Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Computers | 8 |
Data Processing | 8 |
Privacy | 8 |
Information Systems | 4 |
Computer Science | 3 |
Higher Education | 3 |
Information Storage | 3 |
Public Policy | 3 |
Administration | 2 |
Databases | 2 |
Information Dissemination | 2 |
More ▼ |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 2 |
Collected Works - Proceedings | 1 |
Guides - Non-Classroom | 1 |
Reference Materials -… | 1 |
Reports - General | 1 |
Education Level
Elementary Secondary Education | 1 |
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
Greece | 1 |
Hawaii | 1 |
More ▼ |
Laws, Policies, & Programs
First Amendment | 1 |
Fourth Amendment | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Computer and Business Equipment Manufacturers Association, Washington, DC. – 1979
Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…
Descriptors: Bibliographies, Computers, Data Processing, Information Systems
Hellman, J. J. – 1970
The report is presented in two parts. The first examines the social and technical implications of information systems vis a vis the individual's ability to control the dissemination of information about himself. It is argued that information systems must incorporate certain properties in their initial design in order to safeguard man's…
Descriptors: Computers, Data Processing, Information Dissemination, Information Retrieval
Powers, David E. – Creative Computing, 1980
A wide range of computer crimes and the need for computer security are discussed. (MK)
Descriptors: Computer Programs, Computer Science, Computer Storage Devices, Computers

Lautsch, John C. – Journal of College and University Law, 1978
The proliferation of computer processing applications on college campuses has created new legal risks for higher education institutions. The history of computer use on campuses, an overview of computer law, and a discussion of the role of the university attorney are presented. (SF)
Descriptors: Computers, Contracts, Copyrights, Data Processing
Nicely, H. Phillip, Jr. – CAUSE/EFFECT, 1980
It is suggested that the director of personnel should be making maximum use of available computer services. Four concerns of personnel directors are cited: number of government reports required, privacy and security, cost of space for personnel records and files, and the additional decision-making tools required for collective bargaining…
Descriptors: Collective Bargaining, Computers, Data Processing, Databases
Congress of the U.S., Washington, DC. Office of Technology Assessment. – 1981
A general introduction to computer based national information systems, and the context and basis for future studies are provided in this report. Chapter One, the introduction, summarizes computers and information systems and their relation to society, the structure of information policy issues, and public policy issues. Chapter Two describes the…
Descriptors: Administration, Computer Science, Computers, Data Processing
Organisation for Economic Cooperation and Development, Paris (France). – 1973
Three categories of issues relating to government policies and computerized data processing are examined. These relate to: 1) central government policies for data development; 2) parliamentary and public concern with the social consequences of computerized data processing; and 3) the international dimensions of developments in data processing.…
Descriptors: Computers, Data Processing, Databases, Government Role
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers