My Account Log in

2 options

Computer networks, policies and applications / Carolynn M. Berger and Angela D. Streusse, editors.

EBSCOhost Academic eBook Collection (North America) Available online

View online

Ebook Central Academic Complete Available online

View online
Format:
Book
Contributor:
Berger, Carolynn M.
Streusse, Angela D.
Series:
Computer science, technology and applications.
Computer science, technology and applications
Language:
English
Subjects (All):
Computer networks.
Telecommunication--Government policy--United States.
Telecommunication.
Internet--Social aspects--United States.
Internet.
Physical Description:
1 online resource (244 p.)
Edition:
1st ed.
Place of Publication:
New York : Nova Science Publishers, c2011.
Language Note:
English
Summary:
This book presents current research in the study of computer networks, congressional policies and issues, as well as various applications and technologies powered by computers. Topics discussed include internet and computer-mediated technologies as new tools in the study of shyness; broadband internet access and the digital divide; bundling residential telephone, internet and video services; gender differences in high school internet coverage and ad hoc networks.
Contents:
Intro
COMPUTER NETWORKS, POLICIES AND APPLICATIONS
CONTENTS
PREFACE
Chapter 1 ACCESS TO BROADBAND NETWORKS*
ABSTRACT
INTRODUCTION
WHAT DO WIRELINE BROADBAND NETWORKS LOOK LIKE?
The Broadband Last Mile
Broadband Network Providers' Proprietary IP Networks
The Internet Backbone
PARAMETERS AVAILABLE TO BROADBAND NETWORK PROVIDERS THAT CAN AFFECT END USERS' AND INDEPENDENT APPLICATIONS PROVIDERS' ACCESS TO THESE NETWORKS
HOW MIGHT STRATEGIC BROADBAND NETWORK PROVIDER BEHAVIOR HARM CONSUMERS?
PROPOSALS FOR GOVERNMENT POLICY ON ACCESS TO BROADBAND NETWORKS
The FCC Broadband Policy Statement
Internet Consumer Bill of Rights
Network Neutrality
ANTITRUST AND UNFAIR METHODS OF COMPETITION LAWS
REFERENCES
Chapter 2 BROADBAND INTERNET ACCESS AND THE DIGITAL DIVIDE: FEDERAL ASSISTANCE PROGRAMS*
BACKGROUND
Broadband in Rural and Underserved Areas[11]
Federal Role
State and Local Broadband Activities
FEDERAL TELECOMMUNICATIONS DEVELOPMENT PROGRAMS
The Universal Service Concept and the FCC[47]
Universal Service and the Telecommunications Act of 1996
The Schools and Libraries, and Rural Health Care Programs
1. The Schools and Libraries Program
2. The Rural Health Care Program
The Telecommunications Development Fund
Universal Service and Broadband
Rural Utilities Service
LEGISLATION IN THE 109TH CONGRESS
LEGISLATION IN THE 110TH CONGRESS
POLICY ISSUES
Is Broadband Deployment Data Adequate?
Is Federal Assistance for Broadband Deployment Premature or Inappropriate?
Which Approach Is Best?
Chapter3IMPLEMENTATIONANDEXPERIMENTATIONOFALAYER-2ARCHITECTUREFORINTERCONNECTINGHETEROGENEOUSADHOCNETWORKSTOTHEINTERNET
Abstract
1.Introduction
2.NetworkModel
3.RelatedWork.
4.ProtocolDescriptions
4.1.OLSR
4.2.ARPProtocol
5.ProposedArchitecture
5.1.AdHocNodeSelf-configuration
5.2.GlobalInternetConnectivity
5.2.1.ConnectivityforOutgoingTraffic
5.2.2.ConnectivityforIncomingTraffic
5.2.3.MobilitySupport
6.ExperimentalResults
6.1.PerformanceConstraintsofInternetAccess
6.2.PerformanceConstraintswithMobility
7.ConcludingRemarks
References
Chapter 4 THE IMPACT OF LICENSE AGREEMENTS ON ACCESS TO INFORMATION: A CHALLENGE FOR ACADEMIC LIBRARIES
SHIFT FROM PAPER TO ELECTRONIC RESOURCES
RELEVANT COPYRIGHT PROVISIONS
LICENSE AGREEMENTS
IMPACTS AND CONSEQUENCES
CONCLUSION
Chapter 5 BUNDLING RESIDENTIAL TELEPHONE, INTERNET, AND VIDEO SERVICES: ISSUES FOR CONGRESS*
THE MARKET FORCES DRIVING BUNDLING
WIRELINE-OF BUNDLING STRATEGIES
WIRELINE, WIRELESS, VIDEO BUNDLING STRATEGIES
THE PRICING OF BUNDLED SERVICE OFFERINGS
PUBLIC POLICY ISSUES CREATED BY BUNDLING
Bundling and the Federal Universal Service Fund
BUNDLING AND COMPETITION
Chapter 6 THE POSITION OF DIRECTOR OF NATIONAL INTELLIGENCE: ISSUES FOR CONGRESS*
CONGRESSIONAL PROPOSALS CONCERNING DNI POSITION
DCI Budget-Related Responsibilities and Authorities under the National Security Act of 1947 Are Seen by Some as Limited
Recent Interest in the Establishment of a DNI
Senator Dianne Feinstein
Senator Tom Daschle
Senator Dianne Feinstein, Second Proposal
Senator Bob Graham
Representative Jane Harman
Representative Porter Goss
WHAT THE BILLS ARE DESIGNED TO ACCOMPLISH
Feinstein and Graham Would Establish a DNI
Feinstein and Graham Would Enhance DNI Budget-Related Responsibilities[13]
Feinstein and Graham Would Strengthen DNI Budget and Personnel-Related Authorities.
Feinstein and Graham Bills Silent on DNI Personnel Policies
Daschle DNI Legislation Tracks Feinstein and Graham
Harman Would Establish a DNI
Harman Enhances DNI Budget-Related Responsibilities
Harman Would Strengthen DNI Budget and Personnel-Related Authorities
Harman Would Strengthen other Personnel Authorities
Goss Legislation Would Not Establish DNI, but Instead Strengthen DCI
Goss Would Appropriate NFIP Funds Directly to the DCI
Goss Would Strengthen DCI Budget-Related Responsibilities
Goss Would Enhance DCI Budget-Related Authorities
Goss Would Strengthen DCI Reprogramming Authorities
Goss Would Strengthen DCI Budget and Personnel Transfer Authorities
Goss Would Strengthen DCI Personnel Authorities
Goss Would Eliminate Restriction of DCI Control over Internal Security Functions
ARGUMENTS OFFERED IN FAVOR OF ESTABLISHING A DNI
ARGUMENTS OFFERED IN OPPOSITION TO ESTABLISHING A DNI
HISTORY OF RECOMMENDATIONS TO CENTRALIZE AND STRENGTHEN IC LEADERSHIP
Second Hoover Commission, 1955
The Schlesinger Report, 1971
Murphy Commission, 1975
Church Committee, 1976
Pike Committee, 1976
Clifford/Cline Proposals, 1976
Charter Legislation, 1978
Executive Branch Orders, 1976-1981
Boren-Mccurdy, 1992
Aspin-Brown Commission, 1996
Specter/Combest, 1996
Scowcroft Commission, 2001
The Joint Inquiry into September 11 Terrorist Attacks
The 9/11 Commission
APPENDIX 1. DNI LEGISLATION COMPARED TO CURRENT LAW
Chapter 7 GENERAL MANAGEMENT LAWS AND THE 9/11 COMMISSION'S PROPOSED OFFICE OF NATIONAL INTELLIGENCE DIRECTOR (NID) AND NATIONAL COUNTERTERRORISM CENTER (NCTC)*
Legislation to Restructure the Intelligence Community
NID AND NCTC AND THE COVERAGE OF GENERAL MANAGEMENT LAWS.
General Management Laws
Table Showing Coverage of Laws
Table Structure and Contents
Summary of Findings
Within the EOP
Independent Entities
Considerations Regarding Table Contents
"Coverage" Versus "Application" of the Laws
Coverage Sometimes Unclear
Exemptions from Coverage
Certain Provisions can Affect Coverage
CONGRESS COULD INDICATE WHETHER MANAGEMENT LAWS COVER NID AND NCTC
Amending the Management Laws
Identification of Management Laws in Statute Creating NID/NCTC
Evaluating Options: Standardization vs. Customization
Chapter 8 THE ICT'S ACCEPTANCE: ANALYTICAL FRAMEWORK AND EMPIRICAL EXAMPLE
1. INTRODUCTION
2. BACKGROUND OF THE STUDY
3. CONCEPTUAL MODEL
3.1. The Impact of ICTs Acceptance
3.2. Motivational Factors
3.2.1. The Perceived Ease of Use
3.2.2. The Perceived Usefulness
3.2.3. The Perceived Enjoyment
3.2.4. The Social Pressure
3.3. Antecedents Factors
3.3.1. The Individual Level
The Gender
The Age
The Education
3.3.2. The Organizational Level
4. METHODOLOGY
4.1. The Sample
4.2. The Survey Structure
4.2.1. The Antecedents
4.2.2. The Motivator Factors
4.2.3. Acceptance
4.2.4. Personal development
4.3. Data Analysis
5. DISCUSSION
5.1. Factors Affecting Attitudes toward ICTs Acceptance
Results on Perceived Ease of Use
Results on Perceived Usefulness
Results on Perceived Enjoyment
Results on Social Pressure
5.2. Factors Affecting ICTs Acceptance
Results on Gender
Results on Age
Results on Education (Level and Discipline)
Chapter 9 PRIVACY: GOVERNMENT USE OF DATA FROM INFORMATION RESELLERS COULD INCLUDE BETTER PROTECTIONS*
WHY GAO DID THIS STUDY
WHAT GAO RECOMMENDS
WHAT GAO FOUND
ABBREVIATIONS.
Mr. Chairman and Members of the Subcommittee
RESULTS IN BRIEF
Federal Laws and Guidance Govern Use of Personal Information in Federal Agencies
The Fair Information Practices Are Widely Agreed to Be Key Principles for Privacy Protection
Agencies Used Governmentwide Contracts to Obtain Personal Information from Information Resellers for a Variety of Purposes
DOJ and DHS Used Information Resellers Primarily for Law Enforcement and Counterterrorism
SSA and State Used Information Resellers Primarily for Fraud Prevention and Detection
Agencies Lacked Policies on Use of Reseller Data, and Practices Do Not Consistently Reflect the Fair Information Practices
Limitations in the Applicability of the Privacy Act and Ambiguities in OMB Guidance Contributed to an Uneven Adherence to the Purpose Specification, Openness, and Individual Participation Principles
Privacy Impact Assessments Could Address Openness and Purpose Specification Principles but often Were not Conducted
Agencies Often Did Not Have Practices in Place to Ensure Accountability for Proper Handling of Information Reseller Data
Not All Agencies Have Taken Steps to Address Our Recommendations
Privacy Provisions of the Proposed Federal Agency Data Protection Act Are Consistent with Our Recommendations
Chapter 10 INTERNET AND COMPUTER-MEDIATED TECHNOLOGIES AS NEW TOOLS IN THE STUDY OF SHYNESS: A REVIEW OF RECENT SURVEY- AND LABORATORY-BASED STUDIES
SHYNESS AND SOCIAL COMMUNICATIVE BEHAVIOUR
THE USE OF THE INTERNET AND COMPUTER TECHNOLOGIES AS NEW TOOLS TO STUDY SHYNESS: RECENT SURVEY AND LABORATORY-BASED STUDIES
SHYNESS AND THE INTERNET: SURVEY STUDIES
SHYNESS AND THE INTERNET: LABORATORY STUDIES
CONCLUSIONS, IMPLICATIONS, AND FUTURE DIRECTIONS
ACKNOWLEDGMENTS
REFERENCES.
Chapter 11 ONLINE BUT OFF-BALANCE: GENDER DIFFERENCES IN HIGH SCHOOL INTERNET COVERAGE.
Notes:
Description based upon print version of record.
Includes bibliographical references and index.
Description based on print version record.
ISBN:
1-61470-794-4
OCLC:
761307709

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account