Cover image for Computer Networks, Policies and Applications.
Computer Networks, Policies and Applications.
Title:
Computer Networks, Policies and Applications.
Author:
Berger, Carolynn M.
ISBN:
9781614707943
Personal Author:
Physical Description:
1 online resource (244 pages)
Series:
Computer Science, Technology and Applications
Contents:
COMPUTER NETWORKS, POLICIES AND APPLICATIONS -- COMPUTER NETWORKS, POLICIES AND APPLICATIONS -- CONTENTS -- PREFACE -- Chapter 1 ACCESS TO BROADBAND NETWORKS* -- ABSTRACT -- INTRODUCTION -- WHAT DO WIRELINE BROADBAND NETWORKS LOOK LIKE? -- The Broadband Last Mile -- Broadband Network Providers' Proprietary IP Networks -- The Internet Backbone -- PARAMETERS AVAILABLE TO BROADBAND NETWORK PROVIDERS THAT CAN AFFECT END USERS' AND INDEPENDENT APPLICATIONS PROVIDERS' ACCESS TO THESE NETWORKS -- HOW MIGHT STRATEGIC BROADBAND NETWORK PROVIDER BEHAVIOR HARM CONSUMERS? -- PROPOSALS FOR GOVERNMENT POLICY ON ACCESS TO BROADBAND NETWORKS -- The FCC Broadband Policy Statement -- Internet Consumer Bill of Rights -- Network Neutrality -- ANTITRUST AND UNFAIR METHODS OF COMPETITION LAWS -- REFERENCES -- Chapter 2 BROADBAND INTERNET ACCESS AND THE DIGITAL DIVIDE: FEDERAL ASSISTANCE PROGRAMS* -- ABSTRACT -- BACKGROUND -- Broadband in Rural and Underserved Areas[11] -- Federal Role -- State and Local Broadband Activities -- FEDERAL TELECOMMUNICATIONS DEVELOPMENT PROGRAMS -- The Universal Service Concept and the FCC[47] -- Universal Service and the Telecommunications Act of 1996 -- The Schools and Libraries, and Rural Health Care Programs -- 1. The Schools and Libraries Program -- 2. The Rural Health Care Program -- The Telecommunications Development Fund -- Universal Service and Broadband -- Rural Utilities Service -- LEGISLATION IN THE 109TH CONGRESS -- LEGISLATION IN THE 110TH CONGRESS -- POLICY ISSUES -- Is Broadband Deployment Data Adequate? -- Is Federal Assistance for Broadband Deployment Premature or Inappropriate? -- Which Approach Is Best? -- REFERENCES -- Chapter3IMPLEMENTATIONANDEXPERIMENTATIONOFALAYER-2ARCHITECTUREFORINTERCONNECTINGHETEROGENEOUSADHOCNETWORKSTOTHEINTERNET -- Abstract -- 1.Introduction -- 2.NetworkModel -- 3.RelatedWork.

4.ProtocolDescriptions -- 4.1.OLSR -- 4.2.ARPProtocol -- 5.ProposedArchitecture -- 5.1.AdHocNodeSelf-configuration -- 5.2.GlobalInternetConnectivity -- 5.2.1.ConnectivityforOutgoingTraffic -- 5.2.2.ConnectivityforIncomingTraffic -- 5.2.3.MobilitySupport -- 6.ExperimentalResults -- 6.1.PerformanceConstraintsofInternetAccess -- 6.2.PerformanceConstraintswithMobility -- 7.ConcludingRemarks -- References -- Chapter 4 THE IMPACT OF LICENSE AGREEMENTS ON ACCESS TO INFORMATION: A CHALLENGE FOR ACADEMIC LIBRARIES -- ABSTRACT -- INTRODUCTION -- SHIFT FROM PAPER TO ELECTRONIC RESOURCES -- RELEVANT COPYRIGHT PROVISIONS -- LICENSE AGREEMENTS -- IMPACTS AND CONSEQUENCES -- CONCLUSION -- REFERENCES -- Chapter 5 BUNDLING RESIDENTIAL TELEPHONE, INTERNET, AND VIDEO SERVICES: ISSUES FOR CONGRESS* -- ABSTRACT -- THE MARKET FORCES DRIVING BUNDLING -- WIRELINE-OF BUNDLING STRATEGIES -- WIRELINE, WIRELESS, VIDEO BUNDLING STRATEGIES -- THE PRICING OF BUNDLED SERVICE OFFERINGS -- PUBLIC POLICY ISSUES CREATED BY BUNDLING -- Bundling and the Federal Universal Service Fund -- BUNDLING AND COMPETITION -- CONCLUSION -- REFERENCES -- Chapter 6 THE POSITION OF DIRECTOR OF NATIONAL INTELLIGENCE: ISSUES FOR CONGRESS* -- ABSTRACT -- CONGRESSIONAL PROPOSALS CONCERNING DNI POSITION -- DCI Budget-Related Responsibilities and Authorities under the National Security Act of 1947 Are Seen by Some as Limited -- Recent Interest in the Establishment of a DNI -- Senator Dianne Feinstein -- Senator Tom Daschle -- Senator Dianne Feinstein, Second Proposal -- Senator Bob Graham -- Representative Jane Harman -- Representative Porter Goss -- WHAT THE BILLS ARE DESIGNED TO ACCOMPLISH -- Feinstein and Graham Would Establish a DNI -- Feinstein and Graham Would Enhance DNI Budget-Related Responsibilities[13] -- Feinstein and Graham Would Strengthen DNI Budget and Personnel-Related Authorities.

Feinstein and Graham Bills Silent on DNI Personnel Policies -- Daschle DNI Legislation Tracks Feinstein and Graham -- Harman Would Establish a DNI -- Harman Enhances DNI Budget-Related Responsibilities -- Harman Would Strengthen DNI Budget and Personnel-Related Authorities -- Harman Would Strengthen other Personnel Authorities -- Goss Legislation Would Not Establish DNI, but Instead Strengthen DCI -- Goss Would Appropriate NFIP Funds Directly to the DCI -- Goss Would Strengthen DCI Budget-Related Responsibilities -- Goss Would Enhance DCI Budget-Related Authorities -- Goss Would Strengthen DCI Reprogramming Authorities -- Goss Would Strengthen DCI Budget and Personnel Transfer Authorities -- Goss Would Strengthen DCI Personnel Authorities -- Goss Would Eliminate Restriction of DCI Control over Internal Security Functions -- ARGUMENTS OFFERED IN FAVOR OF ESTABLISHING A DNI -- ARGUMENTS OFFERED IN OPPOSITION TO ESTABLISHING A DNI -- HISTORY OF RECOMMENDATIONS TO CENTRALIZE AND STRENGTHEN IC LEADERSHIP -- Second Hoover Commission, 1955 -- The Schlesinger Report, 1971 -- Murphy Commission, 1975 -- Church Committee, 1976 -- Pike Committee, 1976 -- Clifford/Cline Proposals, 1976 -- Charter Legislation, 1978 -- Executive Branch Orders, 1976-1981 -- Executive Branch Orders, 1976-1981 -- Boren-Mccurdy, 1992 -- Aspin-Brown Commission, 1996 -- Specter/Combest, 1996 -- Scowcroft Commission, 2001 -- The Joint Inquiry into September 11 Terrorist Attacks -- The 9/11 Commission -- REFERENCES -- APPENDIX 1. DNI LEGISLATION COMPARED TO CURRENT LAW -- Chapter 7 GENERAL MANAGEMENT LAWS AND THE 9/11 COMMISSION'S PROPOSED OFFICE OF NATIONAL INTELLIGENCE DIRECTOR (NID) AND NATIONAL COUNTERTERRORISM CENTER (NCTC)* -- ABSTRACT -- BACKGROUND -- Legislation to Restructure the Intelligence Community -- NID AND NCTC AND THE COVERAGE OF GENERAL MANAGEMENT LAWS.

General Management Laws -- Table Showing Coverage of Laws -- Table Structure and Contents -- Summary of Findings -- Within the EOP -- Independent Entities -- Considerations Regarding Table Contents -- "Coverage" Versus "Application" of the Laws -- Coverage Sometimes Unclear -- Exemptions from Coverage -- Certain Provisions can Affect Coverage -- CONGRESS COULD INDICATE WHETHER MANAGEMENT LAWS COVER NID AND NCTC -- Amending the Management Laws -- Identification of Management Laws in Statute Creating NID/NCTC -- Evaluating Options: Standardization vs. Customization -- REFERENCES -- Chapter 8 THE ICT'S ACCEPTANCE: ANALYTICAL FRAMEWORK AND EMPIRICAL EXAMPLE -- ABSTRACT -- 1. INTRODUCTION -- 2. BACKGROUND OF THE STUDY -- 3. CONCEPTUAL MODEL -- 3.1. The Impact of ICTs Acceptance -- 3.2. Motivational Factors -- 3.2.1. The Perceived Ease of Use -- 3.2.2. The Perceived Usefulness -- 3.2.3. The Perceived Enjoyment -- 3.2.4. The Social Pressure -- 3.3. Antecedents Factors -- 3.3.1. The Individual Level -- The Gender -- The Age -- The Education -- 3.3.2. The Organizational Level -- 4. METHODOLOGY -- 4.1. The Sample -- 4.2. The Survey Structure -- 4.2.1. The Antecedents -- 4.2.2. The Motivator Factors -- 4.2.3. Acceptance -- 4.2.4. Personal development -- 4.3. Data Analysis -- 5. DISCUSSION -- 5.1. Factors Affecting Attitudes toward ICTs Acceptance -- Results on Perceived Ease of Use -- Results on Perceived Usefulness -- Results on Perceived Enjoyment -- Results on Social Pressure -- 5.2. Factors Affecting ICTs Acceptance -- Results on Gender -- Results on Age -- Results on Education (Level and Discipline) -- CONCLUSION -- REFERENCES -- Chapter 9 PRIVACY: GOVERNMENT USE OF DATA FROM INFORMATION RESELLERS COULD INCLUDE BETTER PROTECTIONS* -- WHY GAO DID THIS STUDY -- WHAT GAO RECOMMENDS -- WHAT GAO FOUND -- ABBREVIATIONS.

Mr. Chairman and Members of the Subcommittee -- RESULTS IN BRIEF -- BACKGROUND -- Federal Laws and Guidance Govern Use of Personal Information in Federal Agencies -- The Fair Information Practices Are Widely Agreed to Be Key Principles for Privacy Protection -- Agencies Used Governmentwide Contracts to Obtain Personal Information from Information Resellers for a Variety of Purposes -- DOJ and DHS Used Information Resellers Primarily for Law Enforcement and Counterterrorism -- SSA and State Used Information Resellers Primarily for Fraud Prevention and Detection -- Agencies Lacked Policies on Use of Reseller Data, and Practices Do Not Consistently Reflect the Fair Information Practices -- Limitations in the Applicability of the Privacy Act and Ambiguities in OMB Guidance Contributed to an Uneven Adherence to the Purpose Specification, Openness, and Individual Participation Principles -- Privacy Impact Assessments Could Address Openness and Purpose Specification Principles but often Were not Conducted -- Agencies Often Did Not Have Practices in Place to Ensure Accountability for Proper Handling of Information Reseller Data -- Not All Agencies Have Taken Steps to Address Our Recommendations -- Privacy Provisions of the Proposed Federal Agency Data Protection Act Are Consistent with Our Recommendations -- REFERENCES -- Chapter 10 INTERNET AND COMPUTER-MEDIATED TECHNOLOGIES AS NEW TOOLS IN THE STUDY OF SHYNESS: A REVIEW OF RECENT SURVEY- AND LABORATORY-BASED STUDIES -- ABSTRACT -- INTRODUCTION -- SHYNESS AND SOCIAL COMMUNICATIVE BEHAVIOUR -- THE USE OF THE INTERNET AND COMPUTER TECHNOLOGIES AS NEW TOOLS TO STUDY SHYNESS: RECENT SURVEY AND LABORATORY-BASED STUDIES -- SHYNESS AND THE INTERNET: SURVEY STUDIES -- SHYNESS AND THE INTERNET: LABORATORY STUDIES -- CONCLUSIONS, IMPLICATIONS, AND FUTURE DIRECTIONS -- ACKNOWLEDGMENTS -- REFERENCES.

Chapter 11 ONLINE BUT OFF-BALANCE: GENDER DIFFERENCES IN HIGH SCHOOL INTERNET COVERAGE.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Added Author:
Electronic Access:
Click to View
Holds: Copies: