Federal Enterprise Architecture and E-Government: Issues for Information Technology Management

Federal Enterprise Architecture and E-Government: Issues for Information Technology Management

Date: May 10, 2006
Creator: Seifert, Jeffrey W.
Description: This report discusses government efforts to increase efficiency. One approach being implemented to reduce duplicative spending and improve cross-agency collaboration is the use of enterprise architecture (EA) planning across the federal government. An EA serves as a blueprint of the business operations of an organization, and the information and technology needed to carry out these functions.
Contributing Partner: UNT Libraries Government Documents Department
Reauthorization of the E-Government Act: A Brief Overview

Reauthorization of the E-Government Act: A Brief Overview

Date: May 14, 2008
Creator: Seifert, Jeffrey W.
Description: This report discusses the E-Government Act that serves as the primary legislative vehicle to guide evolving federal IT management practices and to promote initiatives to make government information and services available online.
Contributing Partner: UNT Libraries Government Documents Department
Data Mining and Homeland Security: An Overview

Data Mining and Homeland Security: An Overview

Date: August 27, 2008
Creator: Seifert, Jeffrey W.
Description: This report explores the issue of data mining in detail and in the context of homeland security, as well as relevant initiatives and pieces of legislation. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. In the context of homeland security, data mining can be a potential means to identify terrorist activities, such as money transfers and communications, and to identify and track individual terrorists themselves, such as through travel and immigration records.
Contributing Partner: UNT Libraries Government Documents Department
Data Mining: An Overview

Data Mining: An Overview

Date: May 21, 2003
Creator: Seifert, Jeffrey W
Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Contributing Partner: UNT Libraries Government Documents Department
Data Mining: An Overview

Data Mining: An Overview

Date: June 7, 2005
Creator: Seifert, Jeffrey W
Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Contributing Partner: UNT Libraries Government Documents Department
Data Mining and Homeland Security: An Overview

Data Mining and Homeland Security: An Overview

Date: July 27, 2006
Creator: Seifert, Jeffrey W
Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Contributing Partner: UNT Libraries Government Documents Department
Data Mining: An Overview

Data Mining: An Overview

Date: June 7, 2005
Creator: Seifert, Jeffrey W
Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Contributing Partner: UNT Libraries Government Documents Department
Data Mining: An Overview

Data Mining: An Overview

Date: May 3, 2004
Creator: Seifert, Jeffrey W
Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Contributing Partner: UNT Libraries Government Documents Department
Data Mining: An Overview

Data Mining: An Overview

Date: December 16, 2004
Creator: Seifert, Jeffrey W
Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Contributing Partner: UNT Libraries Government Documents Department
Homeland Security - Reducing the Vulnerability of Public and Private Information Infrastructures to Terrorism: An Overview

Homeland Security - Reducing the Vulnerability of Public and Private Information Infrastructures to Terrorism: An Overview

Date: December 12, 2002
Creator: Seifert, Jeffrey W
Description: None
Contributing Partner: UNT Libraries Government Documents Department
A Primer on E-Government: Sectors, Stages, Opportunities, and Challenges of Online Governance

A Primer on E-Government: Sectors, Stages, Opportunities, and Challenges of Online Governance

Date: March 28, 2002
Creator: Seifert, Jeffrey W
Description: Electronic government (e-government) intersects many legislative issues, including privacy, digital divide (the lack of equal access to computers, whether due to a lack of financial resources or necessary skills), public access to government information, service delivery, and information security. E-government solutions are prominently represented in efforts to improve the management and efficiency of government information technology resources. To help policymakers discern e-government initiatives relative to their role in various issues, this report identifies and defines the principal e-government sectors and stages of development. It also outlines some of the opportunities and challenges associated with e-government.
Contributing Partner: UNT Libraries Government Documents Department
Federal Chief Information Officer (CIO): Opportunities and Challenges

Federal Chief Information Officer (CIO): Opportunities and Challenges

Date: July 2, 2002
Creator: Seifert, Jeffrey W
Description: None
Contributing Partner: UNT Libraries Government Documents Department
A Primer on E-Government: Sectors, Stages, Opportunities, and Challenges of Online Governance

A Primer on E-Government: Sectors, Stages, Opportunities, and Challenges of Online Governance

Date: January 28, 2003
Creator: Seifert, Jeffrey W
Description: Electronic government (e-government) intersects many legislative issues, including privacy, digital divide (the lack of equal access to computers, whether due to a lack of financial resources or necessary skills), public access to government information, service delivery, and information security. E-government solutions are prominently represented in efforts to improve the management and efficiency of government information technology resources. To help policymakers discern e-government initiatives relative to their role in various issues, this report identifies and defines the principal e-government sectors and stages of development. It also outlines some of the opportunities and challenges associated with e-government.
Contributing Partner: UNT Libraries Government Documents Department
Data Mining and Homeland Security: An Overview

Data Mining and Homeland Security: An Overview

Date: October 3, 2006
Creator: Seifert, Jeffrey W.
Description: Data mining has become one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. In the context of homeland security, data mining can be a potential means to identify terrorist activities, such as money transfers and communications, and to identify and track individual terrorists themselves, such as through travel and immigration records. This report explores the issue of data mining in detail and in the context of homeland security, as well as relevant initiatives and pieces of legislation.
Contributing Partner: UNT Libraries Government Documents Department
Information Sharing for Homeland Security: A Brief Overview

Information Sharing for Homeland Security: A Brief Overview

Date: September 22, 2004
Creator: Relyea, Harold C. & Seifert, Jeffrey W.
Description: This report reviews some of the principal existing homeland security information sharing arrangements, as well as some projected arrangements in this regard, and discusses related policy, evaluations, and proposed legislation.
Contributing Partner: UNT Libraries Government Documents Department
Congressional Continuity of Operations (COOP): An Overview of Concepts and Challenges

Congressional Continuity of Operations (COOP): An Overview of Concepts and Challenges

Date: March 25, 2005
Creator: Petersen, R. Eric & Seifert, Jeffrey W
Description: This report discusses the circumstances surrounding COOP planning, including provisions for alternative meeting sites and methods for conducting House and Senate meetings and floor sessions when Capitol facilities are not available.
Contributing Partner: UNT Libraries Government Documents Department
Congressional Continuity of Operations (COOP): An Overview of Concepts and Challenges

Congressional Continuity of Operations (COOP): An Overview of Concepts and Challenges

Date: January 14, 2003
Creator: Petersen, R. Eric & Seifert, Jeffrey W
Description: This report discusses the circumstances surrounding COOP planning, including provisions for alternative meeting sites and methods for conducting House and Senate meetings and floor sessions when Capitol facilities are not available.
Contributing Partner: UNT Libraries Government Documents Department
Information Sharing for Homeland Security: A Brief Overview

Information Sharing for Homeland Security: A Brief Overview

Date: September 30, 2004
Creator: Relyea, Harold C & Seifert, Jeffrey W
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Information Sharing for Homeland Security: A Brief Overview

Information Sharing for Homeland Security: A Brief Overview

Date: January 10, 2005
Creator: Relyea, Harold C & Seifert, Jeffrey W
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Electronic Congress: Proposals and Issues

Electronic Congress: Proposals and Issues

Date: July 2, 2002
Creator: Seifert, Jeffrey W & Petersen, R. Eric
Description: The events of September 11, 2001, and the subsequent anthrax incidents have prompted some observers to suggest creating a capability for a virtual or electronic Congress (e-Congress) that could function in the event of an emergency. Currently, it is unclear exactly how an e-Congress would be constituted and operated; however, a proposal (H.R. 3481) has been introduced to require the National Institute of Standards and Technology (NIST) to investigate the feasibility and costs of implementing a computer system for remote voting and communication for Congress to ensure business continuity for congressional operations.
Contributing Partner: UNT Libraries Government Documents Department
Electronic Congress: Proposals and Issues

Electronic Congress: Proposals and Issues

Date: January 28, 2003
Creator: Seifert, Jeffrey W & Petersen, R. Eric
Description: The events of September 11, 2001, and the subsequent anthrax incidents have prompted some observers to suggest creating a capability for a virtual or electronic Congress (e-Congress) that could function in the event of an emergency. Currently, it is unclear exactly how an e-Congress would be constituted and operated; however, a proposal (H.R. 3481) has been introduced to require the National Institute of Standards and Technology (NIST) to investigate the feasibility and costs of implementing a computer system for remote voting and communication for Congress to ensure business continuity for congressional operations.
Contributing Partner: UNT Libraries Government Documents Department
Emergency Electronic Communications in Congress: Proposals and Issues

Emergency Electronic Communications in Congress: Proposals and Issues

Date: August 12, 2003
Creator: Seifert, Jeffrey W & Petersen, R. Eric
Description: The events of September 11, 2001, and the subsequent anthrax incidents have prompted some observers to suggest creating an emergency electronic communications system for Congress to ensure continuity of its operations. On July 25, 2003, Representative James R. Langevin introduced H.R. 2948. The bill would direct the Comptroller General of the United States to enter into arrangements with the National Academy of Sciences (NAS) and the Librarian of Congress for conducting a study on the feasibility and costs of implementing such a system for Congress to use during an emergency.
Contributing Partner: UNT Libraries Government Documents Department
Internet: An Overview of Key Technology Policy Issues Affecting Its Use and Growth

Internet: An Overview of Key Technology Policy Issues Affecting Its Use and Growth

Date: May 31, 2002
Creator: Smith, Marcia S; Moteff, John D; Kruger, Lennard G; McLoughlin, Glenn J & Seifert, Jeffrey W
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Internet: An Overview of Key Technology Policy Issues Affecting Its Use and Growth

Internet: An Overview of Key Technology Policy Issues Affecting Its Use and Growth

Date: August 20, 2004
Creator: Smith, Marcia S; Moteff, John D; Kruger, Lennard G; McLoughlin, Glenn J & Seifert, Jeffrey W
Description: None
Contributing Partner: UNT Libraries Government Documents Department
FIRST PREV 1 2 NEXT LAST