The Distortion of Information

  • Peter Nilsson

Abstract

INFORMATION is an important strategic resource that penetrates human affairs. The problem discussed here is a common one—the need for information to answer specific questions. One method is to retrieve it from databases. In the terminology of Ladrière (this volume), information is regarded in this context as a model of the second case.

Keywords

Problem Solver Human Mind Computer Security Criminal History Housing Allowance 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Sources

  1. [1]
    Ashby, W.R., [1963], Introduction to Cybernetics Wiley & SonsGoogle Scholar
  2. [2]
    ASIS. [1974] Proceedings from the Annual Meeting,vol. 11, 1974, Information Utilities.Google Scholar
  3. [3]
    ASIS. [1979], Procedings from the Annual Meeting,vol. 16, 1979. Information, choices and policies.Google Scholar
  4. [4]
    Bailey, R. [ 1983 ], Human Error in Computer Systems, Prentice-Hall, Inc.Google Scholar
  5. [5]
    Bateson, G. [ 1979 ], Mind and Nature, a Necessery Unit, Wildwood House Ltd, Flamingo edition Fontana paperbacks 1985.Google Scholar
  6. [6]
    Bateson, G. [1972], Steps to an Ecology of Mind,Balantine Books.Google Scholar
  7. [7]
    Beer, S. [ 1978 ], Plattform for Change, Wiley, New York, Corrected reprint.Google Scholar
  8. [8]
    Checkland, P. [ 1981 ], Systems Thinking Systems, Practice, Wiley.Google Scholar
  9. [9]
    The Swedish Data Inspection Board: Dnr 2510–80, Dnr 1336–80, Dnr 3019–82.Google Scholar
  10. [10]
    Debons, A., ed. [ 1974 ], Information Science, Search for Identity, Marcel Dekker, Inc., New York and Basel.Google Scholar
  11. [11]
    Göranzon, B. red. [1983], Datautvecklingens Filosofi,Carlsson & Jönsson Bokförlag AB och Arbetslivscentrum.Google Scholar
  12. [12]
    Heibey, H.W., Lutterbeck, B., Töpel, M. [ 1985 ], Organizational Consequences of the Use of EDP—How to Design Information Technology. Computerization and Work. A Reader on Social Aspects of Computerization, A Collection of Articles by members of IFIP WG 9. 1. Edited by Ulrich Briefs, John Kjaer, Jean-Louis Rigal. Springer Verlag.Google Scholar
  13. [13]
    Hellström, T. [ 1985 ], IRI-rapport 1985:3, Oriktigheter i näringsidkares personregister, Institutet för Rättsinformatik, Juridiska Institutionen, Stockholms Universitet.Google Scholar
  14. [14]
    IFIP/SEC’85 Computer Security. [1985], Practical Issues in a Troubled World. Participants ed. Proceedings of the third IFIP International Conference on Computer Security. Dublin, Ireland, 12–15 August, 1985, North-Holland.Google Scholar
  15. [15]
    Langefors, B. [ 1973 ], Theoretical Analysis of Information Systems, Studentlitteratur, Sweden. Auerbach Publishers Inc. Philadelphia, Pa.Google Scholar
  16. [16]
    Machlup, F., Mansfield, U., eds. [ 1983 ] The Study of Information, Interdisciplinary Messages. John Wiley & Sons.Google Scholar
  17. [17]
    Miser, H.J., Quade, E.S. [1985], Handbook of Systems Analysis, Overview of Uses, Procedures, Applications, and Practice John Wiley & Sons.Google Scholar
  18. [18]
    Morris, C.W., [ 1938 ], Foundations of the Theory of Signs, International Encyclopedia of Unified Science volume 1, number 2. The University of Chicago Press, Chicago Illinois.Google Scholar
  19. [19]
    Nilsson, P.; [ 1989 ], Information Quality. An Analysis of Quality Aspects of Information Used in Problemsolving, The Department of Computers and Systems Science, University of Stockholm, (to be published).Google Scholar
  20. [20]
    Nevitt, B. [ 1982 ], Visible and Invisible Bias via Media, SGSR Yearbook XXVII, 1982, Vid. 213–239.Google Scholar
  21. [21]
    Nyberg, B., IRI-rapport [1984], 1984: 2, Samkörning av personregister, Institutet för Rättsinformatik, Juridiska Institutionen, Stockholms Universitet.Google Scholar
  22. [22]
    OTA [ 1982 ], Office of Technology Assessment, Congress of the United States; An Assessment of Alternatives for a National Computerized Criminal History System, october.Google Scholar
  23. [23]
    Pearson, C.R., Slamecka, V. [ 1977 ], Semiotic Foundations of Information Science; Georgia Institute of Technology, Atlanta. School of Information and Computer Science.Google Scholar
  24. [24]
    SCB [1977], Kvalitetsskydd av data, Statskontoret—Statistiska Centralbyran, Liber Tryck Stockholm 1977Google Scholar
  25. [25]
    Schoderbeck, Kefalas [ 1985 ], Management Systems, Conceptual Considerations, Business Publ., Plano, Texas, 3rd ed.Google Scholar
  26. [26]
    SIS: Svensk Standard SS 01 16 88, Databehandling—ADB—säkerhetOrdlista (Data processing—System security—vocabulary) 1981–06–25 (Swedish member of the international organization for standardization, ISO).Google Scholar
  27. [27]
    SIS: Informationssäkernet och dataskydd—en begreppsapparat, Teknisk rapport SIS TR322, 1989–04–01Google Scholar
  28. [28]
    Steinmüller, W. [ 1980 ], Rationalisation and modellification: two complementary implications of information technology. Information Age, vol. 2 no. 4 july.Google Scholar
  29. [29]
    Steinmüller, W. [ 1983 ], Information Technology and Information Law, Information Age, vol. 5 no. 1 january.Google Scholar
  30. [30]
    Steinmüller, W. [ 1984a ], Information Science Analysis of Information systems, Information Age, vol. 6 no. 1 january.Google Scholar
  31. [31]
    Steinmüller, W. [ 1984b ], Consequences of Information Technology, Information Age, vol. 6 no. 3 july.Google Scholar
  32. [32]
    Steinmüller, W. [ 1984c ], Political and Legal Aspects of Industrialized Intellectual Work, Information Age, vol. 6 no. 4 october.Google Scholar
  33. [33]
    Svensson, T. [ 1982 ], IRI-rapport 1982:8, Företagsdata i myndigheternas informationssystem, Institutet för Rättsinformatik, Juridiska Institutionen, Stockholms Universitet.Google Scholar
  34. [34]
    The Swedish National Audit Bureau [ 1985 ], Dnr 1985: 497Google Scholar
  35. [35]
    Wahlgren, P. [ 1982 ], IRI-rapport 1982:6, Rättstatistik, Institutet för Rättsinformatik, Juridiska Institutionen, Stockholms Universitet.Google Scholar
  36. [36]
    Weizenbaum, J. [1983], The Paradoxical Role of the Computer,December 14, 1983. Holst Memorial Lecture.Google Scholar

Copyright information

© Springer Science+Business Media New York 1990

Authors and Affiliations

  • Peter Nilsson

There are no affiliations available

Personalised recommendations