NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Liu, Yung-Ying – 1974
Materials in the Library of Congress (LC) concerned with the topic of privacy and security in computer systems are listed in this "LC Science Tracer Bullet." The guide includes a total of 59 sources: (1) an introductory source; (2) relevant LC subject headings; (3) basic and additional texts; (4) handbooks, encyclopedias, and…
Descriptors: Computers, Confidential Records, Confidentiality, Data Processing
Peer reviewed Peer reviewed
Gehrke, Charles S. – AEDS Journal, 1973
Discusses ethical, legal, scientific, and technological considerations affecting the confidentiality of information in data systems. (JF)
Descriptors: Computers, Confidential Records, Confidentiality, Data Processing
Darrow, J. W.; Slivka, R. T. – Rutgers Journal of Computers and the Law, 1976
Both accidental and intentional events may compromise the security of an electronic data processing system. Ways of assessing security needs are surveyed, and measures that can be taken to prevent, detect, and recover from security breaches are described. (Author/LBH)
Descriptors: Computer Storage Devices, Computers, Confidential Records, Data Processing
Peer reviewed Peer reviewed
Boruch, Robert F. – Sociology of Education, 1971
The ACE Data Base is compared to others. Devises for maintenance of confidentiality in data collection, transmission, and analysis are evaluated, as well as administrative and ethical regulations, and computer processing. Recommendations follow. (Author/DB)
Descriptors: Civil Liberties, Computers, Confidential Records, Data Processing
Bergart, Jeffrey G.; And Others – 1972
This paper represents a careful study of published works on computer security and access control in computer systems. The study includes a selective annotated bibliography of some eighty-five important published results in the field and, based on these papers, analyzes the state of the art. In annotating these works, the authors try to be…
Descriptors: Annotated Bibliographies, Bibliographies, Computer Oriented Programs, Computer Science
Havens, Robert I. – 1969
The purpose of this discussion is to acquaint pupil personnel workers with some of the applications of computer based information processing systems for pupil services and also to consider some of the legal and ethical concerns relative to data processing in counseling and guidance. Some of the uses discussed are: (1) scheduling; (2) student…
Descriptors: Computer Oriented Programs, Computer Science Education, Computers, Confidential Records