ASIS 1997 Mid-Year Meeting
Technical Program-at-a-Glance

(Correct as the Bulletin is prepared for publication)

Monday, June 2

Plenary Session

9:00 - 10:30 a.m.
Online Privacy & Free Speech: The Munitions Laws & You -- What's Happening with Personal Information and Communications in the Digital Age?
Janlori Goldman, deputy director and co-founder of the Center for Democracy and Technology
Debora Shaw, Indiana University, Moderator

11:00 a.m. - 12:30 p.m.
Update on the World Intellectual Property Organization (WIPO) Meeting Invited Session
>Janlori Goldman, Center for Democracy and Technology
Carol Morrisey, Sidley and Austin
Speaker TBA, Information Industry Association
Bonnie Lawlor, UMI, Moderator

Public Access: Privacy and Security Issues in Public Libraries SIG/IFP
The Threat of Information Feudalism: Encryption and Power. Samantha Hastings, University of North Texas
Public Access, Private Doubt: Public Libraries' Internet Access Policies. Abby Goodrum, University of North Texas
Public Access to Government Information: Report from the GILS Project. June Koelker, Texas Christian University
Universal Service and Open Access to the National Information Infrastructure. John Bertot, Maryland Institute for Policy Analysis & Research
Bill Moen, University of North Texas, Moderator

Electronic Course Reserves: Fair Use and Copyright Issues SIG/ED
Stuart Sutton, Syracuse University
Joseph Catalano, University of California, Berkeley
Kim Kilman, Ken Madden and Sam Hastings, University of North Texas
Ray Larson, University of California, Berkeley, Moderator

2:00 - 3:30 p.m.
Borders in Cyberspace: International Differences in Information Policies Relating to Privacy, Integrity and Data Security SIG/IFP
Peter Weiss, Office of Management and Budget/OIRA
Stephen Saxby, The University, Highfield, Southampton
Prue Adler, Association of Research Libraries
Bonnie Carroll, Information International Associates, Inc., Moderator

Internet Security -- The Good the Bad and the Ugly Invited Session
Jeffrey I. Schiller, author of MIT's Kerberos Authentication system and area director for security for the Internet Engineering Steering Group (IESG)

Privacy, Integrity and Security for the Holocaust Project Database SIG/CRS
Sam Gustman, Survivors of the Shoah Visual History Foundation
Vivian Hay, Getty Museum, Moderator

4:00 - 6:00 p.m.
Issues in Information Privacy and Policy: Contributed Papers
Information Policy Audit: Method and Use. Edwin M. Cortez, University of Wisconsin-Madison
Problems and Issues in Information Privacy. Stacy B. Veeder, Syracuse University
Providing Internet Access to Los Alamos National Laboratory Technical Reports: A Case History in Providing Public Access to Previously Restricted Documents. Ken Collins, Los Alamos National Laboratory

Online Property Rights: Far Beyond Copyright
Lance Rose, Esq., information and high technology law, and author of the book NetLaw, the first legal guide for online service providers.

Caveat Surfer! -- Social Responsibility and Internet Resources SIGs/HFIS, TIS
Internet Resources and Social Responsibility: Virtual Access as Real Nightmare. Thomas J. Froehlich, Kent State University Users' Rights - Users' Wrongs. Rochelle Warwick, CUNY, Baruch College Private Space and Public Lives. Karen Coyle, University of California
Linda Schamber, University of North Texas, Moderator

Policy Issues and Implications for Electronic Retrieval in "Public" Areas: Or, Why Are You Looking over My Shoulder? SIG/CRS
Douglas Kaylor, Wright State University
June Lester, University of Oklahoma
M. Jay Norton, University of Southern Mississippi
M. Jay Norton, University of Southern Mississippi, Moderator

Tuesday, June 3

Plenary Session

9:00 - 10:30 a.m.
Emerging Legal and Public Policy Issues in Developing the National Health Information Infrastructure
Kathleen Frawley, director of the Washington, DC, office of the American Health Information Management Association (AHIMA)
Michael Buckland, University of California, Berkeley, Moderator

11:00 a.m. - 12:30 p.m.
Scientific Data Integrity: Problems and Solutions, Part 1, Biological Data SIGs/MED, STI
Pharmaceutical Data: Problems and Solutions with Clinical Trial Data. Speaker TBA
Patient Record: Perceived Security as a Barrier to Acceptance of Computer Based Systems in Medicine. Douglas Stetson, J.D. Stetson Associates
Biomedical Data: Policy, Planning, Practice Regarding Patient Information. Jacqueline Doyle, Good Samaritan Medical Center
Ann Weller, University of Illinois at Chicago, Moderator

Competitive Intelligence on the Internet: The Latest Techniques SIG/MGT
Bonnie N. Hohhof, Intelligent Info
Jennifer Krueger, Science Industry and Business Library, Moderator

The Role of Digital Electronic Security Tools in Assuring Data and Image Integrity SIGs/PUB, VIS
Michel Bezy, IBM Software Solutions Division
Terry Beamsley, Henry Ford Museum & Greenfield Village
Others TBA
Abby Goodrum, University of North Texas, Moderator

2:00 - 3:30 p.m.
Scientific Data Integrity: Problems and Solutions, Part 2, Electronic Data Management SIGs/MED, STI
Electronic Data Exchange. Ann Weller, University of Illinois at Chicago
Electronic Journals. Jacqueline Trolley, Institute for Scientific Information
Electronic Lab Notebooks. TBA
Genetic Sequence Data Integrity. Barbara Rapp, National Library of Medicine
Kathleen Wile, Boehringer Mannheim Corporation, Moderator

Personal Privacy: An Oxymoron? SIGs/TIS, MED
Evanescent Personal Privacy: How We Are Giving Personal Privacy Away on Purpose. Barbara Flood, Association for Retarded Citizens/Philadelphia Developmental Disabilities Corporation, and William Lutz, Department of Administration & Finance, City of Camden, NJ
The Right to Spy: Government Technology and Privacy. Rochelle Warwick, CUNY, Baruch College
Health Care Dilemma: Preserving Privacy While Providing Access. Douglas Stetson, J.D. Stetson Associates
Thomas J. Froehlich, Kent State University, Moderator

Knowledge Management Databases: Managing Access and Security SIG/MGT
Walter Hamscher, Price-Waterhouse
Beverly Colby, Arthur D. Little, Inc.
Lois A. Rameikis, IPC, Booz Allen Hamilton, Inc.
TBA, Moderator

4:00 - 5:30 p.m.
I Can't Tell You, But I Know It's Mine: Artists' Rights and Electronic Imagery SIGs/VIS, AH, TIS
David Blow, University of North Texas School of Visual Arts
Ricardo Hernandez, Texas Commission on the Arts
Eunice Maguire, Krannert Art Museum, University of Illinois
Jim Angus, Internet and Hypermedia Programs, Natural History Museum of LA County
Russ Pensyl, University of North Texas School of Visual Arts
Terry Beamsley, Henry Ford Museum & Greenfield Village, Moderator

Quality of Knowledge from KDD Processes -- Using AI Tools and Techniques in the Data Mining Step SIG/ALP
TBA, IBM Almaden Research Center
Helen MacMillan, TRW
Douglas Metzler, University of Pittsburgh, Moderator

Digital Library User Studies: Methods and Results
Robert J. Sandusky, University of Illinois, Urbana-Champaign, Moderator

Wednesday, June 4

Plenary Session

9:00 - 10:30 a.m.
Information Security, Privacy and Data Integrity
Bob Frankston, Microsoft
Michael Lesk, Bellcore
Ellen Sleeter, Morris Automation Information Network, Moderator

11:00 a.m. - 12:30 p.m.
A New Definition of Privacy SIGs/CRS, AH
Donor Privacy Issues in the Public Domain. Jack Knokes, Texas Association of Museums
The Electronic Environment and the Buckley Amendment. Sharon Berish, Southeastern Oklahoma State University
Telecommunications and Privacy Issues. Foxy Mason, Mason Associates
Vivian Hay, Getty Museum, Moderator

Protection and Rights Management Schemes for Digital Images SIGs/AH, VIS
Howard Besser, University of California, Berkeley
Richard Hulser, IBM
Christie Stephenson, Getty Information Institute
TBA, Moderator

Information Security: Contributed Papers
A Plain Person's Guide to the Security of Information. Martin Fricke, University of Arizona
Physical Security and Tamper-Indicating Devices. Roger Johnston and Anthony R. E. Garcia, Los Alamos National Laboratory
The Human Face of Electronic Information Security. Martha Higgins and Lisa Laskaris, University of Arizona
Thomas and GPO ACCESS: An Evaluation Study. John T. Cocklin, Dartmouth College

Treasurer Presents ASIS Audit

ASIS Treasurer Ernest DiMattia presented the audited financial statements for fiscal year 1996 at the February meeting of the ASIS Board of Directors. The Board accepted the report.
The full auditor's report is presented on this and the following pages.