NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Peer reviewed Peer reviewed
Zaiden, Dennis J. – School Management, 1973
Describes EDP (electronic data processing) insurance, which provides coverage for such things as the loss of computer programs and accumulated transaction data, and the consequences of an interruption in processing. Discusses what is and is not covered by EDP insurance, how to plan for EDP insurance, the amount of coverage to get, and how to avoid…
Descriptors: Computer Oriented Programs, Computer Storage Devices, Computers, Data Processing
Hsiao, David K. – 1973
The subject of access control mechanisms in computer systems is concerned with effective means to protect the anonymity of private information on the one hand, and to regulate the access to shareable information on the other hand. Effective means for access control may be considered on three levels: memory, process and logical. This report is a…
Descriptors: Computer Programs, Computer Storage Devices, Computers, Confidentiality
Darrow, J. W.; Slivka, R. T. – Rutgers Journal of Computers and the Law, 1976
Both accidental and intentional events may compromise the security of an electronic data processing system. Ways of assessing security needs are surveyed, and measures that can be taken to prevent, detect, and recover from security breaches are described. (Author/LBH)
Descriptors: Computer Storage Devices, Computers, Confidential Records, Data Processing
Astin, Alexander W.; Boruch, Robert F. – 1970
The purpose of this article is to describe a system for protecting the anonymity of subjects in longitudinal research and for maintaining the security of data files. The basic system comes from the American Council on Education Cooperative Institutional Research Program. Data is collected from questionnaires, and converted to magnetic tape.…
Descriptors: Computer Storage Devices, Confidential Records, Data Processing, Databases
Bergart, Jeffrey G.; And Others – 1972
This paper represents a careful study of published works on computer security and access control in computer systems. The study includes a selective annotated bibliography of some eighty-five important published results in the field and, based on these papers, analyzes the state of the art. In annotating these works, the authors try to be…
Descriptors: Annotated Bibliographies, Bibliographies, Computer Oriented Programs, Computer Science
Everett, Bruce E. – 1977
Current regulations and guidelines established by the Department of Health, Education and Welfare for the maintenance of confidentiality in educational research are summarized. Key terms, such as "system of records" are defined and elaborated upon. The responsibilities of the funding agency and its research contractors are enumerated and…
Descriptors: Administrative Agencies, Agency Role, Civil Liberties, Computer Storage Devices