NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
AL Faresi, Ahmed – ProQuest LLC, 2011
Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…
Descriptors: Identification, Information Security, Compliance (Legal), Patients
Agee, Kelly, Ed. – Research and Curriculum Unit, 2009
Secondary vocational-technical education programs in Mississippi are faced with many challenges resulting from sweeping educational reforms at the national and state levels. Schools and teachers are increasingly being held accountable for providing true learning activities to every student in the classroom. This accountability is measured through…
Descriptors: Information Technology, Educational Technology, Teaching Methods, Computer Science Education
Congress of the U.S., Washington, DC. House Committee on Science, Space and Technology. – 1994
This hearing explores how the High Performance Computing and Communications Program (HPCC) relates to the technology needs of industry. Testimony and prepared statements from the following witnesses on future effects of computing and networking technologies on their companies are included: (1) F. Brett Berlin, president, Brett Berlin Associates,…
Descriptors: Computer Networks, Computer System Design, Federal Legislation, Futures (of Society)