• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 114,766
Next 10 →

Public Policy Issues—Privacy

by Adam Barth
"... Many modern enterprises require methods for guaranteeing compliance with privacy legislation and announced privacy policies. IBM has proposed a formal language, the Enterprise Privacy Authorization Language (EPAL), for describing privacy policies rigorously. In this paper, we identify four desirable ..."
Abstract - Add to MetaCart
Many modern enterprises require methods for guaranteeing compliance with privacy legislation and announced privacy policies. IBM has proposed a formal language, the Enterprise Privacy Authorization Language (EPAL), for describing privacy policies rigorously. In this paper, we identify four

Switching to . . . : business and public policy issues

by Norbert Maier, Marco Ottaviani , 2006
"... ..."
Abstract - Add to MetaCart
Abstract not found

Belvedere: Engaging Students in Critical Discussion of Science and Public Policy Issues

by Daniel Suthers, Arlene Weiner, John Connelly, Massimo Paolucci , 1995
"... : We describe "Belvedere," a system to support students engaged in critical discussion of science issues. The design is intended to address cognitive and metacognitive limitations of unpracticed beginners while supporting their practice of this complex skill. Both prior psychological resea ..."
Abstract - Cited by 100 (7 self) - Add to MetaCart
: We describe "Belvedere," a system to support students engaged in critical discussion of science issues. The design is intended to address cognitive and metacognitive limitations of unpracticed beginners while supporting their practice of this complex skill. Both prior psychological

Africa´s Growth Tragedy: Policies and Ethnic Divisions

by William Easterly, Ross Levine - JOURNAL OF ECONOMICS , 1997
"... Explaining cross-country differences in growth rates requires not only an understanding of the link between growth and public policies, but also an understanding of why countries choose different public policies. This paper shows that ethnic diversity helps explain cross-country differences in publi ..."
Abstract - Cited by 1388 (72 self) - Add to MetaCart
Explaining cross-country differences in growth rates requires not only an understanding of the link between growth and public policies, but also an understanding of why countries choose different public policies. This paper shows that ethnic diversity helps explain cross-country differences

Electronic Security: Risk Mitigation in Financial Transactions - Public Policy Issues

by Thomas Glaessner, Tom Kellermann, Valerie McNevin , 2002
"... This paper builds on a previous series of papers (see Claessens, Glaessner, and Klingebiel, 2001, 2002) that identified electronic security as a key component to the delivery of e-finance benefits. This paper and its technical annexes identify and discuss seven key pillars necessary to the fostering ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
to the fostering of a secure electronic environment. Hence, it is intended for those formulating broad policies in the area of electronic security and those working with financial services providers (e.g., executives and management). The detailed annexes of this paper are especially relevant for chief information

Introducing Traffic Analysis: Attacks, Defences and Public Policy Issues . . .

by George Danezis - UNIVERSITY OF CAMBRIDGE COMPUTER LAB , 2005
"... A lot of traditional computer security has focused on protecting the content of communications by insuring confidentiality, integrity or availability. Yet the meta data associated with it – the sender, the receiver, the time and length of messages – also contains important information in itself. It ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
A lot of traditional computer security has focused on protecting the content of communications by insuring confidentiality, integrity or availability. Yet the meta data associated with it – the sender, the receiver, the time and length of messages – also contains important information in itself. It can also be used to quickly select targets for further surveillance, and extract information about communications content. Such traffic analysis techniques have been used in the closed military communities for a while but their systematic study is an emerging field in the open security community. This talk will present an overview of traffic analysis techniques, and how they can be used to extract data from ‘secure ’ systems.

Rural health networks development: Public policy issues and state initiatives

by Anthony Wellever, Ira Moscovice - Journal of Health Politics, Policy and Law , 1997
"... Abstract Rural health networks are a potential way for rural health care systems to improve access to care, reduce costs, and enhance quality of care. Networks pro-vide a means for rural providers to contract with managed care organizations, develop their own managed care entities, share resources, ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
network definitions, to identify clearly the goals of network development programs, and to document and analyze program out-comes. Future network development efforts need to be much more comprehensive if they are to have a significant impact on rural health care. This article analyzes pub-lic policy

PUBLIC POLICY ISSUES AFFECTING LESBIAN, GAY, BISEXUAL AND TRANSGENDER ELDERS

by M. Grant, Gerard Koskovich, M. Somjen Frazer, Sunny Bjerk, M. Grant, Gerard Koskovich, M. Somjen Frazer, Sunny Bjerk , 2010
"... www.theTaskForce.org The National Gay and Lesbian Task Force is grateful to the Arcus Foundation and to AARP whose generous support funded the research and distribution of this publication. ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
www.theTaskForce.org The National Gay and Lesbian Task Force is grateful to the Arcus Foundation and to AARP whose generous support funded the research and distribution of this publication.

Belvedere: Engaging Students in Critical Discussion of Science and Public Policy Issues

by Daniel Suthers Arlene, Daniel Suthers, Arlene Weiner, John Connelly, Massimo Paolucci , 1995
"... : We describe "Belvedere," a system to support students engaged in critical discussion of science issues. The design is intended to address cognitive and metacognitive limitations of unpracticed beginners while supporting their practice of this complex skill. Both prior psychological re ..."
Abstract - Add to MetaCart
: We describe "Belvedere," a system to support students engaged in critical discussion of science issues. The design is intended to address cognitive and metacognitive limitations of unpracticed beginners while supporting their practice of this complex skill. Both prior psychological

Generic Advertising without Supply Control: Models and Public Policy Issues

by Dermot J. Hayes, Helen H. Jensen, Dermot J. Hayes, Helen H. Jensen , 1988
"... University. It has been accepted for inclusion in CARD Working Papers by an authorized administrator of Digital Repository @ Iowa State University. ..."
Abstract - Add to MetaCart
University. It has been accepted for inclusion in CARD Working Papers by an authorized administrator of Digital Repository @ Iowa State University.
Next 10 →
Results 1 - 10 of 114,766
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University