You limited your search to:

 Collection: Congressional Research Service Reports
Internet Governance and the Domain Name System: Issues for Congress

Internet Governance and the Domain Name System: Issues for Congress

Date: November 20, 2015
Creator: Kruger, Lennard G.
Description: This report provides a definition regarding Internet governance and how the Internet is currently governed, and discusses the role of United States government and future model of Internet governance.
Contributing Partner: UNT Libraries Government Documents Department
The Internet Tax Freedom Act: In Brief

The Internet Tax Freedom Act: In Brief

Date: October 5, 2015
Creator: Stupak, Jeffrey M.
Description: This report discusses the Internet Tax Freedom Act (ITFA; P.L. 105-277), which enacted in 1998, implemented a three-year moratorium preventing state and local governments from taxing Internet access, or imposing multiple or discriminatory taxes on electronic commerce.
Contributing Partner: UNT Libraries Government Documents Department
The Internet of Things: Frequently Asked Questions

The Internet of Things: Frequently Asked Questions

Date: October 13, 2015
Creator: Fischer, Eric A.
Description: This report was developed to assist Congress in responding to some commonly asked questions about the Internet of Things (IoT), a complex, often poorly understood phenomenon.
Contributing Partner: UNT Libraries Government Documents Department
The Department of Defense, Science and Technology Program: An Analysis, FY1998-FY2007

The Department of Defense, Science and Technology Program: An Analysis, FY1998-FY2007

Date: September 12, 2008
Creator: Moteff, John D.
Description: The purpose of this report is to help understand how the budget increases of the last ten years have been allocated.
Contributing Partner: UNT Libraries Government Documents Department
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities

The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities

Date: August 3, 2015
Creator: Moloney Figliola, Patricia
Description: This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. Support of IT R&D began because the government had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
Contributing Partner: UNT Libraries Government Documents Department
Industrial Competitiveness and Technological Advancement: Debate Over Government Policy

Industrial Competitiveness and Technological Advancement: Debate Over Government Policy

Date: August 25, 2008
Creator: Schacht, Wendy H.
Description: This report discusses congressional interest in the pace of U.S. technological advancement due to its influence on U.S. economic growth, productivity, and international competitiveness. The proper role of the federal government in technology development and the competitiveness of U.S. industry continues to be a topic of congressional debate.
Contributing Partner: UNT Libraries Government Documents Department
Data Mining and Homeland Security: An Overview

Data Mining and Homeland Security: An Overview

Date: August 27, 2008
Creator: Seifert, Jeffrey W.
Description: This report explores the issue of data mining in detail and in the context of homeland security, as well as relevant initiatives and pieces of legislation. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. In the context of homeland security, data mining can be a potential means to identify terrorist activities, such as money transfers and communications, and to identify and track individual terrorists themselves, such as through travel and immigration records.
Contributing Partner: UNT Libraries Government Documents Department
Encryption and Evolving Technology: Implications for U.S. Law Enforcement Investigations

Encryption and Evolving Technology: Implications for U.S. Law Enforcement Investigations

Date: September 8, 2015
Creator: Finklea, Kristin
Description: This report provides an overview of the perennial issue involving technology outpacing law enforcement and discusses how policy makers and law enforcement officials have dealt with this issue in the past. It discusses the current debate surrounding smartphone data encryption and how this may impact U.S. law enforcement operations. The report also discusses existing law enforcement capabilities, the debate over whether law enforcement is "going dark" because of rapid technological advances, and resulting issues that policy makers may consider.
Contributing Partner: UNT Libraries Government Documents Department
Unmanned Aircraft Systems (UAS): Commercial Outlook for a New Industry

Unmanned Aircraft Systems (UAS): Commercial Outlook for a New Industry

Date: September 9, 2015
Creator: Canis, Bill
Description: This report discusses unmanned aircraft systems (UAS)--commonly referred to as drones-- which have become a staple of U.S. military reconnaissance and weapons delivery in overseas war zones such as Afghanistan. Now some new technologies and pending federal regulations are enabling the manufacture and use of UAS in domestic commerce, giving rise to a growing commercial UAS industry.
Contributing Partner: UNT Libraries Government Documents Department
OPM Data Breach: Personnel Security Background Investigation Data

OPM Data Breach: Personnel Security Background Investigation Data

Date: July 24, 2015
Creator: Christensen, Michelle D.
Description: This report provides information on the types of data that may be collected in a typical personnel security background investigation. In a July 9, 2015, news release on the cyber-intrusions of its systems, OPM "concluded with high confidence that sensitive information, including the Social Security Numbers (SSNs) of 21.5 million individuals, was stolen from the background investigation databases." This report is not an official statement of the data that was compromised in the OPM breach.
Contributing Partner: UNT Libraries Government Documents Department
The Health Information Technology for Economic and Clinical Health (HITECH) Act

The Health Information Technology for Economic and Clinical Health (HITECH) Act

Date: February 23, 2009
Creator: Redhead, C. S.
Description: This report provides a summary and explanation of the provisions in the HITECH Act, which is intended to promote the widespread adoption of health information technology (HIT) for the electronic sharing of clinical data among hospitals, physicians, and other health care stakeholders. It gives an overview of prior actions taken by Congress and the Administrations to promote HIT, and briefly describes efforts by the 109th and 110th Congresses to enact comprehensive HIT legislation.
Contributing Partner: UNT Libraries Government Documents Department
Policy Implications of the Internet of Things

Policy Implications of the Internet of Things

Date: August 25, 2015
Creator: Moore, Linda K.
Description: This report briefly discusses the Internet of Things (IoT), which is an umbrella term that many policymakers use to refer to the technologies and network structures that interconnect objects, humans, and animals to collect and analyze data and manage processes.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Date: August 18, 2015
Creator: Tehan, Rita
Description: This report provides links to cybersecurity committee hearings and legislation from the 112th, 113th, and 114th Congresses, as well as a list of executive orders and presidential directives pertaining to information and computer security. Summaries of activities and findings are included as a series of tables.
Contributing Partner: UNT Libraries Government Documents Department
Expansion of WTO Information Technology Agreement Targets December Conclusion

Expansion of WTO Information Technology Agreement Targets December Conclusion

Date: July 28, 2015
Creator: Fefer, Rachel F.
Description: This report discusses the World Trade Organization (WTO) expansion and agreement to expand the Information Technology Agreement (ITA) and eliminate tariffs on 201 goods not included in the original 1996 ITA.
Contributing Partner: UNT Libraries Government Documents Department
Engineered Nanoscale Materials and Derivative Products: Regulatory Challenges

Engineered Nanoscale Materials and Derivative Products: Regulatory Challenges

Date: July 18, 2008
Creator: Schierow, Linda-Jo
Description: The purpose of this report is to consider certain challenges faced by federal EHS (environmental, human health and safety) risk assessors, risk managers, and policy makers, and to discuss possible legislative approaches to address those challenges.
Contributing Partner: UNT Libraries Government Documents Department
Cyber Intrusion into U.S. Office of Personnel Management: In Brief

Cyber Intrusion into U.S. Office of Personnel Management: In Brief

Date: July 17, 2015
Creator: Finklea, Kristin; Christensen, Michelle D.; Fischer, Eric A.; Lawrence, Susan V. & Theohary, Catherine A.
Description: This report provides an overview of the current understanding of the recent U.S. Office of Personnel Management (OPM) breaches, which may have compromised personal information of former and current federal employees. It also discusses issues and questions raised about the source of the breaches, possible uses of the information exfiltrated, potential national security ramifications, and implications for the cybersecurity of federal information systems.
Contributing Partner: UNT Libraries Government Documents Department
Science and Technology Policymaking: A Primer

Science and Technology Policymaking: A Primer

Date: January 27, 2009
Creator: Stine, Deborah D.
Description: This report provides a basic understanding of science and technology policy including the nature of S&T policy, how scientific and technical knowledge is useful for public policy decisionmaking, and an overview of the key stakeholders in science and technology policy.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731 as Passed by the House

Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731 as Passed by the House

Date: June 4, 2015
Creator: Fischer, Eric A. & Logan, Stephanie M.
Description: This report compares provisions in two bills in the House of Representatives that address information sharing and related activities in cybersecurity. This report consists of an overview of those and other legislative proposals on information sharing, along with selected associated issues, followed by a side-by-side analysis of the two House bills as passed.
Contributing Partner: UNT Libraries Government Documents Department
Dark Web

Dark Web

Date: July 7, 2015
Creator: Finklea, Kristin
Description: This report illuminates information on the various layers of the Internet, with a particular focus on the Dark Web. It discusses both legitimate and illicit uses of the Dark Web, including how the government may rely upon it. Throughout, the report raises issues that policy makers may consider as they explore means to curb malicious activity online.
Contributing Partner: UNT Libraries Government Documents Department
The Transition to Digital Television: Is America Ready?

The Transition to Digital Television: Is America Ready?

Date: January 30, 2009
Creator: Kruger, Lennard G.
Description: This report discusses the background and potential effects of the DTV Delay Act, which directs that all over-the-air full-power television broadcasts will become digital only.
Contributing Partner: UNT Libraries Government Documents Department
The Federal Networking and Information Technology Research and Development Program: Funding Issues and Activities

The Federal Networking and Information Technology Research and Development Program: Funding Issues and Activities

Date: May 14, 2009
Creator: Moloney Figliola, Patricia
Description: This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers that would be capable of addressing the problems and issues the government needed to solve and study.
Contributing Partner: UNT Libraries Government Documents Department
The Federal Networking and Information Technology Research and Development Program: Funding Issues and Activities

The Federal Networking and Information Technology Research and Development Program: Funding Issues and Activities

Date: May 15, 2008
Creator: Figliola, Patricia Moloney
Description: This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
Contributing Partner: UNT Libraries Government Documents Department
Net Neutrality: Background and Issues

Net Neutrality: Background and Issues

Date: March 19, 2009
Creator: Gilroy, Angele A.
Description: This report discusses the continued debate amongst congressional policymakers regarding telecommunications reform. A major point of the ongoing discussion is whether action is needed to ensure unfettered access to the Internet.
Contributing Partner: UNT Libraries Government Documents Department
"Spam": An Overview of Issues Concerning Commercial Electronic Mail

"Spam": An Overview of Issues Concerning Commercial Electronic Mail

Date: May 14, 2008
Creator: Moloney Figliola, Patricia
Description: This report discusses Spam, also called unsolicited commercial email (UCE) or "junk email." Not only can Spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment. This report discusses this issue in detail, as well as related legislation.
Contributing Partner: UNT Libraries Government Documents Department