Search Results

open access

Homeland Security - Reducing the Vulnerability of Public and Private Information Infrastructures to Terrorism: An Overview

Description: This report assesses the impact of the September 11, 2001 attacks on public and private information infrastructures in the context of critical infrastructure protection, continuity of operations (COOP) planning, and homeland security.
Date: February 10, 2004
Creator: Seifert, Jeffrey W.
Partner: UNT Libraries Government Documents Department
open access

Data Mining and Homeland Security: An Overview

Description: This report provides information about the Data Mining and Homeland Security. Data mining has become one of the key features of the homeland security initiatives. Data mining can be a potential means to identify terrorist activities such as money transfer etc.
Date: July 19, 2007
Creator: Seifert, Jeffrey W.
Partner: UNT Libraries Government Documents Department
open access

Data Mining and Homeland Security: An Overview

Description: This report provides information about the Data Mining and Homeland Security. Data mining has become one of the key features of the homeland security initiatives. Data mining can be a potential means to identify terrorist activities such as money transfer etc.
Date: April 3, 2008
Creator: Seifert, Jeffrey W.
Partner: UNT Libraries Government Documents Department
open access

Data Mining and Homeland Security: An Overview

Description: This report gives an overview of data mining and homeland security. The contents include what the data mining is, limitations of data mining, its uses, issues, and legislation in the 108th, 109th and 110th Congress.
Date: March 28, 2007
Creator: Seifert, Jeffrey W.
Partner: UNT Libraries Government Documents Department
open access

Data Mining and Homeland Security: An Overview

Description: This report provides information about the Data Mining and Homeland Security. Data mining has become one of the key features of the homeland security initiatives. Data mining can be a potential means to identify terrorist activities such as money transfer etc.
Date: December 5, 2007
Creator: Seifert, Jeffrey W.
Partner: UNT Libraries Government Documents Department
open access

Government Information Technology Management: Past and Future Issues (The Clinger-Cohen Act)

Description: This report provides an overview of the Information Technology Management Reform Act (ITMRA) of 1996, or as it is better known, the Clinger-Cohen Act. Although the Clinger Cohen Act is a combination of the Federal Acquisition Reform Act (FARA) and the ITMRA, this report focuses on the information technology procurement and management reforms only.
Date: January 15, 2002
Creator: Seifert, Jeffrey W.
Partner: UNT Libraries Government Documents Department
open access

Data Mining and Homeland Security: An Overview

Description: This report explores the issue of data mining in detail and in the context of homeland security, as well as relevant initiatives and pieces of legislation. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. In the context of homeland security, data mining can be a potential means to identify terrorist activities, such as money tr… more
Date: August 27, 2008
Creator: Seifert, Jeffrey W.
Partner: UNT Libraries Government Documents Department
open access

Information Technology (IT) Management: The Clinger-Cohen Act and the Homeland Security Act of 2002

Description: This report discusses the effect of provisions like the Clinger-Cohen Act and the Homeland Security Act of 2002 on Information Technology (IT) management. It compares the effects of these acts on IT and potential issues are brought the forefront, with appropriate congressional action due.
Date: February 3, 2005
Creator: Seifert, Jeffrey W.
Partner: UNT Libraries Government Documents Department
open access

Information Technology (IT) Management: The Clinger-Cohen Act and the Homeland Security Act of 2002

Description: This report discusses the effect of provisions like the Clinger-Cohen Act and the Homeland Security Act of 2002 on Information Technology (IT) management. It compares the effects of these acts on IT and potential issues are brought the forefront, with appropriate congressional action due.
Date: June 7, 2005
Creator: Seifert, Jeffrey W.
Partner: UNT Libraries Government Documents Department
open access

Data Mining and Homeland Security: An Overview

Description: Data mining has become one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. In the context of homeland security, data mining can be a potential means to identify terrorist activities, such as money transfers and communications, and to identify and track individual terro… more
Date: October 3, 2006
Creator: Seifert, Jeffrey W.
Partner: UNT Libraries Government Documents Department
open access

Data Mining: An Overview

Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data … more
Date: June 7, 2005
Creator: Seifert, Jeffrey W.
Partner: UNT Libraries Government Documents Department
open access

Data Mining: An Overview

Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data … more
Date: June 7, 2005
Creator: Seifert, Jeffrey W.
Partner: UNT Libraries Government Documents Department
open access

Data Mining: An Overview

Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data … more
Date: May 21, 2003
Creator: Seifert, Jeffrey W.
Partner: UNT Libraries Government Documents Department
open access

Data Mining: An Overview

Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data … more
Date: May 3, 2004
Creator: Seifert, Jeffrey W.
Partner: UNT Libraries Government Documents Department
open access

Data Mining: An Overview

Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data … more
Date: December 16, 2004
Creator: Seifert, Jeffrey W.
Partner: UNT Libraries Government Documents Department
Back to Top of Screen