, and more,
please see the ASIS Web site at <http://www.asis.org/midyear-97/> or
contact ASIS at the address below.

Special and Plenary Sessions
* Online Privacy and Free Speech: The Munitions Laws & You --
What's Happening with Personal Information and Communications
in the Digital Age?
   Janlori Goldman, Deputy Director/co-founder, Center for
   Democracy and Technology
* Internet Security -- The Good the Bad and the Ugly
   Jeffrey I. Schiller is the Internet Engineering Steering
   group's (IESG) Area Director for Security and oversees
   security related Working Groups of the Internet
   Engineering Task Force (IETF).
* Cyber Law, Lance Rose, Attorney; contributor to _Wired_
* Update on the World Intellectual Property Organization
* Emerging Legal and Public Policy Issues in Developing the
National Health Information Infrastructure.
   Kathleen A. Frawley Director of the Washington, D.C.,
   Office of the American Health Information Management
   Association
* Information Security, Privacy, and Data Integrity
   Bob Frankston, co-creator of Visicalc, advanced technology
    projects in the next generation of software at Microsoft.
   Michael Lesk, Computer Science Research Dept., Bellcore.

Technical Program Sessions
* Digital Electronic Security Tools in Assuring Data and
   Image Integrity
* Electronic Course Reserves: Fair Use and Copyright Issues
* Knowledge Management Databases: Managing Access and
   Security
* Artists' Rights and Electronic Imagery
* Protection and Rights Management Schemes for Digital Images
* Information Security
* International Differences in Information Policies
* Privacy, Integrity and Security for the Holocaust Project
   Database
* Privacy and Security Issues in Public Libraries
* Issues in Information Privacy and Policy
* Social Responsibility and Internet Resources
* Policy Issues and Implications for Electronic Retrieval in
    "Public" Areas
* Scientific Data Integrity: Problems and Solutions:
    Part 1: Biological Data; Part 2: Electronic Data Mgmt
* Competitive Intelligence on the Internet: the Latest
    Techniques
* Personal Privacy: an Oxymoron?
* Quality of Knowledge -- Using AI Tools and Techniques in
    Data Mining
* Accessing Government Information

Continuing Education/Professional Development
Saturday, May 31, 1997
* Copyright in an Electronic World ,  Mickie A. Voges,
    Chicago Kent School of Law
* Preparing for the Explosion of JAVA on the World Wide Web,
   Micah Beck and Terry Moore, Univ. Tennessee Knoxville.

Sunday June 1, 1997
* The Year 2000 Software Crisis: Practical Solutions
   (9:00 am -11:00am) David Eddy, Global Software , Carla Von
   Bernewitz, DoD Year 2000 Program Office , Dale Flecker,
   Harvard University
* Harnessing New Technologies for Collaboration,
   (1:00pm to 5:00pm)
   Micah Beck and Terry Moore, Univ. Tennessee Knoxville
* Introduction to Image Databases, Howard Besser, University
   of Michigan
* Building the Virtual "Intranet" Knowledge Center, Howard
    McQueen, McQueen Associates
* From Boolean/Thesaurus to Non/Boolean/ Free Text Searching:
    An Information Survey in Historical Perspective,
    Ev Brenner
* Introduction to Computer and Network Security, Michael R.
    Leach, Harvard University Applied Physics Library, and
    Geoffrey W. McKim, McKim Group
* Data Communications: Understanding the Basics,
    James E. Rush, Palinet
* ASIS Leadership Development Program: Meeting Facilitation
   (10:00am - Noon)
   Bonnie Carroll, Information International Associates

Tours
Friday, May 30:  Sedona & Oak Creek Canyon
Saturday, May 31: * Frank Lloyd Wright's Taliesin West, * The
Heard Museum, * Scottsdale Shopping
Sunday, June 1: * Biosphere 2, * Scottsdale Shopping
Tuesday, June 3: * An Evening in the Old West - Rawhide

ASIS Conference Headquarters - The Radisson Resort Scottsdale
Rates: $85.00 single or double occupancy.
For reservations Call: (602) 991-3800 or 1(800) 333-3333
Radisson Resort Scottsdale, 7171 North Scottsdale Road,
Scottsdale, AZ 85253-3696

American Society for Information Science
8720 Georgia Avenue, Suite 501
Silver Spring, MD 20910
FAX: (301) 495-0810
VOICE: (301) 495-0810
meetings @asis.org
http://www.asis.org/
http://www.asis.org/midyear-97/index.html

Richard Hill
Executive Director, American Society for Information Science
8720 Georgia Avenue, Suite 501
Silver Spring, MD  20910
FAX: (301) 495-0810
Voice: (301) 495-0900
[log in to unmask]
http://www.asis.org