Skip to main content

Search results for Confronting Commercial Sexual Exploitation and Sex Tr

Filters: Information Security and Privacy Information Security and Privacy ×
Viewing 1 - 20 of 66 results by relevance
Proceedings

Beyond Spectre: Confronting New Technical and Policy Challenges: Proceedings of a Workshop  (2019)

Consensus Study Report

Global Networks and Local Values: A Comparative Look at Germany and the United States  (2001)

A Question of Balance: Private Rights and the Public Interest in Scientific and Technical Databases  (1999)

Consensus Study Report

Putting People on the Map: Protecting Confidentiality with Linked Social-Spatial Data  (2007)

Scaling Up: A Research Agenda for Software Engineering  (1989)

Consensus Study Report

Health Data in the Information Age: Use, Disclosure, and Privacy  (1994)

Consensus Study Report

Letter Report for the Committee on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy  (2010)

Consensus Study Report

Protecting Data Privacy in Health Services Research  (2000)

Consensus Study Report

Private Lives and Public Policies: Confidentiality and Accessibility of Government Statistics  (1993)

Proceedings

Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop  (2016)

Proceedings

Summary of Discussions at a Planning Meeting on Cyber-Security and the Insider Threat to Classified Information  (2001)

Proceedings

Facilitating Innovation in the Federal Statistical System: Summary of a Workshop  (2011)

Ada and Beyond: Software Policies for the Department of Defense  (1997)

Proceedings

Privacy Research and Best Practices: Summary of a Workshop for the Intelligence Community  (2016)

Consensus Study Report

Engaging Privacy and Information Technology in a Digital Age  (2007)

Location Data in the Context of Public Health, Research, and Law Enforcement: An Exploration of Governance Frameworks: Proceedings of a Workshop—in Brief  (2022)

Consensus Study Report

At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues  (2014)

Proceedings

Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext: Proceedings of a Workshop  (2016)

Threatening Communications and Behavior: Perspectives on the Pursuit of Public Figures  (2011)