@BOOK{NAP author = "National Research Council", editor = "Richard Celeste and Dick Thornburgh and Herbert Lin", title = "Asking the Right Questions About Electronic Voting", isbn = "978-0-309-10024-3", abstract = "Many election officials look to electronic voting systems as a means for improving their ability to more effectively conduct and administer elections. At the same time, many information technologists and activists have raised important concerns regarding the security of such systems. Policy makers are caught in the midst of a controversy with both political and technological overtones. The public debate about electronic voting is characterized by a great deal of emotion and rhetoric.\nAsking the Right Questions About Electronic Voting describes the important questions and issues that election officials, policy makers, and informed citizens should ask about the use of computers and information technology in the electoral process\u2014focusing the debate on technical and policy issues that need resolving. The report finds that while electronic voting systems have improved, federal and state governments have not made the commitment necessary for e-voting to be widely used in future elections. More funding, research, and public education are required if e-voting is to become viable.", url = "https://nap.nationalacademies.org/catalog/11449/asking-the-right-questions-about-electronic-voting", year = 2006, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Academies of Sciences, Engineering, and Medicine", title = "Securing the Vote: Protecting American Democracy", isbn = "978-0-309-47647-8", abstract = "During the 2016 presidential election, America's election infrastructure was targeted by actors sponsored by the Russian government. Securing the Vote: Protecting American Democracy examines the challenges arising out of the 2016 federal election, assesses current technology and standards for voting, and recommends steps that the federal government, state and local governments, election administrators, and vendors of voting technology should take to improve the security of election infrastructure. In doing so, the report provides a vision of voting that is more secure, accessible, reliable, and verifiable.", url = "https://nap.nationalacademies.org/catalog/25120/securing-the-vote-protecting-american-democracy", year = 2018, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", title = "Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy", isbn = "978-0-309-16035-3", abstract = "In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation's important computer and communications systems and networks is a problem that looms large. Given the demonstrated limitations of passive cybersecurity defense measures, it is natural to consider the possibility that deterrence might play a useful role in preventing cyberattacks against the United States and its vital interests. At the request of the Office of the Director of National Intelligence, the National Research Council undertook a two-phase project aimed to foster a broad, multidisciplinary examination of strategies for deterring cyberattacks on the United States and of the possible utility of these strategies for the U.S. government. \n\nThe first phase produced a letter report providing basic information needed to understand the nature of the problem and to articulate important questions that can drive research regarding ways of more effectively preventing, discouraging, and inhibiting hostile activity against important U.S. information systems and networks. \n\nThe second phase of the project entailed selecting appropriate experts to write papers on questions raised in the letter report. A number of experts, identified by the committee, were commissioned to write these papers under contract with the National Academy of Sciences. Commissioned papers were discussed at a public workshop held June 10-11, 2010, in Washington, D.C., and authors revised their papers after the workshop. \n\nAlthough the authors were selected and the papers reviewed and discussed by the committee, the individually authored papers do not reflect consensus views of the committee, and the reader should view these papers as offering points of departure that can stimulate further work on the topics discussed. The papers presented in this volume are published essentially as received from the authors, with some proofreading corrections made as limited time allowed.", url = "https://nap.nationalacademies.org/catalog/12997/proceedings-of-a-workshop-on-deterring-cyberattacks-informing-strategies-and", year = 2010, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", editor = "Joseph N. Pato and Lynette I. Millett", title = "Biometric Recognition: Challenges and Opportunities", isbn = "978-0-309-14207-6", abstract = "Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric recognition has been applied to identification of criminals, patient tracking in medical informatics, and the personalization of social services, among other things. In spite of substantial effort, however, there remain unresolved questions about the effectiveness and management of systems for biometric recognition, as well as the appropriateness and societal impact of their use. Moreover, the general public has been exposed to biometrics largely as high-technology gadgets in spy thrillers or as fear-instilling instruments of state or corporate surveillance in speculative fiction. \n\nNow, as biometric technologies appear poised for broader use, increased concerns about national security and the tracking of individuals as they cross borders have caused passports, visas, and border-crossing records to be linked to biometric data. A focus on fighting insurgencies and terrorism has led to the military deployment of biometric tools to enable recognition of individuals as friend or foe. Commercially, finger-imaging sensors, whose cost and physical size have been reduced, now appear on many laptop personal computers, handheld devices, mobile phones, and other consumer devices. \n\nBiometric Recognition: Challenges and Opportunities addresses the issues surrounding broader implementation of this technology, making two main points: first, biometric recognition systems are incredibly complex, and need to be addressed as such. Second, biometric recognition is an inherently probabilistic endeavor. Consequently, even when the technology and the system in which it is embedded are behaving as designed, there is inevitable uncertainty and risk of error. This book elaborates on these themes in detail to provide policy makers, developers, and researchers a comprehensive assessment of biometric recognition that examines current capabilities, future possibilities, and the role of government in technology and system development.", url = "https://nap.nationalacademies.org/catalog/12720/biometric-recognition-challenges-and-opportunities", year = 2010, publisher = "The National Academies Press", address = "Washington, DC" }