Search Results

open access

Internet: An Overview of Key Technology Policy Issues Affecting Its Use and Growth

Description: This report summarizes several key technology policy issues such as Internet privacy, broadband internet access, electronic commerce, spam, internet's domain name system, and e-government.
Date: August 20, 2004
Creator: Smith, Marcia S.; Moteff, John D.; Kruger, Lennard G.; McLoughlin, Glenn J. & Seifert, Jeffrey W.
Partner: UNT Libraries Government Documents Department
open access

Internet: An Overview of Key Technology Policy Issues Affecting Its Use and Growth

Description: This report summarizes several key technology policy issues such as Internet privacy, computer and internet security, broadband internet access, electronic commerce, spam, internet's domain name system, and e-government.
Date: December 29, 2004
Creator: Smith, Marcia S.; Moteff, John D.; Kruger, Lennard G.; McLoughlin, Glenn J.; Seifert, Jeffrey W. & Figliola, Patricia Moloney
Partner: UNT Libraries Government Documents Department
open access

Industrial Competitiveness and Technological Advancement: Debate Over Government Policy

Description: This updated report summarizes the debate on the government policy regarding industrial competitiveness and technological advancement and its influence on the U.S. economy. It discusses the most recent developments, dives into the background and analysis of the topic, and talks about Congress' plans and approach.
Date: September 21, 2004
Creator: Schacht, Wendy H.
Partner: UNT Libraries Government Documents Department
open access

Weapons of Mass Destruction: Trade Between North Korea and Pakistan

Description: In October 2002, the United States confronted North Korea about its alleged clandestine uranium enrichment program. Soon after, the Agreed Framework collapsed, North Korea expelled international inspectors, and withdrew from the Nuclear Nonproliferation Treaty (NPT). U.S. intelligence officials claimed Pakistan was a key supplier of uranium enrichment technology to North Korea, and some media reports suggested that Pakistan had exchanged centrifuge enrichment technology for North Korean help in… more
Date: March 11, 2004
Creator: Squassoni, Sharon
Partner: UNT Libraries Government Documents Department
open access

Data Mining: An Overview

Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data … more
Date: May 3, 2004
Creator: Seifert, Jeffrey W.
Partner: UNT Libraries Government Documents Department
open access

Data Mining: An Overview

Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data … more
Date: December 16, 2004
Creator: Seifert, Jeffrey W.
Partner: UNT Libraries Government Documents Department
open access

Computer Security: A Summary of Selected Federal Laws, Executive Orders, and Presidential Directives

Description: This report provides a short summary of selected federal laws, executive orders, and presidential directives, currently in force, that govern computer security. The report focuses on the major roles and responsibilities assigned various federal agencies in the area of computer security.
Date: April 16, 2004
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department
open access

Dual-Use Biological Equipment: Difficulties in Domestic Regulation

Description: A question in the current debate over chemical and biological terrorism is: how well do current United States policies limit opportunities to terrorist groups for acquisition of such weapons? The domestic purchase and use of “dual-use” biological equipment, such as fermenters, centrifuges, and other equipment, is one area suggested as potentially providing opportunities for terrorist, biological weapons development. Dual-use equipment has both legitimate civilian and military use. Regulating in… more
Date: January 22, 2004
Creator: Shea, Dana A.
Partner: UNT Libraries Government Documents Department
open access

Broadband Internet Access and the Digital Divide: Federal Assistance Programs

Description: Some policymakers, believing that disparities in broadband access across American society could have adverse economic and social consequences on those left behind, assert that the federal government should play a more active role to avoid a “digital divide” in broadband access. One approach is for the federal government to provide financial assistance to support broadband deployment in underserved areas. Others, however, believe that federal assistance for broadband deployment is not appropriat… more
Date: March 11, 2004
Creator: Kruger, Lennard G.
Partner: UNT Libraries Government Documents Department
Back to Top of Screen