Skip to main content

Search results for "wrongly accused"

Filters: Computers and Information Technology Computers and Information Technology ×
Viewing 1 - 20 of 39 results by relevance
Proceedings

Computers, Communications, and Public Policy: Report of a Workshop at Woods Hole, Massachusetts, August 14-18, 1978  (1981)

Protecting Individual Privacy in Evaluation Research  (1975)

Cryptography's Role in Securing the Information Society  (1996)

Consensus Study Report

Critical Information Infrastructure Protection and the Law: An Overview of Key Issues  (2003)

Proceedings

Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext: Proceedings of a Workshop  (2016)

Consensus Study Report

At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues  (2014)

Consensus Study Report

Broadband: Bringing Home the Bits  (2002)

Funding a Revolution: Government Support for Computing Research  (1999)

Consensus Study Report

Improving Risk Communication  (1989)

Consensus Study Report

Health Data in the Information Age: Use, Disclosure, and Privacy  (1994)

Consensus Study Report

A Technical Analysis of the Common Carrier/User Interconnections Area  (1970)

Consensus Study Report

Letter Report for the Committee on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy  (2010)

Consensus Study Report

Who Goes There?: Authentication Through the Lens of Privacy  (2003)

Consensus Study Report

Information Technologies and Social Transformation  (1985)

Consensus Study Report

Computer Assisted Modeling: Contributions of Computational Approaches to Elucidating Macromolecular Structure and Function  (1987)

Consensus Study Report

Computers at Risk: Safe Computing in the Information Age  (1991)

Beyond FTS2000: A Program for Change: Appendix A -- FTS2000 Case Study  (1989)

Proceedings

Electronic Scientific, Technical, and Medical Journal Publishing and Its Implications: Proceedings of a Symposium  (2004)

Consensus Study Report

Engaging Privacy and Information Technology in a Digital Age  (2007)