You limited your search to:

 Country: United States
 Collection: Congressional Research Service Reports
Access to Broadband Networks: The Net Neutrality Debate
This report discusses the continued debate amongst congressional policymakers regarding telecommunications reform. A major point of the ongoing discussion is whether action is needed to ensure unfettered access to the Internet. digital.library.unt.edu/ark:/67531/metadc33009/
Access to Broadband Networks: The Net Neutrality Debate
This report discusses the continued debate amongst congressional policymakers regarding telecommunications reform. A major point of the ongoing discussion is whether action is needed to ensure unfettered access to the Internet. digital.library.unt.edu/ark:/67531/metadc333001/
Access to Broadband Networks: The Net Neutrality Debate
This report discusses the continued debate amongst congressional policymakers regarding telecommunications reform. A major point of the ongoing discussion is whether action is needed to ensure unfettered access to the Internet. digital.library.unt.edu/ark:/67531/metadc40076/
Advanced Vehicle Technologies: Energy, Environment, and Development Issues
This report discusses four major vehicle technologies — electric vehicles, hybrid electric vehicles, plug-in hybrids, and fuel cell vehicles — as well as advanced component technologies. Each technology is discussed in terms of cost, fueling and maintenance infrastructure, and performance. digital.library.unt.edu/ark:/67531/metadc462526/
Aereo and FilmOn X: Internet Television Streaming and Copyright Law
This report begins with a discussion of the technology used by Aereo and FilmOn X that permit subscribers to watch live broadcast television as well as already-aired programming. It then examines the public performance right in the Copyright Act and discusses the interpretation of the transmit clause and public performance right by the courts in the Aereo and FilmOn cases. The report concludes with a brief overview of future litigation by these parties and related legislative proposals in the 113th Congress. digital.library.unt.edu/ark:/67531/metadc284471/
Aereo and FilmOn X: Internet Television Streaming and Copyright Law
This report begins with a discussion of the technology used by Aereo and FilmOn X that permit subscribers to watch live broadcast television as well as already-aired programming. It then examines the public performance right in the Copyright Act and discusses the interpretation of the transmit clause and public performance right by the courts in the Aereo and FilmOn cases. The report concludes with a brief overview of future litigation by these parties and related legislative proposals in the 113th Congress. digital.library.unt.edu/ark:/67531/metadc284491/
“Amazon” Laws and Taxation of Internet Sales: Constitutional Analysis
This report covers ways in which states are attempting to capture taxes on Internet sales. Two basic approaches include imposing tax collection responsibilities on the retailer, and requiring remote sellers to provide tax information to the state and/or it's customers. This report covers the legality of both options. digital.library.unt.edu/ark:/67531/metadc99071/
"Amazon Laws" and Taxation of Internet Sales: Constitutional Analysis
This report focuses on the ways in which the states' efforts to impose requirements on out-of-state retailers are limited by the Constitution. The report discusses recent state legislation as well as legislation introduced in the two most recent Congresses. digital.library.unt.edu/ark:/67531/metadc462168/
America COMPETES Act: Programs, Funding, and Selected Issues
This report provides an overview of the America COMPETES Act provisions, summarizes its legislative origin and the origins of some of the new programs it authorizes, analyzes selected America COMPETES Act programs that are the focus of appropriation discussions, and provides a comparison of the President's budget, congressional appropriations, and America COMPETES Act authorization levels for FY2008. digital.library.unt.edu/ark:/67531/metadc463110/
America COMPETES Acts: FY2008-FY2013 Funding Tables
This report has been updated to reflect FY2013 funding levels contained in P.L. 113-6 (Consolidated and Further Continuing Appropriations Act, 2013) and the explanatory statement published in the March 11, 2013. digital.library.unt.edu/ark:/67531/metadc276885/
America COMPETES Acts: FY2008-FY2013 Funding Tables
This report has been updated to reflect FY2013 funding levels contained in P.L. 113-6 (Consolidated and Further Continuing Appropriations Act, 2013) and the explanatory statement published in the March 11, 2013. This report also provides selected FY2013 current or operational plan funding levels, which have been adjusted to account for the effects of sequestration and other currently known legal determinations made by the Office of Management and Budget (OMB) that may affect the final appropriations levels. digital.library.unt.edu/ark:/67531/metadc227815/
America COMPETES Acts: FY2008-FY2013 Funding Tables
This report discusses major provisions of the America COMPETES Reauthorization Act of 2010 that are set to expire in 2013. This report has been updated to reflect FY2013 enacted funding levels--as contained in P.L. 113- 6 (Consolidated and Further Continuing Appropriations Act, 2013)--for specified COMPETES related accounts. digital.library.unt.edu/ark:/67531/metadc462416/
An Analysis of STEM Education Funding at the NSF: Trends and Policy Discussion
This report analyzes National Science Foundation funding trends and selected closely related STEM (science, technology, engineering, and math) education policy issues in order to place conversations about FY2013 funding in broader fiscal and policy context. It concludes with an analysis of potential policy options. digital.library.unt.edu/ark:/67531/metadc86626/
An Analysis of STEM Education Funding at the NSF: Trends and Policy Discussion
This report analyzes National Science Foundation funding trends and selected closely-related STEM (science, technology, engineering, and math) education policy issues to provide fiscal and policy context. It concludes with an analysis of potential policy options. digital.library.unt.edu/ark:/67531/metadc282339/
An Analysis of STEM Education Funding at the NSF: Trends and Policy Discussion
This report analyzes National Science Foundation funding trends and selected closely-related STEM (science, technology, engineering, and math) education policy issues to provide fiscal and policy context. It concludes with an analysis of potential policy options. digital.library.unt.edu/ark:/67531/metadc461926/
Broadband Internet Access and the Digital Divide: Federal Assistance Programs
Report that provides an overview of the "digital divide", which is a term used to describe a perceived gap between those Americans who use or have access to telecommunications and information technologies and those who do not. digital.library.unt.edu/ark:/67531/metadc227964/
Broadband Internet Access and the Digital Divide: Federal Assistance Programs
This report looks at considerations of the 112th Congress in furthering encouragement of broadband deployment and adoption so as decrease the "digital divide" between "information haves and have-nots." digital.library.unt.edu/ark:/67531/metadc122279/
Broadband Internet Access and the Digital Divide: Federal Assistance Programs
The "digital divide" is a term used to describe a perceived gap between "information haves and have-nots," or in other words, between those Americans who use or have access to telecommunications and information technologies and those who do not. Whether or not individuals or communities fall into the "information haves" category depends on a number of factors, ranging from the presence of computers in the home, to training and education, to the availability of affordable Internet access. digital.library.unt.edu/ark:/67531/metadc40179/
Broadband Internet Access and the Digital Divide: Federal Assistance Programs
Some policymakers, believing that disparities in broadband access across American society could have adverse economic and social consequences on those left behind, assert that the federal government should play a more active role to avoid a "digital divide" in broadband access. One approach is for the federal government to provide financial assistance to support broadband deployment in underserved areas. Others, however, believe that federal assistance for broadband deployment is not appropriate. Some opponents question the reality of the "digital divide," and argue that federal intervention in the broadband marketplace would be premature and, in some cases, counterproductive. digital.library.unt.edu/ark:/67531/metadc29641/
Can Body Worn Cameras Serve as a Deterrent to Police Misconduct?
This report discusses various issues regarding body worn cameras (BWCs), including the potential merits, concerns, and financial costs of use. The report also briefly states a possible method for allotting federal funds to help law enforcement agencies purchase BWCs. digital.library.unt.edu/ark:/67531/metadc462415/
Clean Energy Standard: Potential Qualifying Energy Sources
This report begins with a brief examination of clean energy, renewable energy, and alternative energy. It then presents possible selection criteria Congress could use to determine which sources could be eligible for a CES depending on the goal(s) of the CES. The report provides an overview of the energy sources most commonly discussed as potential CES qualifying sources: biomass, fossil fuels (natural gas combined-cycle and coal-fired power plants with carbon capture and sequestration), geothermal resources, nuclear, solar, water, and wind. The report describes where each source can be found in the United States, the estimated quantity available for electricity generation, technologies used to create electricity from the source, advantages and disadvantages of using the source for electricity generation, and policy implications should the source be included in a CES.5 The report also contains a section on energy efficiency and its potential inclusion in a CES. digital.library.unt.edu/ark:/67531/metadc40142/
Cloud Computing: Constitutional and Statutory Privacy Protections
This report first describes cloud computing and how it differs from traditional computing. It then describes how the Fourth Amendment and federal electronic privacy statutes apply to communications in the physical world, to Internet communications generally, and specifically to the cloud. Finally, this report surveys recent legislation and other various proposals designed to update the existing statutory framework. digital.library.unt.edu/ark:/67531/metadc462838/
Cooperative R&D: Federal Efforts to Promote Industrial Competitiveness
Report regarding the ways the United States Congress has explored to stimulate technological advancement in the private sector. digital.library.unt.edu/ark:/67531/metadc228030/
Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws
The federal computer fraud and abuse statute, 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of Section 1030 and some of its federal statutory companions, including the amendments found in the Identity Theft Enforcement and Restitution Act. digital.library.unt.edu/ark:/67531/metadc83829/
Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws
This report discusses The Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. digital.library.unt.edu/ark:/67531/metadc461970/
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement
This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime. digital.library.unt.edu/ark:/67531/metadc87232/
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement
This report gives an overview of cybercrime, which can include crimes such as identity theft, payment card fraud, and intellectual property theft. The report discusses where the criminal acts exist (in both the real and digital worlds), motivations for cybercrimes, and who is committing them, as well as government definitions, strategies, and methods of tracking cybercrime. digital.library.unt.edu/ark:/67531/metadc98020/
Cybersecurity: Authoritative Reports and Resources
Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues and will be updated as needed. digital.library.unt.edu/ark:/67531/metadc87226/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc99065/
Cybersecurity: Authoritative Reports and Resources
Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues and will be updated as needed. digital.library.unt.edu/ark:/67531/metadc85416/
Cybersecurity: Authoritative Reports and Resources
Report that provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc227761/
Cybersecurity: Authoritative Reports and Resources
Report that provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc227759/
Cybersecurity: Authoritative Reports and Resources
This report provides links to cybersecurity hearings and legislation under consideration in the 113th Congress and those considered in the 112th Congress, as well as executive orders and presidential directives, data and statistics, glossaries, and authoritative reports. digital.library.unt.edu/ark:/67531/metadc227760/
Cybersecurity: Authoritative Reports and Resources
Report that provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc227758/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc122226/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc93941/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc98018/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cyber security issues, including: legislation, hearings in the 112th Congress, data and statistics, and cyber security glossaries. digital.library.unt.edu/ark:/67531/metadc93928/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc93929/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries. digital.library.unt.edu/ark:/67531/metadc93930/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D) digital.library.unt.edu/ark:/67531/metadc462495/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D) digital.library.unt.edu/ark:/67531/metadc463359/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D) digital.library.unt.edu/ark:/67531/metadc462060/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D) digital.library.unt.edu/ark:/67531/metadc463466/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D) digital.library.unt.edu/ark:/67531/metadc462636/
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D) digital.library.unt.edu/ark:/67531/metadc462922/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc284460/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc306502/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc306561/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc306484/
FIRST PREV 1 2 3 4 NEXT LAST