Search Results

open access

Federal R&D Funding Under a Continuing Resolution

Description: This report discusses the continuing resolution, or CR (P.L. 109-383, H.J.Res. 102) which provides spending at FY2006 levels (through February 15, 2007), for those agencies lacking enacted FY2007 appropriations bills.
Date: December 14, 2006
Creator: Davey, Michael E.
Partner: UNT Libraries Government Documents Department
open access

Data, Social Media, and Users: Can We All Get Along?

Description: This report examines policy issues surrounding the Cambridge Analytica data breach/misuse of Facebook and provides options for Congress to consider. While this event has started discussions on election security and social media company requirements to report advertising, this report addresses data security concerns without discussing the impacts or consequences of data use.
Date: April 4, 2018
Creator: Jaikaran, Chris
Partner: UNT Libraries Government Documents Department
open access

Aereo and FilmOn X: Internet Television Streaming and Copyright Law

Description: This report begins with a discussion of the technology used by Aereo and FilmOn X that permit subscribers to watch live broadcast television as well as already-aired programming. It then examines the public performance right in the Copyright Act and discusses the interpretation of the transmit clause and public performance right by the courts in the Aereo and FilmOn cases. The report concludes with a brief overview of future litigation by these parties and related legislative proposals in the 1… more
Date: January 13, 2014
Creator: Lanza, Emily M.
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international… more
Date: March 13, 2015
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, … more
Date: January 17, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international… more
Date: January 9, 2014
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Cyber Crime Protection Security Act (S. 2111, 112th Congress)— A Legal Analysis

Description: This report discusses the Cyber Crime Protection Security Act (S. 2111) that would enhance the criminal penalties for the cyber crimes outlawed in the Computer Fraud and Abuse Act (CFAA). Those offenses include espionage, hacking, fraud, destruction, password trafficking, and extortion committed against computers and computer networks. S. 2111 contains some of the enhancements approved by the Senate Judiciary Committee when it reported the Personal Data Privacy and Security Act (S. 1151), S.Rep… more
Date: January 28, 2013
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international… more
Date: January 23, 2014
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, … more
Date: April 17, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international… more
Date: October 14, 2014
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Can Body Worn Cameras Serve as a Deterrent to Police Misconduct?

Description: This report discusses various issues regarding body worn cameras (BWCs), including the potential merits, concerns, and financial costs of use. The report also briefly states a possible method for allotting federal funds to help law enforcement agencies purchase BWCs.
Date: August 28, 2014
Creator: James, Nathan
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, … more
Date: March 8, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, … more
Date: May 22, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, … more
Date: May 24, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, … more
Date: March 20, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international… more
Date: January 9, 2015
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international… more
Date: February 3, 2015
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Law Enforcement Using and Disclosing Technology Vulnerabilities

Description: This report provides background on law enforcement's use of technology vulnerabilities in criminal investigations. It also provides information on the government's system by which agencies collectively determine whether to maintain or disclose newly discovered vulnerabilities. The report also outlines a range of policy issues that may arise regarding the use and disclosure of vulnerabilities in technology.
Date: April 26, 2017
Creator: Finklea, Kristin
Partner: UNT Libraries Government Documents Department
open access

Federal Prize Competitions

Description: This report discusses federal prize competitions, which are a tool for incentivizing the achievement of scientific and technological innovation by offering monetary and non-monetary benefits (e.g., recognition) to competition participants. Prize competitions have a long history of use in both the public and private sectors, but have gained popularity in recent years. This report describes the background and current trends of federal prize competitions, potential policy considerations, and legis… more
Date: July 25, 2018
Creator: Gallo, Marcy E.
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. This report provides links to selected authoritative resources related to cybersecuri… more
Date: December 4, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
Back to Top of Screen