Network maintenance July 27th between 7:30AM and 8:00AM CDT may cause service disruptions.

  You limited your search to:

 Collection: Congressional Research Service Reports
Engineered Nanoscale Materials and Derivative Products: Regulatory Challenges

Engineered Nanoscale Materials and Derivative Products: Regulatory Challenges

Date: July 18, 2008
Creator: Schierow, Linda-Jo
Description: The purpose of this report is to consider certain challenges faced by federal EHS (environmental, human health and safety) risk assessors, risk managers, and policy makers, and to discuss possible legislative approaches to address those challenges.
Contributing Partner: UNT Libraries Government Documents Department
Manufacturing, Technology, and Competitiveness

Manufacturing, Technology, and Competitiveness

Date: January 12, 1999
Creator: Schacht, Wendy H
Description: This report discusses increases in the productivity of American firms to maintain competitiveness in the international marketplace.
Contributing Partner: UNT Libraries Government Documents Department
The National Institute of Standards and Technology: An Overview

The National Institute of Standards and Technology: An Overview

Date: February 13, 2006
Creator: Schacht, Wendy H
Description: This report discusses the National Institute of Standards and Technology (NIST) that has a mandate to increase the competitiveness of U.S. companies. NIST research also provides the measurement, calibration, and quality assurance techniques that underpin U.S. commerce.
Contributing Partner: UNT Libraries Government Documents Department
The National Institute of Standards and Technology: An Overview

The National Institute of Standards and Technology: An Overview

Date: March 17, 2003
Creator: Schacht, Wendy H
Description: This report discusses the National Institute of Standards and Technology (NIST) that has a mandate to increase the competitiveness of U.S. companies. NIST research also provides the measurement, calibration, and quality assurance techniques that underpin U.S. commerce.
Contributing Partner: UNT Libraries Government Documents Department
Illegal Internet Streaming of Copyrighted Content: Legislation in the 112th Congress

Illegal Internet Streaming of Copyrighted Content: Legislation in the 112th Congress

Date: December 1, 2011
Creator: Yeh, Brian T.
Description: This report describes streaming technology, explains the disparity in criminal penalties for different forms of infringement committed by electronic means, analyzes legislation in the 112th Congress that would harmonize penalties for illegal streaming with those available for other forms of online copyright infringement, and summarizes arguments for and against such a legislative change.
Contributing Partner: UNT Libraries Government Documents Department
Social Networking and Constituent Communications: Members' Use of Twitter and Facebook During a Two-Month Period in the 112th Congress

Social Networking and Constituent Communications: Members' Use of Twitter and Facebook During a Two-Month Period in the 112th Congress

Date: March 22, 2013
Creator: Glassman, Matthew E.; Straus, Jacob R. & Shogan, Colleen J.
Description: This report examines Member adoption and use of two social networking services: Twitter and Facebook. The report analyzes data on Member use of Twitter and Facebook collected by an academic institution in collaboration with the Congressional Research Service during a two-month period between August and October 2011 and the adoption of both platforms as of January 2012.
Contributing Partner: UNT Libraries Government Documents Department
Cloud Computing: Constitutional and Statutory Privacy Protections

Cloud Computing: Constitutional and Statutory Privacy Protections

Date: March 22, 2013
Creator: Thompson, Richard M., II
Description: This report first describes cloud computing and how it differs from traditional computing. It then describes how the Fourth Amendment and federal electronic privacy statutes apply to communications in the physical world, to Internet communications generally, and specifically to the cloud. Finally, this report surveys recent legislation and other various proposals designed to update the existing statutory framework.
Contributing Partner: UNT Libraries Government Documents Department
U.S. Initiatives to Promote Global Internet Freedom: Issues, Policy, and Technology

U.S. Initiatives to Promote Global Internet Freedom: Issues, Policy, and Technology

Date: April 5, 2010
Creator: Moloney Figliola, Patricia; Nakamura, Kennon H.; Addis, Casey L. & Lum, Thomas
Description: This report provides information regarding the role of U.S. and other foreign companies in facilitating Internet censorship by repressive regimes overseas. The report is divided into several sections: Examination of repressive policies in China and Iran, Relevant U.S. laws, U.S. policies to promote Internet freedom, Private sector initiatives, and Congressional action.
Contributing Partner: UNT Libraries Government Documents Department
Information Warfare: The Role of Social Media in Conflict

Information Warfare: The Role of Social Media in Conflict

Date: March 4, 2015
Creator: Theohary, Catherine A.
Description: This report briefly discusses the use if social media as a tool of information warfare. The ability to rapidly disseminate graphic images and ideas to shape the public narrative transforms social media into a strategic weapon in the hands of terrorists, insurgent groups, or governments engaged in conflict.
Contributing Partner: UNT Libraries Government Documents Department
Advertising Industry in the Digital Age

Advertising Industry in the Digital Age

Date: November 9, 2009
Creator: Kirchhoff, Suzanne M.
Description: This report discusses regulatory challenges faced by policymakers as the advertising industry enters a period of far-reaching change brought about by the economic downturn and structural shifts as consumers move to the Internet and other digital platforms for news, entertainment, and socializing.
Contributing Partner: UNT Libraries Government Documents Department
An Analysis of STEM Education Funding at the NSF: Trends and Policy Discussion

An Analysis of STEM Education Funding at the NSF: Trends and Policy Discussion

Date: April 9, 2012
Creator: Gonzalez, Heather B.
Description: This report analyzes National Science Foundation funding trends and selected closely related STEM (science, technology, engineering, and math) education policy issues in order to place conversations about FY2013 funding in broader fiscal and policy context. It concludes with an analysis of potential policy options.
Contributing Partner: UNT Libraries Government Documents Department
Federally-Funded Innovation Inducement Prizes

Federally-Funded Innovation Inducement Prizes

Date: June 29, 2009
Creator: Stine, Deborah D.
Description: This report discusses the status of current federally-funded innovation inducement prizes, addresses the different types of prizes, analyzes when prizes may be appropriate and effective, and summarizes assessments that have been made of their effectiveness. The report also provides the lessons that may be learned from completed competitions, and policy options for those Members of Congress interested in taking action regarding federally-funded innovation inducement prizes. The report concludes with an overview of 111th congressional activities regarding prizes.
Contributing Partner: UNT Libraries Government Documents Department
Internet Governance and the Domain Name System: Issues for Congress

Internet Governance and the Domain Name System: Issues for Congress

Date: February 9, 2012
Creator: Kruger, Lennard G.
Description: As the Internet grows and becomes more pervasive in all aspects of modern society, the question of how it should be governed becomes more pressing. Currently, an important aspect of the Internet is governed by a private sector, international organization called the Internet Corporation for Assigned Names and Numbers (ICANN), which manages and oversees some of the critical technical underpinnings of the Internet such as the domain name system and Internet Protocol (IP) addressing. ICANN makes its policy decisions using a multistakeholder model of governance, whereby a “bottom-up” collaborative process is open to all constituencies of Internet stakeholders. A key issue for Congress is whether and how the U.S. government should continue to maximize U.S. influence over ICANN's multistakeholder Internet governance process, while at the same time effectively resisting proposals for an increased role by international governmental institutions such as the U.N. The outcome of this debate will likely have a significant impact on how other aspects of the Internet may be governed in the future, especially in such areas as intellectual property, privacy, law enforcement, Internet free speech, and cybersecurity. Looking forward, the institutional nature of Internet governance could have far reaching implications on important policy decisions that will ...
Contributing Partner: UNT Libraries Government Documents Department
Data Mining: An Overview

Data Mining: An Overview

Date: May 21, 2003
Creator: Seifert, Jeffrey W
Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Contributing Partner: UNT Libraries Government Documents Department
Data Mining: An Overview

Data Mining: An Overview

Date: June 7, 2005
Creator: Seifert, Jeffrey W
Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Contributing Partner: UNT Libraries Government Documents Department
Electronic Commerce: An Introduction

Electronic Commerce: An Introduction

Date: June 27, 2000
Creator: McLoughlin, Glenn J
Description: Electronic commercial transactions over the Internet, or “e-commerce,” have grown so fast over the last five years that many experts continue to underestimate its growth and development. Whether retail business-to-customer or business-to-business transactions, e-commerce shows no signs of slowing down. In turn, policymakers both in the United States and abroad are likely to face increasingly complex issues of security, privacy, taxation, infrastructure development and other issues in 2000 and beyond. This report will be updated periodically.
Contributing Partner: UNT Libraries Government Documents Department
Data Mining and Homeland Security: An Overview

Data Mining and Homeland Security: An Overview

Date: July 27, 2006
Creator: Seifert, Jeffrey W
Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Contributing Partner: UNT Libraries Government Documents Department
Data Mining: An Overview

Data Mining: An Overview

Date: June 7, 2005
Creator: Seifert, Jeffrey W
Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Contributing Partner: UNT Libraries Government Documents Department
Japanese and U.S. Industrial Associations: Their Roles in High-Technology Policymaking

Japanese and U.S. Industrial Associations: Their Roles in High-Technology Policymaking

Date: June 26, 1991
Creator: Nanto, Dick K & McLoughlin, Glenn J
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Data Mining: An Overview

Data Mining: An Overview

Date: May 3, 2004
Creator: Seifert, Jeffrey W
Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Contributing Partner: UNT Libraries Government Documents Department
Data Mining: An Overview

Data Mining: An Overview

Date: December 16, 2004
Creator: Seifert, Jeffrey W
Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Contributing Partner: UNT Libraries Government Documents Department
Internet Statistics: Explanation and Sources

Internet Statistics: Explanation and Sources

Date: February 6, 2002
Creator: Tehan, Rita
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Internet Statistics: Explanation and Sources

Internet Statistics: Explanation and Sources

Date: April 22, 2003
Creator: Tehan, Rita
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Computer Security: A Summary of Selected Federal Laws, Executive Orders, and Presidential Directives

Computer Security: A Summary of Selected Federal Laws, Executive Orders, and Presidential Directives

Date: April 16, 2004
Creator: Moteff, John D
Description: This report provides a short summary of selected federal laws, executive orders, and presidential directives, currently in force, that govern computer security. The report focuses on the major roles and responsibilities assigned various federal agencies in the area of computer security.
Contributing Partner: UNT Libraries Government Documents Department