The National Academies: Advisers to the Nation on Science, Engineering, and Medicine
NATIONAL ACADEMY OF SCIENCES NATIONAL ACADEMY OF ENGINEERING INSTITUTE OF MEDICINE NATIONAL RESEARCH COUNCIL
Current Operating Status
CSTB Publications

Listed by Title (with Descriptions)

A   B   C   D   E   F   G   H   I   J   K   L   M   N  
O   P   Q   R   S   T   U   V   W   X   Y   Z  
Letter Reports   White Papers

For another view of CSTB's publications, see any of the following indices:

A:

Academic Careers for Experimental Computer Scientists and Engineers (1994)
This report deals primarily with the career tracks of regular faculty members in experimental computer science and engineering, i.e., faculty who are eligible for tenure and have a mix of regular research and teaching responsibilities. It provides a guide to university administrators, explaining the nature of experimental computer science, its focus on artifacts, the time involved in artifact development, the role of collaboration among researchers, and the nature of preferred publication outlets.
Ada and Beyond: Software Policies for the Department of Defense (1997)
This report addresses the evolution of the Ada language in the context of the evolution of the commercial software market, making recommendations to DOD about how to address the choice of programming language in its requirements for software. The report was cited in a summer 1997 change (relaxation) of the Ada policy by DOD's ASD/C3I.
Antennas, Satellite Broadcasting, and Emergency Preparedness for the Voice of America (1988) [Board on Telecommunications and Computer Applications]

Asking the Right Questions About Electronic Voting (2005)
articulates important questions and issues that election officials, policy makers, and informed citizens should ask concerning the use of computers and information technology (IT) in the electoral process.

B:

Being Fluent with Information Technology (1999)
Authored by a CSTB committee including computer scientists, a cognitive scientist, and a labor expert, this practical report describes an intellectual framework for fluency with information technology. It addresses implementation and describes how to build a curriculum to increase and promote fluency with information technology among college students, an important step in increasing fluency for all.
Beyond FTS2000: A Program for Change (1989) [Board on Telecommunications and Computer Applications]

Beyond Productivity: Information Technology, Innovation, and Creativity (2003)
This report examines the dynamic intersection of information technology with the world of the arts and design. This intersection has already yielded results of significant cultural and economic value, including innovative architectural and product designs, computer animated films, computer music, computer games, interactive art installations, cross-cultural experimentation, and Web-based texts. However, many opportunities for new collaborative ventures remain to be explored.
Broadband: Bringing Home the Bits (2001)
Combining technical, economic, and policy insights, this report examines what broadband is, how its deployment and use have been growing, and what it would take to realize the promise of a technology that has diffused slower than some had expected.
Building a Workforce For the Information Economy (2001)
A comprehensive assessment of the information technology workforce and labor market, this report presents in one place a wide range of information useful for understanding IT workforce availability issues while explaining the shortcomings of that information and the range of inferences that can and cannot be made from it. Requested by Congress and motivated by debate about H1-b visas, the report examines employer and worker perspectives, the role of foreign labor in meeting U.S. employer needs, and a range of employer and employee actions and options that affect the fit between supply and demand in this much-discussed and much-misunderstood group of occupations.
Building an Electronic Records Archive at NARA: Recommendations for a Long-Term Strategy (2005)
examines several important long-term issues in archiving electronic records, including coping with technological change, reengineering archival processes for electronic records, partnering with other institutions, broadening research interactions, and assuring record integrity and authenticity.
Building an Electronic Records Archive at the National Archives and Records Administration: Recommendations for Initial Development (2003)
This report examines the role of the agency in the archiving and preservation of federal records including those that are 'born digital' such as e-mails and Web sites. This first report from the committee provides an assessment of NARA's current activities and recommendations for its Electronic Records Archive (ERA) program.

C:

Catalyzing Inquiry at the Interface of Computing and Biology (2005)
provides a high-level intellectual structure for Federal agencies for supporting work at the biology/computing interface, and seeks to establish the intellectual legitimacy of a fundamentally cross-disciplinary collaboration between biologists and computer scientists.
The Changing Nature of Telecommunications/Information Infrastructure (1995)
Based on a CSTB workshop hosted on October 12-13, 1993, this report assesses the extraordinary changes in the nation's telecommunications and information infrastructures since the divestiture of AT&T and addresses related questions of technology and policy, including the evolution of attitudes toward and approaches to regulation as well as how economic and social activities inspire development and use of new technology (subject to the constraint of investment in developing and deploying that technology).
Computer Science: Reflections on the Field, Reflections from the Field (2004)
provides a concise characterization of key ideas that lie at the core of computer science (CS) research together with two dozen essays on diverse aspects of CS research and what motivates and excites CS researchers.
Computers at Risk: Safe Computing in the Information Age (1991)
This report has become an enduring primer for information security, explaining key concepts and terms and outlining the technology and procedures that give rise to and can alleviate security problems. It relates security to complementary concerns such as privacy and safety. It describes the private and public sector institutional contexts and makes recommendations that continue to be revisited, including in the late-1990s explorations of "critical infrastructure protection." The report inspired private sector and government activity that continued through the 1990s.
Computing and Communications in the Extreme: Research for Crisis Management and Other Applications (1996)
This report describes crisis management and explains the current and potential role of information technology therein, culminating in research recommendations. Building on a workshop series, the project led to changes in research direction by some participants and programmatic developments in government. It became the proof of concept for the federal "Digital Government" program, aimed at motivating computer science research relevant to problems faced by government mission agencies.
Computing and Molecular Biology: Mapping and Interpreting Biological Information (1991)
This workshop was designed to interest young researchers in computing and in biology in research at the intersection of these fields.
Computing and the Humanities: Summary of a Roundtable Meeting (1998)
A summary of a lively roundtable discussion held in March 1997 among computer scientists and humanists was published by the American Council of Learned Societies. It has become the most-requested ACLS occasional paper. It has also become the inspiration for a series of activities, including the coordinated Building Blocks workshops and integrating conferences, under the aegis of the National Institute for a Networked Cultural Heritage and for the CSTB project on Information Technology and Creativity. The original report and ensuing activities have explored areas of common interest among computer science and the humanities, with an interest in inspiring computer science research that relates to humanities challenges and opportunities.
Computing Professionals: Changing Needs for the 1990s (1993)
Based on a workshop held October 28-29, 1991, CSTB and OSEP released a report aimed at better understanding the human resource base of the computing professions. At the time, it was the only comprehensive consideration of demand and supply for computing professionals. It illuminated a variety of analytical difficulties while giving voice to multiple perspectives from industry and academia on the issue.
Computing the Future: A Broader Agenda for Computer Science and Engineering (1992)
The report is a comprehensive examination of computer science and engineering as a discipline. Its release coincided with the maturation of the High Performance Computing and Communications Initiative, which amplified long-standing differences of opinion within the research community about the nature and role of research relating to applications.
Continued Review of the Tax Systems Modernization of the Internal Revenue Service (1994)
This report was transmitted to the IRS in December 1995. It culminates 5 years of effort in three phases, and is the sixth report produced in that period. The committee chairman testified before a Senate committee on March 26 (accompanied by committee member, Al Irvine) and on September 10, 1996, and before a House subcommittee on March 28, 1996, following which he briefed OMB/OIRA staff. The report was cited explicitly in opening remarks in these and other hearings, as well as in questioning. There was substantial mention in the trade press, plus coverage in The Washington Post and on CNN.
Critical Information Infrastructure Protection and the Law: An Overview of Key Issues (2003)
This report outlines the legal and business issues associated with the protection of information infrastructures. These issues include incentives and disincentives for information sharing between the public and private sectors, and the role of FOIA and antitrust laws as a barrier or facilitator to progress. The report also provides a preliminary analysis of the role of criminal law, liability law, and the establishment of best practices, in encouraging various stakeholders to secure their computer systems and networks.
Critical Issues in NASA Information Systems (1987) [Board on Telecommunications and Computer Applications]

Crossroads of Information Technology Standards (1990) [Board on Telecommunications and Computer Applications]

Cryptography's Role in Securing the Information Society (1996)
This report, covered extensively by the press, is hailed as a landmark study and appreciated for its comprehensive packaging of relevant materials. It describes the growing importance of encryption, relating government interests to interests in the spread and control of encryption and recommending policy changes.
Cybersecurity of Freight Information Systems: A Scoping Study (2003)
This report outlines the research necessary to strengthen the security of freight information systems, which facilitate the efficient movement and delivery of goods and materials. This report was produced by CSTB and the Transportation Research Board.
Cybersecurity Today and Tomorrow: Pay Now or Pay Later (2002)
A synthesis of highlights from past CSTB security reports, this brief report focuses on issue identification and practical guidance. Though the most recent of the reports was issued 2 years ago and the oldest 10 years ago, not much has changed with respect to security as it is practiced. The unfortunate reality is that relative to the magnitude of the threat, our ability and willingness to deal with threats has, on balance, changed for the worse, making many of the analyses, findings and recommendations of these reports all the more relevant and timely today.

D:

Defense Logistics Modernization: An Opportunity for Excellence (1989) [Board on Telecommunications and Computer Applications]

Defining a Decade: Envisioning CSTB's Second 10 Years (1997)
Capturing the discussions at CSTB's tenth anniversary symposium, this report is a lively presentation of issues, trends, and perspectives; it is a readable overview of information technology.
The Digital Dilemma: Intellectual Property in the Information Age (2000)
This report discusses the complex labyrinth of technology, law, economics, social science, and public policy that shapes digital intellectual property, with an emphasis on copyright. Describing profound differences in outlook among stakeholders, it illuminates the major policy issues relating to intellectual property in the networked environment, distinguishes among the more and less tractable issues, and offers recommendations. Specific issues examined include the implications of digital intellectual property for fair use, private use, public access and archiving, technical protection mechanisms, business models, and much more.

E:

Elements of Systems Modernization for the Social Security Administration (1991)
This project examined how SSA was using and could use information technology to meet its very information-intensive mission. The committee's reports went beyond consideration of technology per se to challenge the agency to think through what it wanted to do first and then derive its technology plans. They also illuminated challenges and options relating to privacy and security.
Embedded, Everywhere: A Research Agenda for Networked Systems of Embedded Computers (2001)
This report examines the implications of heterogeneous, sensor-rich computational and communications devices embedded throughout the environment. It describes the research necessary to achieve robust, scalable, networked, embedded computing systems (EmNets), which operate under a unique set of constraints and present fundamental new research challenges. A comprehensive, systems-oriented research agenda is presented along with recommendations to major federal funding agencies.
Engaging Privacy and Information Technology in a Digital Age (2007)
This report examines how threats to privacy are evolving, ongoing information technology trends, and how society can balance the interests of individuals, businesses, and government in ways that promote privacy reasonably and efficiently.
The Evolution of Untethered Communications (1997)
An examination of wireless and mobile communications technology trends and challenges, this report characterizes the vibrant commercial marketplace, trends and barriers to progress, and recommendations for DOD to better leverage commercial wireless goods and services via research and procurement. The impetus was the DARPA GloMo (global-mobile) program.
Evolving the High Performance Computing and Communications Initiative to Support the Nation's Information Infrastructure (1995)
Undertaken to assess the HPCC program, the report describes the rationale for the initiative as an engine of U.S. leadership in information technology and outlines the contributions of ongoing publicly funded research to past and current progress in developing computing and communications technology. It describes and evaluates the HPCCI's goals, accomplishments, management, and planning, and it makes recommendations aimed at ensuring continuing U.S. leadership in information technology.

F:

Fair Weather: Effective Partnerships in Weather and Climate Services (2003)
This report recommends that the National Weather Service continue to issue general forecasts and provide unrestricted access to observational data and model results, even though private companies also produce weather forecasts. However, the NWS should come up with a new process for deciding whether a particular forecast or weather product should be created by the NWS or the private sector. This report was produced by the Board on Earth Sciences and Resources in association with the Board on Atmospheric Sciences and Climate and CSTB.
For the Record: Protecting Electronic Health Information (1997)
This report, drawing on both medical community members and computer scientists, explores the systemic nature of health-care information flows and the range of technical and procedural options for enhancing patient privacy. Prepublication release in March 1997 generated considerable media coverage, including 3 pieces in The New York Times within a week. Report recommendations factor into ongoing drafting of legislation as well as deliberations in DHHS and in the health care community.
Fostering Research on the Economic and Social Impacts of Information Technology (1998)
This report provides a framework for studying a wide range of questions about how people use, influence, and are affected by the Internet and information technology generally. It is a guide to thinking about the implications of electronic commerce, the digitization of all kinds of information, and the notion of a digital divide.
Funding a Revolution: Government Support for Computing Research (1999)
The report reviews the history of innovation in computing and related communications technologies, identifying factors contributing to the nation's success in the field, illuminating the role of the federal government in funding computer research, and relating government support to developments in the private sector. Launched with a prepublication briefing November 9, 1998, it has informed discussions on proposals for increased federal funding for information technology and has been the subject of congressional testimony.
The Future of Supercomputing: An Interim Report (2003)
This report provides a preliminary outline of the state of U.S. supercomputing today, the needs for the future, and the factors that contribute to meeting those needs.

G:

Getting up to Speed: The Future of Supercomputing (2004)
This report examines U.S. needs for supercomputing and recommends a long-term strategy for government support of high-performance computing research and development.
Global Networks and Local Values: A Comparative Look at Germany and the United States (2001)
This report focuses on the relationship between global information networks and local values (political, economic, and cultural norms). The book is structured around a comparison between U.S. and German approaches toward global communication and information flow. (The U.S. and Germany are selected as two industrialized, highly networked countries with significant social differences.) Highlighting specific issues such as taxation, privacy, free speech, and more, this thoughtful volume will be of interest to everyone concerned about the social implications of the global Internet.
Global Trends in Computer Technology and Their Impact on Export Control (1988)
This report describes comprehensively trends in the development of information technologies in Western nations and compared them to trends in the so-called East Bloc, characterizing growing difficulties in controlling unwanted technology transfer. Providing a middle ground between Departments of Commerce, Defense, and State positions, it contributed to relaxation of supercomputer export controls.
Growing Vulnerability of the Public Switched Networks: Implications for National Security Emergency Preparedness (1989) [Board on Telecommunications and Computer Applications]


I:

IDs -- Not That Easy: Questions About Nationwide Identity Systems (2002)
Undertaken in response to post-September 11, 2002 proposals for national ID cards, this brief report highlights some of the challenging policy, procedural, and technological issues presented by nationwide identity systems. Its goal is to raise the level of discussion among policymakers and stakeholders about whether such systems are desirable or feasible.
Improving Disaster Management: The Role of IT in Mitigation, Preparedness, Response, and Recovery (2007)
This report examines information technology's as-yet unrealized potential to improve how communities and the nation handle disasters and describes payoffs for disaster management that include more robust and interoperable communications, improved situational awareness and decision support, greater organizational agility, and enhanced engagement of the public.
Information Technology and Manufacturing: A Preliminary Report on Research Needs (1993)

Information Technology for Counterterrorism: Immediate Actions and Future Possibilities (2003)
This report identifies potentially significant risks to the nation's citizens and assets with information technology. The report provides an assessment of near-term actions that can be taken to counter these threats based on currently available science and technology. It identifies opportunities for R&D to further reduce the nation's vulnerability or increase its capacity to respond to terrorist threats or attacks.
Information Technology for Manufacturing: A Research Agenda (1995)
The report describes the role of information technology in all aspects of manufacturing -- design, fabrication/production, management and complementary functions -- and it emphasizes IT-related research in product/process design, shop floor operations, factory modeling and simulation, and information infrastructure.
Information Technology in the Service Society: A Twenty-First Century Lever (1994)
This report addresses macroeconomic, industry, enterprise, and management issues.
Information Technology Research for Crisis Management (1999)
This summary of a December 1998 workshop examines how information technology can contribute to more-effective response and recovery efforts to crises such as natural disasters or terrorist attacks, as well as to mitigation and preparedness in order to reduce the impact of these events.
Information Technology Research for Federal Statistics (2000)
A workshop on federal statistical programs, convened in February 1999 by CSTB, brought together federal statistics program managers, statisticians, and members of the computing and communications research community to discuss how to leverage information technology to satisfy the requirements of statistics programs.
Information Technology Research, Innovation, and E-Government (2002)
Although government has done much to leverage information technology to deploy e-government services, much work remains before the vision of e-government is fully realized. This, the final report from CSTB's digital government project, describes areas where government is a "demand leader" for information technology, explores the roles of IT researchers in e-government innovation, and discusses approaches that can help accelerate innovation and foster the transition of innovative technologies from the lab to operational systems.
Innovation in Information Technology (2003)
This report builds on several CSTB reports to explain the what and why of information technology (IT) research. It features a 2003 update of the "tire tracks" diagram first published in CSTB's 1995 Brooks-Sutherland report, which depicts the critical role that university research has played in the development of many billion-dollar IT industries.
Intellectual Property Issues in Software (1991)
The report presents a range of technical, legal, and policy issues building on dynamic interactions among technologists and intellectual property attorneys at a workshop and forum. A lively educational vehicle, it led some participants to alter their professional activities to focus further on these issues.
Interim Report on Air Force Base Level Automation Environment (1986) [Board on Telecommunications and Computer Applications]

Interim Report On the Status of the High Performance Computing and Communications Initiative (1994)
This interim report focused on the high-performance computing portion of the HPCCI program.
The Internet Under Crisis Conditions: Learning from September 11 (2002)
Although secondary to the human tragedy resulting from the September 11, 2001, attacks on the World Trade Center and the Pentagon, telecommunications issues were significant in terms of both infrastructure damage and the role of communications in mounting response and recovery efforts. As the Internet has come to be a major component of the nation's (and the world's) communications and information infrastructure there is interest in understanding how the Internet performed and was used following the attacks. This report presents an assessment of how the Internet fared, lessons learned from the experience, and how the Internet might play a greater role in responding to future crises.
The Internet's Coming of Age (2001)
The latest in CSTB's series of penetrating analyses of the evolution of the Internet, this book explains basic design choices that underlie the Internet's success, evaluates current and prospective technical, operational, and management challenges, and explores the resulting implications for decision makers. It illuminates areas where public policy may become more important while presenting arguments against premature or transplanted regulatory approaches. Released at a public briefing, it has been circulated among policy makers and in the technical community. It received broad press coverage, in part due to a wire-service story that focused on the social-impact elements.
IT Roadmap to a Geospatial Future (2002)
This report focuses computer science research on the challenges associated with rapid proliferation of geospatial information. Based on an October 2001 workshop, it illuminates interdisciplinary, coordinated research opportunities in location-aware computing, databases and data mining, and visualization and human-computer interaction.
ITCP: Information Technology and Creative Practices (brochure) (2004)
This 10-page pamphlet provides a brief summary of the groundbreaking report Beyond Productivity: Information Technology, Innovation, and Creativity (2003) and showcases some current examples of projects at the intersection of IT and the arts and design. It is designed to engage the academic community, government agencies, industry, arts organizations, and individual creative practitioners in thinking about how best to foster ITCP work.

J:

Japanese to English Machine Translation: Report of a Symposium (1990)
Report of a December 7, 1989, symposium jointly organized with the Office of Japan Affairs.

K:

Keeping the U.S. Computer and Communications Industry Competitive: Convergence of Computing, Communications, and Entertainment (1995)
This report, third in a series, explores the broader integration of information processing, communications, and generation that is reflected in the convergence of computing, communications, and entertainment. In addition to discussing conditions, opportunities, and risks for competitiveness, it also addresses implications of the subject technologies and their uses for the daily lives of citizens.
Keeping the U.S. Computer Industry Competitive: Defining the Agenda (1990)
Report on a May 22-23, 1989, colloquium. First in CSTB's competitiveness series, it provided an overview of the computing industry, including hardware, software, and services.
Keeping the U.S. Computer Industry Competitive: Systems Integration (1992)
This report, based on a January 1991 colloquium, describes successes, strengths, opportunities, and challenges in this vital area.

L:

LC21: A Digital Strategy for the Library of Congress (2000)
Libraries, archives, and publishers are perhaps most affected by the digital revolution; this report addresses their issues with a focus on the Library of Congress' needs to modernize its technology and the role that the Library could and should play in the larger community.
Looking Over the Fence at Networks: A Neighbor's View of Networking Research (2001)
Based on a January 2001 CSTB workshop that convened a 'visiting committee' of researchers from outside of networking and a smaller group of networking researchers, this report urges networking researchers to look beyond the current Internet and evolutionary modifications to it. Focusing on three major themes -- measuring, modeling, and creating and deploying disruptive prototypes -- it aims to stimulate fresh thinking within the networking research community. It was released at the August 2001 SIGCOMM conference.

M:

Making IT Better: Expanding Information Technology Research to Meet Society's Needs (2000)
This book identifies research areas that are in need of greater attention if the nation is to continue to enjoy the benefits of its leadership in the development and deployment of IT systems. Specific areas singled out include large-scale systems and social applications.
Modeling and Simulation: Linking Entertainment and Defense (1997)
Building on a lively October 1996 workshop, the report describes trends and opportunities in modeling and simulation in commercial entertainment industries and in DOD. It explores technical and cultural/organizational issues in intersectoral collaboration. The workshop facilitated follow-on discussions among entertainment and DOD parties, and a new center to foster such interactions was opened in southern California in 1999.
Modernizing the U.S. Air Force Base Level Automation System (1981) [Board on Telecommunications and Computer Applications]

More Than Screen Deep: Toward Every-Citizen Interfaces to the Nation's Information Infrastructure (1997)
Released in prepublication form at an August 1997 interactive systems conference, this report describes opportunities for enhancing the usability of information technology and recommends a broad-based agenda of research (computer and social science) and evaluation for interfaces to make the Internet and other information infrastructure more usable by more people in more circumstances. It has circulated widely among researchers in academia and industry.

N:

The National Challenge in Computer Science and Technology (1988)
(a.k.a. the "Articulation Report") This report discusses exciting opportunities in computer science and underscored the importance of achieving nationwide information networking.
National Collaboratories: Applying Information Technology for Scientific Research (1993)
This report is the result of a year-long effort to study the needs of scientists for computing and information technology to facilitate collaboration, and to relate those needs to the development and use of collaboratories. It examined experiences and needs in genome research, space physics, and oceanography.
Networking Health: Prescriptions for the Internet (2000)
The report also examines the organizational and policy issues that will influence broader use of the Internet in health activities and outlines steps that could be taken to address them. Drawing on a series of site visits, this report examines ways in which the Internet can be used to support applications in clinical care, consumer health, public health, health care finance and administration, professional education, and biomedical research. It also identifies the technical capabilities that the Internet must provide in order to support health applications and outlines ways to better ensure that these capabilities are implemented in future generations of the Internet.
Nontechnical Strategies to Reduce Children's Exposure to Inappropriate Material on the Internet: Summary of a Workshop (2001)
Summarizes a workshop organized around four topics: developmental considerations for defining inappropriate material and the effects of exposure to sexually explicit and other harmful materials; children's use patterns and experiences on the Internet; innovative approaches and existing efforts to use nontechnological strategies; and opportunities to bridge research, policy, and practice.

O:

Observed Practices for Improving the Security and Confidentiality of Electronic Health Information: Interim Report (1996)
Precursor to For the Record

P:

Planning for Defense Logistics Modernization (1988) [Board on Telecommunications and Computer Applications]


R:

Radio Frequency Identification (RFID) Technologies: A Workshop Summary (2004)
provides a summary of discussions by panelists and participants at a workshop organized by CSTB's Committee on Radio Frequency Identification Technologies.
Realizing the Information Future: The Internet and Beyond (1994)
This report describes Open Data Network (ODN) architecture for the national information infrastructure (NII). It addresses the development and deployment of an ODN-based NII, characterizing needs of the research and education communities and opportunities for the federal government.
Realizing the Potential of C4I: Fundamental Challenges (1999)
This report addresses the intersecting arenas of security, interoperability, and DOD culture and processes as they relate to challenges in command, control, communications, computers, and intelligence. It has been briefed extensively within DOD and has received wide press coverage, including on the front page of USA Today following the March 22, 1999 prepublication release.
Renewing U.S. Telecommunications Research (2006)
examines telecommunications research in industry and academia, discusses the implications for the health of the sector, and recommends ways to enhance U.S. telecommunications research efforts.
Research Recommendations to Facilitate Distributed Work (1994)
This report addresses technological issues and impacts related to telecommuting. It provides a thoughtful examination of how the nature of work has been changing as a result of greater support for distributing where work is done, distribution of greater scope than implied by telecommuting, per se.
A Review of Computer Science Research at NASA (1987)

Review of a New Data Management System for the Social Security Administration (1978) [Board on Telecommunications and Computer Applications]

A Review of Selected Activities in the Office of Telecommunications, Department of Commerce (1978) [Board on Telecommunications and Computer Applications]

Review of Tax Processing System Planning for the Internal Revenue Service (1980) [Board on Telecommunications and Computer Applications]

A Review of the FBI's Trilogy IT Modernization Program (2004)
This report addresses architectural, technical, and management issues related to the bureau's Trilogy computer program, which aims to establish a high-speed network and user interface for all agents to use in organizing, accessing, and analyzing information.
Rights and Responsibilities of Participants in Networked Communities (1994)
The report illuminates, questions, and articulates difficult issues that arise in an era of increasing networked communications, and helps to lay a foundation for a more informed public debate and discussion of the rights and responsibilities of those who operate in this domain.
Roles of Industry and the University in Computer Research and Development (1982)


S:

Scaling Up: A Research Agenda for Software Engineering (1989)
This report on CSTB's February 1989 Workshop on Large Complex Systems Software discusses the difficulties in improving software development and makes recommendations for progress. DARPA adopted the report's framework for its software research program. The observations and recommendations in this report have endured, with echoes in such late-1990s reports as Making IT Better.
Second Review of a New Data Management System for the Social Security Administration (1979) [Board on Telecommunications and Computer Applications]

Signposts in Cyberspace: The Domain Name System and Internet Navigation (2005)
examines the performance and prospects of the Domain Name System from technical and institutional perspectives, and also looks at how navigation technologies and institutions facilitate finding and accessing Internet resources. It describes the evolution of the technologies and institutions that have supported the growth of the Internet and provides the basis for future decisions that will enable its productive evolution.
Social Security Administration Electronic Service Provision: A Strategic Assessment (2007)
examines the SSA’s proposed e-government strategy and provides advice on how the SSA can best deliver services to its user communities in the future.
Software for Dependable Systems: Sufficient Evidence? (2007)
discusses the meaning of dependability in a software and systems context, illustrates how the growing use and complexity of software necessitates a different approach to ensuring dependability, and recommends an evidence-based approach to achieving justifiable confidence in and greater dependability of software.
Space-Based Broadcasting: The Future of Worldwide Audio Broadcasting (1985) [Board on Telecommunications and Computer Applications]

Summary of a Forum on Spectrum Management Policy Reform (2004)
This report provides a summary of remarks made by speakers at a public forum organized by CSTB and held on February 12-13, 2004. A variety of government and private sector stakeholders were asked to present their views on spectrum policy, with emphasis on issues identified in a May 29, 2003 executive memorandum that established a federal Spectrum Policy Initiative.
Summary of a Workshop on Software Certification and Dependability (2004)
provides a summary of discussions by panelists and participants at a public workshop organized by CSTB's Committee on Certifiably Dependable Software Systems and held on April 19-20, 2004.
Summary of a Workshop on the Technology, Policy, and Cultural Dimensions of Biometric Systems (2006)
provides a summary of discussions by panelists and participants at a public workshop organized by CSTB's Whither Biometrics Committee and held on March 15-16, 2005.
Summary of a Workshop on Using IT to Enhance Disaster Management (2005)
summarizes remarks at a June 22-23, 2005, workshop by representatives of federal, state, and local government agencies, private industry, and the research community on the present state of the art and practice and future opportunities to harness information technology to aid in the management of natural and human-made disasters.
Supercomputers: Directions in Technology and Applications (1989)
Report on a September 7-8, 1988, session jointly sponsored by CSTB and the Academy Industry Program and aimed at stimulating industry interest in supercomputing applications.
Systems Modernization and the Strategic Plans of the Social Security Administration (1990) [Board on Telecommunications and Computer Applications]


T:

Technical, Business, and Legal Dimensions of Protecting Children from Pornography on the Internet: Proceedings of a Workshop (2002)
Report of the second workshop conducted for the project resulting in Youth, Pornography, and the Internet. This volume contains edited transcripts of the presentations and discussions from a workshop focusing on some of the technical, business, and legal factors that affect how one might choose to protect kids from pornography on the Internet. It is not intended to be a comprehensive review of all of the technical, business, and legal issues that might be relevant to this subject.
Toward a National Research Network (1988)
The report is widely acknowledged as helping to ensure development of the NREN program. It assesses technical, user, and management concerns relating to the growth of the network complex underlying the early Internet.
Toward a Safer and More Secure Cyberspace (2007)
This report examines the vulnerabilities of the Internet and offers a strategy for future research aimed at countering cyber attacks. The report also explores the nature of online threats and some of the reasons why past research for improving cybersecurity has had less impact than anticipated.
Transport Protocols for Department of Defense Data Networks: Report to the Department of Defense and the National Bureau of Standards (1985) [Board on Telecommunications and Computer Applications]

Trust in Cyberspace (1999)
The book describes the integrated problems of information security, reliability, and safety -- together, "trustworthiness." It outlines trends, characterizes Internet-related issues, and recommends research for developing the science and technology base necessary to enhance networked information systems trustworthiness. It provides educational input to multiple kinds of policy appraisals.

U:

The Unpredictable Certainty: Information Infrastructure Through 2000 (1996)
This report provides an overview of the multiple technologies and industries associated with enhancements to the information infrastructure and the evolution of the Internet, addressing who is doing what, where, why, and how and explaining why the "when" is difficult to forecast.
The Unpredictable Certainty: White Papers (1998)
This book contains a key component of the NII 2000 project, a set of white papers that contributed to and complements the project's final report, The Unpredictable Certainty: Information Infrastructure Through 2000.

V:

Virtual Reality: Scientific and Technological Challenges (1994)
This report recommends a national research and development agenda in the area of virtual reality to guide government research and development over the next generation.

W:

Who Goes There? Authentication Through the Lens of Privacy (2003)
This report explores authentication technologies (including biometrics, PKI, passwords, etc.) and their implications for the privacy of the individuals being authenticated. As authentication becomes ever more ubiquitous, understanding its interplay with privacy is vital. The report carefully examines numerous concepts, including authentication, authorization, identification, privacy, and security. It provides a framework to guide thinking about these issues when deciding whether and how to use authentication in a particular context. The report explains how privacy is affected by system design decisions, and what steps one can take to mitigate adverse privacy effects of authentication systems. The report also describes government's unique role and what this means for government use of authentication that seeks to minimize invasions of privacy. In addition, the report outlines usability and security considerations and provides a primer on privacy law and policy.

Y:

Youth, Pornography, and the Internet (2002)
The result of an extensive undertaking conducted at the request of the U.S. Congress, this report examines the pros and cons of options for protecting children from inappropriate sexually explicit material on the Internet, laying a foundation for a more coherent and objective national debate on the subject. It discusses social and educational strategies, technological tools, and policy options for how to teach children to make safe and appropriate decisions about what they see and experience on the Internet. It is designed to speak to numerous interested communities, practitioners, and the public.

Letter Reports:

Building an Electronic Records Archive: Letter Report (2003)
This letter report elaborates on issues discussed in the committee's first report, Building an Electronic Records Archive at the National Archives and Records Administration: Recommendations for Initial Development, tying the issues specifically to the NARA's draft request for proposals for its Electronic Records Archives program
Letter Report of the FBI (2004)
This letter report responds to updated information about recent activities at the FBI that was presented to the Committee on the Review of the FBI Program for IT Modernization during the May 20 briefing of its report A Review of the FBI's Trilogy IT Modernization Program.
Letter Report on Electronic Voting (2006)
Many jurisdictions will face unprecedented challenges as they prepare to use new electronic voting equipment for the November elections. Because it will be the first time electronic voting is used on a large scale, jurisdictions must ensure backup procedures are available if the equipment fails. Letter Report on E-Voting examines the current state of readiness for electronic voting in jurisdictions across the United States, and gauges what progress has been made since the publication of CSTB's 2005 report, Asking the Right Questions About Electronic Voting.
Letter Report on Information Technology Research for E-Government (2001)
Responding to legislative and budgeting interest in e-government, this letter outlines the potential for engaging computer science researchers in IT-based enhancement of government processes. It was sent to Lawrence E. Brandt of the National Science Foundation on July 9, 2001.

White Papers:

Advancing the Public Interest through Knowledge and Distributed Intelligence (KDI) (1998)
A summary of two meetings (September and December 1997) of leaders from NSF and a variety of private foundations, it describes the NSF KDI initiative, relevant private foundation programs, and compares NSF and private foundation approaches and interests.
Cyber-Security and the Insider Threat to Classified Information (2000)
This is a non-reviewed summary of discussions at a planning meeting held November 1-2, 2000 to determine whether CSTB should conduct a study on this topic.
Democratic Processes in the Age of the Internet: A Framework for Action (2001)
This paper develops a framework for action by policy makers seeking to support and promote democratic processes in the United States at the local, State and national levels by examining the role that information technology and the Internet can and should play in the processes of democracy.
Exploring the Digital Divide: Charting the Terrain of Technology Access and Opportunity (2001)
The phrase "digital divide" expresses concern about the distribution of access to and benefits from advances in communications, information infrastructure and the Internet. This paper examines the issues posed by the digital divide and assesses prospects for one or more projects addressing those issues.
Summary of Discussions at a Planning Meeting on the Effects of Information Technology on the Role and Authority of Government (1997)

Summary of Discussions at a Planning Meeting on The Roles of Information Infrastructure in Health and Health Care (1993)

Technology Issues Associated With Modernization of the Securities and Exchange Commission's Electronic Data Gathering, Analysis and Retrieval (EDGAR) System (1996)
CSTB convened a one-day planning meeting/brainstorming session on December 1, 1995, to provide the SEC with immediate input on the technical implications of the EDGAR redesign. The paper, summarizing the deliberations of the session, discusses the architectural, management, data standards, and archival issues associated with modernization of the EDGAR system.

Alternate indices:

Subscribe to e-newsletters | Feedback | Back to Top