Federal Enterprise Architecture and E-Government: Issues for Information Technology Management

Federal Enterprise Architecture and E-Government: Issues for Information Technology Management

Date: May 10, 2006
Creator: Seifert, Jeffrey W
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Data Mining: An Overview

Data Mining: An Overview

Date: June 7, 2005
Creator: Seifert, Jeffrey W
Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Contributing Partner: UNT Libraries Government Documents Department
Data Mining: An Overview

Data Mining: An Overview

Date: May 21, 2003
Creator: Seifert, Jeffrey W
Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Contributing Partner: UNT Libraries Government Documents Department
A Primer on E-Government: Sectors, Stages, Opportunities, and Challenges of Online Governance

A Primer on E-Government: Sectors, Stages, Opportunities, and Challenges of Online Governance

Date: March 28, 2002
Creator: Seifert, Jeffrey W
Description: Electronic government (e-government) intersects many legislative issues, including privacy, digital divide (the lack of equal access to computers, whether due to a lack of financial resources or necessary skills), public access to government information, service delivery, and information security. E-government solutions are prominently represented in efforts to improve the management and efficiency of government information technology resources. To help policymakers discern e-government initiatives relative to their role in various issues, this report identifies and defines the principal e-government sectors and stages of development. It also outlines some of the opportunities and challenges associated with e-government.
Contributing Partner: UNT Libraries Government Documents Department
Federal Chief Information Officer (CIO): Opportunities and Challenges

Federal Chief Information Officer (CIO): Opportunities and Challenges

Date: July 2, 2002
Creator: Seifert, Jeffrey W
Description: None
Contributing Partner: UNT Libraries Government Documents Department
A Primer on E-Government: Sectors, Stages, Opportunities, and Challenges of Online Governance

A Primer on E-Government: Sectors, Stages, Opportunities, and Challenges of Online Governance

Date: January 28, 2003
Creator: Seifert, Jeffrey W
Description: Electronic government (e-government) intersects many legislative issues, including privacy, digital divide (the lack of equal access to computers, whether due to a lack of financial resources or necessary skills), public access to government information, service delivery, and information security. E-government solutions are prominently represented in efforts to improve the management and efficiency of government information technology resources. To help policymakers discern e-government initiatives relative to their role in various issues, this report identifies and defines the principal e-government sectors and stages of development. It also outlines some of the opportunities and challenges associated with e-government.
Contributing Partner: UNT Libraries Government Documents Department
Data Mining and Homeland Security: An Overview

Data Mining and Homeland Security: An Overview

Date: October 3, 2006
Creator: Seifert, Jeffrey W.
Description: Data mining has become one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. In the context of homeland security, data mining can be a potential means to identify terrorist activities, such as money transfers and communications, and to identify and track individual terrorists themselves, such as through travel and immigration records. This report explores the issue of data mining in detail and in the context of homeland security, as well as relevant initiatives and pieces of legislation.
Contributing Partner: UNT Libraries Government Documents Department
Data Mining and Homeland Security: An Overview

Data Mining and Homeland Security: An Overview

Date: July 27, 2006
Creator: Seifert, Jeffrey W
Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Contributing Partner: UNT Libraries Government Documents Department
Data Mining: An Overview

Data Mining: An Overview

Date: June 7, 2005
Creator: Seifert, Jeffrey W
Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Contributing Partner: UNT Libraries Government Documents Department
Homeland Security - Reducing the Vulnerability of Public and Private Information Infrastructures to Terrorism: An Overview

Homeland Security - Reducing the Vulnerability of Public and Private Information Infrastructures to Terrorism: An Overview

Date: December 12, 2002
Creator: Seifert, Jeffrey W
Description: None
Contributing Partner: UNT Libraries Government Documents Department
FIRST PREV 1 2 3 NEXT LAST