Search results

Jump to: navigation, search
  • Welcome to the Autumn 2004 course Wiki for Information Technology & Public Policy (UW CSE P 590TU // UC Berkeley PP 190/290-009 // UCSD CSE 291). ...edu/~scotch/maurer.htm Steve Maurer], UC Berkeley Goldman School of Public Policy
    6 KB (897 words) - 04:04, 22 August 2005
  • ...ific data is a great one lying squarely at the interface of technology and policy. Privacy/Encryption/IDs
    650 bytes (104 words) - 03:56, 19 October 2004
  • *"IT Outsourcing Policy", [[Student Projects:IT Outsourcing]] ...Outsourcing: Economic and Policy Analysis", [[IT Outsourcing: Economic and Policy Analysis]]
    6 KB (806 words) - 04:55, 21 November 2004
  • ...intro piece. I'm happy to be an overview type editor--I was an editor at a policy journal before coming to UW and miss it. ...ngly, I'd suggest we want to focus on a particular problem confronting the policy-maker, explain it thoroughly, and offer him options for fixing it. In my mi
    27 KB (4,353 words) - 00:08, 9 November 2004
  • *"IT Outsourcing Policy", [[Student Projects:IT Outsourcing]] *"IT Outsourcing Policy: Economic and Policy Analysis", [[IT_Outsourcing:_Economic_and_Policy_Analysis]]
    7 KB (944 words) - 20:08, 14 November 2004
  • ...tems and assess costs and benefits of these approaches. We then consider a policy solution, namely whether software engineering should be licensed as civil e * Beyond the Horizon: A Call to Arms, Jeannette M. Wing, IEEE Security and Privacy. November/December 2003, pp. 62-67.
    10 KB (1,542 words) - 22:10, 9 November 2004
  • Privacy and the Internet ...f personal information. Alternative solutions such as self-regulation and privacy enhancing technologies will also be considered.
    6 KB (919 words) - 20:03, 9 November 2004
  • ...e and more frequently will become the only viable approach to assuring the privacy and safety of sensitive information as these trends continue." [http://www. ...y is probably impossible." [http://www.worldhistory.com/wiki/P/Pretty-Good-Privacy.htm]
    18 KB (2,820 words) - 23:22, 19 November 2004
  • ...te or criminal investigation. However, these policies can lead to loss of privacy and create insecurities in the encryption schemes. The combination of impro ...of encryption and information security and make recommendations for future policy makers.
    5 KB (696 words) - 19:36, 8 November 2004
  • Privacy and the Internet ...le in the Internet era, and will examine solutions to maintain and enhance privacy rights related to the Internet.
    6 KB (852 words) - 01:03, 9 November 2004
  • ...intro piece. I'm happy to be an overview type editor--I was an editor at a policy journal before coming to UW and miss it. ...ngly, I'd suggest we want to focus on a particular problem confronting the policy-maker, explain it thoroughly, and offer him options for fixing it. In my mi
    26 KB (4,299 words) - 23:57, 8 November 2004
  • Notes and references about encryption policy. ...lopment. Another aspect that could be explored is corporate/private usage policy.
    14 KB (2,055 words) - 04:45, 22 November 2004
  • ...ses an encryption called PGP (Pretty Good Policy) to provide cryptographic privacy and authentication. With information transfer becoming a critical aspect o
    10 KB (1,595 words) - 20:35, 22 November 2004
  • This policy brief is not an attempt to provide the final answer on the truthful charact ...beliefs and values, shared feelings of validity and truth and a “common policy enterprise” – a set of common practices and competencies. The participa
    92 KB (13,825 words) - 19:20, 10 December 2004
  • ...e presence in a virtual community (like a message board) but still protect privacy. ### Companies must draft policy statement that covers all elements in FIP.
    3 KB (474 words) - 22:12, 30 November 2004
  • ONLINE PROFILING AND THE RIGHT TO PRIVACY ...that computers, by their very nature, prohibitively invade their personal privacy . Clearly, computers dramatically increase one's capabilities to gather an
    93 KB (14,789 words) - 07:31, 4 December 2004
  • Welcome to the Autumn 2004 course Wiki for Information Technology & Public Policy (UW CSE P 590TU // UC Berkeley PP 190/290-009 // UCSD CSE 291). ...edu/~scotch/maurer.htm Steve Maurer], UC Berkeley Goldman School of Public Policy
    6 KB (897 words) - 23:26, 15 August 2005
  • Access to data Open exchange of information encouraged by federal policy Open, with data and ideas shared after results have been published Interna ...awful use and access to the University’s database system and invasion of privacy by those whose information was captured by the hackers.
    19 KB (2,993 words) - 00:22, 11 December 2004