NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Genova, Gina L. – Business Communication Quarterly, 2010
The 20th-century office is dead. According to "Telework Trendlines 2009," WorldatWork's new survey of more than 1,000 U.S. adults, the number of Americans working remotely at least once a month jumped 39%, from 12.4 million in 2006 to 17.2 million in 2008. Last year Congress even introduced bills that would encourage and expand telework programs…
Descriptors: Working Hours, Teleworking, Employees, Courts
Hsiao, David K. – 1973
The subject of access control mechanisms in computer systems is concerned with effective means to protect the anonymity of private information on the one hand, and to regulate the access to shareable information on the other hand. Effective means for access control may be considered on three levels: memory, process and logical. This report is a…
Descriptors: Computer Programs, Computer Storage Devices, Computers, Confidentiality
Sutton, Robert – 1974
Privacy is defined and its various social implications discussed in the first part of this paper. The effect of a National Data Center (NDC) and computerized dossiers about people and their past is also considered. It is determined that a computerized information system would present at least four distinct problems to individual identity or…
Descriptors: Computer Storage Devices, Confidentiality, Credibility, Data Processing
Peer reviewed Peer reviewed
Bank, Rheta; Laska, Eugene M. – Evaluation and Program Planning, 1978
These aspects of maintaining the security of computer-processed information concerning mental health patients are discussed: legal protection, technological safeguards, and managerial responsibility. (CTM)
Descriptors: Administration, Administrator Role, Computer Storage Devices, Confidential Records
Bergart, Jeffrey G.; And Others – 1972
This paper represents a careful study of published works on computer security and access control in computer systems. The study includes a selective annotated bibliography of some eighty-five important published results in the field and, based on these papers, analyzes the state of the art. In annotating these works, the authors try to be…
Descriptors: Annotated Bibliographies, Bibliographies, Computer Oriented Programs, Computer Science
Everett, Bruce E. – 1977
Current regulations and guidelines established by the Department of Health, Education and Welfare for the maintenance of confidentiality in educational research are summarized. Key terms, such as "system of records" are defined and elaborated upon. The responsibilities of the funding agency and its research contractors are enumerated and…
Descriptors: Administrative Agencies, Agency Role, Civil Liberties, Computer Storage Devices