You limited your search to:

 Collection: Congressional Research Service Reports
An Analysis of STEM Education Funding at the NSF: Trends and Policy Discussion

An Analysis of STEM Education Funding at the NSF: Trends and Policy Discussion

Date: April 9, 2012
Creator: Gonzalez, Heather B.
Description: This report analyzes National Science Foundation funding trends and selected closely related STEM (science, technology, engineering, and math) education policy issues in order to place conversations about FY2013 funding in broader fiscal and policy context. It concludes with an analysis of potential policy options.
Contributing Partner: UNT Libraries Government Documents Department
Federally-Funded Innovation Inducement Prizes

Federally-Funded Innovation Inducement Prizes

Date: June 29, 2009
Creator: Stine, Deborah D.
Description: This report discusses the status of current federally-funded innovation inducement prizes, addresses the different types of prizes, analyzes when prizes may be appropriate and effective, and summarizes assessments that have been made of their effectiveness. The report also provides the lessons that may be learned from completed competitions, and policy options for those Members of Congress interested in taking action regarding federally-funded innovation inducement prizes. The report concludes with an overview of 111th congressional activities regarding prizes.
Contributing Partner: UNT Libraries Government Documents Department
Internet Governance and the Domain Name System: Issues for Congress

Internet Governance and the Domain Name System: Issues for Congress

Date: February 9, 2012
Creator: Kruger, Lennard G.
Description: As the Internet grows and becomes more pervasive in all aspects of modern society, the question of how it should be governed becomes more pressing. Currently, an important aspect of the Internet is governed by a private sector, international organization called the Internet Corporation for Assigned Names and Numbers (ICANN), which manages and oversees some of the critical technical underpinnings of the Internet such as the domain name system and Internet Protocol (IP) addressing. ICANN makes its policy decisions using a multistakeholder model of governance, whereby a “bottom-up” collaborative process is open to all constituencies of Internet stakeholders. A key issue for Congress is whether and how the U.S. government should continue to maximize U.S. influence over ICANN's multistakeholder Internet governance process, while at the same time effectively resisting proposals for an increased role by international governmental institutions such as the U.N. The outcome of this debate will likely have a significant impact on how other aspects of the Internet may be governed in the future, especially in such areas as intellectual property, privacy, law enforcement, Internet free speech, and cybersecurity. Looking forward, the institutional nature of Internet governance could have far reaching implications on important policy decisions that will ...
Contributing Partner: UNT Libraries Government Documents Department
Data Mining: An Overview

Data Mining: An Overview

Date: May 21, 2003
Creator: Seifert, Jeffrey W
Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Contributing Partner: UNT Libraries Government Documents Department
Data Mining: An Overview

Data Mining: An Overview

Date: June 7, 2005
Creator: Seifert, Jeffrey W
Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Contributing Partner: UNT Libraries Government Documents Department
Electronic Commerce: An Introduction

Electronic Commerce: An Introduction

Date: June 27, 2000
Creator: McLoughlin, Glenn J
Description: Electronic commercial transactions over the Internet, or “e-commerce,” have grown so fast over the last five years that many experts continue to underestimate its growth and development. Whether retail business-to-customer or business-to-business transactions, e-commerce shows no signs of slowing down. In turn, policymakers both in the United States and abroad are likely to face increasingly complex issues of security, privacy, taxation, infrastructure development and other issues in 2000 and beyond. This report will be updated periodically.
Contributing Partner: UNT Libraries Government Documents Department
Data Mining and Homeland Security: An Overview

Data Mining and Homeland Security: An Overview

Date: July 27, 2006
Creator: Seifert, Jeffrey W
Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Contributing Partner: UNT Libraries Government Documents Department
Data Mining: An Overview

Data Mining: An Overview

Date: June 7, 2005
Creator: Seifert, Jeffrey W
Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Contributing Partner: UNT Libraries Government Documents Department
Japanese and U.S. Industrial Associations: Their Roles in High-Technology Policymaking

Japanese and U.S. Industrial Associations: Their Roles in High-Technology Policymaking

Date: June 26, 1991
Creator: Nanto, Dick K & McLoughlin, Glenn J
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Data Mining: An Overview

Data Mining: An Overview

Date: May 3, 2004
Creator: Seifert, Jeffrey W
Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Contributing Partner: UNT Libraries Government Documents Department