Street - Google Patents
TITLE Challenges and Opportunities of Information Technology in the 90s. Track IV: Policy and Standards. INSTITUTION CAUSE, Boulder, Colo. PUB DATE 91Street
View PDF- Document ID
- 3370029216346344176
- Author
- Street T
External Links
Snippet
Seven papers from the 1990 CAUSE conference's Track IV, Policy and Standards are presented. Topics addressed in this track include data administration, computing access, involvement of constituencies in policy making and enforcement, and institutional standards …
- 238000005516 engineering process 0 title description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/357—Cards having a plurality of specified features
- G06Q20/3578—Hierarchy of users of cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/009—Trust
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230018169A1 (en) | Document management system with barcode mapping and storing | |
US10142316B2 (en) | Computerized method and system for managing an email input facility in a networked secure collaborative exchange environment | |
US8374944B2 (en) | Method and system for enabling collaboration between advisors and clients | |
US20110238430A1 (en) | Organization Optimization System and Method of Use Thereof | |
Rice et al. | Organizations and unusual routines: A systems analysis of dysfunctional feedback processes | |
FAISAL et al. | The Impact of Digital Transformation on Small and Medium Enterprises (SMEs) in the USA: Opportunities and Challenges | |
US7835965B2 (en) | System and method for private equity fund formation | |
Kshetri | The adoption of E‐business by organizations in China: An institutional perspective | |
Flynn et al. | E-mail Rules: A Business Guide to Managing Policies, Security, and Legal Issues for E-mail and Digital Communications | |
Desouza | Managing knowledge security: strategies for protecting your company's intellectual assets | |
Street | TITLE Challenges and Opportunities of Information Technology in the 90s. Track IV: Policy and Standards. INSTITUTION CAUSE, Boulder, Colo. PUB DATE 91 | |
Halachmi | Irm: Perspectives, issues and implications | |
Lopez | Information data security specialists' and business leaders' experiences regarding communication challenges | |
Longo et al. | ARC II–Handbook on Personal Data Protection for SMEs | |
Cadogan | The ethics of data privacy in an electronic marketplace: A multiple case study of the privacy policy notice and the incorporation of fair information practice principles | |
Kang | The workflow application as an unintended medium for organizational learning: A longitudinal field study | |
McDonnell | Fintech Usage: What have financial professionals in Ireland been up to in relation to Fintech? | |
Bashford | The new interface between government and the community in social welfare delivery: Centrelink-is it working as hoped?[Edited text of address to the National Institute for Governance Conference'Public and Private Sector Governance in Australia: Exploring the Changing Boundaries'(2000: Canberra). Also includes Commentary.] | |
Hoffman | A Multiple-Case Study of Cloud Computing Acceptance in a Small Business Environment | |
Al-Musehel | A web-based process model to reduce defects on requests for proposals in Kingdom of Saudi Arabia | |
Taylor | The real-time world: Using online budget and financial applications at higher education institutions | |
Spangler | A Reverse Engineering Approach to Information Technology Planning | |
Sanks | An analysis of the adoption of World Wide Web Common Gateway Interface (CGI) technology within higher education environments | |
Owusu-Aning | Towards the paperless office: best practices and exploration of enterprise rights management solutions for Ghanaian business processes | |
Hauser | Clinical Information Management |