You limited your search to:

 Resource Type: Report
 Collection: Congressional Research Service Reports
Tracking Federal Funds: USAspending.gov and Other Data Sources
This report discusses USAspending.gov, which collects data on grants, loans, insurance, assistance, and contracts, and it presents various searching and downloading options to Congress and the public. digital.library.unt.edu/ark:/67531/metadc626949/
Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731 as Passed by the House
This report compares provisions in two bills in the House of Representatives that address information sharing and related activities in cybersecurity. digital.library.unt.edu/ark:/67531/metadc627150/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under a variety of cybersecurity topics. digital.library.unt.edu/ark:/67531/metadc627154/
Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731
This report compares provisions in two bills in the House of Representatives that address information sharing and related activities in cybersecurity. digital.library.unt.edu/ark:/67531/metadc505493/
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study. digital.library.unt.edu/ark:/67531/metadc505596/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc505562/
Access to Broadband Networks: The Net Neutrality Debate
This report discusses the continued debate amongst congressional policymakers regarding telecommunications reform. A major point of the ongoing discussion is whether action is needed to ensure unfettered access to the Internet. digital.library.unt.edu/ark:/67531/metadc503368/
Internet Domain Names: Background and Policy Issues
This report discusses the Domain Name System (DNS), which is the distributed set of databases residing in computers around the world that contain address numbers mapped to corresponding domain names, making it possible to send and receive messages and to access information from computers anywhere on the Internet. digital.library.unt.edu/ark:/67531/metadc503406/
Internet Governance and the Domain Name System: Issues for Congress
This report provides a definition regarding Internet governance and how the Internet is currently governed. The report discusses the role of United States government and future model of Internet governance. digital.library.unt.edu/ark:/67531/metadc503671/
Information Warfare: The Role of Social Media in Conflict
This report briefly discusses the use if social media as a tool of information warfare. The ability to rapidly disseminate graphic images and ideas to shape the public narrative transforms social media into a strategic weapon in the hands of terrorists, insurgent groups, or governments engaged in conflict. digital.library.unt.edu/ark:/67531/metadc503647/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under a variety of cybersecurity topics. digital.library.unt.edu/ark:/67531/metadc503534/
Access to Broadband Networks: The Net Neutrality Debate
This report discusses the continued debate amongst congressional policymakers regarding telecommunications reform. A major point of the ongoing discussion is whether action is needed to ensure unfettered access to the Internet. digital.library.unt.edu/ark:/67531/metadc503673/
Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis
This report analyzes the incentives for companies to share information about cybersecurity breaches with other companies and the federal government. digital.library.unt.edu/ark:/67531/metadc505415/
Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis
This report analyzes the sharing of cyberattack information by government with private companies, by private companies with the government, and among private companies. Sharing information with consumers is mentioned but is not the central focus of this report. digital.library.unt.edu/ark:/67531/metadc503362/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc503613/
Information Warfare: Cyberattacks on Sony
This report discusses information warfare, which includes information-related capabilities to influence, disrupt, corrupt, or usurp the decision making of adversaries while protecting our own. digital.library.unt.edu/ark:/67531/metadc501705/
The America COMPETES Acts: An Overview
This report provides an overview of the COMPETES Acts for readers seeking background and legislative context. It includes a description and legislative history of the acts, a summary of the broad policy debate, and an examination of the implementation status of selected COMPETES-related programs and policies. This report also highlights major bills to reauthorize the COMPETES Acts from the 113th Congress. digital.library.unt.edu/ark:/67531/metadc503696/
Aereo and FilmOn X: Internet Television Streaming and Copyright Law
This report begins with a discussion of the technology used by Aereo and FilmOn X that permit subscribers to watch live broadcast television as well as already-aired programming. It then examines the public performance right in the Copyright Act and discusses the interpretation of the transmit clause and public performance right by the courts in the Aereo and FilmOn cases. The report concludes with a brief overview of future litigation by these parties and related legislative proposals in the 113th Congress. digital.library.unt.edu/ark:/67531/metadc503662/
Access to Broadband Networks: The Net Neutrality Debate
This report discusses the continued debate amongst congressional policymakers regarding telecommunications reform. A major point of the ongoing discussion is whether action is needed to ensure unfettered access to the Internet. digital.library.unt.edu/ark:/67531/metadc501905/
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement
This report discusses the concept of cybercrime and related cyber threats such as cyber espionage and cyber warfare, and questions whether--and under what circumstances--clear distinctions between the various threats should be delineated. It also outlines how current federal strategies may address cybercrime, including issues surrounding the measurement and tracking of cybercrime. digital.library.unt.edu/ark:/67531/metadc503621/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc503611/
The Network for Manufacturing Innovation
This report discusses the Revitalize American Manufacturing and Innovation Act of 2014 (RAMIA). RAMIA includes provisions authorizing the Commerce Department's National Institute of Standards and Technology (NIST), the Department of Energy, and other agencies to support the establishment of centers for manufacturing innovation, as well as establishing and providing for the operation of a Network for Manufacturing Innovation. digital.library.unt.edu/ark:/67531/metadc503321/
Desalination and Membrane Technologies: Federal Research and Adoption Issues
This report discusses emerging technologies (e.g., forward osmosis, nanocomposite and chlorine resistant membranes) that show promise for reducing desalination costs. It also discusses the research to support development of emerging technologies and to reduce desalination's environmental and social impacts. digital.library.unt.edu/ark:/67531/metadc501882/
Internet Governance and the Domain Name System: Issues for Congress
This report provides a definition regarding Internet governance and describes how the Internet is currently governed. The report discusses the role of United States government and future model of Internet governance. digital.library.unt.edu/ark:/67531/metadc501555/
Cybersecurity Issues and Challenges: In Brief
The information and communications technology (ICT) industry has evolved greatly over the last half century. The technology is ubiquitous and increasingly integral to almost every facet of modern society. ICT devices and components are generally interdependent, and disruption of one may affect many others. Over the past several years, experts and policy makers have expressed increasing concerns about protecting ICT systems from cyberattacks, which many experts expect to increase in frequency and severity over the next several years. This report discusses the concept of cybersecurity, the management of cybersecurity risks, and the federal government's role in managing such risks. digital.library.unt.edu/ark:/67531/metadc501605/
The 2013 Cybersecurity Executive Order: Overview and Considerations for Congress
The federal role in cybersecurity has been a topic of discussion and debate for over a decade. Despite significant legislative efforts in the 112th Congress on bills designed to improve the cybersecurity of U.S. critical infrastructure (CI), no legislation on that issue was enacted in that Congress. This report discusses the ramifications of Executive Order 13636, which issued in February 2013 was an attempt to enhance security and resiliency of CI through voluntary, collaborative efforts involving federal agencies and owners and operators of privately owned CI, as well as use of existing federal regulatory authorities. digital.library.unt.edu/ark:/67531/metadc501519/
Radio Broadcasting Chips for Smartphones: A Status Report
This report provides information on consumer and industry trends in radio and wireless network communications to give perspective on the proposal for widespread deployment of FM radio chips in smartphones as an emergency preparedness measure. It also provides a brief overview of the role of technology in disseminating emergency alerts and information. digital.library.unt.edu/ark:/67531/metadc501523/
Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis
This report analyzes the incentives for companies to share information about cybersecurity breaches with other companies and the federal government. Data breaches, such as those at Target, Home Depot, Neiman Marcus, and JPMorgan Chase, affecting financial records of tens of millions of households seem to occur regularly. Companies typically respond by trying to increase their cybersecurity by hiring consultants and purchasing new hardware and software. Policy analysts have suggested that sharing information about these breaches could be an effective and inexpensive part of improving cybersecurity. Firms share information directly on an ad hoc basis and through private-sector, nonprofit organizations such as Information Sharing and Analysis Centers (ISACs) that can analyze and disseminate information. digital.library.unt.edu/ark:/67531/metadc501916/
"Amazon Laws" and Taxation of Internet Sales: Constitutional Analysis
As more purchases are made over the Internet, states are looking for new ways to collect taxes on online sales. There is a common misperception that the U.S. Constitution prohibits states from taxing Internet sales. This report discusses "Amazon laws", which try to capture uncollected taxes on Internet sales and yet still comply with the Constitution's requirements. digital.library.unt.edu/ark:/67531/metadc490974/
Internet Domain Names: Background and Policy Issues
This report discusses the Domain Name System (DNS), which is the distributed set of databases that contain address numbers mapped to corresponding domain names, making it possible to send and receive messages and to access information on the Internet. The report includes background on the DNS and the Internet Corporation for Assigned Names and Numbers (ICANN) that manages the services, as well as related issues for the 113th Congress. digital.library.unt.edu/ark:/67531/metadc491152/
Internet Governance and the Domain Name System: Issues for Congress
This report provides a definition regarding Internet governance and how the Internet is currently governed. The report discusses the role of United States government and future model of Internet governance. digital.library.unt.edu/ark:/67531/metadc491174/
Cybersecurity: FISMA Reform
This report briefly discusses current requirements under the Federal Information Security Management Act (FISMA) and two bills currently being considered by Congress that would revise the conditions and authority granted by FISMA. digital.library.unt.edu/ark:/67531/metadc491497/
Smartphone Data Encryption: A Renewed Boundary for Law Enforcement?
This report briefly examines new issues for law enforcement regarding data encryption and smartphones including cyber-criminals and Apple's new privacy policy that removes the back-doors that law enforcement used to be able to use to access user data. digital.library.unt.edu/ark:/67531/metadc462308/
Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws
This report discusses the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet by shielding them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. digital.library.unt.edu/ark:/67531/metadc491537/
Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws
This report discusses The Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. digital.library.unt.edu/ark:/67531/metadc461970/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc462338/
Federal Lands and Natural Resources: Overview and Selected Issues for the 113th Congress
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc491088/
Can Body Worn Cameras Serve as a Deterrent to Police Misconduct?
This report discusses various issues regarding body worn cameras (BWCs), including the potential merits, concerns, and financial costs of use. The report also briefly states a possible method for allotting federal funds to help law enforcement agencies purchase BWCs. digital.library.unt.edu/ark:/67531/metadc462415/
Access to Broadband Networks: The Net Neutrality Debate
This report discusses the continued debate amongst congressional policymakers regarding telecommunications reform. A major point of the ongoing discussion is whether action is needed to ensure unfettered access to the Internet. digital.library.unt.edu/ark:/67531/metadc333001/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc306561/
Nanotechnology: A Policy Primer
This report provides an overview of nanomanufacturing as well as public understanding of and attitudes toward nanotechnology. digital.library.unt.edu/ark:/67531/metadc332898/
Internet Domain Names: Background and Policy Issues
This report discusses the Domain Name System (DNS), which is the distributed set of databases that contain address numbers mapped to corresponding domain names, making it possible to send and receive messages and to access information on the Internet. The report includes background on the DNS and the Internet Corporation for Assigned Names and Numbers (ICANN) that manages the services, as well as related issues for the 113th Congress. digital.library.unt.edu/ark:/67531/metadc306512/
Internet Governance and the Domain Name System: Issues for Congress
This report provides a definition regarding Internet governance and how the Internet is currently governed. The report discusses the role of United States government and future model of Internet governance. digital.library.unt.edu/ark:/67531/metadc306421/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc306502/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc306484/
Cybersecurity: Authoritative Reports and Resources, by Topic
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D). digital.library.unt.edu/ark:/67531/metadc284460/
Internet Domain Names: Background and Policy Issues
This report discusses the Domain Name System (DNS), which is the distributed set of databases that contain address numbers mapped to corresponding domain names, making it possible to send and receive messages and to access information on the Internet. The report includes background on the DNS and the Internet Corporation for Assigned Names and Numbers (ICANN) that manages the servies, as well as related issues for the 113th Congress. digital.library.unt.edu/ark:/67531/metadc284473/
Aereo and FilmOn X: Internet Television Streaming and Copyright Law
This report begins with a discussion of the technology used by Aereo and FilmOn X that permit subscribers to watch live broadcast television as well as already-aired programming. It then examines the public performance right in the Copyright Act and discusses the interpretation of the transmit clause and public performance right by the courts in the Aereo and FilmOn cases. The report concludes with a brief overview of future litigation by these parties and related legislative proposals in the 113th Congress. digital.library.unt.edu/ark:/67531/metadc284471/
An Analysis of STEM Education Funding at the NSF: Trends and Policy Discussion
This report analyzes National Science Foundation funding trends and selected closely-related STEM (science, technology, engineering, and math) education policy issues to provide fiscal and policy context. It concludes with an analysis of potential policy options. digital.library.unt.edu/ark:/67531/metadc282339/
The Obama Administration's Proposal to Establish a National Network for Manufacturing Innovation
This report discusses the proposed creation of the National Network for Manufacturing Innovation (NNMI), which would help accelerate innovation and support manufacturing technology commercialization. The report includes an overview of the topic as well as discussion on the Administration's proposal, preliminary activities, legislative status, and issues for consideration. digital.library.unt.edu/ark:/67531/metadc463238/
FIRST PREV 1 2 3 4 5 NEXT LAST