Skip to main content

Currently Skimming:

5 Rationalizing the Future Research Agenda
Pages 106-114

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.

From page 106...
... will be important in any research program in IT for counterterrorist purposes. Based on the discussion in Chapter 3, Box 5.1 summarizes some of the Further discussion of a broader research agenda on information and network security can be found in CSTB's Computers at Risk (1991)
From page 107...
... As noted in Chapter 4, the commercial market has largely failed in promoting information and network security. In other cases, the research program required (e.g., research addressing the needs of emergency responders)
From page 110...
... The committee believes that because this research program has considerable overlap with that needed to fight cybercrime, progress in this research program has the potential to reduce cybercrime as well. Without rigorous argument, the committee believes that the potential reduction in cybercrime would likely offset a considerable portion (if not all)
From page 111...
... · Provide support extending for time scales that are long enough to make meaningful progress on hard problems (perhaps 5-year project durations) and in sufficient amounts that reasonably realistic operating environments for the technology could be constructed (perhaps $2 million to $5 million per year per site for system-oriented research programs)
From page 112...
... 112 INFORMATION TECHNOLOGY FOR COUNTERTERRORISM only a very small fraction of the universities that do support such programs can be regarded as first-rate universities. One additional attribute of this R&D infrastructure would be desirable, though the committee has few good ideas on how to achieve it.
From page 113...
... More detailed research agendas should be forthcoming from the agencies responsible for implementing the broad research program described in this report.

This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.