Subject(s)
Biomedical Research/legislation & jurisprudence , Genome, Human/physiology , Government Regulation , Human Genetics/legislation & jurisprudence , Practice Guidelines as Topic , Biomedical Research/ethics , Biomedical Research/history , Biomedical Research/standards , Computer Security/ethics , Computer Security/history , Computer Security/legislation & jurisprudence , Ethicists/history , Ethicists/legislation & jurisprudence , Genetic Privacy/ethics , Genetic Privacy/legislation & jurisprudence , Government Regulation/history , Healthy Volunteers , History, 21st Century , Human Genetics/ethics , Human Genetics/history , Human Genetics/standards , Humans , Japan , Practice Guidelines as Topic/standardsSubject(s)
Computer Security , Equipment and Supplies , Research , Computer Security/history , Computer Security/instrumentation , Computer Security/standards , Computer Security/trends , Equipment and Supplies/standards , History, 21st Century , Humans , Ohio , Research/history , Research/organization & administration , Research/standardsSubject(s)
Computer Security/statistics & numerical data , Sexism/prevention & control , Sexism/statistics & numerical data , Black or African American/statistics & numerical data , Biometric Identification , Computer Security/economics , Computer Security/history , Female , History, 20th Century , History, 21st Century , Humans , Leadership , Male , Military Science , Sex Factors , Stereotyped Behavior , Women's Rights/history , Women's Rights/statistics & numerical data , Women's Rights/trends , Workforce , Workplace/statistics & numerical dataSubject(s)
Computer Security/statistics & numerical data , Sexism/prevention & control , Women , Workforce/statistics & numerical data , Biometric Identification , Computer Security/economics , Computer Security/history , Crime Victims/statistics & numerical data , Female , Fraud/prevention & control , History, 20th Century , Humans , Information Technology/history , Information Technology/statistics & numerical data , Inventions/history , Male , Military Personnel/history , Military Personnel/statistics & numerical data , Sexism/history , Sexism/statistics & numerical data , Women/history , Workforce/historySubject(s)
Computer Security , Medical Informatics , Computer Security/history , Computer Security/legislation & jurisprudence , Computer Security/standards , History, 20th Century , History, 21st Century , Humans , Medical Informatics/history , Medical Informatics/legislation & jurisprudence , Medical Informatics/organization & administration , Medical Informatics/standardsSubject(s)
Computer Security/history , Homosexuality, Male/history , Mathematics/history , History, 20th Century , Humans , Male , United KingdomABSTRACT
The use of the Social Security number (SSN) has expanded significantly since its inception in 1936. Created merely to keep track of the earnings history of U.S. workers for Social Security entitlement and benefit computation purposes, it has come to be used as a nearly universal identifier. Assigned at birth, the SSN enables government agencies to identify individuals in their records and businesses to track an individual's financial information. This article explores the history and meaning of the SSN and the Social Security card, as well as the Social Security Administration's (SSA's) SSN master file, generally known as the Numident. The article also traces the historical expansion of SSN use and the steps SSA has taken to enhance SSN integrity.