Digital fingerprints: implementing algorithms as technical controls
dc.contributor.author | Gazvoda, Gregg, author | |
dc.contributor.author | Covance, publisher | |
dc.date.accessioned | 2016-06-09T16:39:45Z | |
dc.date.available | 2016-06-09T16:39:45Z | |
dc.date.issued | 2016-06-03 | |
dc.description | Presented at the National data integrity conference: data sharing: the how, why, when and when not to share held on June 2-3, 2016 at University of Colorado, Denver, Colorado. The National Data Integrity Conference is a gathering of people sharing new challenges and solutions regarding research data and integrity. This conference aims to provide attendees with both an understanding of data integrity issues and impart practical tools and skills to deal with them. Topics addressed will include data privacy, openness, policy, education and the impacts of sharing data, how to do it, when to do it, and when not to. Speakers and audience members come from diverse fields such as: Academic Research; Information Technology; Quality Assurance; Regulatory Compliance; Private Industry; Grant Funding; Government. | |
dc.description | PowerPoint presentation during Lightning Talks given on June 3, 2016. | |
dc.description | Includes bibliographical references. | |
dc.format.medium | born digital | |
dc.format.medium | Presentation slides | |
dc.identifier.uri | http://hdl.handle.net/10217/172987 | |
dc.identifier.uri | http://dx.doi.org/10.25675/10217/172987 | |
dc.language | English | |
dc.language.iso | eng | |
dc.publisher | Colorado State University. Libraries | |
dc.relation.ispartof | 2nd Annual National Data Integrity Conference (2016) | |
dc.relation.ispartof | National data integrity conference, 2016 | |
dc.rights | Copyright and other restrictions may apply. User is responsible for compliance with all applicable laws. For information about copyright law, please see https://libguides.colostate.edu/copyright. | |
dc.subject | evolution | |
dc.subject | data collection systems | |
dc.subject | controls | |
dc.subject | hash function | |
dc.subject | MD5 algorithm | |
dc.subject | risks | |
dc.title | Digital fingerprints: implementing algorithms as technical controls | |
dc.type | Text |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- CONF2016NDIC_GazvodaGregg.pdf
- Size:
- 9.87 MB
- Format:
- Adobe Portable Document Format