@BOOK{NAP author = "National Research Council", title = "Global Networks and Local Values: A Comparative Look at Germany and the United States", isbn = "978-0-309-07310-3", abstract = "Whether you call it the third wave, the information revolution, or the virtually connected world, the implications of a global information network are profound. As a society, we want to forestall the possible negative impacts without closing the door to the potential benefits. But how? \n\nGlobal Networks and Local Values provides perspective and direction, focusing on the relationship between global information networks and local values-that is, the political, economic, and cultural norms that shape our daily lives. This book is structured around an illuminating comparison between U.S. and German approaches toward global communication and information flow. (The United States and Germany are selected as two industrialized, highly networked countries with significant social differences.) \n\nGlobal Networks and Local Values captures the larger context of technology and culture, explores the political and commercial institutions where the global network functions, and highlights specific issues such as taxation, privacy, free speech, and more. The committee contrasts the technical uniformity that makes global communication possible with the diversity of the communities being served and explores the prospects that problems resulting from technology can be resolved by still more technology. This thoughtful volume will be of interest to everyone concerned about the social implications of the global Internet.\n", url = "https://nap.nationalacademies.org/catalog/10033/global-networks-and-local-values-a-comparative-look-at-germany", year = 2001, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", editor = "David E. Liddle and Lynette I. Millett", title = "A Review of the Next Generation Air Transportation System: Implications and Importance of System Architecture", isbn = "978-0-309-37178-0", abstract = "The Next Generation Air Transportation System's (NextGen) goal is the transformation of the U.S. national airspace system through programs and initiatives that could make it possible to shorten routes, navigate better around weather, save time and fuel, reduce delays, and improve capabilities for monitoring and managing of aircraft. A Review of the Next Generation Air Transportation provides an overview of NextGen and examines the technical activities, including human-system design and testing, organizational design, and other safety and human factor aspects of the system, that will be necessary to successfully transition current and planned modernization programs to the future system. This report assesses technical, cost, and schedule risk for the software development that will be necessary to achieve the expected benefits from a highly automated air traffic management system and the implications for ongoing modernization projects. The recommendations of this report will help the Federal Aviation Administration anticipate and respond to the challenges of implementing NextGen.", url = "https://nap.nationalacademies.org/catalog/21721/a-review-of-the-next-generation-air-transportation-system-implications", year = 2015, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", title = "Assessing the Impacts of Changes in the Information Technology R&D Ecosystem: Retaining Leadership in an Increasingly Global Environment", isbn = "978-0-309-11882-8", abstract = "The U.S. information technology (IT) research and development (R&D) ecosystem was the envy of the world in 1995. However, this position of leadership is not a birthright, and it is now under pressure. In recent years, the rapid globalization of markets, labor pools, and capital flows have encouraged many strong national competitors. During the same period, national policies have not sufficiently buttressed the ecosystem, or have generated side effects that have reduced its effectiveness. As a result, the U.S. position in IT leadership today has materially eroded compared with that of prior decades, and the nation risks ceding IT leadership to other nations within a generation. \n\nAssessing the Impacts of Changes in the Information Technology R&D Ecosystem calls for a recommitment to providing the resources needed to fuel U.S. IT innovation, to removing important roadblocks that reduce the ecosystem's effectiveness in generating innovation and the fruits of innovation, and to becoming a lead innovator and user of IT. The book examines these issues and makes recommendations to strengthen the U.S. IT R&D ecosystem.", url = "https://nap.nationalacademies.org/catalog/12174/assessing-the-impacts-of-changes-in-the-information-technology-rd-ecosystem", year = 2009, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", editor = "Fred B. Schneider", title = "Trust in Cyberspace", isbn = "978-0-309-13182-7", abstract = "Whether or not you use a computer, you probably use a telephone, electric power, and a bank. Although you may not be aware of their presence, networked computer systems are increasingly becoming an integral part of your daily life. Yet, if such systems perform poorly or don't work at all, then they can put life, liberty, and property at tremendous risk. Is the trust that we\u2014as individuals and as a society\u2014are placing in networked computer systems justified? And if it isn't, what can we do to make such systems more trustworthy?\nThis book provides an assessment of the current state of the art procedures for building trustworthy networked information systems. It proposes directions for research in computer and network security, software technology, and system architecture. In addition, the book assesses current technical and market trends in order to better inform public policy as to where progress is likely and where incentives could help. Trust in Cyberspace offers insights into:\n\n The strengths and vulnerabilities of the telephone network and Internet, the two likely building blocks of any networked information system.\n The interplay between various dimensions of trustworthiness: environmental disruption, operator error, \"buggy\" software, and hostile attack.\n The implications for trustworthiness of anticipated developments in hardware and software technology, including the consequences of mobile code.\n The shifts in security technology and research resulting from replacing centralized mainframes with networks of computers.\n The heightened concern for integrity and availability where once only secrecy mattered.\n The way in which federal research funding levels and practices have affected the evolution and current state of the science and technology base in this area.\n\nYou will want to read this book if your life is touched in any way by computers or telecommunications. But then, whose life isn't?", url = "https://nap.nationalacademies.org/catalog/6161/trust-in-cyberspace", year = 1999, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", title = "More Than Screen Deep: Toward Every-Citizen Interfaces to the Nation's Information Infrastructure", isbn = "978-0-309-06357-9", abstract = "The national information infrastructure (NII) holds the promise of connecting people of all ages and descriptions\u2014bringing them opportunities to interact with businesses, government agencies, entertainment sources, and social networks. Whether the NII fulfills this promise for everyone depends largely on interfaces\u2014technologies by which people communicate with the computing systems of the NII.\nMore Than Screen Deep addresses how to ensure NII access for every citizen, regardless of age, physical ability, race\/ethnicity, education, ability, cognitive style, or economic level. This thoughtful document explores current issues and prioritizes research directions in creating interface technologies that accommodate every citizen's needs.\nThe committee provides an overview of NII users, tasks, and environments and identifies the desired characteristics in every-citizen interfaces, from power and efficiency to an element of fun. The book explores:\n\n Technological advances that allow a person to communicate with a computer system.\n Methods for designing, evaluating, and improving interfaces to increase their ultimate utility to all people.\n Theories of communication and collaboration as they affect person-computer interactions and person-person interactions through the NII.\n Development of agents: intelligent computer systems that \"understand\" the user's needs and find the solutions.\n\nOffering data, examples, and expert commentary, More Than Screen Deep charts a path toward enabling the broadest-possible spectrum of citizens to interact easily and effectively with the NII. This volume will be important to policymakers, information system designers and engineers, human factors professionals, and advocates for special populations.", url = "https://nap.nationalacademies.org/catalog/5780/more-than-screen-deep-toward-every-citizen-interfaces-to-the", year = 1997, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Academies of Sciences, Engineering, and Medicine", editor = "Barbara M. Means and Amy Stephens", title = "Cultivating Interest and Competencies in Computing: Authentic Experiences and Design Factors", isbn = "978-0-309-68215-2", abstract = "Computing in some form touches nearly every aspect of day to day life and is reflected in the ubiquitous use of cell phones, the expansion of automation into many industries, and the vast amounts of data that are routinely gathered about people's health, education, and buying habits. Computing is now a part of nearly every occupation, not only those in the technology industry. Given the ubiquity of computing in both personal and professional life, there are increasing calls for all learners to participate in learning experiences related to computing including more formal experiences offered in schools, opportunities in youth development programs and after-school clubs, or self-initiated hands-on experiences at home. At the same time, the lack of diversity in the computing workforce and in programs that engage learners in computing is well-documented.\nIt is important to consider how to increase access and design experiences for a wide range of learners. Authentic experiences in STEM - that is, experiences that reflect professional practice and also connect learners to real-world problems that they care about - are one possible approach for reaching a broader range of learners. These experiences can be designed for learners of all ages and implemented in a wide range of settings. However, the role they play in developing youths' interests, capacities, and productive learning identities for computing is unclear. There is a need to better understand the role of authentic STEM experiences in supporting the development of interests, competencies, and skills related to computing.\nCultivating Interest and Competencies in Computing examines the evidence on learning and teaching using authentic, open-ended pedagogical approaches and learning experiences for children and youth in grades K-12 in both formal and informal settings. This report gives particular attention to approaches and experiences that promote the success of children and youth from groups that are typically underrepresented in computing fields. Cultivating Interest and Competencies in Computing provides guidance for educators and facilitators, program designers, and other key stakeholders on how to support learners as they engage in authentic learning experiences.", url = "https://nap.nationalacademies.org/catalog/25912/cultivating-interest-and-competencies-in-computing-authentic-experiences-and-design", year = 2021, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", title = "Interim Report of a Review of the Next Generation Air Transportation System Enterprise Architecture, Software, Safety, and Human Factors", isbn = "978-0-309-29834-6", abstract = "The Next Generation Air Transportation System (NextGen) is an effort begun in 2003 whose goals include improving the capacity, efficiency, and safety of the U.S. air transportation system and also enabling reduction in noise, pollution, and energy use. The Federal Aviation Administration and various stakeholders, including equipment providers, airlines, and contractors, are currently implementing both near-term and midterm capabilities of this effort. Interim Report of a Review of the Next Generation Air Transportation System Enterprise Architecture, Software, Safety, and Human Factors is part of a larger project to examine NextGen's enterprise architecture and related issues. This interim report provides an initial assessment focusing on challenges of system architecture for software-intensive systems.", url = "https://nap.nationalacademies.org/catalog/18618/interim-report-of-a-review-of-the-next-generation-air-transportation-system-enterprise-architecture-software-safety-and-human-factors", year = 2014, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", editor = "Stephen A. Merrill and William J. Raduchel", title = "Copyright in the Digital Era: Building Evidence for Policy", isbn = "978-0-309-27895-9", abstract = "Over the course of several decades, copyright protection has been expanded and extended through legislative changes occasioned by national and international developments. The content and technology industries affected by copyright and its exceptions, and in some cases balancing the two, have become increasingly important as sources of economic growth, relatively high-paying jobs, and exports. Since the expansion of digital technology in the mid-1990s, they have undergone a technological revolution that has disrupted long-established modes of creating, distributing, and using works ranging from literature and news to film and music to scientific publications and computer software.\n\nIn the United States and internationally, these disruptive changes have given rise to a strident debate over copyright's proper scope and terms and means of its enforcement--a debate between those who believe the digital revolution is progressively undermining the copyright protection essential to encourage the funding, creation, and distribution of new works and those who believe that enhancements to copyright are inhibiting technological innovation and free expression.\n\nCopyright in the Digital Era: Building Evidence for Policy examines a range of questions regarding copyright policy by using a variety of methods, such as case studies, international and sectoral comparisons, and experiments and surveys. This report is especially critical in light of digital age developments that may, for example, change the incentive calculus for various actors in the copyright system, impact the costs of voluntary copyright transactions, pose new enforcement challenges, and change the optimal balance between copyright protection and exceptions.", url = "https://nap.nationalacademies.org/catalog/14686/copyright-in-the-digital-era-building-evidence-for-policy", year = 2013, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", title = "Signposts in Cyberspace: The Domain Name System and Internet Navigation", isbn = "978-0-309-09640-9", abstract = "The Domain Name System (DNS) enables user-friendly alphanumeric names\u2014domain names\u2014to be assigned to Internet sites. Many of these names have gained economic, social, and political value, leading to conflicts over their ownership, especially names containing trademarked terms. Congress, in P.L. 105-305, directed the Department of Commerce to request the NRC to perform a study of these issues. When the study was initiated, steps were already underway to address the resolution of domain name conflicts, but the continued rapid expansion of the use of the Internet had raised a number of additional policy and technical issues. Furthermore, it became clear that the introduction of search engines and other tools for Internet navigation was affecting the DNS. Consequently, the study was expanded to include policy and technical issues related to the DNS in the context of Internet navigation. This report presents the NRC\u2019s assessment of the current state and future prospects of the DNS and Internet navigation, and its conclusions and recommendations concerning key technical and policy issues. ", url = "https://nap.nationalacademies.org/catalog/11258/signposts-in-cyberspace-the-domain-name-system-and-internet-navigation", year = 2005, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "Institute of Medicine", title = "Health IT and Patient Safety: Building Safer Systems for Better Care", isbn = "978-0-309-22112-2", abstract = "IOM's 1999 landmark study To Err is Human estimated that between 44,000 and 98,000 lives are lost every year due to medical errors. This call to action has led to a number of efforts to reduce errors and provide safe and effective health care. Information technology (IT) has been identified as a way to enhance the safety and effectiveness of care. In an effort to catalyze its implementation, the U.S. government has invested billions of dollars toward the development and meaningful use of effective health IT.\nDesigned and properly applied, health IT can be a positive transformative force for delivering safe health care, particularly with computerized prescribing and medication safety. However, if it is designed and applied inappropriately, health IT can add an additional layer of complexity to the already complex delivery of health care. Poorly designed IT can introduce risks that may lead to unsafe conditions, serious injury, or even death. Poor human-computer interactions could result in wrong dosing decisions and wrong diagnoses. Safe implementation of health IT is a complex, dynamic process that requires a shared responsibility between vendors and health care organizations. Health IT and Patient Safety makes recommendations for developing a framework for patient safety and health IT. This book focuses on finding ways to mitigate the risks of health IT-assisted care and identifies areas of concern so that the nation is in a better position to realize the potential benefits of health IT.\nHealth IT and Patient Safety is both comprehensive and specific in terms of recommended options and opportunities for public and private interventions that may improve the safety of care that incorporates the use of health IT. This book will be of interest to the health IT industry, the federal government, healthcare providers and other users of health IT, and patient advocacy groups.", url = "https://nap.nationalacademies.org/catalog/13269/health-it-and-patient-safety-building-safer-systems-for-better", year = 2012, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", editor = "Mark Haselkorn", title = "Strategic Management of Information and Communication Technology: The United States Air Force Experience with Y2K", isbn = "978-0-309-11128-7", url = "https://nap.nationalacademies.org/catalog/11999/strategic-management-of-information-and-communication-technology-the-united-states", year = 2007, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", editor = "Leon J. Osterweil and Lynette I. Millett and Joan D. Winston", title = "Social Security Administration Electronic Service Provision: A Strategic Assessment", isbn = "978-0-309-10393-0", abstract = "Social Security Administration Electronic Service Provision examines the Social Security Administration's (SSA's) proposed e-government strategy and provides advice on how the SSA can best deliver services to its constituencies in the future. The assessment by the Committee on the Social Security Administration's E-Government Strategy and Planning for the Future was based on (1) its examination of the SSA's current e-government strategy, including technological assumptions, performance measures and targets, planned operational capabilities, strategic requirements, and future goals; (2) its consideration of strategies, assumptions, and technical and operational requirements in comparable public- and private-sector institutions; and (3) its consideration of the larger organizational, societal, and technological context in which the SSA operates.", url = "https://nap.nationalacademies.org/catalog/11920/social-security-administration-electronic-service-provision-a-strategic-assessment", year = 2007, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", editor = "James Waldo and Herbert S. Lin and Lynette I. Millett", title = "Engaging Privacy and Information Technology in a Digital Age", isbn = "978-0-309-10392-3", abstract = "Privacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly boundaryless options for collecting, saving, sharing, and comparing information trigger consumer worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives. Engaging Privacy and Information Technology in a Digital Age presents a comprehensive and multidisciplinary examination of privacy in the information age. It explores such important concepts as how the threats to privacy evolving, how can privacy be protected and how society can balance the interests of individuals, businesses and government in ways that promote privacy reasonably and effectively? This book seeks to raise awareness of the web of connectedness among the actions one takes and the privacy policies that are enacted, and provides a variety of tools and concepts with which debates over privacy can be more fruitfully engaged. Engaging Privacy and Information Technology in a Digital Age focuses on three major components affecting notions, perceptions, and expectations of privacy: technological change, societal shifts, and circumstantial discontinuities. This book will be of special interest to anyone interested in understanding why privacy issues are often so intractable.", url = "https://nap.nationalacademies.org/catalog/11896/engaging-privacy-and-information-technology-in-a-digital-age", year = 2007, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", title = "Networking Health: Prescriptions for the Internet", isbn = "978-0-309-06843-7", abstract = "Consumer health websites have garnered considerable media attention, but only begin to scratch the surface of the more pervasive transformations the Internet could bring to health and health care. Networking Health examines ways in which the Internet may become a routine part of health care delivery and payment, public health, health education, and biomedical research. Building upon a series of site visits, this book:\n\n Weighs the role of the Internet versus private networks in uses ranging from the transfer of medical images to providing video-based medical consultations at a distance.\n Reviews technical challenges in the areas of quality of service, security, reliability, and access, and looks at the potential utility of the next generation of online technologies.\n Discusses ways health care organizations can use the Internet to support their strategic interests and explores barriers to a broader deployment of the Internet.\n Recommends steps that private and public sector entities can take to enhance the capabilities of the Internet for health purposes and to prepare health care organizations to adopt new Internet-based applications.\n", url = "https://nap.nationalacademies.org/catalog/9750/networking-health-prescriptions-for-the-internet", year = 2000, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Academies of Sciences, Engineering, and Medicine", title = "Automated Research Workflows for Accelerated Discovery: Closing the Knowledge Discovery Loop", isbn = "978-0-309-68652-5", abstract = "The needs and demands placed on science to address a range of urgent problems are growing. The world is faced with complex, interrelated challenges in which the way forward lies hidden or dispersed across disciplines and organizations. For centuries, scientific research has progressed through iteration of a workflow built on experimentation or observation and analysis of the resulting data. While computers and automation technologies have played a central role in research workflows for decades to acquire, process, and analyze data, these same computing and automation technologies can now also control the acquisition of data, for example, through the design of new experiments or decision making about new observations.\nThe term automated research workflow (ARW) describes scientific research processes that are emerging across a variety of disciplines and fields. ARWs integrate computation, laboratory automation, and tools from artificial intelligence in the performance of tasks that make up the research process, such as designing experiments, observations, and simulations; collecting and analyzing data; and learning from the results to inform further experiments, observations, and simulations. The common goal of researchers implementing ARWs is to accelerate scientific knowledge generation, potentially by orders of magnitude, while achieving greater control and reproducibility in the scientific process.\nAutomated Research Workflows for Accelerated Discovery: Closing the Knowledge Discovery Loop examines current efforts to develop advanced and automated workflows to accelerate research progress, including wider use of artificial intelligence. This report identifies research needs and priorities in the use of advanced and automated workflows for scientific research. Automated Research Workflows for Accelerated Discovery is intended to create awareness, momentum, and synergies to realize the potential of ARWs in scholarly discovery. ", url = "https://nap.nationalacademies.org/catalog/26532/automated-research-workflows-for-accelerated-discovery-closing-the-knowledge-discovery", year = 2022, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", editor = "Robert M. Hauser and Maxine Weinstein and Robert Pool and Barney Cohen", title = "Conducting Biosocial Surveys: Collecting, Storing, Accessing, and Protecting Biospecimens and Biodata", isbn = "978-0-309-15706-3", abstract = "Recent years have seen a growing tendency for social scientists to collect biological specimens such as blood, urine, and saliva as part of large-scale household surveys. By combining biological and social data, scientists are opening up new fields of inquiry and are able for the first time to address many new questions and connections. But including biospecimens in social surveys also adds a great deal of complexity and cost to the investigator's task. Along with the usual concerns about informed consent, privacy issues, and the best ways to collect, store, and share data, researchers now face a variety of issues that are much less familiar or that appear in a new light. \n\nIn particular, collecting and storing human biological materials for use in social science research raises additional legal, ethical, and social issues, as well as practical issues related to the storage, retrieval, and sharing of data. For example, acquiring biological data and linking them to social science databases requires a more complex informed consent process, the development of a biorepository, the establishment of data sharing policies, and the creation of a process for deciding how the data are going to be shared and used for secondary analysis--all of which add cost to a survey and require additional time and attention from the investigators. These issues also are likely to be unfamiliar to social scientists who have not worked with biological specimens in the past. Adding to the attraction of collecting biospecimens but also to the complexity of sharing and protecting the data is the fact that this is an era of incredibly rapid gains in our understanding of complex biological and physiological phenomena. Thus the tradeoffs between the risks and opportunities of expanding access to research data are constantly changing. \n\nConducting Biosocial Surveys offers findings and recommendations concerning the best approaches to the collection, storage, use, and sharing of biospecimens gathered in social science surveys and the digital representations of biological data derived therefrom. It is aimed at researchers interested in carrying out such surveys, their institutions, and their funding agencies.", url = "https://nap.nationalacademies.org/catalog/12942/conducting-biosocial-surveys-collecting-storing-accessing-and-protecting-biospecimens-and", year = 2010, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", editor = "Joseph N. Pato and Lynette I. Millett", title = "Biometric Recognition: Challenges and Opportunities", isbn = "978-0-309-14207-6", abstract = "Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric recognition has been applied to identification of criminals, patient tracking in medical informatics, and the personalization of social services, among other things. In spite of substantial effort, however, there remain unresolved questions about the effectiveness and management of systems for biometric recognition, as well as the appropriateness and societal impact of their use. Moreover, the general public has been exposed to biometrics largely as high-technology gadgets in spy thrillers or as fear-instilling instruments of state or corporate surveillance in speculative fiction. \n\nNow, as biometric technologies appear poised for broader use, increased concerns about national security and the tracking of individuals as they cross borders have caused passports, visas, and border-crossing records to be linked to biometric data. A focus on fighting insurgencies and terrorism has led to the military deployment of biometric tools to enable recognition of individuals as friend or foe. Commercially, finger-imaging sensors, whose cost and physical size have been reduced, now appear on many laptop personal computers, handheld devices, mobile phones, and other consumer devices. \n\nBiometric Recognition: Challenges and Opportunities addresses the issues surrounding broader implementation of this technology, making two main points: first, biometric recognition systems are incredibly complex, and need to be addressed as such. Second, biometric recognition is an inherently probabilistic endeavor. Consequently, even when the technology and the system in which it is embedded are behaving as designed, there is inevitable uncertainty and risk of error. This book elaborates on these themes in detail to provide policy makers, developers, and researchers a comprehensive assessment of biometric recognition that examines current capabilities, future possibilities, and the role of government in technology and system development.", url = "https://nap.nationalacademies.org/catalog/12720/biometric-recognition-challenges-and-opportunities", year = 2010, publisher = "The National Academies Press", address = "Washington, DC" }