Congressional Research Service Reports - Browse

ABOUT BROWSE FEED

Data Mining: An Overview

Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Date: May 3, 2004
Creator: Seifert, Jeffrey W
Item Type: Report
Partner: UNT Libraries Government Documents Department

Data Mining: An Overview

Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Date: December 16, 2004
Creator: Seifert, Jeffrey W
Item Type: Report
Partner: UNT Libraries Government Documents Department

Computer Security: A Summary of Selected Federal Laws, Executive Orders, and Presidential Directives

Description: This report provides a short summary of selected federal laws, executive orders, and presidential directives, currently in force, that govern computer security. The report focuses on the major roles and responsibilities assigned various federal agencies in the area of computer security.
Date: April 16, 2004
Creator: Moteff, John D.
Item Type: Report
Partner: UNT Libraries Government Documents Department

"Spam": An Overview of Issues Concerning Commercial Electronic Mail

Description: Spam, also called unsolicited commercial email (UCE) or “junk email,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment, and that some consumers want to receive such solicitations. This report discusses this issue in detail, as well as related legislation.
Date: September 16, 2004
Creator: Smith, Marcia S.
Item Type: Report
Partner: UNT Libraries Government Documents Department

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment. On December 16, President Bush signed into law S. 877, the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act. The law, P.L. 108-187, went into effect on January 1, 2004.
Date: January 30, 2004
Creator: Smith, Marcia S.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Dual-Use Biological Equipment: Difficulties in Domestic Regulation

Description: A question in the current debate over chemical and biological terrorism is: how well do current United States policies limit opportunities to terrorist groups for acquisition of such weapons? The domestic purchase and use of “dual-use” biological equipment, such as fermenters, centrifuges, and other equipment, is one area suggested as potentially providing opportunities for terrorist, biological weapons development. Dual-use equipment has both legitimate civilian and military use. Regulating international sale of dual-use equipment is used as a nonproliferation policy tool. Similar regulation of domestic sales has not been employed. This report will discuss the difficulties of applying domestic controls on dual-use biological equipment and the potential advantages and disadvantages of doing so.
Date: January 22, 2004
Creator: Shea, Dana A.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Broadband Internet Access and the Digital Divide: Federal Assistance Programs

Description: Some policymakers, believing that disparities in broadband access across American society could have adverse economic and social consequences on those left behind, assert that the federal government should play a more active role to avoid a “digital divide” in broadband access. One approach is for the federal government to provide financial assistance to support broadband deployment in underserved areas. Others, however, believe that federal assistance for broadband deployment is not appropriate. Some opponents question the reality of the “digital divide,” and argue that federal intervention in the broadband marketplace would be premature and, in some cases, counterproductive.
Date: March 11, 2004
Creator: Kruger, Lennard G.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Broadband Internet Access: Background and Issues

Description: From a public policy perspective, the goals are to ensure that broadband deployment is timely, that industry competes fairly, and that service is provided to all sectors and geographical locations of American society. The federal government -- through Congress and the Federal Communications Commission (FCC) -- is seeking to ensure fair competition among the players so that broadband will be available and affordable in a timely manner to all Americans who want it. While the FCC's position is not to intervene at this time, some assert that legislation is necessary to ensure fair competition and timely broadband deployment. One proposal would ease certain legal restrictions and requirements, imposed by the Telecommunications Act of 1996, on incumbent telephone companies who provide high speed data (broadband) access. Another proposal would compel cable companies to provide "open access" to competing Internet service providers.
Date: January 21, 2004
Creator: Gilroy, Angele A. & Kruger, Lennard G.
Item Type: Report
Partner: UNT Libraries Government Documents Department