%0 Book %A National Research Council %T Computational Needs and Resources in Crystallography: Proceedings of a Symposium, Albuquerque, New Mexico, April 8, 1972. %D 1973 %U https://nap.nationalacademies.org/catalog/18587/computational-needs-and-resources-in-crystallography-proceedings-of-a-symposium %> https://nap.nationalacademies.org/catalog/18587/computational-needs-and-resources-in-crystallography-proceedings-of-a-symposium %I The National Academies Press %C Washington, DC %G English %K %K Computers and Information Technology %P 144 %0 Book %A National Academies of Sciences, Engineering, and Medicine %E Johnson, Anne Frances %E Millett, Lynette I. %T Software Update as a Mechanism for Resilience and Security: Proceedings of a Workshop %@ 978-0-309-46288-4 %D 2017 %U https://nap.nationalacademies.org/catalog/24833/software-update-as-a-mechanism-for-resilience-and-security-proceedings %> https://nap.nationalacademies.org/catalog/24833/software-update-as-a-mechanism-for-resilience-and-security-proceedings %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %P 92 %X Software update is an important mechanism by which security changes and improvements are made in software, and this seemingly simple concept encompasses a wide variety of practices, mechanisms, policies, and technologies. To explore the landscape further, the Forum on Cyber Resilience hosted a workshop featuring invited speakers from government, the private sector, and academia. This publication summarizes the presentations and discussions from the workshop. %0 Book %A National Research Council %T Wireless Technology Prospects and Policy Options %@ 978-0-309-16398-9 %D 2011 %U https://nap.nationalacademies.org/catalog/13051/wireless-technology-prospects-and-policy-options %> https://nap.nationalacademies.org/catalog/13051/wireless-technology-prospects-and-policy-options %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %P 112 %X The use of radio-frequency communication--commonly referred to as wireless communication--is becoming more pervasive as well as more economically and socially important. Technological progress over many decades has enabled the deployment of several successive generations of cellular telephone technology, which is now used by many billions of people worldwide; the near-universal addition of wireless local area networking to personal computers; and a proliferation of actual and proposed uses of wireless communications. The flood of new technologies, applications, and markets has also opened up opportunities for examining and adjusting the policy framework that currently governs the management and use of the spectrum and the institutions involved in it, and models for allocating spectrum and charging for it have come under increasing scrutiny. Yet even as many agree that further change to the policy framework is needed, there is debate about precisely how the overall framework should be changed, what trajectory its evolution should follow, and how dramatic or rapid the change should be. Many groups have opinions, positions, demands, and desires related to these questions--reflecting multiple commercial, social, and political agendas and a mix of technical, economic, and social perspectives. The development of technologies and associated policy and regulatory regimes are often closely coupled, an interplay apparent as early as the 1910s, when spectrum policy emerged in response to the growth of radio communications. As outlined in this report, current and ongoing technological advances suggest the need for a careful reassessment of the assumptions that inform spectrum policy in the United States today. This book seeks to shine a spotlight on 21st-century technology trends and to outline the implications of emerging technologies for spectrum management in ways that the committee hopes will be useful to those setting future spectrum policy. %0 Book %A National Research Council %E Jackson, Daniel %E Thomas, Martyn %E Millett, Lynette I. %T Software for Dependable Systems: Sufficient Evidence? %@ 978-0-309-10394-7 %D 2007 %U https://nap.nationalacademies.org/catalog/11923/software-for-dependable-systems-sufficient-evidence %> https://nap.nationalacademies.org/catalog/11923/software-for-dependable-systems-sufficient-evidence %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %P 148 %X The focus of Software for Dependable Systems is a set of fundamental principles that underlie software system dependability and that suggest a different approach to the development and assessment of dependable software. Unfortunately, it is difficult to assess the dependability of software. The field of software engineering suffers from a pervasive lack of evidence about the incidence and severity of software failures; about the dependability of existing software systems; about the efficacy of existing and proposed development methods; about the benefits of certification schemes; and so on. There are many anecdotal reports, which—although often useful for indicating areas of concern or highlighting promising avenues of research—do little to establish a sound and complete basis for making policy decisions regarding dependability. The committee regards claims of extraordinary dependability that are sometimes made on this basis for the most critical of systems as unsubstantiated, and perhaps irresponsible. This difficulty regarding the lack of evidence for system dependability leads to two conclusions: (1) that better evidence is needed, so that approaches aimed at improving the dependability of software can be objectively assessed, and (2) that, for now, the pursuit of dependability in software systems should focus on the construction and evaluation of evidence. The committee also recognized the importance of adopting the practices that are already known and used by the best developers; this report gives a sample of such practices. Some of these (such as systematic configuration management and automated regression testing) are relatively easy to adopt; others (such as constructing hazard analyses and threat models, exploiting formal notations when appropriate, and applying static analysis to code) will require new training for many developers. However valuable, though, these practices are in themselves no silver bullet, and new techniques and methods will be required in order to build future software systems to the level of dependability that will be required. %0 Book %A National Research Council %E Uhlir, Paul F. %T The Socioeconomic Effects of Public Sector Information on Digital Networks: Toward a Better Understanding of Different Access and Reuse Policies: Workshop Summary %@ 978-0-309-13968-7 %D 2009 %U https://nap.nationalacademies.org/catalog/12687/the-socioeconomic-effects-of-public-sector-information-on-digital-networks %> https://nap.nationalacademies.org/catalog/12687/the-socioeconomic-effects-of-public-sector-information-on-digital-networks %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %P 104 %X While governments throughout the world have different approaches to how they make their public sector information (PSI) available and the terms under which the information may be reused, there appears to be a broad recognition of the importance of digital networks and PSI to the economy and to society. However, despite the huge investments in PSI and the even larger estimated effects, surprisingly little is known about the costs and benefits of different information policies on the information society and the knowledge economy. By understanding the strengths and weaknesses of the current assessment methods and their underlying criteria, it should be possible to improve and apply such tools to help rationalize the policies and to clarify the role of the internet in disseminating PSI. This in turn can help promote the efficiency and effectiveness of PSI investments and management, and to improve their downstream economic and social results. The workshop that is summarized in this volume was intended to review the state of the art in assessment methods and to improve the understanding of what is known and what needs to be known about the effects of PSI activities. %0 Book %A National Research Council %T Being Fluent with Information Technology %@ 978-0-309-06399-9 %D 1999 %U https://nap.nationalacademies.org/catalog/6482/being-fluent-with-information-technology %> https://nap.nationalacademies.org/catalog/6482/being-fluent-with-information-technology %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %P 128 %X Computers, communications, digital information, software—the constituents of the information age—are everywhere. Being computer literate, that is technically competent in two or three of today's software applications, is not enough anymore. Individuals who want to realize the potential value of information technology (IT) in their everyday lives need to be computer fluent—able to use IT effectively today and to adapt to changes tomorrow. Being Fluent with Information Technology sets the standard for what everyone should know about IT in order to use it effectively now and in the future. It explores three kinds of knowledge—intellectual capabilities, foundational concepts, and skills—that are essential for fluency with IT. The book presents detailed descriptions and examples of current skills and timeless concepts and capabilities, which will be useful to individuals who use IT and to the instructors who teach them. %0 Book %A National Research Council %T Avoiding Surprise in an Era of Global Technology Advances %@ 978-0-309-09605-8 %D 2005 %U https://nap.nationalacademies.org/catalog/11286/avoiding-surprise-in-an-era-of-global-technology-advances %> https://nap.nationalacademies.org/catalog/11286/avoiding-surprise-in-an-era-of-global-technology-advances %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %P 138 %X The global spread of science and technology expertise and the growing commercial access to advanced technologies with possible military application are creating potentially serious threats to the technological superiority underpinning U.S. military strength. Key to dealing with this situation is the ability of the U.S. intelligence community to be able to provide adequate and effective warning of evolving, critical technologies. To assist in performing this task, the Technology Warning Division of the Defense Intelligence Agency (DIA) asked the National Research Council (NRC) to undertake a study examining technology warning issues. This report provides the first part of that study. It presents an assessment of critical, evolving technologies; postulates ways potential adversaries could disrupt these technologies; and provides indicators for the intelligence community to determine if such methods are under development. The intention of this report is to establish the foundation for a long-term relationship with the technology warning community to support the examination of technology warning issues. %0 Book %A National Academies of Sciences, Engineering, and Medicine %E Johnson, Anne %E Millett, Lynette I. %T Beyond Spectre: Confronting New Technical and Policy Challenges: Proceedings of a Workshop %@ 978-0-309-49149-5 %D 2019 %U https://nap.nationalacademies.org/catalog/25418/beyond-spectre-confronting-new-technical-and-policy-challenges-proceedings-of %> https://nap.nationalacademies.org/catalog/25418/beyond-spectre-confronting-new-technical-and-policy-challenges-proceedings-of %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %P 84 %X In 2017, researchers discovered a vulnerability in microprocessors used in computers and devices all over the world. The vulnerability, named Spectre, combines side effects from caching and speculative execution, which are techniques that have been used for many years to increase the speed at which computers operate. The discovery upends a number of common assumptions about cybersecurity and draws attention to the complexities of the global supply chain and global customer base for the vast range of devices and cloud capabilities that all computer users rely on. In October 2018, the Forum on Cyber Resilience hosted a workshop to explore the implications of this development. This publication summarizes the presentations and discussions from the workshop. %0 Book %A National Research Council %E Schneider, Fred B. %T Trust in Cyberspace %@ 978-0-309-13182-7 %D 1999 %U https://nap.nationalacademies.org/catalog/6161/trust-in-cyberspace %> https://nap.nationalacademies.org/catalog/6161/trust-in-cyberspace %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %P 352 %X Whether or not you use a computer, you probably use a telephone, electric power, and a bank. Although you may not be aware of their presence, networked computer systems are increasingly becoming an integral part of your daily life. Yet, if such systems perform poorly or don't work at all, then they can put life, liberty, and property at tremendous risk. Is the trust that we—as individuals and as a society—are placing in networked computer systems justified? And if it isn't, what can we do to make such systems more trustworthy? This book provides an assessment of the current state of the art procedures for building trustworthy networked information systems. It proposes directions for research in computer and network security, software technology, and system architecture. In addition, the book assesses current technical and market trends in order to better inform public policy as to where progress is likely and where incentives could help. Trust in Cyberspace offers insights into: The strengths and vulnerabilities of the telephone network and Internet, the two likely building blocks of any networked information system. The interplay between various dimensions of trustworthiness: environmental disruption, operator error, "buggy" software, and hostile attack. The implications for trustworthiness of anticipated developments in hardware and software technology, including the consequences of mobile code. The shifts in security technology and research resulting from replacing centralized mainframes with networks of computers. The heightened concern for integrity and availability where once only secrecy mattered. The way in which federal research funding levels and practices have affected the evolution and current state of the science and technology base in this area. You will want to read this book if your life is touched in any way by computers or telecommunications. But then, whose life isn't? %0 Book %A National Research Council %T Broadband: Bringing Home the Bits %@ 978-0-309-08273-0 %D 2002 %U https://nap.nationalacademies.org/catalog/10235/broadband-bringing-home-the-bits %> https://nap.nationalacademies.org/catalog/10235/broadband-bringing-home-the-bits %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %P 336 %X Broadband communication expands our opportunities for entertainment, e-commerce and work at home, health care, education, and even e-government. It can make the Internet more useful to more people. But it all hinges on higher capacity in the "first mile" or "last mile" that connects the user to the larger communications network. That connection is often adequate for large organizations such as universities or corporations, but enhanced connections to homes are needed to reap the full social and economic promise. Broadband: Bringing Home the Bits provides a contemporary snapshot of technologies, strategies, and policies for improving our communications and information infrastructure. It explores the potential benefits of broadband, existing and projected demand, progress and failures in deployment, competition in the broadband industry, and costs and who pays them. Explanations of broadband's alphabet soup – HFC, DSL, FTTH, and all the rest – are included as well. The report's finding and recommendations address regulation, the roles of communities, needed research, and other aspects, including implications for the Telecommunications Act of 1996. %0 Book %A National Research Council %T The Unpredictable Certainty: White Papers %@ 978-0-309-06036-3 %D 1997 %U https://nap.nationalacademies.org/catalog/6062/the-unpredictable-certainty-white-papers %> https://nap.nationalacademies.org/catalog/6062/the-unpredictable-certainty-white-papers %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %P 632 %X This book contains a key component of the NII 2000 project of the Computer Science and Telecommunications Board, a set of white papers that contributed to and complements the project's final report, The Unpredictable Certainty: Information Infrastructure Through 2000, which was published in the spring of 1996. That report was disseminated widely and was well received by its sponsors and a variety of audiences in government, industry, and academia. Constraints on staff time and availability delayed the publication of these white papers, which offer details on a number of issues and positions relating to the deployment of information infrastructure. %0 Book %A National Research Council %T Making IT Better: Expanding Information Technology Research to Meet Society's Needs %@ 978-0-309-06991-5 %D 2000 %U https://nap.nationalacademies.org/catalog/9829/making-it-better-expanding-information-technology-research-to-meet-societys %> https://nap.nationalacademies.org/catalog/9829/making-it-better-expanding-information-technology-research-to-meet-societys %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %P 268 %X The flood of information technology (I.T.) products and services entering the market place often obscures the need to nurture the research enterprise. But as I.T. becomes integrated into all aspects of society, the need for research is even greater. And the range of issues that need to be addressed is broader than ever. This new book highlights the fundamental importance of research to ensure that I.T. meets society's expanding needs. Against the background of dramatic change in the I.T. landscape, the committee examines four key questions: Is the scope of I.T. research broad enough—particularly in the arena of large-scale systems—to address government, business, and social applications? Are government and industrial sponsors providing sufficient funding for I.T. research? Is the research net big both big and diverse enough to capture sufficient financial and intellectual resources to advance the field? Are structures and mechanisms for funding and conducting research suited to the new sets of research challenges? %0 Book %A Institute of Medicine %E Donaldson, Molla S. %E Lohr, Kathleen N. %T Health Data in the Information Age: Use, Disclosure, and Privacy %@ 978-0-309-07667-8 %D 1994 %U https://nap.nationalacademies.org/catalog/2312/health-data-in-the-information-age-use-disclosure-and-privacy %> https://nap.nationalacademies.org/catalog/2312/health-data-in-the-information-age-use-disclosure-and-privacy %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %P 272 %X Regional health care databases are being established around the country with the goal of providing timely and useful information to policymakers, physicians, and patients. But their emergence is raising important and sometimes controversial questions about the collection, quality, and appropriate use of health care data. Based on experience with databases now in operation and in development, Health Data in the Information Age provides a clear set of guidelines and principles for exploiting the potential benefits of aggregated health data—without jeopardizing confidentiality. A panel of experts identifies characteristics of emerging health database organizations (HDOs). The committee explores how HDOs can maintain the quality of their data, what policies and practices they should adopt, how they can prepare for linkages with computer-based patient records, and how diverse groups from researchers to health care administrators might use aggregated data. Health Data in the Information Age offers frank analysis and guidelines that will be invaluable to anyone interested in the operation of health care databases. %0 Book %A National Research Council %T Improving Risk Communication %@ 978-0-309-03943-7 %D 1989 %U https://nap.nationalacademies.org/catalog/1189/improving-risk-communication %> https://nap.nationalacademies.org/catalog/1189/improving-risk-communication %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %P 352 %X Technological risk and the process of explaining risks to the public have become major public issues. The mention of Bhopal or Love Canal can provoke emotional arguments—not only about the hazards themselves but also about how they were explained to the public. As new laws, the threat of AIDS, and other factors make risk communication more crucial, officials in government and industry are seeking guidelines on how to communicate effectively and responsibly. This volume offers an approach to better quality in risk communication. The combined insight of experts from government, business, and universities, Improving Risk Communication draws on the most current academic and practical information and analysis. Issues addressed include why risk communication has become more difficult in recent decades, what the major problems are, and how common misconceptions often hamper communication campaigns. Aimed especially at top decisionmakers in government and industry, the book emphasizes that solving the problems of risk communication is as much about improving procedures as improving the content of risk messages. Specific recommendations for change include a Risk Message Checklist and a call for developing a consumer's guide to risk. Appendixes provide additional details. %0 Book %T Transport Protocols for Department of Defense Data Networks: Report to the Department of Defense and the National Bureau of Standards %D 1985 %U https://nap.nationalacademies.org/catalog/10333/transport-protocols-for-department-of-defense-data-networks-report-to %> https://nap.nationalacademies.org/catalog/10333/transport-protocols-for-department-of-defense-data-networks-report-to %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %P 88 %0 Book %A National Research Council %T Keeping the U.S. Computer Industry Competitive: Defining the Agenda %@ 978-0-309-04176-8 %D 1990 %U https://nap.nationalacademies.org/catalog/1497/keeping-the-us-computer-industry-competitive-defining-the-agenda %> https://nap.nationalacademies.org/catalog/1497/keeping-the-us-computer-industry-competitive-defining-the-agenda %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %P 85 %X This book warns that retaining U.S. preeminence in computing at the beginning of the next century will require long-term planning, leadership, and collective will that cannot be attained with a business-as-usual approach by industry or government. This consensus emerged from a colloquium of top executives from the U.S. computer sector, university and industry researchers, and government policymakers. Among the major issues discussed are long-term, or strategic, commitment on the part of large firms in the United States; cooperation within and among firms and between industry, universities, and government; weaknesses in manufacturing and in the integration of research, development, and manufacturing; technical standards for both hardware and software manufacture and operation; and education and infrastructure (in particular, computer networks). %0 Book %A National Academy of Sciences %T A Technical Analysis of the Common Carrier/User Interconnections Area %D 1970 %U https://nap.nationalacademies.org/catalog/13320/a-technical-analysis-of-the-common-carrieruser-interconnections-area %> https://nap.nationalacademies.org/catalog/13320/a-technical-analysis-of-the-common-carrieruser-interconnections-area %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %P 86 %X A Technical Analysis of the Common Carrier/User Interconnections Area assesses the technical factors affecting the common carrier/user interconnection area of public communications. This book develops technical and background information that might be useful to common carriers, users, and equipment manufacturers in reaching and implementing solutions to immediate problems. This includes a technical evaluation of various contending points fo view regarding the common carrier/user interaction area, the various problems to which these views relate, and the various technical and policy alternatives for responding to these problems in the near future. A Technical Analysis of the Common Carrier/User Interconnections Area addresses questions of the propriety of the telephone company-provided network control signaling requirements and various alternatives to the provision thereof by the telephone company; the necessity and characteristics of telephone company-provided connecting arrangements and various alternatives to the provision thereof by the telephone company; and basic standards and specifications for interconnection and the appropriate method to administer them. %0 Book %A National Research Council %E Gutmann, Myron P. %E Stern, Paul C. %T Putting People on the Map: Protecting Confidentiality with Linked Social-Spatial Data %@ 978-0-309-10414-2 %D 2007 %U https://nap.nationalacademies.org/catalog/11865/putting-people-on-the-map-protecting-confidentiality-with-linked-social %> https://nap.nationalacademies.org/catalog/11865/putting-people-on-the-map-protecting-confidentiality-with-linked-social %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %P 176 %X Precise, accurate spatial information linked to social and behavioral data is revolutionizing social science by opening new questions for investigation and improving understanding of human behavior in its environmental context. At the same time, precise spatial data make it more likely that individuals can be identified, breaching the promise of confidentiality made when the data were collected. Because norms of science and government agencies favor open access to all scientific data, the tension between the benefits of open access and the risks associated with potential breach of confidentiality pose significant challenges to researchers, research sponsors, scientific institutions, and data archivists. Putting People on the Map finds that several technical approaches for making data available while limiting risk have potential, but none is adequate on its own or in combination. This book offers recommendations for education, training, research, and practice to researchers, professional societies, federal agencies, institutional review boards, and data stewards. %0 Book %A National Research Council %T Information Technology in the Service Society: A Twenty-First Century Lever %@ 978-0-309-04876-7 %D 1994 %U https://nap.nationalacademies.org/catalog/2237/information-technology-in-the-service-society-a-twenty-first-century %> https://nap.nationalacademies.org/catalog/2237/information-technology-in-the-service-society-a-twenty-first-century %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %P 288 %X Information technology has been touted as a boon for productivity, but measuring the benefits has been difficult. This volume examines what macroeconomic data do and do not show about the impact of information technology on service-sector productivity. This book assesses the ways in which different service firms have selected and implemented information technology, examining the impact of different management actions and styles on the perceived benefits of information technology in services. %0 Book %A National Research Council %E Breiger, Ronald %E Carley, Kathleen %E Pattison, Philippa %T Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers %@ 978-0-309-08952-4 %D 2003 %U https://nap.nationalacademies.org/catalog/10735/dynamic-social-network-modeling-and-analysis-workshop-summary-and-papers %> https://nap.nationalacademies.org/catalog/10735/dynamic-social-network-modeling-and-analysis-workshop-summary-and-papers %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %K Behavioral and Social Sciences %P 392 %X In the summer of 2002, the Office of Naval Research asked the Committee on Human Factors to hold a workshop on dynamic social network and analysis. The primary purpose of the workshop was to bring together scientists who represent a diversity of views and approaches to share their insights, commentary, and critiques on the developing body of social network analysis research and application. The secondary purpose was to provide sound models and applications for current problems of national importance, with a particular focus on national security. This workshop is one of several activities undertaken by the National Research Council that bears on the contributions of various scientific disciplines to understanding and defending against terrorism. The presentations were grouped in four sessions – Social Network Theory Perspectives, Dynamic Social Networks, Metrics and Models, and Networked Worlds – each of which concluded with a discussant-led roundtable discussion among the presenters and workshop attendees on the themes and issues raised in the session.