Search Results

Advanced search parameters have been applied.
open access

Cybersecurity Issues and Challenges

Description: This report provides information about Cybersecurity Issues and Challenges. People who perform cyberattacks generally fall into various categories like criminals, spies, nation-state warriors, terrorists, etc.
Date: January 21, 2015
Creator: Fischer, Eric A.
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity Issues and Challenges: In Brief

Description: The information and communications technology (ICT) industry has evolved greatly over the last half century. The technology is ubiquitous and increasingly integral to almost every facet of modern society. ICT devices and components are generally interdependent, and disruption of one may affect many others. Over the past several years, experts and policy makers have expressed increasing concerns about protecting ICT systems from cyberattacks, which many experts expect to increase in frequency and severity over the next several years. This report discusses the concept of cybersecurity, the management of cybersecurity risks, and the federal government's role in managing such risks.
Date: December 16, 2014
Creator: Fischer, Eric A.
Partner: UNT Libraries Government Documents Department
open access

Public Access to Data from Federally Funded Research: Provisions in OMB Circular A-110

Description: The results of scientific studies are used in making many governmental policy decisions. While the studies are often published, the data on which they are based may not be, even for federally funded research. Before 1999, academic and nonprofit performers of such research were permitted but not required to make their data available to the public through provisions of the Freedom of Information Act (FOIA). In October 1998, a provision in P.L. 105-277 changed that, requiring that such data be made publicly available. This report provides background on the 1999 revisions to federal policy, a discussion of the impacts of those changes, and an analysis of the issues raised by them.
Date: March 1, 2013
Creator: Fischer, Eric A.
Partner: UNT Libraries Government Documents Department
open access

The Designation of Election Systems as Critical Infrastructure

Description: This report discusses the Department of Homeland Security (DHS) designating the election infrastructure used in federal elections as a component of U.S. critical infrastructure. The designation was made in January 2017, in response to a series of cyberattacks that occurred on information systems of state and local election jurisdictions prior to the 2016 election. The report explains the concept of critical infrastructure and the implications of the designation.
Date: July 6, 2018
Creator: Fischer, Eric A.
Partner: UNT Libraries Government Documents Department
open access

Federal Voluntary Voting System Guidelines: Issues

Description: This report discusses the Voluntary Voting System Guidelines (VVSG), which are a set of technical standards for voting systems that use computers to assist in recording or counting votes. Systems covered include most used in the United States—not only DREs (direct recording electronic systems) such as touchscreen voting machines, but also optical scan and punch card systems. Hand-counted paper-ballot and lever-machine systems, which do not involve computers, are not covered. However, they are used by a small and decreasing number of election jurisdictions.
Date: January 23, 2009
Creator: Fischer, Eric A.
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity Issues and Challenges: In Brief

Description: This report provides information about Cybersecurity Issues and Challenges. People who perform cyberattacks generally fall into various categories like criminals, spies, nation-state warriors, terrorists, etc.
Date: April 29, 2015
Creator: Fischer, Eric A.
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity Issues and Challenges

Description: This report provides information about Cybersecurity Issues and Challenges. People who perform cyberattacks generally fall into various categories like criminals, spies, nation-state warriors, terrorists, etc.
Date: November 6, 2014
Creator: Fischer, Eric A.
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: CRS Experts

Description: This report contains the table that provides names and contact information for CRS experts on policy issues related to cyber security bills currently being debated in the 112th Congress.
Date: July 23, 2012
Creator: Fischer, Eric A.
Partner: UNT Libraries Government Documents Department
Back to Top of Screen