Descriptor
Data Collection | 3 |
Data Analysis | 2 |
Databases | 2 |
Laws | 2 |
Privacy | 2 |
Civil Liberties | 1 |
Computer Networks | 1 |
Confidential Records | 1 |
Credit (Finance) | 1 |
Definitions | 1 |
Disclosure | 1 |
More ▼ |
Source
Library Hi Tech | 3 |
Publication Type
Journal Articles | 3 |
Opinion Papers | 3 |
Information Analyses | 2 |
Reports - Descriptive | 2 |
Education Level
Audience
Media Staff | 2 |
Practitioners | 2 |
Administrators | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating

Rubin, Michael Rogers – Library Hi Tech, 1988
The second of three articles on abusive data collection and usage practices and their effect on personal privacy, discusses the evolution of data protection laws worldwide, and compares the scope, major provisions, and enforcement components of the laws. A chronology of key events in the regulation of computer databanks in included. (1 reference)…
Descriptors: Data Collection, Databases, Foreign Countries, Global Approach

Peters, Thomas A.; And Others – Library Hi Tech, 1993
Seven articles discuss aspects of transaction log analysis, including introduction and definitions; history and development; components of an ideal logging facility; research methodologies; applications to a variety of library functions; practical and logical limits of the methodology; and future developments needed to enhance successful use of…
Descriptors: Data Analysis, Data Collection, Definitions, Library Research

Rubin, Michael Rogers – Library Hi Tech, 1987
Describes the development and current uses of computerized databases of information about individuals by the government and private agencies, especially credit bureaus, and discusses three major categories of abusive information practices that threaten personal privacy: information collection, information dissemination, and information management…
Descriptors: Civil Liberties, Computer Networks, Confidential Records, Credit (Finance)