Descriptor
Computer Networks | 5 |
Confidentiality | 5 |
Privacy | 5 |
Computer Security | 3 |
Users (Information) | 3 |
Access to Information | 2 |
Higher Education | 2 |
Information Networks | 2 |
Information Policy | 2 |
Information Systems | 2 |
Information Technology | 2 |
More ▼ |
Source
EDUCAUSE Quarterly | 1 |
Author
Anderson, John A. | 1 |
Denning, Dorothy E., Ed. | 1 |
Lin, Herbert S., Ed. | 1 |
Qayoumi, Mohammad H. | 1 |
Woody, Carol | 1 |
Publication Type
Reports - Evaluative | 2 |
Books | 1 |
Journal Articles | 1 |
Legal/Legislative/Regulatory… | 1 |
Reports - Descriptive | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
General Accounting Office, Washington, DC. – 1995
This report focuses on the pivotal technical issues associated with the National Information Infrastructure program, security and privacy, interoperability, and reliability, and presents the General Accounting Office's findings on these challenges. It is reported that while the structures and services to be offered by the information superhighway…
Descriptors: Communications, Computer Networks, Computer Security, Confidentiality
Denning, Dorothy E., Ed.; Lin, Herbert S., Ed. – 1994
This report is based on a November 1992 workshop and a February 1993 public forum which discussed some of the social issues raised by the emergence of electronic communities. The workshop examined user, provider, and other perspectives on different types of networked communities, including those on the Internet, commercial information services,…
Descriptors: Access to Information, Censorship, Computer Networks, Confidentiality
Anderson, John A. – 1996
Information Technology (IT) personnel in higher education requirement at Mary Washington College, Virginia. The goal of the creativity, promote freedom of speech, support research and investigation, and provide information access globally, while demonstrating proper use and protection of the data of which they are in charge. This paper addresses…
Descriptors: Codes of Ethics, Computer Networks, Computer Security, Confidentiality
Congress of the U.S., Washington, DC. Office of Technology Assessment. – 1993
This report analyzes the implications of computerized medical information and the challenges it brings to individual privacy. The report examines the nature of the privacy interest in health care information and the current state of the law protecting that information; the nature of proposals to computerize health care information and the…
Descriptors: Access to Information, Automation, Computer Networks, Confidential Records
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy