2 options
Computer networks, policies and applications / Carolynn M. Berger and Angela D. Streusse, editors.
- Format:
- Book
- Series:
- Computer science, technology and applications.
- Computer science, technology and applications
- Language:
- English
- Subjects (All):
- Computer networks.
- Telecommunication--Government policy--United States.
- Telecommunication.
- Internet--Social aspects--United States.
- Internet.
- Physical Description:
- 1 online resource (244 p.)
- Edition:
- 1st ed.
- Place of Publication:
- New York : Nova Science Publishers, c2011.
- Language Note:
- English
- Summary:
- This book presents current research in the study of computer networks, congressional policies and issues, as well as various applications and technologies powered by computers. Topics discussed include internet and computer-mediated technologies as new tools in the study of shyness; broadband internet access and the digital divide; bundling residential telephone, internet and video services; gender differences in high school internet coverage and ad hoc networks.
- Contents:
- Intro
- COMPUTER NETWORKS, POLICIES AND APPLICATIONS
- CONTENTS
- PREFACE
- Chapter 1 ACCESS TO BROADBAND NETWORKS*
- ABSTRACT
- INTRODUCTION
- WHAT DO WIRELINE BROADBAND NETWORKS LOOK LIKE?
- The Broadband Last Mile
- Broadband Network Providers' Proprietary IP Networks
- The Internet Backbone
- PARAMETERS AVAILABLE TO BROADBAND NETWORK PROVIDERS THAT CAN AFFECT END USERS' AND INDEPENDENT APPLICATIONS PROVIDERS' ACCESS TO THESE NETWORKS
- HOW MIGHT STRATEGIC BROADBAND NETWORK PROVIDER BEHAVIOR HARM CONSUMERS?
- PROPOSALS FOR GOVERNMENT POLICY ON ACCESS TO BROADBAND NETWORKS
- The FCC Broadband Policy Statement
- Internet Consumer Bill of Rights
- Network Neutrality
- ANTITRUST AND UNFAIR METHODS OF COMPETITION LAWS
- REFERENCES
- Chapter 2 BROADBAND INTERNET ACCESS AND THE DIGITAL DIVIDE: FEDERAL ASSISTANCE PROGRAMS*
- BACKGROUND
- Broadband in Rural and Underserved Areas[11]
- Federal Role
- State and Local Broadband Activities
- FEDERAL TELECOMMUNICATIONS DEVELOPMENT PROGRAMS
- The Universal Service Concept and the FCC[47]
- Universal Service and the Telecommunications Act of 1996
- The Schools and Libraries, and Rural Health Care Programs
- 1. The Schools and Libraries Program
- 2. The Rural Health Care Program
- The Telecommunications Development Fund
- Universal Service and Broadband
- Rural Utilities Service
- LEGISLATION IN THE 109TH CONGRESS
- LEGISLATION IN THE 110TH CONGRESS
- POLICY ISSUES
- Is Broadband Deployment Data Adequate?
- Is Federal Assistance for Broadband Deployment Premature or Inappropriate?
- Which Approach Is Best?
- Chapter3IMPLEMENTATIONANDEXPERIMENTATIONOFALAYER-2ARCHITECTUREFORINTERCONNECTINGHETEROGENEOUSADHOCNETWORKSTOTHEINTERNET
- Abstract
- 1.Introduction
- 2.NetworkModel
- 3.RelatedWork.
- 4.ProtocolDescriptions
- 4.1.OLSR
- 4.2.ARPProtocol
- 5.ProposedArchitecture
- 5.1.AdHocNodeSelf-configuration
- 5.2.GlobalInternetConnectivity
- 5.2.1.ConnectivityforOutgoingTraffic
- 5.2.2.ConnectivityforIncomingTraffic
- 5.2.3.MobilitySupport
- 6.ExperimentalResults
- 6.1.PerformanceConstraintsofInternetAccess
- 6.2.PerformanceConstraintswithMobility
- 7.ConcludingRemarks
- References
- Chapter 4 THE IMPACT OF LICENSE AGREEMENTS ON ACCESS TO INFORMATION: A CHALLENGE FOR ACADEMIC LIBRARIES
- SHIFT FROM PAPER TO ELECTRONIC RESOURCES
- RELEVANT COPYRIGHT PROVISIONS
- LICENSE AGREEMENTS
- IMPACTS AND CONSEQUENCES
- CONCLUSION
- Chapter 5 BUNDLING RESIDENTIAL TELEPHONE, INTERNET, AND VIDEO SERVICES: ISSUES FOR CONGRESS*
- THE MARKET FORCES DRIVING BUNDLING
- WIRELINE-OF BUNDLING STRATEGIES
- WIRELINE, WIRELESS, VIDEO BUNDLING STRATEGIES
- THE PRICING OF BUNDLED SERVICE OFFERINGS
- PUBLIC POLICY ISSUES CREATED BY BUNDLING
- Bundling and the Federal Universal Service Fund
- BUNDLING AND COMPETITION
- Chapter 6 THE POSITION OF DIRECTOR OF NATIONAL INTELLIGENCE: ISSUES FOR CONGRESS*
- CONGRESSIONAL PROPOSALS CONCERNING DNI POSITION
- DCI Budget-Related Responsibilities and Authorities under the National Security Act of 1947 Are Seen by Some as Limited
- Recent Interest in the Establishment of a DNI
- Senator Dianne Feinstein
- Senator Tom Daschle
- Senator Dianne Feinstein, Second Proposal
- Senator Bob Graham
- Representative Jane Harman
- Representative Porter Goss
- WHAT THE BILLS ARE DESIGNED TO ACCOMPLISH
- Feinstein and Graham Would Establish a DNI
- Feinstein and Graham Would Enhance DNI Budget-Related Responsibilities[13]
- Feinstein and Graham Would Strengthen DNI Budget and Personnel-Related Authorities.
- Feinstein and Graham Bills Silent on DNI Personnel Policies
- Daschle DNI Legislation Tracks Feinstein and Graham
- Harman Would Establish a DNI
- Harman Enhances DNI Budget-Related Responsibilities
- Harman Would Strengthen DNI Budget and Personnel-Related Authorities
- Harman Would Strengthen other Personnel Authorities
- Goss Legislation Would Not Establish DNI, but Instead Strengthen DCI
- Goss Would Appropriate NFIP Funds Directly to the DCI
- Goss Would Strengthen DCI Budget-Related Responsibilities
- Goss Would Enhance DCI Budget-Related Authorities
- Goss Would Strengthen DCI Reprogramming Authorities
- Goss Would Strengthen DCI Budget and Personnel Transfer Authorities
- Goss Would Strengthen DCI Personnel Authorities
- Goss Would Eliminate Restriction of DCI Control over Internal Security Functions
- ARGUMENTS OFFERED IN FAVOR OF ESTABLISHING A DNI
- ARGUMENTS OFFERED IN OPPOSITION TO ESTABLISHING A DNI
- HISTORY OF RECOMMENDATIONS TO CENTRALIZE AND STRENGTHEN IC LEADERSHIP
- Second Hoover Commission, 1955
- The Schlesinger Report, 1971
- Murphy Commission, 1975
- Church Committee, 1976
- Pike Committee, 1976
- Clifford/Cline Proposals, 1976
- Charter Legislation, 1978
- Executive Branch Orders, 1976-1981
- Boren-Mccurdy, 1992
- Aspin-Brown Commission, 1996
- Specter/Combest, 1996
- Scowcroft Commission, 2001
- The Joint Inquiry into September 11 Terrorist Attacks
- The 9/11 Commission
- APPENDIX 1. DNI LEGISLATION COMPARED TO CURRENT LAW
- Chapter 7 GENERAL MANAGEMENT LAWS AND THE 9/11 COMMISSION'S PROPOSED OFFICE OF NATIONAL INTELLIGENCE DIRECTOR (NID) AND NATIONAL COUNTERTERRORISM CENTER (NCTC)*
- Legislation to Restructure the Intelligence Community
- NID AND NCTC AND THE COVERAGE OF GENERAL MANAGEMENT LAWS.
- General Management Laws
- Table Showing Coverage of Laws
- Table Structure and Contents
- Summary of Findings
- Within the EOP
- Independent Entities
- Considerations Regarding Table Contents
- "Coverage" Versus "Application" of the Laws
- Coverage Sometimes Unclear
- Exemptions from Coverage
- Certain Provisions can Affect Coverage
- CONGRESS COULD INDICATE WHETHER MANAGEMENT LAWS COVER NID AND NCTC
- Amending the Management Laws
- Identification of Management Laws in Statute Creating NID/NCTC
- Evaluating Options: Standardization vs. Customization
- Chapter 8 THE ICT'S ACCEPTANCE: ANALYTICAL FRAMEWORK AND EMPIRICAL EXAMPLE
- 1. INTRODUCTION
- 2. BACKGROUND OF THE STUDY
- 3. CONCEPTUAL MODEL
- 3.1. The Impact of ICTs Acceptance
- 3.2. Motivational Factors
- 3.2.1. The Perceived Ease of Use
- 3.2.2. The Perceived Usefulness
- 3.2.3. The Perceived Enjoyment
- 3.2.4. The Social Pressure
- 3.3. Antecedents Factors
- 3.3.1. The Individual Level
- The Gender
- The Age
- The Education
- 3.3.2. The Organizational Level
- 4. METHODOLOGY
- 4.1. The Sample
- 4.2. The Survey Structure
- 4.2.1. The Antecedents
- 4.2.2. The Motivator Factors
- 4.2.3. Acceptance
- 4.2.4. Personal development
- 4.3. Data Analysis
- 5. DISCUSSION
- 5.1. Factors Affecting Attitudes toward ICTs Acceptance
- Results on Perceived Ease of Use
- Results on Perceived Usefulness
- Results on Perceived Enjoyment
- Results on Social Pressure
- 5.2. Factors Affecting ICTs Acceptance
- Results on Gender
- Results on Age
- Results on Education (Level and Discipline)
- Chapter 9 PRIVACY: GOVERNMENT USE OF DATA FROM INFORMATION RESELLERS COULD INCLUDE BETTER PROTECTIONS*
- WHY GAO DID THIS STUDY
- WHAT GAO RECOMMENDS
- WHAT GAO FOUND
- ABBREVIATIONS.
- Mr. Chairman and Members of the Subcommittee
- RESULTS IN BRIEF
- Federal Laws and Guidance Govern Use of Personal Information in Federal Agencies
- The Fair Information Practices Are Widely Agreed to Be Key Principles for Privacy Protection
- Agencies Used Governmentwide Contracts to Obtain Personal Information from Information Resellers for a Variety of Purposes
- DOJ and DHS Used Information Resellers Primarily for Law Enforcement and Counterterrorism
- SSA and State Used Information Resellers Primarily for Fraud Prevention and Detection
- Agencies Lacked Policies on Use of Reseller Data, and Practices Do Not Consistently Reflect the Fair Information Practices
- Limitations in the Applicability of the Privacy Act and Ambiguities in OMB Guidance Contributed to an Uneven Adherence to the Purpose Specification, Openness, and Individual Participation Principles
- Privacy Impact Assessments Could Address Openness and Purpose Specification Principles but often Were not Conducted
- Agencies Often Did Not Have Practices in Place to Ensure Accountability for Proper Handling of Information Reseller Data
- Not All Agencies Have Taken Steps to Address Our Recommendations
- Privacy Provisions of the Proposed Federal Agency Data Protection Act Are Consistent with Our Recommendations
- Chapter 10 INTERNET AND COMPUTER-MEDIATED TECHNOLOGIES AS NEW TOOLS IN THE STUDY OF SHYNESS: A REVIEW OF RECENT SURVEY- AND LABORATORY-BASED STUDIES
- SHYNESS AND SOCIAL COMMUNICATIVE BEHAVIOUR
- THE USE OF THE INTERNET AND COMPUTER TECHNOLOGIES AS NEW TOOLS TO STUDY SHYNESS: RECENT SURVEY AND LABORATORY-BASED STUDIES
- SHYNESS AND THE INTERNET: SURVEY STUDIES
- SHYNESS AND THE INTERNET: LABORATORY STUDIES
- CONCLUSIONS, IMPLICATIONS, AND FUTURE DIRECTIONS
- ACKNOWLEDGMENTS
- REFERENCES.
- Chapter 11 ONLINE BUT OFF-BALANCE: GENDER DIFFERENCES IN HIGH SCHOOL INTERNET COVERAGE.
- Notes:
- Description based upon print version of record.
- Includes bibliographical references and index.
- Description based on print version record.
- ISBN:
- 1-61470-794-4
- OCLC:
- 761307709
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.