TY - BOOK AU - National Research Council TI - Computers, Communications, and Public Policy: Report of a Workshop at Woods Hole, Massachusetts, August 14-18, 1978 DO - 10.17226/18716 PY - 1981 UR - https://nap.nationalacademies.org/catalog/18716/computers-communications-and-public-policy-report-of-a-workshop-at PB - The National Academies Press CY - Washington, DC LA - English KW - KW - Computers and Information Technology ER - TY - BOOK AU - National Research Council A2 - Kenneth W. Dam A2 - Herbert S. Lin TI - Cryptography's Role in Securing the Information Society SN - DO - 10.17226/5131 PY - 1996 UR - https://nap.nationalacademies.org/catalog/5131/cryptographys-role-in-securing-the-information-society PB - The National Academies Press CY - Washington, DC LA - English KW - Computers and Information Technology AB - For every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security of the nation, U.S. businesses, and citizens in their private lives. The more information that is transmitted in computer-readable form, the more vulnerable we become to automated spying. It's been estimated that some 10 billion words of computer-readable data can be searched for as little as $1. Rival companies can glean proprietary secrets . . . anti-U.S. terrorists can research targets . . . network hackers can do anything from charging purchases on someone else's credit card to accessing military installations. With patience and persistence, numerous pieces of data can be assembled into a revealing mosaic. Cryptography's Role in Securing the Information Society addresses the urgent need for a strong national policy on cryptography that promotes and encourages the widespread use of this powerful tool for protecting of the information interests of individuals, businesses, and the nation as a whole, while respecting legitimate national needs of law enforcement and intelligence for national security and foreign policy purposes. This book presents a comprehensive examination of cryptography—the representation of messages in code—and its transformation from a national security tool to a key component of the global information superhighway. The committee enlarges the scope of policy options and offers specific conclusions and recommendations for decision makers. Cryptography's Role in Securing the Information Society explores how all of us are affected by information security issues: private companies and businesses; law enforcement and other agencies; people in their private lives. This volume takes a realistic look at what cryptography can and cannot do and how its development has been shaped by the forces of supply and demand. How can a business ensure that employees use encryption to protect proprietary data but not to conceal illegal actions? Is encryption of voice traffic a serious threat to legitimate law enforcement wiretaps? What is the systemic threat to the nation's information infrastructure? These and other thought-provoking questions are explored. Cryptography's Role in Securing the Information Society provides a detailed review of the Escrowed Encryption Standard (known informally as the Clipper chip proposal), a federal cryptography standard for telephony promulgated in 1994 that raised nationwide controversy over its "Big Brother" implications. The committee examines the strategy of export control over cryptography: although this tool has been used for years in support of national security, it is increasingly criticized by the vendors who are subject to federal export regulation. The book also examines other less well known but nevertheless critical issues in national cryptography policy such as digital telephony and the interplay between international and national issues. The themes of Cryptography's Role in Securing the Information Society are illustrated throughout with many examples—some alarming and all instructive—from the worlds of government and business as well as the international network of hackers. This book will be of critical importance to everyone concerned about electronic security: policymakers, regulators, attorneys, security officials, law enforcement agents, business leaders, information managers, program developers, privacy advocates, and Internet users. ER - TY - BOOK AU - National Research Council A2 - William J. Mitchell A2 - Alan S. Inouye A2 - Marjory S. Blumenthal TI - Beyond Productivity: Information Technology, Innovation, and Creativity SN - DO - 10.17226/10671 PY - 2003 UR - https://nap.nationalacademies.org/catalog/10671/beyond-productivity-information-technology-innovation-and-creativity PB - The National Academies Press CY - Washington, DC LA - English KW - Computers and Information Technology AB - Computer science has drawn from and contributed to many disciplines and practices since it emerged as a field in the middle of the 20th century. Those interactions, in turn, have contributed to the evolution of information technology – new forms of computing and communications, and new applications – that continue to develop from the creative interactions between computer science and other fields. Beyond Productivity argues that, at the beginning of the 21st century, information technology (IT) is forming a powerful alliance with creative practices in the arts and design to establish the exciting new, domain of information technology and creative practices—ITCP. There are major benefits to be gained from encouraging, supporting, and strategically investing in this domain. ER - TY - BOOK AU - National Research Council AU - National Academy of Engineering A2 - Seymour E. Goodman A2 - Herbert S. Lin TI - Toward a Safer and More Secure Cyberspace SN - DO - 10.17226/11925 PY - 2007 UR - https://nap.nationalacademies.org/catalog/11925/toward-a-safer-and-more-secure-cyberspace PB - The National Academies Press CY - Washington, DC LA - English KW - Computers and Information Technology KW - Conflict and Security Issues AB - Given the growing importance of cyberspace to nearly all aspects of national life, a secure cyberspace is vitally important to the nation, but cyberspace is far from secure today. The United States faces the real risk that adversaries will exploit vulnerabilities in the nation’s critical information systems, thereby causing considerable suffering and damage. Online e-commerce business, government agency files, and identity records are all potential security targets. Toward a Safer and More Secure Cyberspace examines these Internet security vulnerabilities and offers a strategy for future research aimed at countering cyber attacks. It also explores the nature of online threats and some of the reasons why past research for improving cybersecurity has had less impact than anticipated, and considers the human resource base needed to advance the cybersecurity research agenda. This book will be an invaluable resource for Internet security professionals, information technologists, policy makers, data stewards, e-commerce providers, consumer protection advocates, and others interested in digital security and safety. ER - TY - BOOK AU - National Research Council A2 - James C. McGroddy A2 - Herbert S. Lin TI - A Review of the FBI's Trilogy Information Technology Modernization Program SN - DO - 10.17226/10991 PY - 2004 UR - https://nap.nationalacademies.org/catalog/10991/a-review-of-the-fbis-trilogy-information-technology-modernization-program PB - The National Academies Press CY - Washington, DC LA - English KW - Computers and Information Technology KW - Math, Chemistry, and Physics AB - The Federal Bureau of Investigation (FBI) is in the process of developing a modern information technology (IT) system—the Trilogy program— that is designed to provide a high-speed network, modern workstations and software, and an application—the Virtual Case File (VCF)—to enhance the ability of agents to organize, access, and analyze information. Implementation of this system has encountered substantial difficulties, however, and has been the subject of much investigation and congressional concern. To help address these problems, the FBI asked the National Research Council (NRC) to undertake a quick review of the program and the progress that has been made to date. This report presents that review. The current status of four major aspects of the program—the enterprise architecture, system design, program management, and human resources—are discussed, and recommendations are presented to address the problems. ER - TY - BOOK AU - National Academies of Sciences, Engineering, and Medicine TI - Information Technology and the U.S. Workforce: Where Are We and Where Do We Go from Here? SN - DO - 10.17226/24649 PY - 2017 UR - https://nap.nationalacademies.org/catalog/24649/information-technology-and-the-us-workforce-where-are-we-and PB - The National Academies Press CY - Washington, DC LA - English KW - Computers and Information Technology KW - Industry and Labor AB - Recent years have yielded significant advances in computing and communication technologies, with profound impacts on society. Technology is transforming the way we work, play, and interact with others. From these technological capabilities, new industries, organizational forms, and business models are emerging. Technological advances can create enormous economic and other benefits, but can also lead to significant changes for workers. IT and automation can change the way work is conducted, by augmenting or replacing workers in specific tasks. This can shift the demand for some types of human labor, eliminating some jobs and creating new ones. Information Technology and the U.S. Workforce explores the interactions between technological, economic, and societal trends and identifies possible near-term developments for work. This report emphasizes the need to understand and track these trends and develop strategies to inform, prepare for, and respond to changes in the labor market. It offers evaluations of what is known, notes open questions to be addressed, and identifies promising research pathways moving forward. ER - TY - BOOK AU - National Research Council TI - Network Science SN - DO - 10.17226/11516 PY - 2005 UR - https://nap.nationalacademies.org/catalog/11516/network-science PB - The National Academies Press CY - Washington, DC LA - English KW - Computers and Information Technology KW - Conflict and Security Issues AB - The military is currently attempting to develop itself into a force capable of networkcentric operations. While this effort has highlighted the military’s dependence on interacting networks, it has also shown that there is a huge gap between what we need to know about networks and our fundamental knowledge about network behavior. This gap makes the military vision of NCO problematic. To help address this problem, the Army asked the NRC to find out whether identifying and funding a new field of “network science” could help close this gap. This report presents an examination of networks andthe military, an analysis of the promise, content, and challenges of network science, and an assessment of approaches to creating value from network science. ER - TY - BOOK AU - National Academies of Sciences, Engineering, and Medicine TI - Building Data Capacity for Patient-Centered Outcomes Research: Priorities for the Next Decade SN - DO - 10.17226/26489 PY - 2022 UR - https://nap.nationalacademies.org/catalog/26489/building-data-capacity-for-patient-centered-outcomes-research-priorities-for PB - The National Academies Press CY - Washington, DC LA - English KW - Health and Medicine KW - Computers and Information Technology AB - The Office of the Assistant Secretary for Planning and Evaluation (ASPE), in partnership with other agencies and divisions of the United States Department of Health and Human Services, coordinates a portfolio of projects that build data capacity for conducting patient-centered outcomes research (PCOR). PCOR focuses on producing scientific evidence on the effectiveness of prevention and treatment options to inform the health care decisions of patients, families, and health care providers, taking into consideration the preferences, values, and questions patients face when making health care choices. ASPE asked the National Academies to appoint a consensus study committee to identify issues critical to the continued development of the data infrastructure for PCOR. Building Data Capacity for Patient-Centered Outcomes Research contains findings and conclusions in the areas that could benefit from being prioritized as part of ASPE's work, and offers input on strengthening the overall framework for building the data infrastructure over the coming years. The committee authoring this report also issued three interim reports, which summarized discussions from three workshops, and are included as appendices in the final report. ER - TY - BOOK AU - National Research Council A2 - John C. Wooley A2 - Herbert S. Lin TI - Catalyzing Inquiry at the Interface of Computing and Biology SN - DO - 10.17226/11480 PY - 2005 UR - https://nap.nationalacademies.org/catalog/11480/catalyzing-inquiry-at-the-interface-of-computing-and-biology PB - The National Academies Press CY - Washington, DC LA - English KW - Biology and Life Sciences KW - Computers and Information Technology KW - Math, Chemistry, and Physics KW - Surveys and Statistics AB - The remarkable growth of both computer science and biology in recent decades has drawn attention to their areas of intersection. Both fields have much in common; they are among the most rapidly changing fields of science, they both deal with very complex systems, and they both have profound implications for science and society. To examine the potential for greater interaction between the two fields, the National Research Council undertook a study looking at ways computational science can aid the development and understanding of biology and how the biological sciences might facilitate new and more powerful computational methods. This book presents an analysis of the potential synergies at the interface of the two fields and of ways to develop new collaborations between researchers in both areas to exploit those synergies. The book provides a large sample of well-documented examples of these interactions. The study concludes that the impact of computing on biology will be deep and profound and span virtually all areas of life science research. Computational biology will ultimately become part of the biological sciences. The impact of biology on computing is less certain, but could be substantial and should be pursued. ER -