This system will be undergoing maintenance Tuesday, May 5, 2015 from 10:00 AM to 11:00 AM CDT.

  You limited your search to:

 Country: United States
 Collection: Congressional Research Service Reports
Access to Broadband Networks: The Net Neutrality Debate

Access to Broadband Networks: The Net Neutrality Debate

Date: March 9, 2015
Creator: Gilroy, Angele A.
Description: This report discusses the continued debate amongst congressional policymakers regarding telecommunications reform. A major point of the ongoing discussion is whether action is needed to ensure unfettered access to the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Internet Domain Names: Background and Policy Issues

Internet Domain Names: Background and Policy Issues

Date: March 6, 2015
Creator: Kruger, Lennard G.
Description: This report discusses the Domain Name System (DNS), which is the distributed set of databases residing in computers around the world that contain address numbers mapped to corresponding domain names, making it possible to send and receive messages and to access information from computers anywhere on the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Internet Governance and the Domain Name System: Issues for Congress

Internet Governance and the Domain Name System: Issues for Congress

Date: March 6, 2015
Creator: Kruger, Lennard G.
Description: This report provides a definition regarding Internet governance and how the Internet is currently governed. The report discusses the role of United States government and future model of Internet governance.
Contributing Partner: UNT Libraries Government Documents Department
Information Warfare: The Role of Social Media in Conflict

Information Warfare: The Role of Social Media in Conflict

Date: March 4, 2015
Creator: Theohary, Catherine A.
Description: This report briefly discusses the use if social media as a tool of information warfare. The ability to rapidly disseminate graphic images and ideas to shape the public narrative transforms social media into a strategic weapon in the hands of terrorists, insurgent groups, or governments engaged in conflict.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Date: February 27, 2015
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under a variety of cybersecurity topics.
Contributing Partner: UNT Libraries Government Documents Department
Access to Broadband Networks: The Net Neutrality Debate

Access to Broadband Networks: The Net Neutrality Debate

Date: February 26, 2015
Creator: Gilroy, Angele A.
Description: This report discusses the continued debate amongst congressional policymakers regarding telecommunications reform. A major point of the ongoing discussion is whether action is needed to ensure unfettered access to the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis

Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis

Date: February 23, 2015
Creator: Weiss, N. Eric
Description: This report analyzes the sharing of cyberattack information by government with private companies, by private companies with the government, and among private companies. Sharing information with consumers is mentioned but is not the central focus of this report.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Date: February 3, 2015
Creator: Tehan, Rita
Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Contributing Partner: UNT Libraries Government Documents Department
Information Warfare: Cyberattacks on Sony

Information Warfare: Cyberattacks on Sony

Date: January 30, 2015
Creator: Theohary, Catherine A.
Description: This report discusses information warfare, which includes information-related capabilities to influence, disrupt, corrupt, or usurp the decision making of adversaries while protecting our own.
Contributing Partner: UNT Libraries Government Documents Department
The America COMPETES Acts: An Overview

The America COMPETES Acts: An Overview

Date: January 27, 2015
Creator: Gonzalez, Heather B.
Description: This report provides an overview of the COMPETES Acts for readers seeking background and legislative context. It includes a description and legislative history of the acts, a summary of the broad policy debate, and an examination of the implementation status of selected COMPETES-related programs and policies. This report also highlights major bills to reauthorize the COMPETES Acts from the 113th Congress.
Contributing Partner: UNT Libraries Government Documents Department
FIRST PREV 1 2 3 4 5 NEXT LAST