@BOOK{NAP author = "National Research Council", title = "Embedded, Everywhere: A Research Agenda for Networked Systems of Embedded Computers", isbn = "978-0-309-07568-8", abstract = "Advances in the miniaturization and networking of microprocessors promise a day when networked computers are embedded throughout the everyday world. However, our current understanding of what such systems would be like is insufficient to bring the promise to reality.\nEmbedded, Everywhere explores the potential of networked systems of embedded computers and the research challenges arising from embedding computation and communications technology into a wide variety of applications\u2014from precision agriculture to automotive telematics to defense systems.\nIt describes how these emerging networks operate under unique constraints not present in more traditional distributed systems, such as the Internet. It articulates how these networks will have to be dynamically adaptive and self-configuring, and how new models for approaching programming and computation are necessary.\nIssues relating to trustworthiness, security, safety, reliability, usability, and privacy are examined in light of the ubiquitous nature of these systems. A comprehensive, systems-oriented research agenda is presented, along with recommendations to major federal funding agencies.", url = "https://nap.nationalacademies.org/catalog/10193/embedded-everywhere-a-research-agenda-for-networked-systems-of-embedded", year = 2001, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", editor = "Fred B. Schneider", title = "Trust in Cyberspace", isbn = "978-0-309-13182-7", abstract = "Whether or not you use a computer, you probably use a telephone, electric power, and a bank. Although you may not be aware of their presence, networked computer systems are increasingly becoming an integral part of your daily life. Yet, if such systems perform poorly or don't work at all, then they can put life, liberty, and property at tremendous risk. Is the trust that we\u2014as individuals and as a society\u2014are placing in networked computer systems justified? And if it isn't, what can we do to make such systems more trustworthy?\nThis book provides an assessment of the current state of the art procedures for building trustworthy networked information systems. It proposes directions for research in computer and network security, software technology, and system architecture. In addition, the book assesses current technical and market trends in order to better inform public policy as to where progress is likely and where incentives could help. Trust in Cyberspace offers insights into:\n\n The strengths and vulnerabilities of the telephone network and Internet, the two likely building blocks of any networked information system.\n The interplay between various dimensions of trustworthiness: environmental disruption, operator error, \"buggy\" software, and hostile attack.\n The implications for trustworthiness of anticipated developments in hardware and software technology, including the consequences of mobile code.\n The shifts in security technology and research resulting from replacing centralized mainframes with networks of computers.\n The heightened concern for integrity and availability where once only secrecy mattered.\n The way in which federal research funding levels and practices have affected the evolution and current state of the science and technology base in this area.\n\nYou will want to read this book if your life is touched in any way by computers or telecommunications. But then, whose life isn't?", url = "https://nap.nationalacademies.org/catalog/6161/trust-in-cyberspace", year = 1999, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", title = "Summary of Discussions at a Planning Meeting on Cyber-Security and the Insider Threat to Classified Information", abstract = "This is a summary of discussions at a planning meeting held November 1-2, 2000 to examine the prospects of initiating an NRC study on cyber-security and the insider threat to classified information. The meeting's focus was on the threat to classified systems and information because the political and organizational issues that often arise with protection policies and practices (e.g., rights to privacy) are considerably fewer and less intense than if sensitive unclassified information (especially non-governmental information) is involved. The meeting also addressed threats other than insider threats as well as non-classified computer systems.", url = "https://nap.nationalacademies.org/catalog/10197/summary-of-discussions-at-a-planning-meeting-on-cyber-security-and-the-insider-threat-to-classified-information", year = 2001, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "Transportation Research Board and National Academies of Sciences, Engineering, and Medicine", editor = "Randall J. Murphy and Michael Sukkarieh and Jon Haass and Paul Hriljac", title = "Guidebook on Best Practices for Airport Cybersecurity", abstract = "TRB\u2019s Airport Cooperative Research Program (ACRP) Report 140: Guidebook on Best Practices for Airport Cybersecurity provides information designed to help reduce or mitigate inherent risks of cyberattacks on technology-based systems.Traditional IT infrastructure such as servers, desktops, and network devices are covered along with increasingly sophisticated and interconnected industrial control systems, such as baggage handling, temperature control, and airfield lighting systems.The guidebook also includes a CD-ROM of multimedia material that may be used to educate all staff at airports about the need, and how, to be diligent against cybersecurity threats.The CD-ROM is also available for download from TRB\u2019s website as an ISO image. Links to the ISO image and instructions for burning a CD-ROM from an ISO image are provided below.Help on Burning an .ISO CD-ROM ImageDownload the .ISO CD-ROM Image(Warning: This is a large file and may take some time to download using a high-speed connection.)CD-ROM Disclaimer - This software is offered as is, without warranty or promise of support of any kind either expressed or implied. Under no circumstance will the National Academy of Sciences or the Transportation Research Board (collectively \"TRB\") be liable for any loss or damage caused by the installation or operation of this product. TRB makes no representation or warranty of any kind, expressed or implied, in fact or in law, including without limitation, the warranty of merchantability or the warranty of fitness for a particular purpose, and shall not in any case be liable for any consequential or special damages.", url = "https://nap.nationalacademies.org/catalog/22116/guidebook-on-best-practices-for-airport-cybersecurity", year = 2015, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "Transportation Research Board and National Academies of Sciences, Engineering, and Medicine", editor = "Paula Okunieff", title = "Multiagency Electronic Fare Payment Systems", abstract = "TRB's Transit Cooperative Research Program (TCRP) Synthesis 125: Multiagency Electronic Fare Payment Systems describes the current practice, challenges, and benefits of utilizing electronic fare payment systems (EFPS), such as smart cards. This synthesis reviews current systems and identifies their major challenges and benefits; describes the use of electronic fare systems in multimodal, multiagency environments; and reviews next-generation approaches through existing implementation case examples.", url = "https://nap.nationalacademies.org/catalog/24733/multiagency-electronic-fare-payment-systems", year = 2017, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", title = "Summary of a Workshop on Software Certification and Dependability", isbn = "978-0-309-09429-0", abstract = "Certification of critical software systems (e.g., for safety and security) is important to help ensure their dependability. Today, certification relies as much on evaluation of the software development process as it does on the system\u2019s properties. While the latter are preferable, the complexity of these systems usually makes them extremely difficult to evaluate. To explore these and related issues, the National Coordination Office for Information technology Research and Development asked the NRC to undertake a study to assess the current state of certification in dependable systems. The study is in two phases: the first to frame the problem and the second to assess it. This report presents a summary of a workshop held as part of the first phase. The report presents a summary of workshop participants\u2019 presentations and subsequent discussion. It covers, among other things, the strengths and limitations of process; new challenges and opportunities; experience to date; organization context; and cost-effectiveness of software engineering techniques. A consensus report will be issued upon completion of the second phase.", url = "https://nap.nationalacademies.org/catalog/11133/summary-of-a-workshop-on-software-certification-and-dependability", year = 2004, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", title = "Making IT Better: Expanding Information Technology Research to Meet Society's Needs", isbn = "978-0-309-06991-5", abstract = "The flood of information technology (I.T.) products and services entering the market place often obscures the need to nurture the research enterprise. But as I.T. becomes integrated into all aspects of society, the need for research is even greater. And the range of issues that need to be addressed is broader than ever.\nThis new book highlights the fundamental importance of research to ensure that I.T. meets society's expanding needs. Against the background of dramatic change in the I.T. landscape, the committee examines four key questions:\n\n Is the scope of I.T. research broad enough\u2014particularly in the arena of large-scale systems\u2014to address government, business, and social applications?\n Are government and industrial sponsors providing sufficient funding for I.T. research?\n Is the research net big both big and diverse enough to capture sufficient financial and intellectual resources to advance the field?\n Are structures and mechanisms for funding and conducting research suited to the new sets of research challenges?\n", url = "https://nap.nationalacademies.org/catalog/9829/making-it-better-expanding-information-technology-research-to-meet-societys", year = 2000, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", title = "Network-Centric Naval Forces: A Transition Strategy for Enhancing Operational Capabilities", isbn = "978-0-309-06925-0", abstract = "Network-Centric Naval Forces: A Transition Strategy for Enhancing Operational Capabilities is a study to advise the Department of the Navy regarding its transition strategy to achieve a network-centric naval force through technology application. This report discusses the technical underpinnings needed for a transition to networkcentric forces and capabilities.", url = "https://nap.nationalacademies.org/catalog/9864/network-centric-naval-forces-a-transition-strategy-for-enhancing-operational", year = 2000, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", title = "Continuing Innovation in Information Technology", isbn = "978-0-309-25962-0", abstract = "Information technology (IT) is widely understood to be the enabling technology of the 21st century. IT has transformed, and continues to transform, all aspects of our lives: commerce and finance, education, employment, energy, health care, manufacturing, government, national security, transportation, communications, entertainment, science, and engineering. IT and its impact on the U.S. economy-both directly (the IT sector itself) and indirectly (other sectors that are powered by advances in IT)\u2014continue to grow in size and importance.\nIn 1995, the National Research Council's Computer Science and Telecommunications Board (CSTB) produced the report Evolving the High Performance Computing and Communications Initiative to Support the Nation's Information Infrastructure. A graphic in that report, often called the \"tire tracks\" diagram because of its appearance, produced an extraordinary response by clearly linking government investments in academic and industry research to the ultimate creation of new information technology industries with more than $1 billion in annual revenue.\nUsed in presentations to Congress and executive branch decision makers and discussed broadly in the research and innovation policy communities, the tire tracks figure dispelled the assumption that the commercially successful IT industry is self-sufficient, underscoring through long incubation periods of years and even decades. The figure was updated in 2002, 2003, and 2009 reports produced by the CSTB. With the support of the National Science Foundation, CSTB updated the tire tracks figure. Continuing Innovation in Information Technology includes the updated figure and a brief text based in large part on prior CSTB reports.", url = "https://nap.nationalacademies.org/catalog/13427/continuing-innovation-in-information-technology", year = 2012, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "Transportation Research Board and National Academies of Sciences, Engineering, and Medicine", editor = "Jeroen Kok, Regina Lipták, IMG Rebel Inc.", title = "Multimodal Fare Payment Integration", abstract = "Nearly all transit agencies are seeing potential benefits to multimodal payment convergence. However, many agencies find that implementing necessary upgrades is cost-prohibitive, which is the biggest barrier to full adoption.The TRB Transit Cooperative Research Program's TCRP Synthesis 144: Multimodal Fare Payment Integration documents current practices and experiences of transit agencies dealing with the complexities of multimodal fare payment convergence.", url = "https://nap.nationalacademies.org/catalog/25734/multimodal-fare-payment-integration", year = 2020, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Academies of Sciences, Engineering, and Medicine", editor = "Joe Alper", title = "Informing Environmental Health Decisions Through Data Integration: Proceedings of a Workshop—in Brief", abstract = "Integrating large quantities of data from multiple, disparate sources can create new opportunities to understand complex environmental health questions. Currently, efforts are under way to develop methods to reliably integrate data from sources or designed experiments that are not traditionally used in environmental health research, such as electronic health records (EHRs), geospatial datasets, and crowd-based sources. However, combining new types and larger quantities of data to inform a specific decision also presents many new challenges. \n\nOn February 20\u201321, 2018, the National Academies of Sciences, Engineering, and Medicine held a workshop to explore the promise and potential pitfalls of environmental health data integration. The workshop brought together a multidisciplinary group of scientists, policy makers, risk assessors, and regulators to discuss the topic. This publication summarizes the presentations and discussions from the workshop.", url = "https://nap.nationalacademies.org/catalog/25139/informing-environmental-health-decisions-through-data-integration-proceedings-of-a", year = 2018, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", editor = "Joan D. Winston and Lynette I. Millett", title = "Summary of a Workshop on Software-Intensive Systems and Uncertainty at Scale", isbn = "978-0-309-10844-7", url = "https://nap.nationalacademies.org/catalog/11936/summary-of-a-workshop-on-software-intensive-systems-and-uncertainty-at-scale", year = 2007, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", title = "Information Technology Research, Innovation, and E-Government", isbn = "978-0-309-08401-7", abstract = "Governments have done much to leverage information technology to deploy e-government services, but much work remains before the vision of e-government can be fully realized. Information Technology Research, Innovation, and E-government examines the emerging visions for e-government, the technologies required to implement them, and approaches that can be taken to accelerate innovation and the transition of innovative information technologies from the laboratory to operational government systems. In many cases, government can follow the private sector in designing and implementing IT-based services. But there are a number of areas where government requirements differ from those in the commercial world, and in these areas government will need to act on its role as a \u201cdemand leader.\u201d Although researchers and government agencies may appear to by unlikely allies in this endeavor, both groups have a shared interest in innovation and meeting future needs. \nE-government innovation will require addressing a broad array of issues, including organization and policy as well as engineering practice and technology research and development, and each of these issues is considered in the book.\n", url = "https://nap.nationalacademies.org/catalog/10355/information-technology-research-innovation-and-e-government", year = 2002, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Academies of Sciences, Engineering, and Medicine", editor = "Lynette I. Millett and Baruch Fischhoff and Peter J. Weinberger", title = "Foundational Cybersecurity Research: Improving Science, Engineering, and Institutions", isbn = "978-0-309-45529-9", abstract = "Attaining meaningful cybersecurity presents a broad societal challenge. Its complexity and the range of systems and sectors in which it is needed mean that successful approaches are necessarily multifaceted. Moreover, cybersecurity is a dynamic process involving human attackers who continue to adapt. Despite considerable investments of resources and intellect, cybersecurity continues to poses serious challenges to national security, business performance, and public well-being. Modern developments in computation, storage and connectivity to the Internet have brought into even sharper focus the need for a better understanding of the overall security of the systems we depend on.\n\nFoundational Cybersecurity Research focuses on foundational research strategies for organizing people, technologies, and governance. These strategies seek to ensure the sustained support needed to create an agile, effective research community, with collaborative links across disciplines and between research and practice. This report is aimed primarily at the cybersecurity research community, but takes a broad view that efforts to improve foundational cybersecurity research will need to include many disciplines working together to achieve common goals.", url = "https://nap.nationalacademies.org/catalog/24676/foundational-cybersecurity-research-improving-science-engineering-and-institutions", year = 2017, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", title = "2001-2002 Assessment of the Army Research Laboratory", url = "https://nap.nationalacademies.org/catalog/18596/2001-2002-assessment-of-the-army-research-laboratory", year = 2003, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", editor = "Daniel Jackson and Martyn Thomas and Lynette I. Millett", title = "Software for Dependable Systems: Sufficient Evidence?", isbn = "978-0-309-10394-7", abstract = "The focus of Software for Dependable Systems is a set of fundamental principles that underlie software system dependability and that suggest a different approach to the development and assessment of dependable software.\n\nUnfortunately, it is difficult to assess the dependability of software. The field of software engineering suffers from a pervasive lack of evidence about the incidence and severity of software failures; about the dependability of existing software systems; about the efficacy of existing and proposed development methods; about the benefits of certification schemes; and so on. There are many anecdotal reports, which\u2014although often useful for indicating areas of concern or highlighting promising avenues of research\u2014do little to establish a sound and complete basis for making policy decisions regarding dependability. The committee regards claims of extraordinary dependability that are sometimes made on this basis for the most critical of systems as unsubstantiated, and perhaps irresponsible. This difficulty regarding the lack of evidence for system dependability leads to two conclusions: (1) that better evidence is needed, so that approaches aimed at improving the dependability of software can be objectively assessed, and (2) that, for now, the pursuit of dependability in software systems should focus on the construction and evaluation of evidence.\n\nThe committee also recognized the importance of adopting the practices that are already known and used by the best developers; this report gives a sample of such practices. Some of these (such as systematic configuration management and automated regression testing) are relatively easy to adopt; others (such as constructing hazard analyses and threat models, exploiting formal notations when appropriate, and applying static analysis to code) will require new training for many developers. However valuable, though, these practices are in themselves no silver bullet, and new techniques and methods will be required in order to build future software systems to the level of dependability that will be required.", url = "https://nap.nationalacademies.org/catalog/11923/software-for-dependable-systems-sufficient-evidence", year = 2007, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", editor = "John L. Hennessy and David A. Patterson and Herbert S. Lin", title = "Information Technology for Counterterrorism: Immediate Actions and Future Possibilities", isbn = "978-0-309-08736-0", abstract = "Information technology (IT) is essential to virtually all of the nation\u2019s critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation\u2019s communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks. \n", url = "https://nap.nationalacademies.org/catalog/10640/information-technology-for-counterterrorism-immediate-actions-and-future-possibilities", year = 2003, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "Transportation Research Board and National Academies of Sciences, Engineering, and Medicine", title = "Transit Security Update", abstract = "TRB's Transit Cooperative Research Program (TCRP) Synthesis 80: Transit Security Update explores transit-related counterterrorism and anti-crime security measures and practices; examines crime and security incident trends; and highlights other related topics, including major issues and obstacles to security and policing management. The report is an update to TCRP Synthesis of Transit Practice 21: Improving Transit Security, which did not address terrorism.", url = "https://nap.nationalacademies.org/catalog/23058/transit-security-update", year = 2008, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", title = "2003 Assessment of the Office of Naval Research's Marine Corps Science and Technology Program", isbn = "978-0-309-08981-4", abstract = "The Office of Naval Research (ONR) funds research across a broad range of scientific and engineering disciplines in support of the Navy and Marine Corps. To ensure that its investments are serving those ends and are of high quality, ONR requires each of its departments to undergo annual review. Since 1999, the Naval Expeditionary Warfare Department of ONR has requested that the NRC conduct these reviews. This report presents the results of the second review of the Marine Corps Science and Technology program. The first review was conducted in 2000. The 2003 assessment examines the overall Marine Corps S&T program, the littoral combat future naval capability, the core thrusts of the program, and basic research activities.", url = "https://nap.nationalacademies.org/catalog/10917/2003-assessment-of-the-office-of-naval-researchs-marine-corps-science-and-technology-program", year = 2004, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "Transportation Research Board and National Academies of Sciences, Engineering, and Medicine", editor = "Frank Barich and Leslie Ruiz and Rob Linstrum and Martin Leprohon and Patricia Ryan and Ron Hiscox and Wayne McCutcheon", title = "Toward a Touchless Airport Journey", abstract = "As technology continues to evolve, airports are seeking opportunities to create a touchless experience along the passenger journey. The COVID-19 pandemic has accelerated the need to eliminate many common touchpoints, which are potential points of disease transmission.The TRB Airport Cooperative Research Program's ACRP Research Report 241: Toward a Touchless Airport Journey presents solutions from emerging and existing technologies to nontechnological solutions. For each solution, the current level of readiness, barriers to expect in implementation, and specific tips on getting started are detailed. Also explored are technology gaps and the need for medium- and long-term solutions with further development opportunities that could minimize touchpoints.Supplemental to the report is Attachment A: Solutions Worksheet.", url = "https://nap.nationalacademies.org/catalog/26665/toward-a-touchless-airport-journey", year = 2022, publisher = "The National Academies Press", address = "Washington, DC" }