Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Rein Turn is active.

Publication


Featured researches published by Rein Turn.


national computer conference | 1983

Resiliency of the computerized society

Rein Turn; Eric J. Novotny

Computers support nearly every functional area of a modern society. Consequently, when malfunctions or software errors occur, or when computing support is not available for other reasons, disruptions may result. In networked systems, disruptions may spread and seriously impair an entire functional area of the country. Has computerization produced a new vulnerability for society? Or is society intrinsically resilient and able to absorb large disruptions without grave and lasting societal consequences? This paper analyzes these and related questions. The conclusion is that modern societies (at least the United States) still appear to be resilient. Suggestions for maintaining resiliency are made.


ieee symposium on security and privacy | 1990

Information privacy issues for the 1990s

Rein Turn

Information privacy deals with protecting individuals against potential violations of their rights due to collection, storage, and use of personal information by the government and private sector organizations. The privacy protection laws enacted in the 1970s are inadequate and limited in scope. New applications of computer-communications technology involving personal information are now emerging for the decade of the 1990s and create new potentials for privacy violations. The basics of privacy protection, examples of the new technologies, and the need for new privacy laws are discussed.<<ETX>>


Archive | 1986

Security, Privacy, Safety and Resiliency in Computation

Rein Turn

Recent advances in computer technology are making available, at acceptable cost, computer systems with virtually unlimited processing power, storage capacity, and capability for data communication. The very large scale integration (VLSI) technology permits placing on single chips tens of thousands of logic circuits or millions of bits of memory, and to mass-produce these for near-negligible cost [1]. It is economical, therefore, to maximize the use of computer technology in any system. Such use produces old products and services in new, digital form, and engenders new services or products. The digital telephone, electronic funds transfer systems (EFTS), and the “fifth generation” knowledge-based information systems [2] are examples of such new developments.


national computer conference | 1980

Privacy protection and transborder data flows

Rein Turn

In the last decade there has been a dramatic increase in the growth of internationally operated computer-communication systems. In these systems, in essentially a single continuous operation, data are transmitted from terminals to computers in networks that may span several countries or several continents, the requested processing is performed, and results are returned. In other cases, data files are maintained online in international, remotely accessible networks. These networks are operated by vendors of remote computing and/or information services, industry associations, or private corporations (especially the so-called multinational corporations). Some of the data transmitted in these systems are personal data about individuals.


computer software and applications conference | 1978

Technical aspects of privacy protection

Rein Turn

Laws now in effect in the United States grant certain privacy rights to individual citizens vis-a-vis federal agencies, state government agencies in several states, and certain organizations in the private sector that maintain personal information on them in automated record-keeping systems. Pending are bills to extend privacy protection to the entire private sector. Implementation of privacy protection requirements involves numerous technical considerations that are discussed in this paper. Unless these technical aspects and their limitations are taken into account when the privacy protection requirements are legislated, implementation of the requirements may turn out to be technically infeasible or economically unacceptable and, correspondingly, protection provided may be largely illusory.


fall joint computer conference | 1986

Security and privacy requirements in computing

Rein Turn


national computer conference | 1982

Private sector needs for trusted/secure computer systems

Rein Turn


ACM Sigcas Computers and Society | 1984

Courses on societal impacts of computers

Rein Turn


ieee symposium on security and privacy | 1982

Privacy Protection in the 1980s

Rein Turn


ieee symposium on security and privacy | 1980

An Overview of Transborder Data Flow Issues

Rein Turn

Collaboration


Dive into the Rein Turn's collaboration.

Researchain Logo
Decentralizing Knowledge