Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Case Studies | 5 |
Information Policy | 5 |
Privacy | 5 |
Information Technology | 3 |
Access to Information | 2 |
Computer Security | 2 |
Computer System Design | 2 |
Foreign Countries | 2 |
Internet | 2 |
Political Issues | 2 |
Risk Management | 2 |
More ▼ |
Source
ProQuest LLC | 2 |
Campus Technology | 1 |
Publication Type
Dissertations/Theses -… | 2 |
Reports - Descriptive | 2 |
Books | 1 |
Information Analyses | 1 |
Journal Articles | 1 |
Opinion Papers | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 1 |
Audience
Location
China | 1 |
United States | 1 |
Laws, Policies, & Programs
Health Insurance Portability… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
AL Faresi, Ahmed – ProQuest LLC, 2011
Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…
Descriptors: Identification, Information Security, Compliance (Legal), Patients
Archibald, Fred – Campus Technology, 2008
When it comes to anti-malware protection, today's university IT departments have their work cut out for them. Network managers must walk the fine line between enabling a highly collaborative, non-restrictive environment, and ensuring the confidentiality, integrity, and availability of data and computing resources. This is no easy task, especially…
Descriptors: Academic Freedom, Integrity, Privacy, Computer Security
Farrall, Kenneth N. – ProQuest LLC, 2009
This dissertation problematizes the "state dossier system" (SDS): the production and accumulation of personal information on citizen subjects exceeding the reasonable bounds of risk management. SDS--comprising interconnecting subsystems of records and identification--damage individual autonomy and self-determination, impacting not only…
Descriptors: Foreign Countries, Case Studies, Social Systems, Risk Management
Garson, G. David – 1995
Computing involves social issues and political choices. Issues such as privacy, computer crime, gender inequity, disemployment, and electronic democracy versus "Big Brother" are addressed in the context of efforts to develop a national public policy for information technology. A broad range of research and case studies are examined in an…
Descriptors: Case Studies, Civil Liberties, Computer Security, Computers
Worlock, David R. – 1996
This paper reviews 10 years of debate in Europe on commercial rights of access to government information, starting with the United Kingdom's innovative Government Tradable Information Guidelines of 1996 and ending with the European Commission's Draft Green Paper on Rights of Access in 1996. United States market development and commercial rights of…
Descriptors: Access to Information, Business, Case Studies, Copyrights