{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T15:40:05Z","timestamp":1654098005277},"reference-count":0,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,7,1]]},"abstract":"<p>Many of the current issues with information privacy have been the result of inadequate consideration for privacy during the planning, design, and implementation of information systems and communication networks. The area of quantum computation is still in its infancy, and a truly functional quantum computer has not been implemented. However, it is anticipated that within the next decade it may be feasible. This presents a unique opportunity to give due consideration to information privacy in the realm of future quantum computational devices and environments while they are still in their infancy. This article provides an overview of the key information privacy issues that we feel may arise with the evolution and realization of quantum computation. Additionally we propose an integrated approach of technical, legal, and social elements to address these issues.<\/p>","DOI":"10.4018\/jisp.2007070101","type":"journal-article","created":{"date-parts":[[2011,2,15]],"date-time":"2011-02-15T18:54:30Z","timestamp":1297796070000},"page":"1-12","source":"Crossref","is-referenced-by-count":1,"title":["A Projection of the Future Effects of Quantum Computation on Information Privacy"],"prefix":"10.4018","volume":"1","author":[{"given":"Geoff","family":"Skinner","sequence":"first","affiliation":[{"name":"Centre for Extended Enterprise and Business Intelligence Curtin University of Technology, Australia"}]},{"given":"Elizabeth","family":"Chang","sequence":"additional","affiliation":[{"name":"Centre for Extended Enterprise and Business Intelligence Curtin University of Technology, Australia"}]}],"member":"2432","container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=2463","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T15:18:45Z","timestamp":1654096725000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jisp.2007070101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2007,7,1]]},"references-count":0,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2007,7]]}},"URL":"https:\/\/doi.org\/10.4018\/jisp.2007070101","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"value":"1930-1650","type":"print"},{"value":"1930-1669","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,7,1]]}}}