Skip to main content

Search results for "using computerized"

Filters: Information Security and Privacy Information Security and Privacy ×
Viewing 1 - 20 of 29 results by relevance

Use of Computer Graphics Systems for Facilities Design in Public Agencies  (1990)

Consensus Study Report

Private Lives and Public Policies: Confidentiality and Accessibility of Government Statistics  (1993)

Consensus Study Report

Health Data in the Information Age: Use, Disclosure, and Privacy  (1994)

Consensus Study Report

Bits of Power: Issues in Global Access to Scientific Data  (1997)

A Question of Balance: Private Rights and the Public Interest in Scientific and Technical Databases  (1999)

Consensus Study Report

Protecting Data Privacy in Health Services Research  (2000)

Proceedings

Summary of a Workshop on Information Technology Research for Federal Statistics  (2000)

Consensus Study Report

Global Networks and Local Values: A Comparative Look at Germany and the United States  (2001)

Consensus Study Report

Cybersecurity Today and Tomorrow: Pay Now or Pay Later  (2002)

Consensus Study Report

IDs -- Not That Easy: Questions About Nationwide Identity Systems  (2002)

Consensus Study Report

Key Capabilities of an Electronic Health Record System: Letter Report  (2003)

Cybersecurity of Freight Information Systems: A Scoping Study -- Special Report 274  (2003)

Proceedings

Summary of a Workshop on Software Certification and Dependability  (2004)

Consensus Study Report

Expanding Access to Research Data: Reconciling Risks and Opportunities  (2005)

Consensus Study Report

Software for Dependable Systems: Sufficient Evidence?  (2007)

Consensus Study Report

Engaging Privacy and Information Technology in a Digital Age  (2007)

Consensus Study Report

Toward a Safer and More Secure Cyberspace  (2007)

Consensus Study Report

Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment  (2008)

Consensus Study Report

Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health Through Research  (2009)

Consensus Study Report

Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities  (2009)