Search Results

open access

Japanese and U.S. Industrial Associations: Their Roles in High-Technology Policymaking

Description: In both Japan and in the United States, industrial associations play an important role in enhancing government understanding and interaction with industries and in easing cooperative efforts among firms. This report examines the role of industrial associations and related organizations in high-technology policymaking and in accelerating technological development.
Date: June 26, 1991
Creator: Nanto, Dick K. & McLoughlin, Glenn J.
Partner: UNT Libraries Government Documents Department
open access

Internet Domain Names: Background and Policy Issues

Description: This report discusses the Domain Name System (DNS), which is the distributed set of databases residing in computers around the world that contain address numbers mapped to corresponding domain names, making it possible to send and receive messages and to access information from computers anywhere on the Internet.
Date: January 26, 2010
Creator: Kruger, Lennard G.
Partner: UNT Libraries Government Documents Department
open access

Science, Technology, Engineering, and Mathematics (STEM) Education Issues and Legislative Options

Description: Congressional Research Service (CRS) report entailing information about science technology, engineering, and mathematic (STEM) education issues and legislative options. Topics include, STEM education in the united states, federal programs that promote STEM education, proposals to improve stem education, etc..
Date: July 26, 2006
Creator: Kuenzi, Jeffrey J.; Matthews, Christine M. & Mangan, Bonnie F.
Partner: UNT Libraries Government Documents Department
open access

Guam: U.S. Defense Deployments

Description: This report mainly discusses about the U.S. Defense Deployments on Guam. The U.S military is building up forces on he U.S territory of Guam to maintain deterrence and war fighting capabilities for possible reason to disaster.
Date: February 26, 2008
Creator: Kan, Shirley A. & Niksch, Larry A.
Partner: UNT Libraries Government Documents Department
open access

“Amazon” Laws and Taxation of Internet Sales: Constitutional Analysis

Description: This report covers ways in which states are attempting to capture taxes on Internet sales. Two basic approaches include imposing tax collection responsibilities on the retailer, and requiring remote sellers to provide tax information to the state and/or it's customers. This report covers the legality of both options.
Date: July 26, 2012
Creator: Lunder, Erika K. & Luckey, John R.
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources

Description: Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity iss… more
Date: April 26, 2012
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Internet Domain Names: Background and Policy Issues

Description: This report discusses the Domain Name System (DNS), which is the distributed set of databases that contain address numbers mapped to corresponding domain names, making it possible to send and receive messages and to access information on the Internet. The report includes background on the DNS and the Internet Corporation for Assigned Names and Numbers (ICANN) that manages the services, as well as related issues for the 113th Congress.
Date: November 26, 2014
Creator: Kruger, Lennard G.
Partner: UNT Libraries Government Documents Department
open access

Law Enforcement Using and Disclosing Technology Vulnerabilities

Description: This report provides background on law enforcement's use of technology vulnerabilities in criminal investigations. It also provides information on the government's system by which agencies collectively determine whether to maintain or disclose newly discovered vulnerabilities. The report also outlines a range of policy issues that may arise regarding the use and disclosure of vulnerabilities in technology.
Date: April 26, 2017
Creator: Finklea, Kristin
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources

Description: Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues.
Date: April 26, 2012
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybercrime: The Council of Europe Convention

Description: Forty-three countries, including the United States, have signed the Council of Europe’s Convention on Cybercrime of November 2001. The U.S. Senate ratified the Convention on August 3, 2006. The Convention seeks to better combat cybercrime by harmonizing national laws, improving investigative abilities, and boosting international cooperation. Supporters argue that the Convention will enhance deterrence, while critics counter it will have little effect without participation by countries in which … more
Date: April 26, 2002
Creator: Archick, Kristin
Partner: UNT Libraries Government Documents Department
open access

Lasers Aimed at Aircraft Cockpits: Background and Possible Options to Address the Threat to Aviation Safety and Security

Description: A recent rash of incidents involving lasers aimed at aircraft cockpits has raised concerns over the potential threat to aviation safety and security. While none of these incidents has been linked to terrorism, security officials have expressed concern that terrorists may seek to acquire and use higher-powered lasers to, among other things, incapacitate pilots. There is also growing concerned among aviation safety experts that the ubiquity and low cost of handheld laser devices could increase th… more
Date: January 26, 2005
Creator: Elias, Bartholomew
Partner: UNT Libraries Government Documents Department
open access

Broadband Internet Access: Background and Issues

Description: This is one part in the series of reports that provide a background and analysis, and most recent developments regarding broadband or high-speed Internet access. The report starts out by answering questions; what is broadband and why is it important? This report also discusses broadband technologies, the status of broadband deployment and the related policy issues, as well as the legislation in congress.
Date: September 26, 2002
Creator: Gilroy, Angele A. & Kruger, Lennard G.
Partner: UNT Libraries Government Documents Department
open access

Broadband Internet Regulation and Access: Background and Issues

Description: This is one part in the series of reports that provide a background and analysis, and most recent developments regarding broadband or high-speed Internet access. The report starts out by answering questions; what is broadband and why is it important? This report also discusses broadband technologies, the status of broadband deployment and the related policy issues, as well as the legislation in congress.
Date: January 26, 2006
Creator: Gilroy, Angele A. & Kruger, Lennard G.
Partner: UNT Libraries Government Documents Department
Back to Top of Screen