Skip to main content

Search results for "protection policies"

Filters: Computers and Information Technology Computers and Information Technology ×
Viewing 1 - 20 of 20 results by relevance
Proceedings

Summary of Discussions at a Planning Meeting on Cyber-Security and the Insider Threat to Classified Information  (2001)

Proceedings

Computers, Communications, and Public Policy: Report of a Workshop at Woods Hole, Massachusetts, August 14-18, 1978  (1981)

Protecting Individual Privacy in Evaluation Research  (1975)

Proceedings

Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop  (2010)

Consensus Study Report

Critical Information Infrastructure Protection and the Law: An Overview of Key Issues  (2003)

Consensus Study Report

Health Data in the Information Age: Use, Disclosure, and Privacy  (1994)

Consensus Study Report

Private Lives and Public Policies: Confidentiality and Accessibility of Government Statistics  (1993)

Keeping the U.S. Computer Industry Competitive: Defining the Agenda  (1990)

Consensus Study Report

Putting People on the Map: Protecting Confidentiality with Linked Social-Spatial Data  (2007)

Consensus Study Report

Protecting Data Privacy in Health Services Research  (2000)

Proceedings

Opportunities and Challenges for Using Digital Health Applications in Oncology: Proceedings of a Workshop  (2021)

Consensus Study Report

Signposts in Cyberspace: The Domain Name System and Internet Navigation  (2005)

Consensus Study Report

Networking Health: Prescriptions for the Internet  (2000)

Consensus Study Report

Engaging Privacy and Information Technology in a Digital Age  (2007)

Consensus Study Report

Principles and Practices for a Federal Statistical Agency: Third Edition  (2005)

Proceedings

Innovative Flanders: Innovation Policies for the 21st Century: Report of a Symposium  (2008)

Consensus Study Report

Human-System Integration in the System Development Process: A New Look  (2007)

Proceedings

Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy  (2010)

Consensus Study Report

Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment  (2008)

Consensus Study Report

Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities  (2009)