Skip to main content

Search results for "organized crime"

Filters: Computers and Information Technology Computers and Information Technology ×
Viewing 1 - 19 of 19 results by relevance
Consensus Study Report

At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues  (2014)

Cryptography's Role in Securing the Information Society  (1996)

Consensus Study Report

IDs -- Not That Easy: Questions About Nationwide Identity Systems  (2002)

Consensus Study Report

Critical Information Infrastructure Protection and the Law: An Overview of Key Issues  (2003)

Proceedings

Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext: Proceedings of a Workshop  (2016)

Consensus Study Report

Bulk Collection of Signals Intelligence: Technical Options  (2015)

Consensus Study Report

Decrypting the Encryption Debate: A Framework for Decision Makers  (2018)

Fostering Research on the Economic and Social Impacts of Information Technology  (1998)

Consensus Study Report

Trust in Cyberspace  (1999)

Consensus Study Report

Letter Report for the Committee on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy  (2010)

Consensus Study Report

Private Lives and Public Policies: Confidentiality and Accessibility of Government Statistics  (1993)

Consensus Study Report

Toward a Safer and More Secure Cyberspace  (2007)

Proceedings

Technical, Business, and Legal Dimensions of Protecting Children from Pornography on the Internet: Proceedings of a Workshop  (2002)

Consensus Study Report

A Review of the FBI's Trilogy Information Technology Modernization Program  (2004)

Consensus Study Report

Youth, Pornography, and the Internet  (2002)

Consensus Study Report

Engaging Privacy and Information Technology in a Digital Age  (2007)

Proceedings

Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy  (2010)

Consensus Study Report

Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities  (2009)

Consensus Study Report

Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment  (2008)