ASIS 1997 Mid-Year Meeting
Technical Program-at-a-Glance
(Correct as the Bulletin is prepared for publication)
11:00 a.m. - 12:30 p.m.
Update on the World Intellectual Property Organization (WIPO) Meeting Invited Session
>Janlori Goldman, Center for Democracy and Technology
Carol Morrisey, Sidley and Austin
Speaker TBA, Information Industry Association
Bonnie Lawlor, UMI, Moderator
Public Access: Privacy and Security Issues in Public Libraries SIG/IFP
The Threat of Information Feudalism: Encryption and Power. Samantha Hastings, University of
North Texas
Public Access, Private Doubt: Public Libraries' Internet Access Policies. Abby Goodrum,
University of North Texas
Public Access to Government Information: Report from the GILS Project. June Koelker, Texas
Christian University
Universal Service and Open Access to the National Information Infrastructure. John Bertot,
Maryland Institute for Policy Analysis & Research
Bill Moen, University of North Texas, Moderator
Electronic Course Reserves: Fair Use and Copyright Issues SIG/ED
Stuart Sutton, Syracuse University
Joseph Catalano, University of California, Berkeley
Kim Kilman, Ken Madden and Sam Hastings, University of North Texas
Ray Larson, University of California, Berkeley, Moderator
2:00 - 3:30 p.m.
Borders in Cyberspace: International Differences in Information Policies Relating to Privacy,
Integrity and Data Security SIG/IFP
Peter Weiss, Office of Management and Budget/OIRA
Stephen Saxby, The University, Highfield, Southampton
Prue Adler, Association of Research Libraries
Bonnie Carroll, Information International Associates, Inc., Moderator
Internet Security -- The Good the Bad and the Ugly Invited Session
Jeffrey I. Schiller, author of MIT's Kerberos Authentication system and area director for security
for the Internet Engineering Steering Group (IESG)
Privacy, Integrity and Security for the Holocaust Project Database SIG/CRS
Sam Gustman, Survivors of the Shoah Visual History Foundation
Vivian Hay, Getty Museum, Moderator
4:00 - 6:00 p.m.
Issues in Information Privacy and Policy: Contributed Papers
Information Policy Audit: Method and Use. Edwin M. Cortez, University of Wisconsin-Madison
Problems and Issues in Information Privacy. Stacy B. Veeder, Syracuse University
Providing Internet Access to Los Alamos National Laboratory Technical Reports: A Case History
in Providing Public Access to Previously Restricted Documents. Ken Collins, Los Alamos
National Laboratory
Online Property Rights: Far Beyond Copyright
Lance Rose, Esq., information and high technology law, and author of the book NetLaw, the first
legal guide for online service providers.
Caveat Surfer! -- Social Responsibility and Internet Resources SIGs/HFIS, TIS
Internet Resources and Social Responsibility: Virtual Access as Real Nightmare. Thomas J.
Froehlich, Kent State University Users' Rights - Users' Wrongs. Rochelle Warwick, CUNY,
Baruch College Private Space and Public Lives. Karen Coyle, University of California
Linda Schamber, University of North Texas, Moderator
Policy Issues and Implications for Electronic Retrieval in "Public" Areas: Or, Why Are You
Looking over My Shoulder? SIG/CRS
Douglas Kaylor, Wright State University
June Lester, University of Oklahoma
M. Jay Norton, University of Southern Mississippi
M. Jay Norton, University of Southern Mississippi, Moderator
Tuesday, June 3
Plenary Session
9:00 - 10:30 a.m.
Emerging Legal and Public Policy Issues in Developing the National Health Information
Infrastructure
Kathleen Frawley, director of the Washington, DC, office of the American Health Information
Management Association (AHIMA)
Michael Buckland, University of California, Berkeley, Moderator
11:00 a.m. - 12:30 p.m.
Scientific Data Integrity: Problems and Solutions, Part 1, Biological Data SIGs/MED, STI
Pharmaceutical Data: Problems and Solutions with Clinical Trial Data. Speaker TBA
Patient Record: Perceived Security as a Barrier to Acceptance of Computer Based Systems in
Medicine. Douglas Stetson, J.D. Stetson Associates
Biomedical Data: Policy, Planning, Practice Regarding Patient Information. Jacqueline Doyle,
Good Samaritan Medical Center
Ann Weller, University of Illinois at Chicago, Moderator
Competitive Intelligence on the Internet: The Latest Techniques SIG/MGT
Bonnie N. Hohhof, Intelligent Info
Jennifer Krueger, Science Industry and Business Library, Moderator
The Role of Digital Electronic Security Tools in Assuring Data and Image Integrity SIGs/PUB,
VIS
Michel Bezy, IBM Software Solutions Division
Terry Beamsley, Henry Ford Museum & Greenfield Village
Others TBA
Abby Goodrum, University of North Texas, Moderator
2:00 - 3:30 p.m.
Scientific Data Integrity: Problems and Solutions, Part 2, Electronic Data Management
SIGs/MED, STI
Electronic Data Exchange. Ann Weller, University of Illinois at Chicago
Electronic Journals. Jacqueline Trolley, Institute for Scientific Information
Electronic Lab Notebooks. TBA
Genetic Sequence Data Integrity. Barbara Rapp, National Library of Medicine
Kathleen Wile, Boehringer Mannheim Corporation, Moderator
Personal Privacy: An Oxymoron? SIGs/TIS, MED
Evanescent Personal Privacy: How We Are Giving Personal Privacy Away on Purpose. Barbara
Flood, Association for Retarded Citizens/Philadelphia Developmental Disabilities Corporation,
and William Lutz, Department of Administration & Finance, City of Camden, NJ
The Right to Spy: Government Technology and Privacy. Rochelle Warwick, CUNY, Baruch
College
Health Care Dilemma: Preserving Privacy While Providing Access. Douglas Stetson, J.D.
Stetson Associates
Thomas J. Froehlich, Kent State University, Moderator
Knowledge Management Databases: Managing Access and Security SIG/MGT
Walter Hamscher, Price-Waterhouse
Beverly Colby, Arthur D. Little, Inc.
Lois A. Rameikis, IPC, Booz Allen Hamilton, Inc.
TBA, Moderator
4:00 - 5:30 p.m.
I Can't Tell You, But I Know It's Mine: Artists' Rights and Electronic Imagery SIGs/VIS, AH,
TIS
David Blow, University of North Texas School of Visual Arts
Ricardo Hernandez, Texas Commission on the Arts
Eunice Maguire, Krannert Art Museum, University of Illinois
Jim Angus, Internet and Hypermedia Programs, Natural History Museum of LA County
Russ Pensyl, University of North Texas School of Visual Arts
Terry Beamsley, Henry Ford Museum & Greenfield Village, Moderator
Quality of Knowledge from KDD Processes -- Using AI Tools and Techniques in the Data
Mining Step SIG/ALP
TBA, IBM Almaden Research Center
Helen MacMillan, TRW
Douglas Metzler, University of Pittsburgh, Moderator
Digital Library User Studies: Methods and Results
Robert J. Sandusky, University of Illinois, Urbana-Champaign, Moderator
11:00 a.m. - 12:30 p.m.
A New Definition of Privacy SIGs/CRS, AH
Donor Privacy Issues in the Public Domain. Jack Knokes, Texas Association of Museums
The Electronic Environment and the Buckley Amendment. Sharon Berish, Southeastern
Oklahoma State University
Telecommunications and Privacy Issues. Foxy Mason, Mason Associates
Vivian Hay, Getty Museum, Moderator
Protection and Rights Management Schemes for Digital Images SIGs/AH, VIS
Howard Besser, University of California, Berkeley
Richard Hulser, IBM
Christie Stephenson, Getty Information Institute
TBA, Moderator
Information Security: Contributed Papers
A Plain Person's Guide to the Security of Information. Martin Fricke, University of Arizona
Physical Security and Tamper-Indicating Devices. Roger Johnston and Anthony R. E. Garcia,
Los Alamos National Laboratory
The Human Face of Electronic Information Security. Martha Higgins and Lisa Laskaris,
University of Arizona
Thomas and GPO ACCESS: An Evaluation Study. John T. Cocklin, Dartmouth College
Treasurer Presents ASIS Audit
ASIS Treasurer Ernest DiMattia presented the audited financial statements for fiscal year 1996 at
the February meeting of the ASIS Board of Directors. The Board accepted the report.
The full auditor's report is presented on this and the following pages.