Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Privacy | 10 |
Tables (Data) | 10 |
Comparative Analysis | 2 |
Computer Security | 2 |
Computers | 2 |
Confidential Records | 2 |
Confidentiality | 2 |
Data Processing | 2 |
Futures (of Society) | 2 |
Higher Education | 2 |
Statistical Analysis | 2 |
More ▼ |
Author
Deitch, Kenneth M. | 1 |
Dempsey, Bert J., Ed. | 1 |
Grant, Susan Marie | 1 |
Jones, Paul, Ed. | 1 |
Kolman, Anita Sue | 1 |
Lambert-Maberly, Ashley | 1 |
Liew, Chong K. | 1 |
Pritchard-Schoch, Teresa | 1 |
Westin, Alan F. | 1 |
Wilkes, Adeline W. | 1 |
Publication Type
Reports - Research | 4 |
Journal Articles | 3 |
Books | 2 |
Reports - Descriptive | 2 |
Reports - Evaluative | 2 |
Historical Materials | 1 |
Numerical/Quantitative Data | 1 |
Reports - General | 1 |
Education Level
Higher Education | 1 |
Two Year Colleges | 1 |
Audience
Practitioners | 1 |
Researchers | 1 |
Teachers | 1 |
Location
Canada | 1 |
Canada (Vancouver) | 1 |
Texas | 1 |
Laws, Policies, & Programs
First Amendment | 1 |
Fourth Amendment | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Data Quality Campaign, 2011
Under security breach response laws, businesses--and sometimes state and governmental agencies--are required to inform individuals when the security, confidentiality or integrity of their personal information has been compromised. This resource provides a state-by-state analysis of security breach response laws. [The Data Quality Campaign has…
Descriptors: State Legislation, Federal Legislation, Laws, Information Security
Lambert-Maberly, Ashley – British Columbia Council on Admissions and Transfer, 2009
This report examines the demographics, performance, and success of students who were admitted to the University of British Columbia's Vancouver campus on the basis of a minimum 24 transfer credits earned at a BC college during the five year period comprising the 2003/04 through 2007/08 academic years. The report mines familiar ground--similar…
Descriptors: College Transfer Students, Grade Point Average, Definitions, Privacy

Liew, Chong K.; And Others – Journal of the American Society for Information Science, 1985
Introduces two data distortion methods (Frequency-Imposed Distortion, Frequency-Imposed Probability Distortion) and uses a Monte Carlo study to compare their performance with that of other distortion methods (Point Distortion, Probability Distortion). Indications that data generated by these two methods produce accurate statistics and protect…
Descriptors: College Faculty, Comparative Analysis, Data Processing, Monte Carlo Methods
Westin, Alan F.; And Others – 1979
This report of a Louis Harris poll on national opinions toward privacy includes the questions asked of each respondent and the responses given in categories related to age, sex, employment, income, and other factors. There are chapters on privacy and the individual; personal privacy in relation to governmental and business institutions; privacy…
Descriptors: Computers, Futures (of Society), Government (Administrative Body), Industry
Congress of the U.S., Washington, DC. Office of Technology Assessment. – 1981
A general introduction to computer based national information systems, and the context and basis for future studies are provided in this report. Chapter One, the introduction, summarizes computers and information systems and their relation to society, the structure of information policy issues, and public policy issues. Chapter Two describes the…
Descriptors: Administration, Computer Science, Computers, Data Processing
Pritchard-Schoch, Teresa – Database, 1995
Examines developments among public record information providers, including a shift from file acquisition to entire company acquisition. Highlights include a table of remote access to public records by state; pricing information; privacy issues; and information about the three main companies offering access to public records: LEXIS, CDB Infotek,…
Descriptors: Access to Information, Corporations, Mergers, Online Systems
Kolman, Anita Sue – 1978
The paper discusses a study of self-disclosure patterns of 29 college men and 35 college women. The purpose of the study was to determine the extent to which college students confided in their best male friend, best female friend, mother, and father about attitudes and opinions, tastes and interests, work and studies, money, personality, and body.…
Descriptors: College Students, Comparative Analysis, Data Analysis, Females

Wilkes, Adeline W.; Grant, Susan Marie – RQ, 1995
Gives a historical explanation of library confidentiality policies and procedures and reviews notable invasions of patron privacy through use of library records by the Federal Bureau of Investigation and the Internal Revenue Service. Also reports on a study that examined patron confidentiality policies in Texas academic library reference…
Descriptors: Academic Libraries, Confidential Records, Confidentiality, Librarians
Dempsey, Bert J., Ed.; Jones, Paul, Ed. – 1998
This book gives an overview of the leading-edge Internet application areas (streaming multimedia, collaborative tools, Web databases) and key information policy issues (privacy, censorship, information quality, and more). The text serves as a primer on understanding the forces--economic, legal, social, as well as technological--that are shaping…
Descriptors: Censorship, Computer Security, Databases, Distance Education
Deitch, Kenneth M. – 1978
Issues are discussed relating to student financial aid and aid policies in higher education. A review of the economic outlook for higher education in the near future is given, with attention to enrollment trends, rising costs, and age distribution for faculty for 1972 and projected for 1990. Competition for students is discussed. The current…
Descriptors: Educational Economics, Eligibility, Family Income, Financial Aid Applicants