Search
Skip to Search Results- 8Alberta
- 3Canada
- 2BIO 489
- 2health information security
- 1Alberta Health Information Act
- 1Christianization
- 11Concordia University of Edmonton
- 4Concordia University of Edmonton/Master of Information Systems Security Management (MISSM) and Master of Information Systems Assurance Management (MISAM) Project Reports (Concordia University of Edmonton)
- 3Concordia University of Edmonton/Independent Research Reports in Undergraduate Biology and Environmental Science (Concordia University of Edmonton)
- 1Concordia University of Edmonton/Capstone Projects in Undergraduate Sociology (Concordia University of Edmonton)
- 1Concordia University of Edmonton/Master of Education Research Project Final Reports (Concordia University of Edmonton)
- 1Concordia University of Edmonton/Faculty Publications (Concordia University of Edmonton)
-
2013-03-01
This paper will provide a brief but comprehensive account of how the two missions worked in competition with one another to Christianize the people of the Canadian Northwest in the nineteenth century. Separate narrative accounts of the missions, including brief biographical sketches of some of...
-
An inquiry into one feminist education leader's experience in an Alberta urban school district
Download2021-04-01
Through(out) this narrative inquiry, I argue that leadership in public education in Alberta needs to change. I argue that it needs to better reflect the changes in the world. Our school divisions and schools are filled with a wonderful diversity of knowing and being that could easily fill our...
-
Baseline security controls for HIA-compliant EMR systems using a tailored NIST RMF approach
Download2011-01-01
The proclamation of the Health Information Act (HIA) made the Custodian accountable for protecting the confidentiality, integrity, and availability of health information in Alberta, Canada. The health information that a Custodian creates, receives, maintains, or transmits must be protected...
-
Investigating the knowledge, attitudes and habits of academic users regarding computer usage policy
Download2010-01-08
Academic organizations typically require individuals using their information technology resources to agree to follow a set of rules regarding usage of those facilities and resources that the organization sets out as its computer usage policy document. Users may have to read a document, agree...
-
2009-01-08
Videoconferencing over Internet Protocol (IP) is a real-time, collaborative, virtual communication tool. However, current videoconferencing technology has not been built with the protection of the participants' privacy in mind. It is concerned only with the privacy of the conference session,...
-
Privacy classification of health information in Alberta - issues, proposed solution and benefits
Download2008-01-04
This research paper reviews issues, proposes a solution and discusses the benefits of privacy classification for health information in Alberta. After a review and analysis of privacy classification of health information in Canada and the United Sates of America, this paper builds on existing...
-
2014-07-04
This study will examine a causal model of the determinants of Opinions Toward the Police (ATPolice). A secondary data analysis was conducted and data was utilized from the 2009, General Social Survey Cycle 23. The sampling frame consisted of 19,422 respondents who participated in telephone...
-
Spatial and temporal variation of benthic macroinvertebrate communities in three westlope cutthroat trout tributaries in the Rocky Mountains
Download2014-02-04
Westslope cutthroat trout (Oncorhynchus clarkii lewisi) is an important subspecies to Alberta, as a representative of a rich and diverse fish taxon that intrinsically holds many local adaptations to their native range. The reduction of westslope cutthroat trout from their historical range to...