NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
AL Faresi, Ahmed – ProQuest LLC, 2011
Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…
Descriptors: Identification, Information Security, Compliance (Legal), Patients
Peer reviewed Peer reviewed
Colyer, Anita – American Journal of Distance Education, 1997
Examines copyright issues related to online course development and delivery. Provides a brief history of copyright law. Examples of recent lawsuits and several case studies provide a context for examination of fair-use issues and liability for online copyright infringement. Presents questions to consider on topics such as process issues,…
Descriptors: Case Studies, Computer Assisted Instruction, Computer Software, Computer Uses in Education
Worlock, David R. – 1996
This paper reviews 10 years of debate in Europe on commercial rights of access to government information, starting with the United Kingdom's innovative Government Tradable Information Guidelines of 1996 and ending with the European Commission's Draft Green Paper on Rights of Access in 1996. United States market development and commercial rights of…
Descriptors: Access to Information, Business, Case Studies, Copyrights
Tellis, Winston – 1998
The goal of this study was to determine the information technology needs at Fairfield University (Connecticut) in a client/server environment. The primary objectives were: to develop an instrument to assess the information technology needs of the user community, with particular emphasis on client/server computing and the Internet as a result of…
Descriptors: Access to Information, Case Studies, College Faculty, Computer Uses in Education