Protection in operating systems
Communications of the ACM
A problem-list of issues concerning computers and public policy
Communications of the ACM
Computer Power and Human Reason: From Judgment to Calculation
Computer Power and Human Reason: From Judgment to Calculation
ACM SIGCAS Computers and Society
EFTS social and technical issues: what are EFTS?
ACM SIGCAS Computers and Society
Money transfer services: a look at the payment messages network
ACM SIGCAS Computers and Society
Six models for the social accountability of computing
ACM SIGCAS Computers and Society
Information technology and dataveillance
Communications of the ACM
A cross-cultural comparison of IS designer values
Communications of the ACM
Privacy policies and practices: inside the organizational maze
Communications of the ACM
Social Analyses of Computing: Theoretical Perspectives in Recent Empirical Research
ACM Computing Surveys (CSUR)
On approaches to the study of social issues in computing
Communications of the ACM
Consumer difficulties with computerized transactions: an empirical investigation
Communications of the ACM
Communications of the ACM
Vulnerabilities of EFTs to intentionally caused losses
Communications of the ACM
Policy, values, and EFT research: anatomy of a research agenda
Communications of the ACM
A status report: the EFTS environment
ACM-SE 18 Proceedings of the 18th annual Southeast regional conference
Choosing Between Competing Design Ideals in Information Systems Development
Information Systems Frontiers
Simulating an electronic fund transfer system
ANSS '79 Proceedings of the 12th annual symposium on Simulation
Value conflicts in the deployment of computing applications
CSC '84 Proceedings of the ACM 12th annual computer science conference on SIGCSE symposium
Electronic funds transfer networks: The impact of performance and security considerations
ANSS '80 Proceedings of the 13th annual symposium on Simulation
Truth in advertising in present and future generation computing
ACM '84 Proceedings of the 1984 annual conference of the ACM on The fifth generation challenge
Automated information systems as social resources in policy making
ACM '78 Proceedings of the 1978 annual conference - Volume 2
Course syllabus & description: the micro-computer revolution
ACM SIGCAS Computers and Society - Computers & society courses
Six models for the social accountability of computing
ACM SIGCAS Computers and Society
Difficulties in realizing large-scale educational computing projects
ACM SIGCUE Outlook
The social dynamics of instrumental computer use
ACM SIGSOC Bulletin
Rob Kling In Search of One Good Theory
The Information Society
Policy, values and EFT research: anatomy of a research agenda
AFIPS '80 Proceedings of the May 19-22, 1980, national computer conference
Hi-index | 48.36 |
During the last few years, computer-based systems which automate the transfer and recording of debits and credits have begun to be implemented on a large scale. These systems promise both financial benefits for the institutions that use them and potential conveniences to their customers. However, they also raise significant social, legal, and technical questions that must be resolved if full scale systems for Electronic Funds Transfer (EFT) are not to cause more problems for the larger public than they solve. This paper examines the incentives for EFT developments and the social problems they raise in the context of conflicts between five different value positions that are often implicit in analyses of proposed EFT arrangements. These conflicts reflect the relative importance of certain problems for specific groups. The value positions implicit in EFT proposals help to organize analyses of market arrangements, system reliability, and privacy of transactions. These topics are analyzed in this article and related to the value positions held by concerned parties. Last, the ways in which the public can learn about the social qualities of different EFT arrangements and the pace of EFT developments are both discussed in the context of social choice.