Property | Value |
rdfs:label | |
is dcterms:subject of | - Global Cybercrime: The Interplay of Politics and Law
- Cybersecurity Procurement Language for Energy Delivery Systems
- Information Technology: Leveraging Best Practices and Reform Initiatives Can Help Defense Manage Major Investments
- FAA Faces Significant Barriers to Safely Integrate Unmanned Aircraft Systems into the National Airspace System
- Guidance Regarding Cyberspace Roles, Responsibilities, Functions, and Governance Within the DoD
- Revenue and Customs Brief 9 (2014): Bitcoin and other Cryptocurrencies
- Big Data and Privacy: A Technological Perspective
- Best Practices for Data Destruction
- NIST Special Publication 800-168
- Nuclear Command, Control, and Communications: Review of DOD's Current Modernization Efforts
- How Do We Know What Information Sharing Is Really Worth? Exploring Methodologies to Measure the Value of Information Sharing and Fusion Efforts
- CRS Reports - 2014
- Information and Communications in Japan 2014
- Major Automated Information Systems: Selected Defense Programs Need to Implement Key Acquisition Practices
- 2013 Freedom of Information Act Report
- Watching Below: Dimensions of Surveillance-by-UAVs in Canada
- The Legal Needs of Emerging Online Media: The Online Media Legal Network After 500 Referrals
- Autonomous Vehicle Technology: A Guide for Policymakers
- Tax Information Security Guidelines For Federal, State and Local Agencies: Safeguards for Protecting Federal Tax Returns and Return Information
- Australian Cyber Security Centre
- Cloud Computing Policy
- Handbook on European data protection law
- Internet Domain Names: Background and Policy Issues
- Energy Sector Cybersecurity Framework Implementation Guidance
- National Cybersecurity Protection Act of 2014
- Wireless Emergency Alerts (WEA) Cybersecurity Risk Management Strategy for Alert Originators
- The Economics of Digital Currencies
- Content of Premarket Submissions for Management of Cybersecurity in Medical Devices
- Authors Guild v. HathiTrust
- CNSSI No. 1253
- Formal Opinion Interim No. 12-0006
- Pan-American Governmental Access to Data in the Cloud
- The Federal Government's Track Record on Cybersecurity and Critical Infrastructure
- Unmanned Aerial Systems: Efforts Made toward Integration into the National Airspace Continue, but Many Actions Still Required
- Cyber-Risk Oversight
- Cybersecurity Enhancement Act of 2014
- Information Security: IRS Needs to Address Control Weaknesses That Place Financial and Taxpayer Data at Risk
- CryptoWall
- NIST Roadmap for Improving Critical Infrastructure Cybersecurity
- Technology Transfer: Federal Laboratory Consortium Should Increase Communication with Potential Customers to Improve Initiatives
- Improving the Security of Consumer Financial Transactions
- Preliminary Examination Instructions in view of the Supreme Court Decision in Alice Corporation Ply. Ltd. v. CLS Bank International, et al.
- Inquiry Into Cyber Intrusions Affecting U.S. Transportation Command Contractors
- OMB Memorandum M-15-01
- Guidance for Industry: Internet/Social Media Platforms with Character Space Limitations-Presenting Risk and Benefit Information for Prescription Drugs and Medical Devices
- Interested Parties Advancing Copyright
- Denison v. Larkin
- Notice of Completion of Notification of Cyber-Dependent Infrastructure and Process for Requesting Reconsideration of Determinations of Cyber Criticality
- Guidelines on Regulating Robotics
- Cybersecurity and the Smarter Grid
- DoD Instruction 8500.01
- Cyber Defence in the EU: Preparing for Cyber Warfare?
- Cloud Computing: Additional Opportunities and Savings Need to Be Pursued
- Consumer Guide to Protecting Privacy Online
- Reducing Mobile Phone Theft and Improving Security,
- Plain English ISO IEC 27000 2012 Information Security Definitions
- Annual Assessment of the Internal Revenue Service Information Technology Program
- Terrorist Identities Datamart Environment (TIDE) Fact Sheet
- Protecting Student Privacy While Using Online Educational Services: Requirements and Best Practices
- Authors Guild v. Google (Google II)
- Fiscal Year 2014-2015 Guidance on Improving Federal Information Security and Privacy Management Practices
- The Right to Privacy in the Digital Age
- A Call for Action for Online Piracy and Counterfeiting Legislation
- Medicaid: Use of Claims Data for Analysis of Provider Payment Rates
- Net Losses: Estimating the Global Cost of Cybercrime
- Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar
- Initiative for ICT International Competitiveness Enhancement and International Expansion
- NASA: Assessments of Selected Large-Scale Projects
- A Criticism of the Current Security, Privacy and Accountability Issues in Electronic Health Records
- Presidential Policy Directive 28: Signals Intelligence Activities
- CTB-Locker
- Cloud Service Level Agreement Standardisation Guidelines
- Cybersecurity Workforce Assessment Act
- NIST Special Publication 800-162
- An Ethical Framework for Facial Recognition
- The Future of Privacy
- Report on the Telephone Records Program Conducted under Section 215 of the USA PATRIOT Act and on the Operations of the Foreign Intelligence Surveillance Court
- Strategies to Mitigate Targeted Cyber Intrusions
- Border Patrol Agent Pay Reform Act of 2014
- Digital Accountability and Transparency Act
- 2014 Data Breach Investigations Report
- Cyber Risks: The Growing Threat
- U.S.-EU Cyber Cooperation
- Guide to Undertaking Privacy Impact Assessments
- Creative Content UK
- Application of FinCEN's Regulations to Virtual Currency Software Development and Certain Investment Activity
- Industrial Internet Consortium
- Fox News Network v. TVEyes
- ITI Recommendations to the Department of Homeland Security Regarding its Work Developing a Voluntary Program Under Executive Order 13636, "Improving Critical Infrastructure Cybersecurity"
- Consumer Privacy Protection Principles: Privacy Principles for Vehicle Technologies and Services
- Hackers Wanted: An Examination of the Cybersecurity Labor Market
- Digital Arabic Content National Strategy
- Risks to Consumers Posed by Virtual Currencies
- Information Supplement: Third-Party Security Assurance
- The Internet of Things: 2014 OECD Tech Insight Forum
- Air Force Instruction 10-1701
- FTC v. T-Mobile
- Overview of the Baseline Safeguard Protections Under NCTC’s 2012 Attorney General Guidelines
- Unmanned Aerial Systems: Department of Homeland Security's Review of U.S. Customs and Border Protection's Use and Compliance with Privacy and Civil Liberty Laws and Standards
- What’s the Deal? An FTC Study on Mobile Shopping Apps
- The Department of Energy's Management of Cloud Computing Activities: Audit Report
- Critical Infrastructure Protection: DHS Action Needed to Enhance Integration and Coordination of Vulnerability Assessment Efforts
- A "Kill Chain" Analysis of the 2013 Target Data Breach
- Cybersecurity in the Golden State
- ISOO 2013 Annual Report to the President
- Updated Guidance on the Acquisition and Use of Commercial Cloud Computing Services
- Consumers and Mobile Financial Services 2014
- Cloud Computing: The Concept, Impacts and the Role of Government Policy
- One Hundred Year Study on Artificial Intelligence
- DHS Intelligence Analysis: Additional Actions Needed to Address Analytic Priorities and Workforce Challenges
- U.S. Open Data Action Plan
- National FOSS Strategy
- Electronic Health Records: VA and DOD Need to Support Cost and Schedule Claims, Develop Interoperability Plans, and Improve Collaboration
- The Open Government Partnership: Announcing New Open Government Initiatives
- Social Responsibility Strategy
- GAO Reports - 2014
- Ten Strategies of a World-Class Cybersecurity Operations Center
- Disclosure of Employee Information Under TUPE
- Risk and Responsibility in a Hyperconnected World
- Safeguarding the Personal Information of All People: A Status Report on the Development and Implementation Procedures Under Presidential Policy Directive PPD-28
- Building Privacy Into Mobile Location Analytics (MLA) Through Privacy by Design
- The Regime Complex for Managing Global Cyber Activities
- An Empirical Analysis of the Value of Information Sharing in the Market for Online Content
- Korea Hydro and Nuclear Power Co. commercial network
- Emerging Cyber Threats Report 2014
- Worldwide Threat Assessment of the U.S. Intelligence Community
- Internet Pharmacies: Most Rogue Sites Operate from Abroad, and Many Sell Counterfeit Drugs
- Emerging and Readily Available Technologies and National Security-A Framework for Addressing Ethical, Legal, and Societal Issues
- Big Data: Seizing Opportunities, Preserving Values
- Consumer Generated and Controlled Health Data
- Unlocking Consumer Choice and Wireless Competition Act
- Global Commission on Internet Governance
- 2020 Census: Census Bureau Can Improve Use of Leading Practices When Choosing Address and Mapping Sources
- Opinion 05/2014 on Anonymisation Techniques
- BuySecure Initiative
- Telecommunications: Projects and Policies Related to Deploying Broadband in Unserved and Underserved Areas
- The Cost of NSA Surveillance
- Multi-State Internet Gaming Agreement
- Factsheet on the 'Right to be Forgotten' ruling
- China and International Law in Cyberspace
- Data Privacy and Integrity Advisory Committee Recommendations Paper 2014-01
- NIST Special Publication 800-176
- Measures of Effectiveness for the Information Age Army
- Virtual Currencies: Emerging Regulatory, Law Enforcement, and Consumer Protection Challenges
- EU Data Protection Law: A "Right to be Forgotten"?
- Statistical Transparency Report Regarding Use of National Security Authorities: Annual Statistics for Calendar Year 2013
- Riley v. California
- Privacy Best Practice Recommendations for Commercial Biometric Use
- Big Data and Innovation, Setting The Record Straight: De-identification Does Work
- Framework for Improving Critical Infrastructure Cybersecurity
- Big Data Means Big Opportunities and Big Challenges: Promoting Financial Inclusion and Consumer Protection in the “Big Data” Financial Era
- Conducting Privacy Impact Assessments Code of Practice
- Maritime Critical Infrastructure Protection: DHS Needs to Better Address Port Cybersecurity
- Software Licenses: DOD's Plan to Collect Inventory Data Meets Statutory Requirements
- NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 3.0
- Opinion 04/2014 on surveillance of electronic communications for intelligence and national security purposes
- Standardisation in the Field of Electronic Identities and Trust Service Providers
- Critical Infrastructure Cyber Community Voluntary Program
- NSTAC Report to the President on the Internet of Things
- IT Risks
- The Role of Trade Secrets in Innovation Policy
- IEEE P2413
- The Case for a Federal Robotics Commission
|