NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 9 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Özdil, Gülsah; Simsek, Fatma Merve; Tugluk, Mehmet Nur – Southeast Asia Early Childhood, 2021
This is a comparative education study that aims to compare the digital documentation systems used in the preschool education programs and institutions in Turkey, Germany and Spain and to reveal the similarities and differences between these systems. The study was planned as a qualitative research in terms of its descriptive aspect, and as a…
Descriptors: Foreign Countries, Cultural Differences, Preschool Education, Evaluation Methods
Hsiao, D. K.; And Others – 1974
A description is provided of a conceptual model for a data secure system. The discussion first offers a formal working vocabulary and next, using the intuitive idea of a dichotomy between permissible and impermissible accesses, formalizes the idea with an Extended Logical Data Base and with protection specifications and patterns. These…
Descriptors: Computers, Conceptual Schemes, Confidentiality, Databases
Hsiao, D. K.; And Others – 1974
Although the indispensibility of access control mechanisms in data secure systems has been recognized, there is a need for more subtle protection and refined control mechanisms. This report describes context protection mechanisms which enable the same data unit to be protected differently in different contexts, the differences being determined by…
Descriptors: Computer Programs, Computer Science, Confidentiality, Data Processing
Peer reviewed Peer reviewed
Nisenoff, Norman; And Others. – Information Processing and Management, 1979
Considers the implications of possible policy initiatives in the United States in light of Swedish experience in dealing with the privacy of computerized records. (CWM)
Descriptors: Case Studies, Confidential Records, Confidentiality, Federal Regulation
Sutton, Robert – 1974
Privacy is defined and its various social implications discussed in the first part of this paper. The effect of a National Data Center (NDC) and computerized dossiers about people and their past is also considered. It is determined that a computerized information system would present at least four distinct problems to individual identity or…
Descriptors: Computer Storage Devices, Confidentiality, Credibility, Data Processing
Sawtelle, Thomas K. – 1973
The Air Force Logistics Command (AFLC) is revising and enhancing its data-processing capabilities with the development of a large-scale, multi-site, on-line, integrated data base information system known as the Advanced Logistics System (ALS). A data integrity program is to be built around a Data Base Manager (DBM), an individual or a group of…
Descriptors: Computer Oriented Programs, Computer Programs, Computers, Confidentiality
Westin, Alan F. – 1976
This is a report of an interdisciplinary team which: (1) examined the literature from medicine and health, law, computing, and social science; (2) conducted interviews with manufacturers, developers, health professionals, consumers, and public interest groups; (3) made site visits to health organizations using computers; (4) corresponded with…
Descriptors: Civil Liberties, Computer Oriented Programs, Confidentiality, Data Collection
Peer reviewed Peer reviewed
Meerzo, Albert K. – College and University, 1989
A survey of about 100 institutions representing a wide range of types sought information on the procedures and policies for certification and transcript transactions, including financial support, fees, billing and payment, unofficial copies, record storage and access, turnaround time, confidentiality, and staff assignment. Results are reported.…
Descriptors: Academic Records, Access to Information, Certification, College Administration
Kean, Michael H. – 1976
The Buckley Amendment, formally entitled the Family Educational Rights and Privacy Act of 1974, grants parents the right to review all records that schools maintain on their children, and to force the removal of any inaccurate or misleading data. However, its major impact on educational research is linked to its provision requiring written…
Descriptors: Confidential Records, Confidentiality, Data, Data Collection