Browse All Topics

Computers and Information Technology

Computers and Information Technology : Information Security and Privacy
Beyond the HIPAA Privacy Rule:Enhancing Privacy, Improving Health Through Research

In the realm of health care, privacy protections are needed to preserve patients' dignity and prevent possible harms. Ten years ago, to address these concerns as well as set guidelines for ethical health research, Congress called for a set of ...

Protecting Student Records and Facilitating Education Research:A Workshop Summary

Designed to protect the privacy of individual student test scores, grades, and other education records, the Family Educational Rights and Privacy Act (FERPA) of 1974 places limits the access of educational researches, and slows research not only in education but ...

Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment

All U.S. agencies with counterterrorism programs that collect or "mine" personal data -- such as phone records or Web sites visited -- should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can ...

Toward a Safer and More Secure Cyberspace

Given the growing importance of cyberspace to nearly all aspects of national life, a secure cyberspace is vitally important to the nation, but cyberspace is far from secure today. The United States faces the real risk that adversaries will exploit ...

Software for Dependable Systems: Sufficient Evidence?

The focus of Software for Dependable Systems is a set of fundamental principles that underlie software system dependability and that suggest a different approach to the development and assessment of dependable software.

Unfortunately, it is difficult to assess the ...

Engaging Privacy and Information Technology in a Digital Age

Privacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly boundaryless options for collecting, saving, sharing, and comparing information trigger consumer worries. Online practices of business and government ...

Putting People on the Map: Protecting Confidentiality with Linked Social-Spatial Data

Precise, accurate spatial information linked to social and behavioral data is revolutionizing social science by opening new questions for investigation and improving understanding of human behavior in its environmental context. At the same time, precise spatial data make it ...

Improving Business Statistics Through Interagency Data Sharing: Summary of a Workshop

U.S. business data are used broadly, providing the building blocks for key national—as well as regional and local—statistics measuring aggregate income and output, employment, investment, prices, and productivity. Beyond aggregate statistics, individual- and firm-level data are used for a wide ...

Summary of a Workshop on the Technology, Policy, and Cultural Dimensions of Biometric Systems

Biometrics—the use of physiological and behavioral characteristics for identification purposes—has been promoted as a way to enhance security and identification efficiency. There are questions, however, about, among other issues, the effectiveness of biometric security measures, usability, and the social ...

Expanding Access to Research Data: Reconciling Risks and Opportunities

Policy makers need information about the nation—ranging from trends in the overall economy down to the use by individuals of Medicare—in order to evaluate existing programs and to develop new ones. This information often comes from research based on data about individual people, ...