Descriptor
Computer Storage Devices | 6 |
Legal Problems | 6 |
Databases | 4 |
Copyrights | 3 |
Data Processing | 2 |
Microcomputers | 2 |
Online Systems | 2 |
Classification | 1 |
Comparative Analysis | 1 |
Computer Networks | 1 |
Computer Software | 1 |
More ▼ |
Source
Online | 2 |
Annual Review of Information… | 1 |
Electronic Publishing Review | 1 |
Rutgers Journal of Computers… | 1 |
Visible Language | 1 |
Author
Ansell, Michael | 1 |
Brumm, Eugenia K. | 1 |
Darrow, J. W. | 1 |
Garman, Nancy | 1 |
Slivka, R. T. | 1 |
Wang, Chih | 1 |
Warrick, Thomas S. | 1 |
Publication Type
Journal Articles | 5 |
Information Analyses | 3 |
Opinion Papers | 2 |
Reports - General | 1 |
Reports - Research | 1 |
Tests/Questionnaires | 1 |
Education Level
Audience
Community | 1 |
Media Staff | 1 |
Practitioners | 1 |
Location
Laws, Policies, & Programs
Copyright Law 1976 | 1 |
Assessments and Surveys
What Works Clearinghouse Rating

Ansell, Michael – Visible Language, 1979
Considers systems for the classification of handwriting features, discusses computer storage of information about handwriting features, and summarizes recent studies that give an idea of the range of forensic handwriting research. (GT)
Descriptors: Classification, Computer Storage Devices, Courts, Handwriting
Warrick, Thomas S. – Online, 1984
Discusses downloading of data from databases using microcomputers and mass storage technologies as it relates to copyright laws and legal implications. Topics covered include a definition of copyright; original works; collective works and compilations; fair use; downloading by libraries; court bases; and resolution of uncertainty surrounding…
Descriptors: Computer Storage Devices, Copyrights, Court Litigation, Databases
Darrow, J. W.; Slivka, R. T. – Rutgers Journal of Computers and the Law, 1976
Both accidental and intentional events may compromise the security of an electronic data processing system. Ways of assessing security needs are surveyed, and measures that can be taken to prevent, detect, and recover from security breaches are described. (Author/LBH)
Descriptors: Computer Storage Devices, Computers, Confidential Records, Data Processing
Garman, Nancy – Online, 1986
Describes a survey of 39 database publishers concerning their policies for downloading, i.e., capture of information into machine-readable format from proprietary databases. Discussion covers fair use principle, long-term storage and reuse, policy enforcement, and per record payment principle. Database publishers surveyed profile of survey…
Descriptors: Computer Storage Devices, Copyrights, Database Producers, Databases
Wang, Chih – Electronic Publishing Review, 1986
Reviews definitions and the scope, history, technological capabilities, and other significant issues of electronic publishing. Advantages and disadvantages of electronic publishing are compared to those of traditional publishing, and possible future impacts of electronic publishing on books and libraries are considered. (CDD)
Descriptors: Computer Storage Devices, Copyrights, Data Processing, Databases

Brumm, Eugenia K. – Annual Review of Information Science and Technology, 1991
This summary of the literature on document image processing from 1988-90 focuses on WORM (write once read many) technology and on rewritable (i.e., erasable) optical discs, and excludes CD-ROM. Highlights include vendors and products, standards, comparisons of storage media, software, legal issues, records management, indexing, and computer…
Descriptors: Comparative Analysis, Computer Networks, Computer Software, Computer Storage Devices