Skip to main content

Search results for "police department"

Filters: Computers and Information Technology Computers and Information Technology ×
Viewing 1 - 20 of 20 results by relevance

Protecting Individual Privacy in Evaluation Research  (1975)

Summary of a Forum on Spectrum Management Policy Reform  (2004)

Proceedings

Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext: Proceedings of a Workshop  (2016)

Consensus Study Report

Decrypting the Encryption Debate: A Framework for Decision Makers  (2018)

Cryptography's Role in Securing the Information Society  (1996)

Proceedings

Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop  (2016)

Consensus Study Report

Who Goes There?: Authentication Through the Lens of Privacy  (2003)

Consensus Study Report

Information Technology for Counterterrorism: Immediate Actions and Future Possibilities  (2003)

Consensus Study Report

Fostering Responsible Computing Research: Foundations and Practices  (2022)

Proceedings

Technical, Business, and Legal Dimensions of Protecting Children from Pornography on the Internet: Proceedings of a Workshop  (2002)

Rights and Responsibilities of Participants in Networked Communities  (1994)

Applying Advanced Information Systems to Ports and Waterways Management  (1999)

Consensus Study Report

Engaging Privacy and Information Technology in a Digital Age  (2007)

Proceedings

Summary of a Workshop on Using Information Technology to Enhance Disaster Management  (2005)

Consensus Study Report

Facial Recognition Technology: Current Capabilities, Future Prospects, and Governance  (2024)

Consensus Study Report

Improving Disaster Management: The Role of IT in Mitigation, Preparedness, Response, and Recovery  (2007)

Proceedings

Geotargeted Alerts and Warnings: Report of a Workshop on Current Knowledge and Research Gaps  (2013)

Proceedings

The Mathematical Sciences' Role in Homeland Security: Proceedings of a Workshop  (2004)

Consensus Study Report

Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment  (2008)

Consensus Study Report

Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities  (2009)