scispace - formally typeset
Open Access

Internet: An Overview of Six Key Policy Issues Affecting Its Use and Growth

Reads0
Chats0
TLDR
This report summarizes six key issues that could affect the growth and use of the Internet from a technology policy perspective: encryption and digital signatures; computer security; computer privacy, intellectual property rights, unsolicited electronic mail (“junk e-mail” or “spamming”), and Internet domain names.
Abstract
This report summarizes six key issues that could affect the growth and use of the Internet from a technology policy perspective: encryption and digital signatures; computer security; computer privacy (including consumer identity theft, protecting children from unsuitable material, and privacy of information in government databases), intellectual property rights, unsolicited electronic mail (“junk e-mail” or “spamming”), and Internet domain names. Identification of related legislation and other CRS reports that provide more detail on the issues is included. This report will be updated if necessary. Internet: An Overview of Six Key Policy Issues Affecting Its Use and Growth

read more

Content maybe subject to copyright    Report

Citations
More filters
Book

Critical Infrastructures: Background, Policy,and Implementation

TL;DR: This report aims to address the concern that this reliance on computers and computer networks raises the vulnerability of the nation’s critical infrastructures to “cyber” attacks.
Journal ArticleDOI

Concerns About Payment Security of Internet Purchases: A Perspective on Current On-Line Shoppers:

TL;DR: In this paper, the authors investigated the influence of payment security concerns on Internet purchases and found that consumers' concerns about payment security mediate the relationship between attitude toward Internet shopping and actual purchases.
Journal ArticleDOI

Oh, what a tangled web we weave

TL;DR: In this paper, the authors examine federal and state laws that restrict data collection and distribution in the United States and their strengths and weaknesses in the face of rapid technological advancement, and develop a framework for classifying the existing privacy mechanisms.

Critical Infrastructures: Background and Early Implementation of PDD-63

TL;DR: In this paper, the authors define critical infrastructures as "the array of physical assets, processes, and organizations across which these goods and services move across the country" (e.g. electricity, the power plants that generate it, and the electric grid upon which it is distributed or financial capital, the institutions that manage it, the record- keeping and communications that move it from one institution to another).

Critical Infrastructures: Background and Early Implementation of PDD-63 [Updated June 19, 2001]

TL;DR: In this paper, emergency management, infrastructure protection, key assets, management and economics, and organization and planning are discussed. But the focus is on the management of key assets and infrastructure.