You limited your search to:

 Decade: 2010-2019
 Year: 2010
 Collection: Congressional Research Service Reports
Internet Domain Names: Background and Policy Issues

Internet Domain Names: Background and Policy Issues

Date: January 26, 2010
Creator: Kruger, Lennard G.
Description: This report discusses the Domain Name System (DNS), which is the distributed set of databases residing in computers around the world that contain address numbers mapped to corresponding domain names, making it possible to send and receive messages and to access information from computers anywhere on the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Internet Domain Names: Background and Policy Issues

Internet Domain Names: Background and Policy Issues

Date: April 5, 2010
Creator: Kruger, Lennard G.
Description: This report discusses the Domain Name System (DNS), which is the distributed set of databases residing in computers around the world that contain address numbers mapped to corresponding domain names, making it possible to send and receive messages and to access information from computers anywhere on the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Spyware: Background and Policy Issues for Congress

Spyware: Background and Policy Issues for Congress

Date: September 8, 2010
Creator: Figliola, Patricia Moloney
Description: The Anti-Spyware Coalition (ASC) defines spyware as "technologies deployed without appropriate user consent and/or implemented in ways that impair user control over (1) material changes that affect their user experience, privacy, or system security; (2) use of their system resources, including what programs are installed on their computers; and/or (3) collection, use, and distribution of their personal or other sensitive information. The main issue for Congress over spyware is whether to enact new legislation specifically addressing spyware, or to rely on industry self-regulation and enforcement actions by the Federal Trade Commission (FTC) and the Department of Justice under existing law. This report discusses this issue, as well as the opinions of both the opponents and the supporters of industry self-regulation.
Contributing Partner: UNT Libraries Government Documents Department
Broadband Internet Access and the Digital Divide: Federal Assistance Programs

Broadband Internet Access and the Digital Divide: Federal Assistance Programs

Date: September 23, 2010
Creator: Kruger, Lennard G. & Gilroy, Angele A.
Description: Some policymakers, believing that disparities in broadband access across American society could have adverse economic and social consequences on those left behind, assert that the federal government should play a more active role to avoid a "digital divide" in broadband access. One approach is for the federal government to provide financial assistance to support broadband deployment in underserved areas. Others, however, believe that federal assistance for broadband deployment is not appropriate. Some opponents question the reality of the "digital divide," and argue that federal intervention in the broadband marketplace would be premature and, in some cases, counterproductive.
Contributing Partner: UNT Libraries Government Documents Department
Managing Electronic Waste: Issues with Exporting E-Waste

Managing Electronic Waste: Issues with Exporting E-Waste

Date: September 27, 2010
Creator: Luther, Linda
Description: Electronic waste (e-waste) is a term that is used loosely to refer to obsolete, broken, or irreparable electronic devices like televisions, computer central processing units (CPUs), and computer monitors. There are various issues of concern with regard to e-waste disposal and recycling. This report looks at issues specifically related to its export for recycling. Particularly, it discusses documented impacts to human health and the environment that have been tied to unsafe recycling practices in developing countries, as well as issues that have motivated certain stakeholders to divert e-waste from landfill disposal and, hence, increase recycling. It also provides an overview of various factors necessary to understand why e-waste disposal has become a concern in the United States, and it also discusses waste management requirements in the United States.
Contributing Partner: UNT Libraries Government Documents Department
The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability

The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability

Date: December 9, 2010
Creator: Kerr, Paul K.; Rollins, John & Theohary, Catherine A.
Description: In September 2010, media reports emerged about a new form of cyber attack that appeared to target Iran, although the actual target, if any, is unknown. This report discusses this cyber attack, a malicious software program known as Stuxnet, which infected computer systems that were used to control the functioning of a nuclear power plant. Once inside the system, Stuxnet had the ability to degrade or destroy the software on which it operated. Although early reports focused on the impact on facilities in Iran, researchers discovered that the program had spread throughout multiple countries worldwide.
Contributing Partner: UNT Libraries Government Documents Department
Internet Domain Names: Background and Policy Issues

Internet Domain Names: Background and Policy Issues

Date: December 14, 2010
Creator: Kruger, Lennard G.
Description: The Domain Name System (DNS) is the distributed set of databases residing in computers around the world that contain address numbers mapped to corresponding domain names, making it possible to send and receive messages and to access information from computers anywhere on the Internet. Many of the technical, operational, and management decisions regarding the DNS can have significant impacts on Internet-related policy issues such as intellectual property, privacy, ecommerce, and cybersecurity. The expiration of the JPA (Joint Project Agreement), the implementation of the Affirmation of Commitments, and the continuing U.S. authority over the DNS root zone remain issues of interest to the 112th Congress, the Administration, foreign governments, and other Internet stakeholders worldwide.
Contributing Partner: UNT Libraries Government Documents Department
Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Date: December 27, 2010
Creator: Doyle, Charles
Description: The federal computer fraud and abuse statute, 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of Section 1030 and some of its federal statutory companions, including the amendments found in the Identity Theft Enforcement and Restitution Act.
Contributing Partner: UNT Libraries Government Documents Department