NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)1
Since 2006 (last 20 years)1
Education Level
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 19 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Hildebrandt, Mireille – Journal of Learning Analytics, 2017
This article is a revised version of the keynote presented at LAK '16 in Edinburgh. The article investigates some of the assumptions of learning analytics, notably those related to behaviourism. Building on the work of Ivan Pavlov, Herbert Simon, and James Gibson as ways of "learning as a machine," the article then develops two levels of…
Descriptors: Behaviorism, Data Processing, Profiles, Learning Processes
Liu, Yung-Ying – 1974
Materials in the Library of Congress (LC) concerned with the topic of privacy and security in computer systems are listed in this "LC Science Tracer Bullet." The guide includes a total of 59 sources: (1) an introductory source; (2) relevant LC subject headings; (3) basic and additional texts; (4) handbooks, encyclopedias, and…
Descriptors: Computers, Confidential Records, Confidentiality, Data Processing
Peer reviewed Peer reviewed
Gehrke, Charles S. – AEDS Journal, 1973
Discusses ethical, legal, scientific, and technological considerations affecting the confidentiality of information in data systems. (JF)
Descriptors: Computers, Confidential Records, Confidentiality, Data Processing
Peer reviewed Peer reviewed
Lonabocker, Louise – College and University, 1990
Distributed computer processing, increasingly common on campuses, brings the convenience of open and broad access to information but must be combined with well-planned and regularly reviewed security measures. Ethical codes must be defined and followed, and a combination of security components required to gain access should be used when possible.…
Descriptors: Access to Information, Codes of Ethics, Confidential Records, Data Processing
Darrow, J. W.; Slivka, R. T. – Rutgers Journal of Computers and the Law, 1976
Both accidental and intentional events may compromise the security of an electronic data processing system. Ways of assessing security needs are surveyed, and measures that can be taken to prevent, detect, and recover from security breaches are described. (Author/LBH)
Descriptors: Computer Storage Devices, Computers, Confidential Records, Data Processing
Peer reviewed Peer reviewed
Boruch, Robert F. – Sociology of Education, 1971
The ACE Data Base is compared to others. Devises for maintenance of confidentiality in data collection, transmission, and analysis are evaluated, as well as administrative and ethical regulations, and computer processing. Recommendations follow. (Author/DB)
Descriptors: Civil Liberties, Computers, Confidential Records, Data Processing
Boruch, Robert F. – 1971
This report examines a series of general models that represent the process of merging records from separate files when it becomes essential to inhibit identifiability of records in at least one of the files. Models are illustrated symbolically by flow diagrams, and examples of each variation are taken from the social sciences. These variations…
Descriptors: Administrative Principles, Confidential Records, Confidentiality, Data Processing
Astin, Alexander W.; Boruch, Robert F. – 1970
The purpose of this article is to describe a system for protecting the anonymity of subjects in longitudinal research and for maintaining the security of data files. The basic system comes from the American Council on Education Cooperative Institutional Research Program. Data is collected from questionnaires, and converted to magnetic tape.…
Descriptors: Computer Storage Devices, Confidential Records, Data Processing, Databases
Bergart, Jeffrey G.; And Others – 1972
This paper represents a careful study of published works on computer security and access control in computer systems. The study includes a selective annotated bibliography of some eighty-five important published results in the field and, based on these papers, analyzes the state of the art. In annotating these works, the authors try to be…
Descriptors: Annotated Bibliographies, Bibliographies, Computer Oriented Programs, Computer Science
Privacy Protection Study Commission, Washington, DC. – 1977
This report of the Privacy Protection Study Commission was prepared in response to a Congressional mandate to study data banks, automatic data processing programs, and information systems of governmental, regional and private organizations to determine standards and procedures in force for the protection of personal information. Recommendations…
Descriptors: Confidential Records, Confidentiality, Data Processing, Databases
Peer reviewed Peer reviewed
Besharov, Douglas J. – Children Today, 1977
Cites shortcomings of existing centralized state systems for processing child protection case records. Diagnostic, monitoring and statistical functions of these registers are described as severely limited by inaccurate and incomplete reporting. Confidentiality of records, subjects' access to records and problems of verification are discussed. (BF)
Descriptors: Case Records, Child Abuse, Child Advocacy, Child Neglect
Havens, Robert I. – 1969
The purpose of this discussion is to acquaint pupil personnel workers with some of the applications of computer based information processing systems for pupil services and also to consider some of the legal and ethical concerns relative to data processing in counseling and guidance. Some of the uses discussed are: (1) scheduling; (2) student…
Descriptors: Computer Oriented Programs, Computer Science Education, Computers, Confidential Records
Peer reviewed Peer reviewed
Siblock, Steve – College and University, 1997
A student information system, repository of most essential customer information and registration data, is especially vulnerable to data corruption because of its many different users. A hypothetical case illustrates how service to a college applicant can be compromised by inattention in system use. Specific areas of system vulnerability are noted,…
Descriptors: College Administration, College Applicants, Confidential Records, Data Processing
Congress of the U.S., Washington, DC. Office of Technology Assessment. – 1993
This report analyzes the implications of computerized medical information and the challenges it brings to individual privacy. The report examines the nature of the privacy interest in health care information and the current state of the law protecting that information; the nature of proposals to computerize health care information and the…
Descriptors: Access to Information, Automation, Computer Networks, Confidential Records
Seipp, David J. – 1975
Concern is growing over the problems of freedom of information, individual right to privacy, and automated recordkeeping systems. As a guide to policy considerations for overview and for detail, this extensive structured bibliography of privacy and disclosure literature adopts a topical scheme, dividing the subject first into governmental and…
Descriptors: Bibliographies, Civil Rights, Computer Science, Confidential Records
Previous Page | Next Page ยป
Pages: 1  |  2