Skip to main content

Search results for "monkeys exposed"

Filters: Information Security and Privacy Information Security and Privacy ×
Viewing 1 - 20 of 33 results by relevance
Consensus Study Report

Private Lives and Public Policies: Confidentiality and Accessibility of Government Statistics  (1993)

Ada and Beyond: Software Policies for the Department of Defense  (1997)

Consensus Study Report

Protecting Data Privacy in Health Services Research  (2000)

Proceedings

Summary of a Workshop on Information Technology Research for Federal Statistics  (2000)

Proceedings

Improving Access to and Confidentiality of Research Data: Report of a Workshop  (2000)

Consensus Study Report

Global Networks and Local Values: A Comparative Look at Germany and the United States  (2001)

Consensus Study Report

Information Technology for Counterterrorism: Immediate Actions and Future Possibilities  (2003)

Proceedings

Summary of a Workshop on Software Certification and Dependability  (2004)

Consensus Study Report

Putting People on the Map: Protecting Confidentiality with Linked Social-Spatial Data  (2007)

Consensus Study Report

Software for Dependable Systems: Sufficient Evidence?  (2007)

Consensus Study Report

Engaging Privacy and Information Technology in a Digital Age  (2007)

Consensus Study Report

Toward a Safer and More Secure Cyberspace  (2007)

Consensus Study Report

Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment  (2008)

Consensus Study Report

Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health Through Research  (2009)

Consensus Study Report

Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities  (2009)

Consensus Study Report

Letter Report for the Committee on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy  (2010)

Consensus Study Report

Biometric Recognition: Challenges and Opportunities  (2010)

Consensus Study Report

Conducting Biosocial Surveys: Collecting, Storing, Accessing, and Protecting Biospecimens and Biodata  (2010)

Proceedings

Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy  (2010)

Consensus Study Report

Critical Code: Software Producibility for Defense  (2010)