Congressional Research Service Reports - 30 Matching Results

Search Results

The Potential of Systems, Tools, and Techniques for Social and Community Problems: Selected References

Description: This report provides a bibliography of resources related to the use of systems technology to solve social and community problems such as housing, pollution, transportation, and health services. Twenty areas of use are included in the bibliography.
Date: December 11, 1969
Creator: Chartrend, Robert L. & Ayton, Mauree W.
Partner: UNT Libraries Government Documents Department

Industrial Competitiveness and Technological Advancement: Debate Over Government Policy

Description: This report discusses congressional interest in the pace of U.S. technological advancement due to its influence on U.S. economic growth, productivity, and international competitiveness. The proper role of the federal government in technology development and the competitiveness of U.S. industry continues to be a topic of congressional debate.
Date: December 8, 2010
Creator: Schacht, Wendy H.
Partner: UNT Libraries Government Documents Department

Illegal Internet Streaming of Copyrighted Content: Legislation in the 112th Congress

Description: This report describes streaming technology, explains the disparity in criminal penalties for different forms of infringement committed by electronic means, analyzes legislation in the 112th Congress that would harmonize penalties for illegal streaming with those available for other forms of online copyright infringement, and summarizes arguments for and against such a legislative change.
Date: December 1, 2011
Creator: Yeh, Brian T.
Partner: UNT Libraries Government Documents Department

Industrial Competitiveness and Technological Advancement: Debate Over Government Policy

Description: This report discusses contribution of technological advancement to economic growth and productivity increases. Because technology can contribute to economic growth and productivity increases, congressional interest has focused on how to augment private-sector technological development.
Date: December 3, 2001
Creator: Schacht, Wendy H.
Partner: UNT Libraries Government Documents Department

Industrial Competitiveness and Technological Advancement: Debate Over Government Policy

Description: This report discusses contribution of technological advancement to economic growth and productivity increases. Because technology can contribute to economic growth and productivity increases, congressional interest has focused on how to augment private-sector technological development.
Date: December 5, 2000
Creator: Schacht, Wendy H.
Partner: UNT Libraries Government Documents Department

Industrial Competitiveness and Technological Advancement: Debate Over Government Policy

Description: This report discusses contribution of technological advancement to economic growth and productivity increases. Because technology can contribute to economic growth and productivity increases, congressional interest has focused on how to augment private-sector technological development.
Date: December 28, 2000
Creator: Schacht, Wendy H.
Partner: UNT Libraries Government Documents Department

An Analysis of STEM Education Funding at the NSF: Trends and Policy Discussion

Description: This report analyzes National Science Foundation funding trends and selected closely-related STEM (science, technology, engineering, and math) education policy issues to provide fiscal and policy context. It concludes with an analysis of potential policy options.
Date: December 12, 2012
Creator: Gonzalez, Heather B.
Partner: UNT Libraries Government Documents Department

Internet Domain Names: Background and Policy Issues

Description: The Domain Name System (DNS) is the distributed set of databases residing in computers around the world that contain address numbers mapped to corresponding domain names, making it possible to send and receive messages and to access information from computers anywhere on the Internet. Many of the technical, operational, and management decisions regarding the DNS can have significant impacts on Internet-related policy issues such as intellectual property, privacy, ecommerce, and cybersecurity. The expiration of the JPA (Joint Project Agreement), the implementation of the Affirmation of Commitments, and the continuing U.S. authority over the DNS root zone remain issues of interest to the 112th Congress, the Administration, foreign governments, and other Internet stakeholders worldwide.
Date: December 14, 2010
Creator: Kruger, Lennard G.
Partner: UNT Libraries Government Documents Department

The Technology Innovation Program

Description: This report discusses the Technology Innovation Program (TIP) at the National Institute of Standards and Technology (NIST) that was established in 2007 to replace the Advanced Technology Program (ATP). This effort is designed "to support, promote, and accelerate innovation in the United States through high-risk, high-reward research in areas of critical national need," according to the authorizing legislation. Grants are provided to small and medium-sized firms for individual projects or joint ventures with other research organizations.
Date: December 3, 2010
Creator: Schacht, Wendy H.
Partner: UNT Libraries Government Documents Department

Internet Transactions and the Sales Tax

Description: This report is an introduction to the economics of electronic commerce and its potential impact on sales and use tax collections. Presently, 45 states (and the District of Columbia) require that retail outlets add a fixed percentage to the sales price of all taxable items (inclusive of federally imposed excise taxes).
Date: December 12, 2000
Creator: Maguire, Steven
Partner: UNT Libraries Government Documents Department

Radio Broadcasting Chips for Smartphones: A Status Report

Description: This report provides information on consumer and industry trends in radio and wireless network communications to give perspective on the proposal for widespread deployment of FM radio chips in smartphones as an emergency preparedness measure. It also provides a brief overview of the role of technology in disseminating emergency alerts and information.
Date: December 15, 2014
Creator: Moore, Linda K.
Partner: UNT Libraries Government Documents Department

America COMPETES Reauthorization Act of 2010 (H.R. 5116) and the America COMPETES Act (P.L. 110-69): Selected Policy Issues

Description: This report provides background information on P.L. 110-69 and H.R. 5116, includes information about related legislative activity in the 111th Congress, and analyzes four policy issues addressed by these measures: (1) STEM Education, (2) Federal Research Programs and Activities, (3) Broadening Participation, and (4) Funding. It also discusses selected policy concerns identified in the debate about U.S. competitiveness and describes how the House-passed version of H.R. 5116 responds to those concerns. It contains a description of federal multi-agency research and development initiatives that are included in H.R. 5116, as passed by the House.
Date: December 21, 2010
Creator: Gonzalez, Heather B.; Sargent, John F., Jr. & Moloney Figliola, Patricia
Partner: UNT Libraries Government Documents Department

Governmental Tracking of Cell Phones and Vehicles: The Confluence of Privacy, Technology, and Law

Description: This report will briefly survey Fourth Amendment law as it pertains to the government's tracking programs. It will then summarize federal electronic surveillance statutes and the case law surrounding cell phone location tracking. Next, the report will describe the GPS-vehicle tracking cases and review the pending Supreme Court GPS tracking case, United States v. Jones. Finally, the report will summarize the geolocation and electronic surveillance legislation introduced in the 112th Congress.
Date: December 1, 2011
Creator: Thompson, Richard M.
Partner: UNT Libraries Government Documents Department

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Description: The federal computer fraud and abuse statute, 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of Section 1030 and some of its federal statutory companions, including the amendments found in the Identity Theft Enforcement and Restitution Act.
Date: December 27, 2010
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department

Data Security and Breach Notification Legislation: Selected Legal Issues

Description: This report describes the common elements of several data security and breach notification bills that have been introduced in the 114th Congress, which broadly would impose security and notification requirements on businesses regardless of industry sector. It also discusses state laws that may apply in the event of a data breach and addresses two legal issues that may arise in consideration of new legislation about data security and breach notification.
Date: December 28, 2015
Creator: Dolan, Alissa M.
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. This report provides links to selected authoritative resources related to cybersecurity issues.
Date: December 4, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis

Description: This report analyzes the incentives for companies to share information about cybersecurity breaches with other companies and the federal government. Data breaches, such as those at Target, Home Depot, Neiman Marcus, and JPMorgan Chase, affecting financial records of tens of millions of households seem to occur regularly. Companies typically respond by trying to increase their cybersecurity by hiring consultants and purchasing new hardware and software. Policy analysts have suggested that sharing information about these breaches could be an effective and inexpensive part of improving cybersecurity. Firms share information directly on an ad hoc basis and through private-sector, nonprofit organizations such as Information Sharing and Analysis Centers (ISACs) that can analyze and disseminate information.
Date: December 11, 2014
Creator: Weiss, N. Eric
Partner: UNT Libraries Government Documents Department

Cybersecurity Issues and Challenges: In Brief

Description: The information and communications technology (ICT) industry has evolved greatly over the last half century. The technology is ubiquitous and increasingly integral to almost every facet of modern society. ICT devices and components are generally interdependent, and disruption of one may affect many others. Over the past several years, experts and policy makers have expressed increasing concerns about protecting ICT systems from cyberattacks, which many experts expect to increase in frequency and severity over the next several years. This report discusses the concept of cybersecurity, the management of cybersecurity risks, and the federal government's role in managing such risks.
Date: December 16, 2014
Creator: Fischer, Eric A.
Partner: UNT Libraries Government Documents Department