Browse All Topics

Computers and Information Technology

Computers and Information Technology : Information Security and Privacy
Facilitating Innovation in the Federal Statistical System:Summary of a Workshop

On May 8, 2009, the symposium, The Federal Statistical System: Recognizing Its Contributions, Moving It Forward was held in Washington, DC. One of the topics considered at that symposium was the health of innovation in the federal statistical system. ...

More
Threatening Communications and Behavior: Perspectives on the Pursuit of Public Figures

Today's world of rapid social, technological, and behavioral change provides new opportunities for communications with few limitations of time and space. Through these communications, people leave behind an ever-growing collection of traces of their daily activities, including digital footprints provided ...

More
Biometric Recognition:Challenges and Opportunities

Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services ...

More
Critical Code: Software Producibility for Defense

Critical Code contemplates Department of Defense (DoD) needs and priorities for software research and suggests a research agenda and related actions. Building on two prior books--Summary of a Workshop on Software Intensive Systems and Uncertainty at Scale and Preliminary Observations ...

More
Toward Better Usability, Security, and Privacy of Information Technology:Report of a Workshop

Despite many advances, security and privacy often remain too complex for individuals or enterprises to manage effectively or to use conveniently. Security is hard for users, administrators, and developers to understand, making it all too easy to use, configure, or ...

More
Proceedings of a Workshop on Deterring Cyberattacks:Informing Strategies and Developing Options for U.S. Policy

In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation's important computer and communications systems and networks is a problem that looms large. Given the demonstrated limitations of passive cybersecurity defense measures, it is ...

More
Conducting Biosocial Surveys:Collecting, Storing, Accessing, and Protecting Biospecimens and Biodata

Recent years have seen a growing tendency for social scientists to collect biological specimens such as blood, urine, and saliva as part of large-scale household surveys. By combining biological and social data, scientists are opening up new fields of inquiry ...

More
Letter Report for the Committee on Deterring Cyberattacks:Informing Strategies and Developing Options for U.S. Policy

This report is the first phase of a larger project to conduct a broad, multidisciplinary examination of deterrence strategies and their possible utility to the U.S. government in its policies toward preventing cyberattacks. This first phase identifies the key issues ...

More
Protecting and Accessing Data from the Survey of Earned Doctorates:A Workshop Summary

The Survey of Earned Doctorates (SED) collects data on the number and characteristics of individuals receiving research doctoral degrees from all accredited U.S. institutions. The results of this annual survey are used to assess characteristics and trends in doctorate education ...

More
Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities

The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other nations.  Although there is a substantial literature on the potential impact of a cyberattack on the societal infrastructure of ...

More