Search results

Jump to: navigation, search
  • Welcome to the Autumn 2004 course Wiki for Information Technology & Public Policy (UW CSE P 590TU // UC Berkeley PP 190/290-009 // UCSD CSE 291). ...edu/~scotch/maurer.htm Steve Maurer], UC Berkeley Goldman School of Public Policy
    6 KB (897 words) - 04:04, 22 August 2005
  • ...ific data is a great one lying squarely at the interface of technology and policy. Privacy/Encryption/IDs
    650 bytes (104 words) - 03:56, 19 October 2004
  • I think it would be interesting to look at how public policy has effected medical research. Have regulations like HIPAA, which restrict ...the first lecture readings in that its stated goal is to protect personal privacy, rather than to protect investment. But the effects of HIPAA seem to be si
    2 KB (314 words) - 17:29, 24 October 2004
  • *"IT Outsourcing Policy", [[Student Projects:IT Outsourcing]] ...Outsourcing: Economic and Policy Analysis", [[IT Outsourcing: Economic and Policy Analysis]]
    6 KB (806 words) - 04:55, 21 November 2004
  • ...intro piece. I'm happy to be an overview type editor--I was an editor at a policy journal before coming to UW and miss it. ...ngly, I'd suggest we want to focus on a particular problem confronting the policy-maker, explain it thoroughly, and offer him options for fixing it. In my mi
    27 KB (4,353 words) - 00:08, 9 November 2004
  • ...dy in the legal system. Europe appears to have a more unified approach to privacy. Comments? ...ill have different interpretations of what it means. I think the sectoral policy approach in the US is a direct result of this. I'm curious as to how satis
    47 KB (7,875 words) - 23:19, 8 December 2004
  • *"IT Outsourcing Policy", [[Student Projects:IT Outsourcing]] *"IT Outsourcing Policy: Economic and Policy Analysis", [[IT_Outsourcing:_Economic_and_Policy_Analysis]]
    7 KB (944 words) - 20:08, 14 November 2004
  • ...tems and assess costs and benefits of these approaches. We then consider a policy solution, namely whether software engineering should be licensed as civil e * Beyond the Horizon: A Call to Arms, Jeannette M. Wing, IEEE Security and Privacy. November/December 2003, pp. 62-67.
    10 KB (1,542 words) - 22:10, 9 November 2004
  • Privacy and the Internet ...f personal information. Alternative solutions such as self-regulation and privacy enhancing technologies will also be considered.
    6 KB (919 words) - 20:03, 9 November 2004
  • ...e and more frequently will become the only viable approach to assuring the privacy and safety of sensitive information as these trends continue." [http://www. ...y is probably impossible." [http://www.worldhistory.com/wiki/P/Pretty-Good-Privacy.htm]
    18 KB (2,820 words) - 23:22, 19 November 2004
  • ...te or criminal investigation. However, these policies can lead to loss of privacy and create insecurities in the encryption schemes. The combination of impro ...of encryption and information security and make recommendations for future policy makers.
    5 KB (696 words) - 19:36, 8 November 2004
  • Privacy and the Internet ...le in the Internet era, and will examine solutions to maintain and enhance privacy rights related to the Internet.
    6 KB (852 words) - 01:03, 9 November 2004
  • ...intro piece. I'm happy to be an overview type editor--I was an editor at a policy journal before coming to UW and miss it. ...ngly, I'd suggest we want to focus on a particular problem confronting the policy-maker, explain it thoroughly, and offer him options for fixing it. In my mi
    26 KB (4,299 words) - 23:57, 8 November 2004
  • Notes and references about encryption policy. ...lopment. Another aspect that could be explored is corporate/private usage policy.
    14 KB (2,055 words) - 04:45, 22 November 2004
  • ...mains to be seen whether spam can effectively be controlled by legislative/policy measures. ...cally and abroad seems very important and should be a component in future policy decisions (should, but probably won't). The New York Times had a timely art
    20 KB (3,592 words) - 21:08, 14 December 2004
  • ...ses an encryption called PGP (Pretty Good Policy) to provide cryptographic privacy and authentication. With information transfer becoming a critical aspect o
    10 KB (1,595 words) - 20:35, 22 November 2004
  • This policy brief is not an attempt to provide the final answer on the truthful charact ...beliefs and values, shared feelings of validity and truth and a “common policy enterprise” – a set of common practices and competencies. The participa
    92 KB (13,825 words) - 19:20, 10 December 2004
  • ...e presence in a virtual community (like a message board) but still protect privacy. ### Companies must draft policy statement that covers all elements in FIP.
    3 KB (474 words) - 22:12, 30 November 2004
  • ONLINE PROFILING AND THE RIGHT TO PRIVACY ...that computers, by their very nature, prohibitively invade their personal privacy . Clearly, computers dramatically increase one's capabilities to gather an
    93 KB (14,789 words) - 07:31, 4 December 2004
  • Welcome to the Autumn 2004 course Wiki for Information Technology & Public Policy (UW CSE P 590TU // UC Berkeley PP 190/290-009 // UCSD CSE 291). ...edu/~scotch/maurer.htm Steve Maurer], UC Berkeley Goldman School of Public Policy
    6 KB (897 words) - 23:26, 15 August 2005

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)