Search Results

Federal Enterprise Architecture and E-Government: Issues for Information Technology Management

Description: This report discusses government efforts to increase efficiency. One approach being implemented to reduce duplicative spending and improve cross-agency collaboration is the use of enterprise architecture (EA) planning across the federal government. An EA serves as a blueprint of the business operations of an organization, and the information and technology needed to carry out these functions.
Date: May 10, 2006
Creator: Seifert, Jeffrey W.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Reauthorization of the E-Government Act: A Brief Overview

Description: This report discusses the E-Government Act that serves as the primary legislative vehicle to guide evolving federal IT management practices and to promote initiatives to make government information and services available online.
Date: May 14, 2008
Creator: Seifert, Jeffrey W.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Data Mining and Homeland Security: An Overview

Description: This report explores the issue of data mining in detail and in the context of homeland security, as well as relevant initiatives and pieces of legislation. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. In the context of homeland security, data mining can be a potential means to identify terrorist activities, such as money transfers and communications, and to identify and track individual terrorists themselves, such as through travel and immigration records.
Date: August 27, 2008
Creator: Seifert, Jeffrey W.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Data Mining: An Overview

Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Date: May 21, 2003
Creator: Seifert, Jeffrey W
Item Type: Report
Partner: UNT Libraries Government Documents Department

Data Mining: An Overview

Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Date: June 7, 2005
Creator: Seifert, Jeffrey W
Item Type: Report
Partner: UNT Libraries Government Documents Department

Data Mining and Homeland Security: An Overview

Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Date: July 27, 2006
Creator: Seifert, Jeffrey W
Item Type: Report
Partner: UNT Libraries Government Documents Department

Data Mining: An Overview

Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Date: June 7, 2005
Creator: Seifert, Jeffrey W
Item Type: Report
Partner: UNT Libraries Government Documents Department

Data Mining: An Overview

Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Date: May 3, 2004
Creator: Seifert, Jeffrey W
Item Type: Report
Partner: UNT Libraries Government Documents Department

Data Mining: An Overview

Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Date: December 16, 2004
Creator: Seifert, Jeffrey W
Item Type: Report
Partner: UNT Libraries Government Documents Department

A Primer on E-Government: Sectors, Stages, Opportunities, and Challenges of Online Governance

Description: Electronic government (e-government) intersects many legislative issues, including privacy, digital divide (the lack of equal access to computers, whether due to a lack of financial resources or necessary skills), public access to government information, service delivery, and information security. E-government solutions are prominently represented in efforts to improve the management and efficiency of government information technology resources. To help policymakers discern e-government initiatives relative to their role in various issues, this report identifies and defines the principal e-government sectors and stages of development. It also outlines some of the opportunities and challenges associated with e-government.
Date: March 28, 2002
Creator: Seifert, Jeffrey W
Item Type: Report
Partner: UNT Libraries Government Documents Department

A Primer on E-Government: Sectors, Stages, Opportunities, and Challenges of Online Governance

Description: Electronic government (e-government) intersects many legislative issues, including privacy, digital divide (the lack of equal access to computers, whether due to a lack of financial resources or necessary skills), public access to government information, service delivery, and information security. E-government solutions are prominently represented in efforts to improve the management and efficiency of government information technology resources. To help policymakers discern e-government initiatives relative to their role in various issues, this report identifies and defines the principal e-government sectors and stages of development. It also outlines some of the opportunities and challenges associated with e-government.
Date: January 28, 2003
Creator: Seifert, Jeffrey W
Item Type: Report
Partner: UNT Libraries Government Documents Department

Data Mining and Homeland Security: An Overview

Description: Data mining has become one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. In the context of homeland security, data mining can be a potential means to identify terrorist activities, such as money transfers and communications, and to identify and track individual terrorists themselves, such as through travel and immigration records. This report explores the issue of data mining in detail and in the context of homeland security, as well as relevant initiatives and pieces of legislation.
Date: October 3, 2006
Creator: Seifert, Jeffrey W.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Information Sharing for Homeland Security: A Brief Overview

Description: This report reviews some of the principal existing homeland security information sharing arrangements, as well as some projected arrangements in this regard, and discusses related policy, evaluations, and proposed legislation.
Date: September 22, 2004
Creator: Relyea, Harold C. & Seifert, Jeffrey W.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Electronic Congress: Proposals and Issues

Description: The events of September 11, 2001, and the subsequent anthrax incidents have prompted some observers to suggest creating a capability for a virtual or electronic Congress (e-Congress) that could function in the event of an emergency. Currently, it is unclear exactly how an e-Congress would be constituted and operated; however, a proposal (H.R. 3481) has been introduced to require the National Institute of Standards and Technology (NIST) to investigate the feasibility and costs of implementing a computer system for remote voting and communication for Congress to ensure business continuity for congressional operations.
Date: July 2, 2002
Creator: Seifert, Jeffrey W & Petersen, R. Eric
Item Type: Report
Partner: UNT Libraries Government Documents Department

Electronic Congress: Proposals and Issues

Description: The events of September 11, 2001, and the subsequent anthrax incidents have prompted some observers to suggest creating a capability for a virtual or electronic Congress (e-Congress) that could function in the event of an emergency. Currently, it is unclear exactly how an e-Congress would be constituted and operated; however, a proposal (H.R. 3481) has been introduced to require the National Institute of Standards and Technology (NIST) to investigate the feasibility and costs of implementing a computer system for remote voting and communication for Congress to ensure business continuity for congressional operations.
Date: January 28, 2003
Creator: Seifert, Jeffrey W & Petersen, R. Eric
Item Type: Report
Partner: UNT Libraries Government Documents Department

Emergency Electronic Communications in Congress: Proposals and Issues

Description: The events of September 11, 2001, and the subsequent anthrax incidents have prompted some observers to suggest creating an emergency electronic communications system for Congress to ensure continuity of its operations. On July 25, 2003, Representative James R. Langevin introduced H.R. 2948. The bill would direct the Comptroller General of the United States to enter into arrangements with the National Academy of Sciences (NAS) and the Librarian of Congress for conducting a study on the feasibility and costs of implementing such a system for Congress to use during an emergency.
Date: August 12, 2003
Creator: Seifert, Jeffrey W & Petersen, R. Eric
Item Type: Report
Partner: UNT Libraries Government Documents Department