Congressional Research Service Reports - Browse

ABOUT BROWSE FEED

An Analysis of STEM Education Funding at the NSF: Trends and Policy Discussion

Description: This report analyzes National Science Foundation funding trends and selected closely related STEM (science, technology, engineering, and math) education policy issues in order to place conversations about FY2013 funding in broader fiscal and policy context. It concludes with an analysis of potential policy options.
Date: April 9, 2012
Creator: Gonzalez, Heather B.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Federally-Funded Innovation Inducement Prizes

Description: This report discusses the status of current federally-funded innovation inducement prizes, addresses the different types of prizes, analyzes when prizes may be appropriate and effective, and summarizes assessments that have been made of their effectiveness. The report also provides the lessons that may be learned from completed competitions, and policy options for those Members of Congress interested in taking action regarding federally-funded innovation inducement prizes. The report concludes with an overview of 111th congressional activities regarding prizes.
Date: June 29, 2009
Creator: Stine, Deborah D.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Internet Governance and the Domain Name System: Issues for Congress

Description: As the Internet grows and becomes more pervasive in all aspects of modern society, the question of how it should be governed becomes more pressing. Currently, an important aspect of the Internet is governed by a private sector, international organization called the Internet Corporation for Assigned Names and Numbers (ICANN), which manages and oversees some of the critical technical underpinnings of the Internet such as the domain name system and Internet Protocol (IP) addressing. ICANN makes its policy decisions using a multistakeholder model of governance, whereby a “bottom-up” collaborative process is open to all constituencies of Internet stakeholders. A key issue for Congress is whether and how the U.S. government should continue to maximize U.S. influence over ICANN's multistakeholder Internet governance process, while at the same time effectively resisting proposals for an increased role by international governmental institutions such as the U.N. The outcome of this debate will likely have a significant impact on how other aspects of the Internet may be governed in the future, especially in such areas as intellectual property, privacy, law enforcement, Internet free speech, and cybersecurity. Looking forward, the institutional nature of Internet governance could have far reaching implications on important policy decisions that will likely shape the future evolution of the Internet.
Date: February 9, 2012
Creator: Kruger, Lennard G.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Data Mining: An Overview

Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Date: May 21, 2003
Creator: Seifert, Jeffrey W
Item Type: Report
Partner: UNT Libraries Government Documents Department

Data Mining: An Overview

Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Date: June 7, 2005
Creator: Seifert, Jeffrey W
Item Type: Report
Partner: UNT Libraries Government Documents Department

Electronic Commerce: An Introduction

Description: Electronic commercial transactions over the Internet, or “e-commerce,” have grown so fast over the last five years that many experts continue to underestimate its growth and development. Whether retail business-to-customer or business-to-business transactions, e-commerce shows no signs of slowing down. In turn, policymakers both in the United States and abroad are likely to face increasingly complex issues of security, privacy, taxation, infrastructure development and other issues in 2000 and beyond. This report will be updated periodically.
Date: June 27, 2000
Creator: McLoughlin, Glenn J
Item Type: Report
Partner: UNT Libraries Government Documents Department

Data Mining and Homeland Security: An Overview

Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Date: July 27, 2006
Creator: Seifert, Jeffrey W
Item Type: Report
Partner: UNT Libraries Government Documents Department

Data Mining: An Overview

Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Date: June 7, 2005
Creator: Seifert, Jeffrey W
Item Type: Report
Partner: UNT Libraries Government Documents Department

Data Mining: An Overview

Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Date: May 3, 2004
Creator: Seifert, Jeffrey W
Item Type: Report
Partner: UNT Libraries Government Documents Department

Data Mining: An Overview

Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Date: December 16, 2004
Creator: Seifert, Jeffrey W
Item Type: Report
Partner: UNT Libraries Government Documents Department

Computer Security: A Summary of Selected Federal Laws, Executive Orders, and Presidential Directives

Description: This report provides a short summary of selected federal laws, executive orders, and presidential directives, currently in force, that govern computer security. The report focuses on the major roles and responsibilities assigned various federal agencies in the area of computer security.
Date: April 16, 2004
Creator: Moteff, John D
Item Type: Report
Partner: UNT Libraries Government Documents Department

Internet Voting

Description: No Description Available.
Date: January 31, 2003
Creator: Coleman, Kevin J
Item Type: Report
Partner: UNT Libraries Government Documents Department

Internet Voting

Description: No Description Available.
Date: September 23, 2003
Creator: Coleman, Kevin J
Item Type: Report
Partner: UNT Libraries Government Documents Department

The Internet Tax Freedom Act: In Brief

Description: This report discusses the Internet Tax Freedom Act (ITFA; P.L. 105-277), which enacted in 1998, implemented a three-year moratorium preventing state and local governments from taxing Internet access, or imposing multiple or discriminatory taxes on electronic commerce.
Date: June 11, 2015
Creator: Stupak, Jeffrey M.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Dark Web

Description: This report illuminates information on the various layers of the Internet, with a particular focus on the Dark Web. It discusses both legitimate and illicit uses of the Dark Web, including how the government may rely upon it. Throughout, the report raises issues that policy makers may consider as they explore means to curb malicious activity online.
Date: July 7, 2015
Creator: Finklea, Kristin
Item Type: Report
Partner: UNT Libraries Government Documents Department

Science, Technology, and Innovation Policy: CRS Experts

Description: The table in this report provides names and contact information for CRS experts on federal science, technology, and innovation policies, including authorizing programs and funding, making appropriations, and conducting oversight activities.
Date: August 28, 2012
Creator: Sargent, John F., Jr.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Data Mining and Homeland Security: An Overview

Description: Data mining has become one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. In the context of homeland security, data mining can be a potential means to identify terrorist activities, such as money transfers and communications, and to identify and track individual terrorists themselves, such as through travel and immigration records. This report explores the issue of data mining in detail and in the context of homeland security, as well as relevant initiatives and pieces of legislation.
Date: October 3, 2006
Creator: Seifert, Jeffrey W.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Information Services for Agriculture: The Role of Technology

Description: Significant improvements in technology-supported information services have created opportunities for their utilization by the farmers and ranchers of our Nation. This report highlights the development and expanded offering of these systems, describes current operational and experimental systems, and presents salient legislative initiatives which address this priority area.
Date: November 16, 1982
Creator: Chartrand, Robert L.; Carr, A. B. & Miller, Nancy
Item Type: Report
Partner: UNT Libraries Government Documents Department