Descriptor
| Computer Networks | 2 |
| Information Networks | 2 |
| Privacy | 2 |
| Change | 1 |
| Civil Liberties | 1 |
| Computer Mediated… | 1 |
| Confidential Records | 1 |
| Credit (Finance) | 1 |
| Data Analysis | 1 |
| Data Collection | 1 |
| Databases | 1 |
| More ▼ | |
Source
| Library Hi Tech | 2 |
Publication Type
| Journal Articles | 2 |
| Reports - Descriptive | 2 |
| Opinion Papers | 1 |
Education Level
Audience
| Media Staff | 2 |
| Practitioners | 2 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedLynch, Clifford A. – Library Hi Tech, 1997
Reviews traditional issues surrounding authorization and authentication in an organization-centered framework and introduces new interorganizational issues that dominate networked information environment. Describes three major approaches to authentication and authorization for the interorganizational environment and discusses the following…
Descriptors: Change, Computer Mediated Communication, Computer Networks, Information Networks
Peer reviewedRubin, Michael Rogers – Library Hi Tech, 1987
Describes the development and current uses of computerized databases of information about individuals by the government and private agencies, especially credit bureaus, and discusses three major categories of abusive information practices that threaten personal privacy: information collection, information dissemination, and information management…
Descriptors: Civil Liberties, Computer Networks, Confidential Records, Credit (Finance)


