Congressional Record


Book Description







State of Innovation


Book Description

The worst economic crisis since the Great Depression has generated a fundamental re-evaluation of the free-market policies that have dominated American politics for three decades. State of Innovation brings together critical essays looking at the 'innovation industry' in the context of the current crisis. The book shows how government programs and policies have underpinned technological innovation in the US economy over the last four decades, despite the strength of 'free market' political rhetoric. The contributors provide new insights into where innovations come from and how governments can support a dynamic innovation economy as the US recovers from a profound economic crisis. State of Innovation outlines a 21st century policy paradigm that will foster cutting-edge innovation which remains accountable to the public.




Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities


Book Description

The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other nations. Although there is a substantial literature on the potential impact of a cyberattack on the societal infrastructure of the United States, little has been written about the use of cyberattack as an instrument of U.S. policy. Cyberattacks-actions intended to damage adversary computer systems or networks-can be used for a variety of military purposes. But they also have application to certain missions of the intelligence community, such as covert action. They may be useful for certain domestic law enforcement purposes, and some analysts believe that they might be useful for certain private sector entities who are themselves under cyberattack. This report considers all of these applications from an integrated perspective that ties together technology, policy, legal, and ethical issues. Focusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores important characteristics of cyberattack. It describes the current international and domestic legal structure as it might apply to cyberattack, and considers analogies to other domains of conflict to develop relevant insights. Of special interest to the military, intelligence, law enforcement, and homeland security communities, this report is also an essential point of departure for nongovernmental researchers interested in this rarely discussed topic.




Routledge Handbook on Information Technology in Government


Book Description

The explosive growth in information technology has ushered in unparalleled new opportunities for advancing public service. Featuring 24 chapters from foremost experts in the field of digital government, this Handbook provides an authoritative survey of key emerging technologies, their current state of development and use in government, and insightful discussions on how they are reshaping and influencing the future of public administration. This Handbook explores: Key emerging technologies (i.e., big data, social media, Internet of Things (IOT), GIS, smart phones & mobile technologies) and their impacts on public administration The impacts of the new technologies on the relationships between citizens and their governments with the focus on collaborative governance Key theories of IT innovations in government on the interplay between technological innovations and public administration The relationship between technology and democratic accountability and the various ways of harnessing the new technologies to advance public value Key strategies and conditions for fostering success in leveraging technological innovations for public service This Handbook will prove to be an invaluable guide and resource for students, scholars and practitioners interested in this growing field of technological innovations in government.







Digital Government


Book Description

Mission drives agencies, and the need to deliver better services to customers at a lower cost—whether an agency is supporting the warfighter overseas, a teacher seeking classroom resources or a family figuring out how to pay for college—is pushing every level of government to look for new solutions




United States Code


Book Description




Government Policy and Program Impacts on Technology Development, Transfer, and Commercialization


Book Description

In recent decades, government-funded technologies have produced radar, microwave ovens, modern cell phone systems, the Internet, new materials for aircraft and motor vehicles, and new medical instrumentation. This first-of-its-kind book examines how access to technology is affected by government policies and government-sponsored programs. Government Policy and Program Impacts on Technology Development, Transfer, and Commercialization: International Perspectives provides an easy-to-read overview of the field and several studies serving as examples to guide government policymakers and private sector decision makers. This forward-looking book also forecasts the potential impacts of government regulation upon the field and presents provocative discussions of the ethical implications of the cross-cultural and cross-national challenges facing technologically developed nations in the global economy. This book reviews this broad field by first providing an overview of the goals of government technology policies and programs as well as of generic types of government technology programs. Next, it presents carefully selected studies that illustrate the potential impacts of government decisions upon marketing constraints, industry acceptance of regulatory requirements, economic development, gross domestic product, and the choices firms make when it comes to location, competitiveness, product development, and other factors. The final chapters explore ethical considerations from a global perspective. These chapters also explore the implications of these considerations in relation to the success of governmental and private sector technology transfer and commercialization programs. The macromarketing perspective taken by the contributors serves to ground the impacts of government technology policies and programs in practical implications for economic development, business productivity, and quality of life. The contributors to this unique collection share their expertise on government sponsorship of technology research, the impact of government regulation upon technology marketing and economic development, the effects of government policies on business practices, intellectual property rights, and much more. Government Policy and Program Impacts on Technology Development, Transfer, and Commercialization shows how evolving technology and government policy changes have affected: the commercialization of musicnew media, piracy problems, consumer choices and costs, and changes in the radio and concert promotion industries the adoption of new household technology licensure requirements for telemedicinewith an essential overview of telemedicine plus examinations of relevant governmental regulations and potential applications patents, copyrights, trademarks, licensing, and proprietary information scrap tire disposalnew alternatives for a chronic waste disposal problem food product development state-owned enterpriseswith a case study illustrating how a stagnant state-owned company quickly evolved into China’s leading firm in the textile machinery field




Guide to Protecting the Confidentiality of Personally Identifiable Information


Book Description

The escalation of security breaches involving personally identifiable information (PII) has contributed to the loss of millions of records over the past few years. Breaches involving PII are hazardous to both individuals and org. Individual harms may include identity theft, embarrassment, or blackmail. Organ. harms may include a loss of public trust, legal liability, or remediation costs. To protect the confidentiality of PII, org. should use a risk-based approach. This report provides guidelines for a risk-based approach to protecting the confidentiality of PII. The recommend. here are intended primarily for U.S. Fed. gov¿t. agencies and those who conduct business on behalf of the agencies, but other org. may find portions of the publication useful.