Managing Electronic Waste: Issues with Exporting E-Waste

Managing Electronic Waste: Issues with Exporting E-Waste

Date: September 27, 2010
Creator: Luther, Linda
Description: Electronic waste (e-waste) is a term that is used loosely to refer to obsolete, broken, or irreparable electronic devices like televisions, computer central processing units (CPUs), and computer monitors. There are various issues of concern with regard to e-waste disposal and recycling. This report looks at issues specifically related to its export for recycling. Particularly, it discusses documented impacts to human health and the environment that have been tied to unsafe recycling practices in developing countries, as well as issues that have motivated certain stakeholders to divert e-waste from landfill disposal and, hence, increase recycling. It also provides an overview of various factors necessary to understand why e-waste disposal has become a concern in the United States, and it also discusses waste management requirements in the United States.
Contributing Partner: UNT Libraries Government Documents Department
The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability

The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability

Date: December 9, 2010
Creator: Kerr, Paul K.; Rollins, John & Theohary, Catherine A.
Description: In September 2010, media reports emerged about a new form of cyber attack that appeared to target Iran, although the actual target, if any, is unknown. This report discusses this cyber attack, a malicious software program known as Stuxnet, which infected computer systems that were used to control the functioning of a nuclear power plant. Once inside the system, Stuxnet had the ability to degrade or destroy the software on which it operated. Although early reports focused on the impact on facilities in Iran, researchers discovered that the program had spread throughout multiple countries worldwide.
Contributing Partner: UNT Libraries Government Documents Department
Spyware: Background and Policy Issues for Congress

Spyware: Background and Policy Issues for Congress

Date: September 8, 2010
Creator: Figliola, Patricia Moloney
Description: The Anti-Spyware Coalition (ASC) defines spyware as "technologies deployed without appropriate user consent and/or implemented in ways that impair user control over (1) material changes that affect their user experience, privacy, or system security; (2) use of their system resources, including what programs are installed on their computers; and/or (3) collection, use, and distribution of their personal or other sensitive information. The main issue for Congress over spyware is whether to enact new legislation specifically addressing spyware, or to rely on industry self-regulation and enforcement actions by the Federal Trade Commission (FTC) and the Department of Justice under existing law. This report discusses this issue, as well as the opinions of both the opponents and the supporters of industry self-regulation.
Contributing Partner: UNT Libraries Government Documents Department
Nanotechnology: A Policy Primer

Nanotechnology: A Policy Primer

Date: December 16, 2013
Creator: Sargent, John F., Jr.
Description: This report provides an overview of these topics: nanomanufacturing and public understanding of and attitudes toward nanotechnology.
Contributing Partner: UNT Libraries Government Documents Department
Internet Domain Names: Background and Policy Issues

Internet Domain Names: Background and Policy Issues

Date: April 5, 2010
Creator: Kruger, Lennard G.
Description: This report discusses the Domain Name System (DNS), which is the distributed set of databases residing in computers around the world that contain address numbers mapped to corresponding domain names, making it possible to send and receive messages and to access information from computers anywhere on the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Internet Domain Names: Background and Policy Issues

Internet Domain Names: Background and Policy Issues

Date: October 28, 2009
Creator: Kruger, Lennard G.
Description: This report discusses the Domain Name System (DNS), which is the distributed set of databases residing in computers around the world that contain address numbers mapped to corresponding domain names, making it possible to send and receive messages and to access information from computers anywhere on the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Counseling Students' Technological Competence

Counseling Students' Technological Competence

Date: August 2003
Creator: Bullock, Melanie M.
Description: Technology has a profound influence on how business, education, entertainment, and interpersonal communications are conducted. Mental health professionals have been exploring how technology can support and enhance client care since the 1960s. In the last decade the influence of technology in the practice of counseling has increased dramatically. As the use of technology increased, so did the expectations for counselor preparation programs to include technology instruction. In 1999, the Association for Counselor Education and Supervision (ACES) developed the Technical Competencies for Counselor Education Students: Recommended Guidelines for Program Development. This study examines the technological competence of counseling students at one southwestern university based on the ACES recommendations.
Contributing Partner: UNT Libraries
The Effects of Technology Integration Techniques in Elementary Mathematics Methods Courses on Elementary Preservice Teachers' Computer Self-Efficacy, Software Integration Confidence, and Lesson Planning

The Effects of Technology Integration Techniques in Elementary Mathematics Methods Courses on Elementary Preservice Teachers' Computer Self-Efficacy, Software Integration Confidence, and Lesson Planning

Date: August 2003
Creator: Maninger, Robert M.
Description: The purpose of this study was to demonstrate the effect of computer technology integration techniques on preservice teachers' feelings of computer self-efficacy and feelings of confidence in software integration. It was also the purpose of this study to interpret these preservice teachers' confidence in using computer technology integration techniques in their own planning and instruction during student teaching. The participants in this study were from two intact, non-randomly-formed classrooms. They were 27 preservice teachers enrolled in the College of Education at a university in north central Texas in two sections of a course entitled EDEE 4350, Mathematics in the Elementary School. This study was quasi-experimental, with a nonequivalent pretest-posttest control group design. The independent variable was the type of instruction experienced in an elementary mathematics methods course: novel instruction with specialized computer technology integration techniques versus traditional instruction with no specialized technology integration techniques. The dependant variables were measured using the following instruments: the Demographic Data and Previous Context Use of the Computer Survey which described participants' demographics and their previous usage of the computer; the Self-Efficacy With Computer Technologies Scale; the Preservice Teacher Software Integration Confidence Scale; and the Lesson Plan Infusion/Integration Scale. The results of the data analysis ...
Contributing Partner: UNT Libraries
Access to Broadband Networks: The Net Neutrality Debate

Access to Broadband Networks: The Net Neutrality Debate

Date: March 15, 2011
Creator: Gilroy, Angele A.
Description: This report discusses the continued debate amongst congressional policymakers regarding telecommunications reform. A major point of the ongoing discussion is whether action is needed to ensure unfettered access to the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Technology, Ontology, and Pop

Technology, Ontology, and Pop

Date: May 2003
Creator: Tosten, Erik
Description: This problem in lieu of thesis outlines a body of work that uses technology and pop elements to discover ways to understand what it means to be human. In doing so it expands the interpretation of technology, ontology, and pop, and allowed the artist to find an essential balance between the three. It details the understanding of these borrowed aesthetics and their connection to the creative process.
Contributing Partner: UNT Libraries
FIRST PREV 1 2 3 4 5 NEXT LAST