Descriptor
| Computer Storage Devices | 2 |
| Confidential Records | 2 |
| Data Processing | 2 |
| Databases | 2 |
| Information Systems | 2 |
| Security | 2 |
| Computers | 1 |
| Filing | 1 |
| Higher Education | 1 |
| Information Storage | 1 |
| Legal Problems | 1 |
| More ▼ | |
Publication Type
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Darrow, J. W.; Slivka, R. T. – Rutgers Journal of Computers and the Law, 1976
Both accidental and intentional events may compromise the security of an electronic data processing system. Ways of assessing security needs are surveyed, and measures that can be taken to prevent, detect, and recover from security breaches are described. (Author/LBH)
Descriptors: Computer Storage Devices, Computers, Confidential Records, Data Processing
Astin, Alexander W.; Boruch, Robert F. – 1970
The purpose of this article is to describe a system for protecting the anonymity of subjects in longitudinal research and for maintaining the security of data files. The basic system comes from the American Council on Education Cooperative Institutional Research Program. Data is collected from questionnaires, and converted to magnetic tape.…
Descriptors: Computer Storage Devices, Confidential Records, Data Processing, Databases


