You limited your search to:

 Resource Type: Report
 Collection: Congressional Research Service Reports
Internet Statistics: Explanation and Sources

Internet Statistics: Explanation and Sources

Date: April 22, 2003
Creator: Tehan, Rita
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Computer Security: A Summary of Selected Federal Laws, Executive Orders, and Presidential Directives

Computer Security: A Summary of Selected Federal Laws, Executive Orders, and Presidential Directives

Date: April 16, 2004
Creator: Moteff, John D
Description: This report provides a short summary of selected federal laws, executive orders, and presidential directives, currently in force, that govern computer security. The report focuses on the major roles and responsibilities assigned various federal agencies in the area of computer security.
Contributing Partner: UNT Libraries Government Documents Department
Data Mining: An Overview

Data Mining: An Overview

Date: December 16, 2004
Creator: Seifert, Jeffrey W
Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Contributing Partner: UNT Libraries Government Documents Department
Internet Voting: Issues and Legislation

Internet Voting: Issues and Legislation

Date: February 22, 2002
Creator: Coleman, Kevin J
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Data Mining: An Overview

Data Mining: An Overview

Date: June 7, 2005
Creator: Seifert, Jeffrey W
Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Contributing Partner: UNT Libraries Government Documents Department
Data Mining: An Overview

Data Mining: An Overview

Date: May 3, 2004
Creator: Seifert, Jeffrey W
Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Contributing Partner: UNT Libraries Government Documents Department
Internet Voting: Issues and Legislation

Internet Voting: Issues and Legislation

Date: January 16, 2001
Creator: Coleman, Kevin J & Nunno, Richard M
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Internet Voting

Internet Voting

Date: January 31, 2003
Creator: Coleman, Kevin J
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Internet Voting

Internet Voting

Date: September 23, 2003
Creator: Coleman, Kevin J
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Internet Statistics: Explanation and Sources

Internet Statistics: Explanation and Sources

Date: February 6, 2002
Creator: Tehan, Rita
Description: None
Contributing Partner: UNT Libraries Government Documents Department