NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Type
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 2 results Save | Export
Darrow, J. W.; Slivka, R. T. – Rutgers Journal of Computers and the Law, 1976
Both accidental and intentional events may compromise the security of an electronic data processing system. Ways of assessing security needs are surveyed, and measures that can be taken to prevent, detect, and recover from security breaches are described. (Author/LBH)
Descriptors: Computer Storage Devices, Computers, Confidential Records, Data Processing
Astin, Alexander W.; Boruch, Robert F. – 1970
The purpose of this article is to describe a system for protecting the anonymity of subjects in longitudinal research and for maintaining the security of data files. The basic system comes from the American Council on Education Cooperative Institutional Research Program. Data is collected from questionnaires, and converted to magnetic tape.…
Descriptors: Computer Storage Devices, Confidential Records, Data Processing, Databases