DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT : POLLUTION THROUGH PROQUEST STATISTICAL INSIGHT




.


DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :

POLLUTION THROUGH PROQUEST STATISTICAL INSIGHT


.

GOOGLE SITES CIS RESEARCH GUIDE SITE MAP DATABASES

 

AMOUNT OF CIS CONTENT IN A WIDE RANGE OF DATABASES 
WITH CONTENT SAMPLES FOR SOME

 

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE 
FROM SELECTED SEARCH ENGINES DISCOVERY TOOLS

http://tinyurl.com/ya4oggx9

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :   A THROUGH  B

http://tinyurl.com/ydg8z52h

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :   C   PART ONE

http://tinyurl.com/y9my4ppp

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :   C    PART TWO

http://tinyurl.com/yc4sfdta

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT:   D

http://tinyurl.com/yay8pkc3

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT:   E    PART ONE

http://tinyurl.com/ydamheob

 


DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT:    E    PART TWO

http://tinyurl.com/y72w6xq6

 


DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT:     F THROUGH G

http://tinyurl.com/ydbxj5o7

 


DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT: 
H THROUGH INGENTA
 

http://tinyurl.com/y9vj85y6

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :    INSPEC THROUGH  L

http://tinyurl.com/yaxurho3

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :    M THROUGH MLA

http://tinyurl.com/yct8k9o9

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :    MLA THROUGH N

http://tinyurl.com/ydeyt2d7

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :   O

http://tinyurl.com/y8kh4r5u

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :   P   PART ONE

http://tinyurl.com/ybe63hl7

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :   P   PART TWO
POLLUTION THROUGH PROQUEST STATISTICAL INSIGHT

http://tinyurl.com/y9s24mth

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :    PSY THROUGH PZ

http://tinyurl.com/ydgwy6zp

 

 

DATABASES USEFUL FOR COMPUTER SCIENCE AND INFORMATION SCIENCE RESEARCH:   R

http://tinyurl.com/yapzpw7a

 

 

DATABASES USEFUL FOR COMPUTER SCIENCE AND INFORMATION SCIENCE RESEARCH:    S THROUGH SCOPUS

http://tinyurl.com/ydylk7f2

 

 

DATABASES USEFUL FOR COMPUTER SCIENCE AND INFORMATION SCIENCE RESEARCH:
SEARCH.BIOPREPRINT THROUGH SZ

http://tinyurl.com/y8aajt3x

 

 

DATABASES USEFUL FOR COMPUTER SCIENCE AND INFORMATION SCIENCE RESEARCH:     T THROUGH Z

http://tinyurl.com/ya2qprg5

 

 

 



.


DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT : 
POLLUTION THROUGH PROQUEST STATISTICAL INSIGHT

.

.


"computer science" OR "information science" OR "computer programming" OR informatics OR "data management" OR "information security" OR "network security" OR forensics OR "visual computing" OR "data mining" OR "machine learning" OR "multimedia databases" OR "artificial intelligence"



*

Policy File Index 
535 Results


Content Sample

  • 1

    Artificial Intelligence and National Security

    Allen, Greg; Chan, Taniel. July 12, 2017: Center for a New American Security.

    ...World War, but advances in hitmachine hitlearning and hitArtificial hitIntelligence (AI)



  • 2

    Machine Learning for Policymakers

    Buchanan, Ben; Miller, Taylor. June 26, 2017: Belfer Center for Science and International Affairs.

    ...that not only is it possible for generalists to gain insight into hitmachine
    ...of hitmachine hitlearning algorithms: supervised learning, unsupervised learning,
    ...and architectures can lead to powerful results. Second, we examine how hitmachine



  • 3

    An Intelligence in Our Image: The Risks of Bias and Errors in Artificial Intelligence

    Osoba, Osonde A; Welser, William, IV. April 5, 2017: RAND Corporation.

    ...hitMachine hitlearning algorithms and hitartificial hitintelligence systems influence many



  • 4

    Information Security: Continued Efforts Needed to Fully Implement Statutory Requirements: Highlights

    June 24, 2003: U.S. Government Accountability Office.

    ...1996, GAO has reported that poor hitinformation hitsecurity in the federal government
    ...hitinformation hitsecurity practices throughout the federal government, hitinformation



  • 5

    Information Security: Although Progress Reported,
    Federal Agencies Need to Resolve Significant Deficiencies

    February 14, 2008: U.S. Government Accountability Office.

    ...hitInformation hitsecurity is especially important for federal agencies, where the



  • 6

    Information Security:
    Continued Efforts Needed to Fully Implement Statutory Requirements

    June 24, 2003: U.S. Government Accountability Office.

    ...1996, GAO has reported that poor hitinformation hitsecurity in the federal government
    ...hitinformation hitsecurity practices throughout the federal government, hitinformation


  • 7

    Information Security: USDA Needs to Implement Its Department-wide Information Security Plan

    August 10, 2000: U.S. Government Accountability Office.

    ...to improve hitinformation hitsecurity and implement its August 1999 department-wide
    ...hitinformation hitsecurity and has hired a new Associate Chief Information
    ...other recommendations for strengthening the department's hitinformation hitsecurity.



  • 8

    Information Security: Comments on the Proposed Government Information Security Act of 1999

    Brock, Jack L. March 2, 2000: U.S. Government Accountability Office.

    ...hitInformation hitSecurity Act of 1999 -- S. 1993 -- seeks to strengthen hitinformation
    ...the legal framework that supports federal hitinformation hitsecurity requirements and

     

  • 9

    Information Security: Comments on the Proposed Federal Information Security Management Act of 2002

    May 2, 2002: U.S. Government Accountability Office.

    ...Federal hitInformation hitSecurity Management Act of 2002 reauthorizes and expands the
    ...Fiscal Year 2001. Concerned that pervasive hitinformation hitsecurity weaknesses place
    ...The Federal hitInformation hitSecurity Management Act also changes and clarifies



  • 10

    Information Security: Progress Reported,
    but Weaknesses at Federal Agencies Persist

    March 12, 2008: U.S. Government Accountability Office.

    ...hitInformation hitsecurity is especially important for federal agencies, where the


  • 11

    Department of Veterans Affairs'
    Implementation of Information Security Education Assistance Program

    December 18, 2009: U.S. Government Accountability Office.

    ...hitinformation hitsecurity. The hitInformation hitSecurity Education Assistance Program is


  • 12

    Nuclear Forensics: Comprehensive Interagency Plan
    Needed to Address Human Capital Issues

    April 30, 2009: U.S. Government Accountability Office.

    ...of the perpetrators. Technical nuclear hitforensics--the analysis of nuclear or
    ...samples were recovered (known as "postdetonation" nuclear hitforensics). Nuclear
    ...prior to their use in a weapon (known as "predetonation" nuclear hitforensics).




*

POPLINE 
POPLINE provides citations covering reproductive health with
abstracts to scientific articles, 
reports, books, and unpublished
reports in the field of population, family planning, 
and related health issues.
382 Results


*

Proquest Arts and Humanities Full Text 
2,113 Results


Content Sample



  • 1 Toward an accelerated adoption of data-driven findings in medicine

    Kartoun, Uri.Medicine, Health Care, and Philosophy; Dordrecht (2018): 1-5.


  • 2

    How Bioethics Can Shape Artificial Intelligence and Machine Learning

    Nabi, Junaid.The Hastings Center Report; Hastings-on-Hudson 
    Vol. 48, Iss. 5,  (Sep/Oct 2018): 10-13.

    ...hitintelligence and hitmachine hitlearning have the potential to revolutionize the...
    ...AI and hitmachine hitlearning advance, bioethical frameworks need to be tailored to...



  • 3

    Web-based Learning Through Educational Informatics
    Information Science Meets Educational Computing

    Haythornthwaite, Caroline.Journal of Education for Library and Information Science;
    North York Vol. 50, Iss. 3,  (Summer 2009): 211-212.

    ...hitinformatics in the future in library and hitinformation hitscience, education and...
    ...hitInformation hitScience. Their definition identifies educational hitinformatics as:...
    ...hitinformatics. Annual Review of hitInformation hitScience and Technology, 42, 497-546. ...

    • References (‎4)




  • 4

    IMPACT Family Trees: Quantifying Academic Genealogy in Library and Information Science

    Russell, Terrell G; Sugimoto, Cassidy R.Journal of Education for Library and Information Science;
    North York Vol. 50, Iss. 4,  (Fall 2009): 248-262.

    ...most of the researchers came from other fields (engineering, hitcomputer hitscience,...
    ...hitInformation hitScience Research, 28(4), 480-500. Mitchell, M.F. (1992). A...
    ...the same scholarly coin? Library & hitInformation hitScience Research, 30(4),...
     all

      • Cited by (‎3)
      • References (‎18)
     

  • 5

    THE BOO-FOUND-GORILLA

    Keegan, Edward, AIA.Architect; Washington Vol. 107, Iss. 1,  (Jan 2018): 80.

    ...the building industry with initiatives in automation, hitmachine hitlearning and hitdata...
    ...hitartificial hitintelligence-led generative design, and hitmachine hitlearning, as well as...



  • 6

    The preferences of Chinese LIS journal articles
    in citing works outside the discipline

    Chen, Chuanfu; Li, Qiao; Deng, Zhiqing; Chiu, Kuei; Wang, Ping.Journal of Documentation; Bradford Vol. 74, Iss. 1,  (2018): 99-118.

    ...citation data, hitdata hitmining techniques such as hitmachine hitlearning and statistical...
    ...Therefore, hitdata hitmining becomes more important for discovering knowledge hidden...
    ...academic, practice and public. WEKA 3.6, an effective hitdata hitmining tool, is...



  • 7

    Explanation and trust: what to tell the user in security and AI?

    Pieters, Wolter.Ethics and Information Technology; Dordrecht 
    Vol. 13, Iss. 1,  (Mar 2011): 53-64.

    ...hitinformation hitsecurity. In AI, an expert system needs to be able to justify and...
    ...framework to both AI and hitinformation hitsecurity, and show the benet of the...

    • Cited by (‎2)
    • References (‎40)


  • 8

    Combining psychological models with machine learning 
    to better predict people's decisions

    Rosenfeld, Avi; Zuckerman, Inon; Azaria, Amos; Kraus, Sarit.Synthese, suppl. Supplement; Dordrecht Vol. 189,  (Dec 2012): 81-93.

    ...hitcomputer hitscience Azaria et al. used hitmachine hitlearning to t parameters within a...
    ...domains. In relatively simple domains,
    both psychological models and hitmachine...
    ...by psychological models is not even clear, and hitmachine hitlearning models are even...

      • References (‎27)


  • 9

    How Should Health Data Be Used?

    KAPLAN, BONNIE.Cambridge Quarterly of Healthcare Ethics: CQ;
    New York Vol. 25, Iss. 2,  (Apr 2016): 312-329.

    ...who benefits from data disclosure and aggregation,
    and secondary use for itdata...
    ...secondary use of data for hitdata hitmining, marketing, research, public health, and...
    ...from the original source. Health Data Uses: Big Data, hitData hitMining...



  • 10

    Meaning and mining: the impact of implicit assumptions
    in data mining for the humanities

    Sculley, D; Pasanek, Bradley M.Literary and Linguistic Computing;
    Oxford Vol. 23, Iss. 4,  (Dec 2008): 409-424.

    ...text analysis to hitdata hitmining and other hitmachine hitlearning methods. Speaking about...
    ...hitData hitMining Is distant reading amenable to hitmachine hitlearning?...

    •       Cited by (‎3)


  • 11

    Philosophy and machine learning
    Thagard, Paul.Canadian Journal of Philosophy; Edmonton Vol. 20, Iss. 2,  (Jun 1990): 261-276.



  • 12

    E. Francesconi, S. Montemagni, W. Peters, D. Tiscornia:
    Semantic Processing of Legal Texts: where the language
    of law meets the law of language (Lecture notes
    in computer science: lecture notes in artificial intelligence, Vol 6036)

    Walter, Stephan.Language Resources and Evaluation; Dordrect Vol. 46, Iss. 1,  (Mar 2012): 109-115.

    ...hitcomputer hitscience: lecture notesin articial intelligence, Vol 6036) ...
    ...some interest in the legal as well as hitcomputer hitscience research communities....
    ...mentioned in passing, would certainly be to try using hitmachine hitlearning...



  • 13  Wang, Lin.Journal of Documentation; Bradford Vol. 74, Iss. 6,  (2018): 1243-1257.

    ...interdisciplinary because it involves statistics, hitdata hitmininghitmachine hitlearning...
    ...hitmachine hitlearning, statistics and hitdata hitmining, but we want to emphasize depending...
    ...statistics, hitcomputer hitscience and hitmachine hitlearning are basic components of the...


    • References (‎82)


  • 14  
    Twinning data science with information science 
    in schools of library and information science

  • 14

    Assessing Continuous Operator Workload With a Hybrid
    Scaffolded Neuroergonomic Modeling Approach

    Borghetti, Brett J; Giametta, Joseph J; Rusnock, Christina F.Human Factors; Santa Monica Vol. 59, Iss. 1,  (Feb 2017): 134-146.

    ...interpretation. Method: We use hitmachine hitlearning algorithms on...
    ...distinguishing between 62% of the workload changes. hitMachine hitlearning...
    ...to train our statistical hitmachine hitlearning models. Once trained, the workload...

    •  References (‎25)

  • 15

    Machine Learning

    Winthrop-Young, Geoffrey; Horn, Eva.Artforum International; New York Vol. 51, Iss. 1,  (Sep 2012): 473-474,476-479.

    ...hitartificial-hitintelligence system, gains self-awareness, goes ballistic, and...
    ...hitartificial hitintelligence proceeds to the interception of possible intelligences...



  • 16

    Artificial Intelligence and Scientific Method /
    Philosophy and AI: Essays at the Interface

    Preston, John.The British Journal for the Philosophy of Science;
    Oxford Vol. 48, Iss. 4,  (Dec 1997): 610-612.

    ...he calls the `Turing tradition' in hitmachine hitlearning, and he argues that the...
    ...to which hitmachine-hitlearning systems are not replacements for the activities of...
    ...hitmachine-hitlearning systems can literally be said to perform the tasks they...



     

  • 17

    Groundhog Day for Medical Artificial Intelligence

    London, Alex John.The Hastings Center Report; Hastings-on-Hudson 
    Vol. 48, Iss. 3, 
    (May/Jun 2018): inside back cover-inside back cover.

    ...hitartificial hitintelligence entered a period of retrenchment known as the “AI...



     

  • 18

    Bringing 'Musicque into the tableture': 
    machine-learning models for
    polyphonic transcription of 16th-century lute tablature

    de Valk, Reinier; Weyde, Tillman.Early Music;
    Oxford Vol. 43, Iss. 4,  (Nov 2015): 563.

    ...variants of a hitmachine-hitlearning model for voice separation and duration...




  • 19

    An application of artificial intelligence to the choreography of dance

    Bradford, James H; Cote-Laurence, Paulette.Computers and the Humanities; New York Vol. 29, Iss. 4,  (Aug 1995): 233.

    ... An experimental computer program that applies the techniques of hitartificial...

    • Cited by (‎1)

  • 20

    Artificial Intelligence & Games:
    Should Computational Psychology be Revalued?

    Ernandes, Marco.Topoi; Dordrecht Vol. 24, Iss. 2,  (2005): 229-242.

    ...order to reproduce real-life problems, hitcomputer hitscience techniques enter an...
    ...of hitArtificial hitIntelligence (AI) concerned with the development of automated game...











*

Proquest Congressional 
2,115 Results


Content Sample

MONTGOMERY ACADEMY FORENSICS TEAM WINS
ALABAMA FORENSICS CHAMPIONSHIP
Congressional Record Daily EditionDate: May 14, 1996Citation: 142 Cong Rec S 5017

result item
Cyber Security: The Status of Information Security 
and the Effects of the Federal Information Security 
Management Act [FISMA] at Federal Agencies
Hearings PublishedDate: June 24, 2003CIS Number: 2004-H401-67Sudoc: Y4.G74/7:SE2/29Collation: iii+178 p.Committee: Committee
on Government Reform. House
Hearing before the Subcom on Technology, Information Policy, Intergovernmental Relations, and the Census to examine status of information technology (IT) security at Federal agencies, including implementation of computer security requirements under the Government Information Security Reform Act (GISRA) and the Federal Information SecurityManagement Act.
  •  
result item
Information Security in the Federal Government: One Year into the Federal Information Security Management Act
Hearings PublishedDate: March 16, 2004CIS Number: 2004-H401-115Sudoc: Y4.G74/7:SE2/31
Collation: iii+199 p.Committee: Committee on
Government Reform. House
Hearing before the Subcom on Technology, Information Policy, Intergovernmental Relations, and the Census to examine implementation of information technology (IT) security measures at Federal agencies, including implementation of computer security requirements under the Federal Information Security Management Act (FISMA).
  •  
result item
[Briefing-Flight 253 Forensics]
Hearings Pre-PublishedPub Date: April 29, 2010Citation: H43-20100429-01Committee: Select Committee on Intelligence. House
Hearing Date: Apr. 29, 2010
Briefing held in executive session to discuss Flight 253 forensics.
  •  
result item
110 S. 236 Reported in Senate
Federal Agency Data Mining Reporting Act of 2007; Federal Agency Data Mining Reporting Act of 2007
Bill TextDate: June 04, 2007Citation: 2007 S. 236; 110 S. 236Bill Status: Reported in SenateCongress-Session: 110- 1
To require reports to Congress on Federal agency use of data mining.
  •  
result item
Federal Research: DOE Is Addressing Invention Disclosure and Other Challenges
But Needs a Plan To Guide Data Management Improvements
Committee PrintsDate: January 01, 2015CIS Number: 2015-J942-51Sudoc: GA1.13:GAO-15-212Collation: 32 p.
Report examining DOE contractor research funding for FY2009-FY2013, and reviewing efforts to ensure contractors disclose agency-funded inventions and manage challenges to protect Federal interest.
  •  
result item
Use of Artificial Intelligence To Improve the U.S. Department of Veterans Affairs' Claims Processing System
Hearings PublishedDate: January 29, 2008CIS Number: 2008-H761-58Sudoc: Y4.V64/3:110-66Collation: 106 p.Committee: Subcommittee
on Disability Assistance and
Memorial Affairs
Committee on Veterans' Affairs. House
Hearing before the Subcom on Disability Assistance and Memorial Affairs
to examine use of new technologies, including artificial intelligence (AI),
to improve VA adjudication system for processing veterans claims
for service-related disabilities.
  •  
result item
Telecommunications Network Security
Hearings PublishedDate: April 29, 1993CIS Number: 94-H361-11Sudoc: Y4.EN2/3:103-53Collation: iii+260 p.Committee: Committee on Energy and Commerce. House
Hearings before the Subcom on Telecommunications and Finance
to consider issues involved in telecommunications and computer
system security, including privacy, criminal electronic fraud, and
development of security standards and programs.
  •  
result item
Information Security: SEC Needs To Improve Controls over Financial Systems and Data
Committee PrintsDate: April 01, 2014CIS Number: 2014-J942-139Sudoc: GA1.13:GAO-14-419Collation: 25 p.
Report examining SEC information security controls, focusing on effectiveness of information security controls to protect confidentiality, integrity, and availability
of SEC key financial systems and information.
  •  
result item
Information Security: FAA Needs To Address Weaknesses
in Air Traffic Control Systems
Committee PrintsDate: January 01, 2015CIS Number: 2015-J942-53Sudoc: GA1.13:GAO-15-221Collation: 46 p.
Report examining FAA information security program, focusing
on implementation of information security controls to protect
the air traffic control system.
  •  
result item
Balancing Privacy and Security:
The Privacy Implications of Government Data Mining Programs
Hearings PublishedDate: January 10, 2007CIS Number: 2007-S521-21Sudoc: Y4.J89/2:S.HRG.110-2Collation: 178 p.Committee: Committee
on the Judiciary. Senate
Hearing to examine current and potential applications of data mining 
technologies by Federal Government, focusing on impact
of data mining on personal privacy.

result item
Data Mining: Current Applications and Future Possibilities
Hearings PublishedDate: March 25, 2003CIS Number: 2003-H401-159Sudoc: Y4.G74/7:D26/5Collation: iii+100 p.Committee: Committee on Government Reform. House
Hearing before the Subcom on Technology, Information Policy,
Intergovernmental Relations, and the Census to examine current
and potential applications of data mining technologies, and to
review possible impact of data mining on personal privacy.
  •  
result item
[The Dawn of Artificial Intelligence]
Hearings Pre-PublishedPub Date: November 30, 2016Citation: S26-20161130-01Committee: Subcommittee on Space, Science, and Competitiveness...
Hearing Date: Nov. 30, 2016
Hearing before the Subcom on Space, Science, and Competitiveness
to examine the state of artificial intelligence (AI), focusing on
commercial applications and policy implications.
  •  Citation/Abstract
  •  Permalink
result item
Information Security: VA Needs To Address Identified Vulnerabilities
Committee PrintsDate: November 01, 2014CIS Number: 2014-J942-487Sudoc: GA1.13:GAO-15-117Collation: 30 p.
Report reviewing VA efforts to address previously identified 
information security vulnerabilities.
  •  
result item
Information Security: Agencies Need
To Improve Oversight of Contractor Controls
Committee PrintsDate: August 01, 2014CIS Number: 2014-J942-360Sudoc: GA1.13:GAO-14-612Collation: 43 p.
Report examining selected Federal agencies oversight of security
and privacy controls for contractor-operated computer systems,
and evaluating executive branch agencies with Government-wide
guidance and oversight responsibilities activities to assist Federal
agencies to ensure contractors implement information security and
privacy controls.
  •  
result item
Information Security: IRS Needs To Continue Improving
Controls over Financial and Taxpayer Data
Committee PrintsDate: March 01, 2015CIS Number: 2015-J942-87Sudoc: GA1.13:GAO-15-337Collation: 30 p.
Report assessing effectiveness of IRS information security controls
over key financial and tax-processing systems to ensure confidentiality,
integrity, and availability of financial and sensitive taxpayer information.
  •  
result item
Information Security: Agencies Need
To Improve Cyber Incident Response Practices
Committee PrintsDate: April 01, 2014CIS Number: 2014-J942-215Sudoc: GA1.13:GAO-14-354Collation: 55 p.
Report examining Federal agencies response measures to security
breaches of computerized systems, and assessing DHS
cybersecurity incident assistance to other agencies.
  •  
result item
Information Security at the Department of Health and Human Services,
The Oversight Series
Committee PrintsDate: August 06, 2015CIS Number: 2015-H362-89Collation: 27 p.Committee: Committee on Energy and Commerce. House
Republican majority staff report presenting findings and
recommendations of Committee investigation into data
breaches involving information systems and websites of
FDA and other HHS components, and reviewing HHS
response to the breaches.
  •  Citation/Abstract
  •  Permalink
result item
Information Security: IRS Needs To Address Control Weaknesses
That Place Financial and Taxpayer Data at Risk
Committee PrintsDate: April 01, 2014CIS Number: 2014-J942-125Sudoc: GA1.13:GAO-14-405Collation: 29 p.
Report examining whether IRS controls over key financial and tax
processing systems, information, and interconnected networks are
effective in ensuring confidentiality, integrity, and availability of
financial and sensitive taxpayer information.
  •  
*

ProQuest Criminal Justice 
14,429 Results


Content Sample



  • 1

    Artificial Intelligence Within the Military Domain and Cyber Warfare

    Hallaq, Bil; Somer, Tiia; Osula, Anna-Maria; Ngo, Kim;
    Mitchener-Nissen, Timothy.
    European Conference on Cyber Warfare and Security;
    Reading : 153-156. Reading: 
    Academic Conferences International Limited. (Jun 2017)

    ...uses of hitmachine hitlearning and hitartificial hitintelligence in the cyber security...
    ...the authors present an overview of hitmachine hitlearning as an enabler to hitartificial...
    ...the application of weapons enhanced with hitartificial hitintelligencehitmachine...



  • 2

    Analysis of Intrusion Detection Dataset NSL-KDD
    Using KNIME Analytics

    Arafat, Mohd; Jain, Archi; Wu, Yan.International Conference on Cyber Warfare and Security;
    Reading : 573-583,X. 
    Reading: Academic Conferences International Limited. (2018)

    ...KNIME assimilates diverse components for hitmachine hitlearning and hitdata hitmining via...
    ...hitdata hitmining (Naahid, 2013) techniques have been used to find correlations...
    ..."Analysis of KDD CUP 99 dataset using clustering based hitdata hitmining."...
    ct result item



  • 3

    Machine Learning and Data Mining for IPv6 Network Defence

    Weisman, Michael; Ritchey, P; Shearer, G; Colbert, E; Dauber, E; et al.International Conference on Cyber Warfare and Security;
    Reading : 681-688,XVI. 
    Reading: Academic Conferences International Limited. (2018)

    ...(Ullrich et al. 2015). 4.hitArtificial hitintelligencehitmachine hitlearning, and hitdata...
    ...? Keywords: hitdata hitmininghitmachine hitlearning, IPv6, Internet of Things 1...
    ...is flexible enough though, that depending on the hitmachine hitlearning and hitdata...
    ct result item


  • 4

    Virtual Case Notes: How Machine Learning 
    Malware Agents Could Evade AI Security Systems

    French, Laura.Forensic Magazine; Rockaway (Jul 27, 2017).

    ...hitmachine hitlearning methods, could evade an artificially intelligent malware...
    ...hitMachine hitlearning can be a powerful tool for defensive cybersecurity. This...
    ...as hitmachine hitlearning expert Hyrum Anderson, technical director for data science...



  • 5

    A survey of intrusion detection and prevention systems

    Patel, Ahmed; Qassim, Qais; Wills, Christopher.Information Management & Computer Security;
    Bradford Vol. 18, Iss. 4,  (2010): 277-290.

    ...from natural language processing, hitartificial hitintelligence and hitdata hitmining to...
    ...from the subject areas of autonomic computing, hitmachine hitlearninghitartificial...
    ...of hitComputer hitScience, Faculty of hitInformation hitScience and Technology, Universiti...

    • Cited by (‎13)
    • References (‎6)


  • 6  Khammassi, Chaouki; Krichen, Saoussen.Computers & Security; Amsterdam Vol. 70,  (Sep 2017): 255.

    ...emerged using hitdata hitmininghitmachine hitlearning, statistical analysis, and...
    ...constitute one of the main issues in computer hitnetwork...

    • Cited by (‎3)




  • 7

    Intelligent agents defending for an IoT world: A review

    Coulter, Rory; Pan, Lei.Computers & Security; Amsterdam Vol. 73,  (Mar 2018): 439.

    ...hitmachine hitlearning for anomaly detection has been an active research area....
    ...domains of hitartificial hitintelligence and the IoT in better understanding the...
    ...hitartificial hitintelligence and the IoT, identification of key defense cycle...


    •  
      Cited by (‎1)

  • 8

    Crime Intelligence 2.0: Reinforcing Crowdsourcing
    using Artificial Intelligence and Mobile Computing

    Khanwalkar, Sanket Subhash.University of California, Irvine,

    ProQuest Dissertations Publishing,
    2016. 10162644.

    ...this thesis proposes two approaches: (i) Combination of hitMachine hitLearning and...

    •      References (‎65)
     

  • 9

    Automated poisoning attacks and defenses in malware
    detection systems: An adversarial machine learning approach

    Chen, Sen; Xue, Minhui; Fan, Lingling; Hao, Shuang; Xu, Lihua; et al.Computers & Security; Amsterdam Vol. 73,  (Mar 2018): 326.

    ...maximally sabotaging hitmachine-hitlearning classifiers via polluting training data,...
    ...constructing crafted malware samples; examine how hitmachine-hitlearning classifiers...


     

  • 10

    Ant Colony Induced Decision Trees for Intrusion Detection

    Botes, Frans Hendrik; Leenen, Louise; De La Harpe, Retha.European Conference on Cyber Warfare and Security;
    Reading : 53-62. Reading: 
    Academic Conferences International Limited. (Jun 2017)

    ... 2.2 hitMachine hitlearning with intrusion detection hitData hitmining, combined with...
    ...& Witten, I. H. (2009) 'The WEKA hitdata hitmining software: an update', ACM...
    ...& Choi, D. (2008) Application of hitdata hitmining to network intrusion detection:...



  • 11

    Using machine learning to identify common flaws
    in CAPTCHA design: FunCAPTCHA case analysis

    Hernández-Castro, Carlos Javier; R-Moreno, María D; Barrero,
    David F; Gibson, Stuart.
    Computers & Security; Amsterdam Vol. 70,  (Sep 2017): 744.

    ...of FunCAPTCHA and uses simple hitmachine hitlearning (ML) analysis to test them. It...



  • 12

    Malware classification using self organising
    feature maps and machine activity data

    Burnap, Pete; French, Richard; Turner, Frederick; Jones, Kevin.Computers & Security; Amsterdam Vol. 73,  (Mar 2018): 399.

    ...hitMachine hitLearning with features derived from the inescapable footprint left...



     

  • 13

    Automated Evaluation of Computer Programs at
    Undergraduate Level: Suitability Study for Competitive Events

    Skupiene, Jurate.Socialines Technologijos; Vilnius Vol. 1, Iss. 2,  (2011): n/a.

    ...hitcomputer hitscience in Lithuania and some other countries as well and may motivate...
    ...co-curricular activity related to hitcomputer hitscience which is seen as a good model...



  • 14

    Machine Learning-based Triage methodology
    for automated categorization of digital media

    Marturana, Fabio; Tacconi, Simone.Digital Investigation; Kidlington Vol. 10, Iss. 2,  (Sep 2013): 193.

    ...that merges Digital hitForensics techniques and hitMachine hitLearning principles....
    ...hitMachine hitLearning terminology. In this regard, we (a) define a list of...
    ...(d) process it with different hitMachine hitLearning mining schemes to come up with a...


    •         Cited by (‎2)

  • 15

    Information SecurityMachine Learning 
    Experiments to Solve the File Fragment Classification Problem

    Wilgenbus, Erich; Kruger, Hennie; du Toit, Tiny.International Conference on Cyber Warfare and Security;
    Reading : 390-IX. Reading: Academic Conferences International Limited. (2015)

    ... Digital hitforensics is an important part of hitinformation hitsecurity...
    ... Zhang, G. P. (2010), Neural Networks For hitData hitMininghitData hitMining and Knowledge...
    ...in 'Proceedings of the 18th International Conference on hitMachine hitLearning.',...



  • 16

    Detecting financial statement fraud: Three essays on fraud predictors,
    multi-classifier combination and fraud detection using data mining

    Perols, Johan L..University of South Florida, ProQuest Dissertations Publishing, 2008. 3347362.



  • 17

    A training-resistant anomaly detection system

    Muller, Steve; Lancrenon, Jean; Harpes, Carlo; Traon, Yves Le;
    Gombault, Sylvain; et al.
    Computers & Security; Amsterdam Vol. 76,  (Jul 2018): 1.

    ...on hitmachine hitlearning based detection schemes, and how it can be detected. ...
    ...hitmachine hitlearning techniques to detect traffic anomalies and thus intruders....



  • 18

    Crossing the Chasm

    Fahy, Brenda G; Balke, C William; Umberger, Gloria H;
    Talbert, Jeffery; Canales, Denise Niles; et al.
    Journal of Investigative Medicine; London Vol. 59, Iss. 5,  (Jun 2011): 768.

    ...resources, quality, safety and public health hitinformaticshitdata hitmining,...
    ...governance; (3) change management; (4) reporting, analytics, and hitdata hitmining...
    ...provides with tools for dashboards, multidimensional analysis, hitdata hitmining, and...

      • References (‎22)




  • 19

    Speeding up Planning of Cyber Attacks Using AI Techniques:
    State of the art

    Grant, Tim.International Conference on Cyber Warfare and Security;
    Reading : 235-244,XII. Reading: 
    Academic Conferences International Limited. (2018)

    ...art in applying hitArtificial hitIntelligence (AI) techniques to automate this...
    ...paper focuses on attack planning. hitArtificial hitIntelligence (AI) techniques have...
    ...University), and a PhD in hitArtificial hitIntelligence (Maastricht University)....



  • 20

    Evolving an Information Security Curriculum:
    New Content, Innovative Pedagogy and Flexible Delivery Formats

    Zlateva, Tanya; Greiman, Virginia; Chitkushev, Lou; Becker, Kip.International Conference on Information Warfare and Security;
    Reading : 268-VII. Reading: 
    Academic Conferences International Limited. (Mar 2011)

    ...as web technologies, enterprise computing, hitdata hitmining, health hitinformatics. The...
    ...hitsecurity concentrations in the Master's programs in hitComputer hitScience, Computer...
    ...courses-such as hitinformation hitsecurityhitnetwork hitsecurity, database security,...







*



ProQuest Legislative Insight
65 Results
Content Sample


1.
Federal Information Security Modernization Act of 2014
Publication Type: Legislative History
ID: PL113-283
Date: Dec. 18, 2014
 
113th Congress,
2nd Session (2014)
2.
National Commission on Libraries and Information Science Act
Publication Type: Legislative History
ID: PL91-345
Date: July 20, 1970
 
91st Congress,
2nd Session (1970)
3.
Nuclear Forensics and Attribution Act
Publication Type: Legislative History
ID: PL111-140
Date: Feb. 16, 2010
 
111th Congress,
2nd Session (2010)
4.
National Commission on Libraries and Information Science Act Amendments of 1991
Publication Type: Legislative History
ID: PL102-95
Date: Aug. 14, 1991
 
102nd Congress,
1st Session (1991)
5.
Paul Coverdell National Forensic Sciences Improvement Act of 2000
Publication Type: Legislative History
ID: PL106-561
Date: Dec. 21, 2000
 
106th Congress,
2nd Session (2000)
6.
Computer Programing Services Advance Payments Act
Publication Type: Legislative History
ID: PL97-20
Date: July 6, 1981
 
97th Congress,
1st Session (1981)
7.
Immigration and Naturalization Service Data ManagementImprovement Act of 2000
Publication Type: Legislative History
ID: PL106-215
Date: June 15, 2000
 
106th Congress,
2nd Session (2000)


8.
Inspector Generals Criminal Investigator Academy and Inspector Generals Forensic Laboratory Establishment
Publication Type: Legislative History
ID: PL106-422
Date: Nov. 1, 2000
 
106th Congress,
2nd Session (2000)
9.
E-Government Act of 2002
Publication Type: Legislative History
ID: PL107-347
Date: Dec. 17, 2002
 
107th Congress,
2nd Session (2002)
10.
Justice for All Act of 2004
Publication Type: Legislative History
ID: PL108-405
Date: Oct. 30, 2004
 
108th Congress,
2nd Session (2004)
11.
Floyd D. Spence National Defense Authorization Act for FY2001
Publication Type: Legislative History
ID: PL106-398
Date: Oct. 30, 2000
 
106th Congress,
2nd Session (2000)
12.
Justice for All Reauthorization Act of 2016
Publication Type: Legislative History
ID: PL114-324
Date: Dec. 16, 2016




























*






























*











Proquest Political Science
7,735 Results

 

Content Sample




  • 1

    Artificial Intelligence Within the Military Domain and Cyber Warfare

    Hallaq, Bil; Somer, Tiia; Osula, Anna-Maria; Ngo, Kim; Mitchener-Nissen, Timothy.European Conference on Cyber Warfare and Security; Reading : 153-156. Reading: Academic Conferences International Limited. (Jun 2017)

    ...uses of hitmachine hitlearning and hitartificial hitintelligence in the cyber security...
    ...the authors present an overview of hitmachine hitlearning as an enabler to hitartificial...
    ...the application of weapons enhanced with hitartificial hitintelligencehitmachine...





  • 2

    Analysis of Intrusion Detection Dataset NSL-KDD Using KNIME Analytics

    Arafat, Mohd; Jain, Archi; Wu, Yan.International Conference on Cyber Warfare and Security; Reading : 573-583,X. Reading: Academic Conferences International Limited. (2018)

    ...KNIME assimilates diverse components for hitmachine hitlearning and hitdata hitmining via...
    ...hitdata hitmining (Naahid, 2013) techniques have been used to find correlations...
    ..."Analysis of KDD CUP 99 dataset using clustering based hitdata hitmining."...

     

  • 3

    Machine Learning and Data Mining for IPv6 Network Defence

    Weisman, Michael; Ritchey, P; Shearer, G; Colbert, E; Dauber, E; et al.International Conference on Cyber Warfare and Security; Reading : 681-688,XVI. 
    Reading: Academic Conferences International Limited. (2018)

    ...(Ullrich et al. 2015). 4.hitArtificial hitintelligencehitmachine hitlearning, and hitdata...
    ...? Keywords: hitdata hitmininghitmachine hitlearning, IPv6, Internet of Things 1...
    ...is flexible enough though, that depending on the hitmachine hitlearning and hitdata...





  • 4

    Ant Colony Induced Decision Trees for Intrusion Detection

    Botes, Frans Hendrik; Leenen, Louise; De La Harpe, Retha.European Conference on Cyber Warfare and Security; Reading : 53-62. 
    Reading: Academic Conferences International Limited. (Jun 2017)

    ... 2.2 hitMachine hitlearning with intrusion detection hitData hitmining, combined with...
    ...& Witten, I. H. (2009) 'The WEKA hitdata hitmining software: an update', ACM...
    ...& Choi, D. (2008) Application of hitdata hitmining to network intrusion detection:...





  • 5

    Information SecurityMachine Learning Experiments to Solve the File Fragment Classification Problem

    Wilgenbus, Erich; Kruger, Hennie; du Toit, Tiny.International Conference on Cyber Warfare and Security; Reading : 390-IX. Reading: Academic Conferences International Limited. (2015)

    ... Digital hitforensics is an important part of hitinformation hitsecurity...
    ... Zhang, G. P. (2010), Neural Networks For hitData hitMininghitData hitMining and Knowledge...
    ...in 'Proceedings of the 18th International Conference on hitMachine hitLearning.',...





  • 6

    S COMMERCE COMMUNICATIONS HEARING ON MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE

    Political Transcript Wire; Lanham [Lanham]16 Dec 2017.

    ...hitintelligence and hitmachine hitlearning for the U.S. economy. We -- WE are also...
    ...hitlearning and hitartificial hitintelligence capabilities are accelerating, and I think...
    ...Technology, Innovation and The Internet Hearing on hitMachine hitLearning ...



  • 7

    Speeding up Planning of Cyber Attacks Using AI Techniques: State of the art

    Grant, Tim.International Conference on Cyber Warfare and Security; Reading : 235-244,XII. Reading: Academic Conferences International Limited. (2018)

    ...art in applying hitArtificial hitIntelligence (AI) techniques to automate this...
    ...paper focuses on attack planning. hitArtificial hitIntelligence (AI) techniques have...
    ...University), and a PhD in hitArtificial hitIntelligence (Maastricht University)....






  • 8

    Artificial Intelligence; Concurrent Technologies Corporation Awarded Competitively Bid National Geospatial-Intelligence Agency Contract to Research Artificial Intelligence

    Politics & Government Business; Atlanta [Atlanta]16 Mar 2017: 23.

    ...hitInformation hitSciences and Technology and its hitArtificial hitIntelligence Research...
    ... Cyborgs, hitMachine hitLearning, Emerging Technologies, hitArtificial hitIntelligence,...
    ...to a difficult technical challenge involving hitmachine hitlearning capabilities and...

     




  • 9

    Evolving an Information Security Curriculum: New Content, Innovative Pedagogy and Flexible Delivery Formats

    Zlateva, Tanya; Greiman, Virginia; Chitkushev, Lou; Becker, Kip.International Conference on Information Warfare and Security; Reading :
    268-VII. Reading: Academic Conferences International Limited. (Mar 2011)

    ...as web technologies, enterprise computing, hitdata hitmining, health hitinformatics. The...
    ...hitsecurity concentrations in the Master's programs in hitComputer hitScience, Computer...
    ...courses-such as hitinformation hitsecurityhitnetwork hitsecurity, database security,...





  • 10

    An Evolved Security Architecture for Distributed Industrial Automation and Control Systems

    Rosa, L; Proença, J; Henriques, J; Graveto, V; Cruz, Tiago; et al.European Conference on Cyber Warfare and Security; Reading : 380-390. Reading: Academic Conferences International Limited. (Jun 2017)

    ...and hitmachine hitlearning techniques should be part of this path. The idea...
    ...within the ICS protection framework. The SSU also implements hitMachine hitLearning...
    ...Improving hitnetwork hitsecurity monitoring for industrial control systems. In 2015...



  • 11

    Patents; "Machine Learning Method and Machine Learning Apparatus Learning Operating Command to Electric Motor and Machine Tool Including Machine Learning Apparatus" in Patent Application Approval Process (USPTO 20170090430)

    Politics & Government Week; Atlanta [Atlanta]20 Apr 2017: 2416.

    ...hitmachine hitlearning method and hitmachine hitlearning apparatus learning an operating...
    ...hitmachine hitlearning apparatus learning an operating command to an electric motor,...




  • 12

    Artificial Intelligence; Bytedance Co-organizes an International Dialogue on Social Responsibility and Ethics in ArtificialIntelligence at the United Nation's 12th Internet Governance Forum

    Politics & Government Business; Atlanta [Atlanta]04 Jan 2018: 5.

    ...of Electrical Engineering and hitComputer hitSciences at UC Berkeley, Dr. Urs Gasser,...
    ... Bytedance Ltd., World Wide Web, hitMachine hitLearning, Internet Governance, Emerging...
    ...Ethics in hitArtificial hitIntelligence: An East-West Dialogue" with the University of...





  • 13

    Information Security Education in the Greek Universities and Technological Education Institutes

    Tsiakis, Theodosios.European Conference on Information Warfare and Security; Reading : 295-XII. Reading: Academic Conferences International Limited. (Jul 2010)

    ...Computer/hitInformatics studies, observing the current need for hitinformation...
    ...primary goal of a security course in a hitComputer hitScience / hitInformatics Department...
    ...technical, science) can enter the departments of hitInformatics/hitComputer...




     

  • 14

    Digital Evidence Collection in Cyber Forensics Using Snort

    Kumar, Thrinadh Praveen; Bhaskari, Lalitha; Avadhani, P; Kumar, P Vijaya.International Conference on Information Warfare and Security; Reading : 216-XI. Reading: Academic Conferences International Limited. (Apr 2010)

    ...be further extended using graph theory, hitdata hitmining and fuzzy logic approaches....
    ...His area of Interests is Digital hitForensics, Network topologies, hitNetwork hitSecurity...
    ...worms and above all cyber crime is becoming a reality, thus hampering hitnetwork...





  • 15

    Suggesting a Honeypot Design to Capture Hacker Psychology, Personality and Sophistication

    Odemis, Murat; Yucel, Cagatay; Koltuksuz, Ahmet; Ozbilgin, Gokhan.International Conference on Cyber Warfare and Security; Reading : 432-438,XV-XVI. Reading: Academic Conferences International Limited. (2018)

    ...hitcomputer hitscience, primarily affect the security arena regarding the fields of...
    ...field of both social and hitcomputer hitsciences, and to indulge in many different...





  • 16

    Highlighting Artificial Intelligence: An Interview with Paul Scharre

    Anonymous.Strategic Studies Quarterly: SSQ; Maxwell Air Force Base Vol. 11, Iss. 4,  (Winter 2017): 15-22.

    ...hitmachine hitlearning, often using deep neural networks, that can make machines very...
    ...hitmachine hitlearning working together. One challenge is going to be how we avoid...
    ...an hitartificial hitintelligence future? Mr. Scharre: People have been talking about...



  • 17

    Proving Cybercriminals' Possession of Stolen Credit Card Details on Compromised POS Devices

    Nel, Wynand; Burger, Andries.International Conference on Cyber Warfare and Security; Reading : 254-XV. Reading: Academic Conferences International Limited. (2017)

    ...Wynand Nel is a lecturer in the Department of hitComputer hitScience and hitInformatics...
    ...is lecturing modules in hitInformation hitSecurity and Digital hitForensics. ...
    ...p. 379). Verine Etsebeth, a lecturer in hitInformation hitSecurity and Data Protection...





  • 18

    Timing, Sequencing, and Quantum of Life Course Events: A Machine Learning Approach

    Billari, Francesco C; Fürnkranz, Johannes; Prskawetz, Alexia.European Journal of Population; Dordrecht Vol. 22, Iss. 1,  (2006): 37-65.

    ... notions of the hitmachine hitlearning and hitdata hitmining approach, which are...
    ... areas for Articial Intelligence techniques. hitMachine hitlearning and...
    ...applications. A selection of recent applications in hitmachine hitlearning and hitdata...





  • 19

    Cytobank; Cytobank Awarded NIH Grant to Scale Its Cloud-Based Machine Learning Platform for Accelerating Immunotherapy Translational Research

    Politics & Government Business; Atlanta [Atlanta]16 Aug 2018: 19.

    ...the NIH to scale and add more hitmachine hitlearning algorithms to its cloud-based...
    ...our research we have found that high-dimensional hitmachine hitlearning-based analyses...
    ...United States, Cloud Computing, hitMachine hitLearning, Clinical Research, Drugs and...



  • 20

    The Double Life of Your Browser: Implications on Privacy and Forensics

    Vlajic, Natalija; Shi, Xue Ying; Roumani, Hamzeh.International Conference on Cyber Warfare and Security; Reading : 374-XVII. Reading: Academic Conferences International Limited. (2017)

    ...include: information and hitnetwork hitsecurity, computer networks and protocols,...
    ...Applied computing [rarr] Computer hitforensics [rarr] Evidence collection,...







*

Proquest Social Science Journals
4,387 Results


Content Sample




  • 1

    Mathematical Analysis for Machine Learning and Data Mining

    ProtoView; Beaverton  Vol. 2018, Iss. 34,  Beaverton: Ringgold Inc. (Aug 7, 2018)

    ...introduces mathematical analysis for hitmachine hitlearning and hitdata hitmining to...
    ...hitMachine hitLearning and hitData hitMining AUTHOR: Dan Simovici AFFILIATION:...





  • 2

    Meta-MapReduce for scalable data mining

    Liu, Xuan; Wang, Xiaoguang; Matwin, Stan; Japkowicz, Nathalie.Journal of Big Data; Heidelberg Vol. 2, Iss. 1,  (Jul 2015): 1-21.

    ...hitmachine hitlearning algorithms in Map and Reduce functions. The relatively simple...
    ...to apply Meta-learning programmed with MapReduce to avoid parallelizing hitmachine...

    • Cited by (‎1)
    • References (‎36)


  • 3

    Informatics and Public Health at CDC

    Centers for Disease Control and Prevention; McNabb, Scott J N; Koo, D; Pinner, R; Seligman, J.MMWR. Morbidity and Mortality Weekly Report, suppl. 60 Years of Public Health Science at CDC; Atlanta,  Vol. 55, (Dec 22, 2006).

    ...hitcomputer hitscience, and molecular biology). Similarly, PHI merged the disciplines...
    ... 6. Burton AH, Dean JA, Dean AG. Software for hitdata hitmanagement and analysis in...

     

  • 4

    Automated Evaluation of Computer Programs at Undergraduate Level: Suitability Study for Competitive Events

    Skupiene, Jurate.Socialines Technologijos; Vilnius Vol. 1, Iss. 2,  (2011): n/a.

    ...hitcomputer hitscience in Lithuania and some other countries as well and may motivate...
    ...co-curricular activity related to hitcomputer hitscience which is seen as a good model...



  • 5

    MACHINE LEARNING AND MEANINGFUL CAREERS: INCREASING THE NUMBER OF WOMEN IN STEM

    Hoffman, Sarah F; Friedman, Hershey H.Journal of Research in Gender Studies; New York Vol. 8, Iss. 1,  (2018): 11-27.

    ...hitartificial hitintelligencehitmachine hitlearning; education; hitcomputer hitscience;...
    ...hitdata hitmining. In 2014 Ver Steeg developed an advanced hitmachine hitlearning method...
    ...Fighting Crime and Terrorism hitComputer hitscience and hitmachine hitlearning are also...



  • 6

    Handbook of Research on Data Science for Effective Healthcare Practice and Administration

    ProtoView; Beaverton  Vol. 2017, Iss. 32,  Beaverton: Ringgold Inc. (Aug 25, 2017)

    ...hitcomputer hitscience. They cover mathematical techniques and operation research,...
    ...applications of hitdata hitmining in healthcare using big data analytics, and...



  • 7

    How Bioethics Can Shape Artificial Intelligence and Machine Learning

    Nabi, Junaid.The Hastings Center Report; Hastings-on-Hudson Vol. 48, Iss. 5,  (Sep/Oct 2018): 10-13.

    ...hitintelligence and hitmachine hitlearning have the potential to revolutionize the...
    ...AI and hitmachine hitlearning advance, bioethical frameworks need to be tailored to...



  • 8

    A survey of open source tools for machine learning with big data in the Hadoop ecosystem

    Landset, Sara; Khoshgoftaar, Taghi M; Richter, Aaron N; Hasanin, Tawfiq.Journal of Big Data; Heidelberg Vol. 2, Iss. 1,  (Nov 2015): 1-36.

    ...hitmachine hitlearning tools for big data can be difficult. The available tools have...
    ...hitmachine hitlearning are becoming insufficient as we move towards distributed and...

    • References (‎169)


  • 9

    Machine Learning Approach to Identifying the Thought Markers of Suicidal Subjects: A Prospective Multicenter Trial

    Pestian, John P; Sorter, Michael; Connolly, Brian; Cohen, Kevin Bretonnel; McCullumsmith, Cheryl; et al.Suicide & Life - Threatening Behavior; Washington Vol. 47, Iss. 1,  (Feb 2017): 112.

    ...hitcomputer hitscience provides opportunities to understand suicide thought markers....



  • 10

    Data mining and machine learning in cybersecurity.

    Reference and Research Book News; Portland Vol. 26, Iss. 4,  (Aug 2011).

    ...the topics are classical hitmachine-hitlearning paradigms for hitdata hitmininghitmachine...
    ...and Du (hitcomputer hitscience, both Louisiana Technical U.) explain how hitmachine...
    ... TITLE: hitData hitmining and...



  • 11

    Smart Talk: Match patient with provider

    Wogen, Steve.HME News; Yarmouth Vol. 24, Iss. 1,  (Jan 2018): 8.

    ...hitLEARNiNG Q. What is hitartificial hitintelligence (Ai) and hitmachine hitlearning, and how...

     






  • 12
         
          FML-kNN: scalable machine learning on Big Data using k-nearest neighbor joins
    Chatzigeorgakidis, Georgios; Karagiorgou, Sophia; Athanasiou, Spiros; Skiadopoulos, Spiros.Journal of Big Data; Heidelberg Vol. 5, Iss. 1,  (Feb 2018): 1-27.



    • References (‎41)




  • 13

    Highlighting Artificial Intelligence: An Interview with Paul Scharre

    Anonymous.Strategic Studies Quarterly: SSQ; Maxwell Air Force Base Vol. 11, Iss. 4,  (Winter 2017): 15-22.

    ...hitmachine hitlearning, often using deep neural networks, that can make machines very...
    ...hitmachine hitlearning working together. One challenge is going to be how we avoid...
    ...an hitartificial hitintelligence future? Mr. Scharre: People have been talking about...





  • 14

    Machine Learning Methods for Demand Estimation

    Bajari, Patrick; Nekipelov, Denis; Ryan, Stephen P; Yang, Miaoyu.The American Economic Review; Nashville Vol. 105, Iss. 5,  (May 2015): 481-485.

    ... Friedman. 2009. The Elements of Statistical Learning: hitData hitMining,...
    ...modeling consumer behavior in the elds of hitcomputer hitscience and statistics. These...
    ...techniques from the hitmachine hitlearning literature.2 We consider eight...

    • Cited by (‎4)    
    • References (‎10)




  • 15

    Advances in machine learning and data mining for astronomy.

    Reference and Research Book News; Portland Vol. 27, Iss. 3,  (Jun 2012).

    ...hitmachine hitlearning and hitdata hitmining for astronomy. AUTHOR: Ed....
    ...in astronomical hitmachine hitlearning and hitdata hitmining, the sky pixelization for...
    ... SERIES: Chapman & Hall/CRC hitdata hitmining and knowledge...
    ct result item


  • .


  • 17

    Advances in machine learning and data mining for astronomy.: [1]

    Reference and Research Book News; Portland Vol. 27, Iss. 3,  (Jun 2012). [Duplicate]

    ...hitmachine hitlearning and hitdata hitmining for astronomy. AUTHOR: Ed....
    ...in astronomical hitmachine hitlearning and hitdata hitmining, the sky pixelization for...
    ... SERIES: Chapman & Hall/CRC hitdata hitmining and knowledge...



  • 18

    Quantum Machine Learning: What Quantum Computing Means to Data Mining

    ProtoView; Beaverton  Vol. 2, Iss. 2,  Beaverton: Ringgold Inc. (Jan 12, 2015)

    ...hitLearning: What Quantum Computing Means to hitData hitMining AUTHOR:...
    ...and hitdata hitmining, and quantum hitmachine hitlearning. The author has organized the bulk...



  • 19

    Learning cyber trust using a triadic functioning analysis: a qualitative approach

    Tsai, Yuan Hui; Lin, Chieh-peng; Chiu, Chou-kang; Joe, Sheng-wuu.Quality and Quantity; Dordrecht Vol. 44, Iss. 6,  (Oct 2010): 1165-1174.

    ...hitcomputer hitsciencehitinformation hitscience and some social sciences. Although social...
    ...hitcomputer hitsciencehitinformation hitscience and some social sciences (Kling 1999)....

    • Cited by (‎1)    
    • References (‎45)


  • 20

    Timing, Sequencing, and Quantum of Life Course Events: A Machine Learning Approach

    Billari, Francesco C; Fürnkranz, Johannes; Prskawetz, Alexia.European Journal of Population; Dordrecht Vol. 22, Iss. 1,  (2006): 37-65.

    ... notions of the hitmachine hitlearning and hitdata hitmining approach, which are...
    ... areas for Articial Intelligence techniques. hitMachine hitlearning and...
    ...applications. A selection of recent applications in hitmachine hitlearning and hitdata...

    • Cited by (‎7)


  • 21

    Intrusion detection model using machine learning algorithm on Big Data environment

    Suad Mohammed Othman; Ba-Alwi, Fadl Mutaher; Alsohybe, Nabeel T; Al-Hashida, Amal Y.Journal of Big Data; Heidelberg Vol. 5, Iss. 1,  (Sep 2018): 1-12.

    ...of data and its incremental increase have changed the importance of hitinformation...



  • 22

    Statistical and machine-learning data mining; techniques for better predictive modeling and analysis of big data, 2d ed.

    Reference and Research Book News; Portland Vol. 27, Iss. 2,  (Apr 2012).

    ...hitmachine-hitlearning hitdata hitmining; techniques for better predictive modeling and...
    ... REVIEW: Distinguishing between statistical hitdata hitmining and...



  • 23

    Survey of review spam detection using machine learning techniques

    Crawford, Michael; Khoshgoftaar, Taghi M; Prusa, Joseph D; Richter, Aaron N; Hamzah Al Najada.Journal of Big Data; Heidelberg Vol. 2, Iss. 1,  (Oct 2015): 1-24.

    ...it is possible to conduct review spam detection using various hitmachine hitlearning...
    ...we survey the prominent hitmachine hitlearning techniques that have been proposed to...
    ...of current research on detecting review spam using various hitmachine hitlearning...

    • References (‎44)



     




  • 24

    Getting Involved: Perspectives on the Use of True Projects as Tools for Developing Ethical Thinking in Computer ScienceStudents

    Godejord, Per Arne.International Journal of Technology and Human Interaction; Hershey Vol. 4, Iss. 2,  (Apr-Jun 2008): 22-34.

    ...hitcomputer hitscience and the course in social hitinformatics. The project focused on...
    ...hitcomputer hitscience in 2002. Nesna University College has been using the example of...
    ...learning within the field of ethics in hitcomputer hitscience. The project also gave...

    • References (‎10)


  • 25

    Machine Learning: An Applied Econometric Approach

    Mullainathan, Sendhil; Spiess, Jann.The Journal of Economic Perspectives; Nashville Vol. 31, Iss. 2,  (Spring 2017): 87-106.

    ...hitmachine hitlearning that gives it its own place in the econometric toolbox. hitMachine...

    • Cited by (‎3)






     

  • 26

    Predicting Language Difficulties in Middle Childhood From Early Developmental Milestones: A Comparison of Traditional Regression and Machine Learning Techniques

    Armstrong, Rebecca; Symons, Martyn; Scott, James G; Arnott, Wendy L; Copland, David A; et al.Journal of Speech, Language and Hearing Research (Online); Rockville Vol. 61, Iss. 8,  (Aug 2018): 1-19.

    ...regression models and interpretable hitmachine hitlearning algorithms were used...
    ...hitmachine hitlearning models using communication-only performance as well as...
    ...that hitmachine hitlearning algorithms provide equivalent predictive accuracy to...



  • 27

    Machine Learning, Sentiment Analysis, and Tweets: An Examination of Alzheimer's Disease Stigma on Twitter

    Oscar, Nels; Fox, Pamela A; Croucher, Racheal; Wernick, Riana; Keune, Jessica; et al.The Journals of Gerontology: Psychological sciences and social sciences, Series B; Oxford Vol. 72, Iss. 5,  (Sep 2017): 742.

    ...large publicly available datasets. Method hitMachine hitlearning techniques modeled...

      •            
    • Cited by (‎3)


  • 28

    Smart Talk: Develop healthcare journey

    Wogen, Steve.HME News; Yarmouth Vol. 23, Iss. 11,  (Nov 2017): 11.

    ...hitlearninG Q. How can hitmachine hitlearning help with communication and...
    ...provide a costeffective solution and avoid hospital readmissions. hitMachine...



  • 29

    Computer Science and Programming Courses in Geography Departments in the United States

    Bowlick, Forrest J.; Goldberg, Daniel W.; Bednarz, Sarah Witham.Professional Geographer; Washington Vol. 69, Iss. 1,  (Feb 2017): 138-150.

    ...Geographer hitComputer hitScience...
    ...hitcomputer hitscience. There is little research, however, about how best to prepare...



  • 30

    Artificial intelligence special session on advances in artificial intelligence and applications; proceedings.

    Reference and Research Book News; Portland Vol. 27, Iss. 1,  (Feb 2012).

    ...recognition and hitdata hitmining for decision making, and bioinformatics and medical...
    ...hitintelligence special session on advances in hitartificial hitintelligence and...



  • 31

    Artificial Intelligence -- Artificial Intelligence: The Case Against edited by Rainer Born

    Phillips, Gerald.Communication Quarterly; University Park Vol. 38, Iss. 4,  (Fall 1990): 405.






  • 32

    ACIS international symposiums on cryptography, network securitydata mining and knowledge discovery, e-commerce and its applications, and embedded systems; proceedings.

    Reference and Research Book News; Portland Vol. 26, Iss. 4,  (Aug 2011).

    ...cryptography, hitnetwork hitsecurityhitdata hitmining and knowledge discovery, e-commerce...
    ...'l Symposiums on Cryptography, hitNetwork hitSecurityhitData hitMining...
    ct result item


  • 33

    32.3 INFORMED CONSENT FOR WHO KNOWS WHAT: ETHICAL DILEMMAS OF BIG DATA AND MACHINE LEARNINGAPPROACHES IN CHILD AND ADOLESCENT PSYCHIATRY

    Deschamps, Peter, MD, PhD.Journal of the American Academy of Child and Adolescent Psychiatry, suppl. Supplement 1; Baltimore Vol. 55, Iss. 10,  (Oct 2016): S308.

    ...of third-party data storage and hitdata hitmining; 3) pitfalls of combining electronic...



  • Select result item34

    Deep learning applications and challenges in big data analytics

    Najafabadi, Maryam M; Villanustre, Flavio; Khoshgoftaar, Taghi M; Seliya, Naeem; Wald, Randall; et al.Journal of Big Data; Heidelberg Vol. 2, Iss. 1,  (Feb 2015): 1-21.

    ...hitinformatics. Companies such as Google and Microsoft are analyzing large volumes...

    • Cited by (‎35)             
    • References (‎60)




  • 35

    Machine learning forensics for law enforcement, security, and intelligence.

    Reference and Research Book News; Portland Vol. 26, Iss. 5,  (Oct 2011).

    ...hitMachine hitlearning hitforensics can be used to recognize patterns of criminal...
    ... TITLE: hitMachine hitlearning...






*

Proquest Sociology
1,182 Results


Content Sample





  • 1

    Forecasts of Violence to Inform Sentencing Decisions

    Berk, Richard; Bleich, Justin.Journal of Quantitative Criminology; New York Vol. 30, Iss. 1,  (Mar 2014): 79-96.

    ...in other jurisdictions. Research has shown that hitmachine hitlearning can lead to...
    ...infrastructure to support hitmachine hitlearning. The intent of this paper is provide...
    ...hitmachine hitlearning is not practical. We consider how classication trees can be...

    • Cited by (‎5)
    • References (‎57)



     

  • 2

    Machine Learning Approach to Identifying the Thought Markers of Suicidal Subjects: A Prospective Multicenter Trial

    Pestian, John P; Sorter, Michael; Connolly, Brian; Cohen, Kevin Bretonnel; McCullumsmith, Cheryl; et al.Suicide & Life - Threatening Behavior; Washington Vol. 47, Iss. 1,  (Feb 2017): 112.

    ...hitcomputer hitscience provides opportunities to understand suicide thought markers....

    • Cited by (‎3)
    • References (‎56)



  • Select result item3
    scholarly journals

    Learning cyber trust using a triadic functioning analysis: a qualitative approach

    Tsai, Yuan Hui; Lin, Chieh-peng; Chiu, Chou-kang; Joe, Sheng-wuu.Quality and Quantity; Dordrecht Vol. 44, Iss. 6,  (Oct 2010): 1165-1174.

    ...hitcomputer hitsciencehitinformation hitscience and some social sciences. Although social...
    ...hitcomputer hitsciencehitinformation hitscience and some social sciences (Kling 1999)....

    •      Cited by (‎1)
    • References (‎45)





  • 4

    Timing, Sequencing, and Quantum of Life Course Events: A Machine Learning Approach

    Billari, Francesco C; Fürnkranz, Johannes; Prskawetz, Alexia.European Journal of Population; Dordrecht Vol. 22, Iss. 1,  (2006): 37-65.

    ... notions of the hitmachine hitlearning and hitdata hitmining approach, which are...
    ... areas for Articial Intelligence techniques. hitMachine hitlearning and...
    ...applications. A selection of recent applications in hitmachine hitlearning and hitdata...

    • Cited by (‎7)





  • 5

    Sharing the Educational Wealth: A Nursing and Health Informatics Program Collaboration

    Brewster, Robin, DNP, RN, AGNP-BC; Scully, Cathleen, DNP, RN, AGNP-BC;
    Saeed, Anam, BS; Chhetri, Shreyi Rimal, BS; Irigoyen, Laura, BS.
    Journal of Health Care for the Poor and Underserved; Baltimore Vol. 27, Iss. 2, 
    (May 2016): XIV,XV,XVI,XVII,XVIII,XIX.

    ...large data sets inform health care research, hitdata hitmining, and hitmachine hitlearning....
    ...hitdata hitmanagement are performed by a single data manager and are designed to...
    ...care needs are projected to require significant expansion of the hitinformatics...





  • 6

    How Should Health Data Be Used?

    KAPLAN, BONNIE.Cambridge Quarterly of Healthcare Ethics: CQ; New York Vol. 25, Iss. 2,  (Apr 2016): 312-329.

    ...who benefits from data disclosure and aggregation, and secondary use for hitdata...
    ...secondary use of data for hitdata hitmining, marketing, research, public health, and...
    ...from the original source. Health Data Uses: Big Data, hitData hitMining...



  • 7

    A usabilidade na perspectiva do uso da informac?o: estatisticas das pesquisas sobre o tema no Brasil.

    de Souza, Osvaldo.Informação & Sociedade; João Pessoa Vol. 25, Iss. 1,  (2015): n/a.

    ...hitInformation hitScience are: Library Science, hitComputer hitScience and Administration....
    ...hitInformation hitScience, presents detailed data of research groups in Brazil. This...
    ...usability and particularized the analysis on subarea of hitInformation hitScience....

    • References (‎20)




  • 8

    Developing a theory-based information security management framework for human service organizations

    Mubarak, Sameera.Journal of Information, Communication & Ethics in Society; Bingley Vol. 14, Iss. 3,  (2016): 254-271.

    ...hitinformation hitsecurity crime is not just a concern for nations; it is a concern...
    ...scope of hitinformation hitsecurity now stretches from the IT resources within an...
    ...is essential (Von Solms and Von Solms, 2004). Appropriate hitinformation hitsecurity...



  • 9

    The Trail Making test: a study of its ability to predict falls in the acute neurological in-patient population

    Mateen Bilal Akhter; Bussas Matthias; Doogan, Catherine; Waller, Denise; Saverino Alessia; et al.Clinical Rehabilitation; London Vol. 32, Iss. 10,  (Oct 2018): 1396-1405.

    ...used to create a hitmachine hitlearning-based predictive tool for falls...
    ...methods were then compared with more recent hitmachine hitlearning based strategies,...
    ... Conclusion: This study identifies a simple yet powerful hitmachine hitlearning...



  • 10

    The Community Informatics of an Aging Society: A Comparative Case Study of Senior Centers and Public Libraries

    Lenstra, Noah.University of Illinois at Urbana-Champaign, ProQuest Dissertations Publishing, 2016. 10609911.

    ...the fields of community hitinformatics and library & hitinformation hitscience, both...
    ..., the hitinformatics lifecourse. This concept refers to how a person learns...
    ...stages of his or her life. The hitinformatics lifecourse is populated by countless...

    • Cited by (‎1)
    • References (‎232)




*


Proquest Statistical Insight 
4,467 Results



Content Sample


  • 1
    Regional Computer Forensics Laboratory: Annual Report for FY2012
    (64 p.) Published: 2013, Source: Federal Bureau of Investigation, SuDoc: J1.14/31:2012, Record Number: 2013 ASI 6224-17
    Data Summary: Computer forensics labs, digital forensics services, training, and funding allocations, FY2012, annual rpt

  • 2
    Regional Computer Forensics Laboratory: Annual Report for FY2011
    (60 p.) Published: 2012, Source: Federal Bureau of Investigation, SuDoc: J1.14/31:2011, Record Number: 2012 ASI 6224-17
    Data Summary: Computer forensics labs, digital forensics services, training, and funding allocations, FY2011, annual rpt

  • 3
    Sexual Assault: Information on Training, Funding, and the Availability ofForensic Examiners
    (44 p.) Published: 2017, Source: Government Accountability Office, SuDoc: GA1.13:GAO-16-334, Record Number: 2017 ASI 26108-3251
    Data Summary: Justice Dept grants for training sexual assault forensic examiners, by grant program and State, various periods 2013-16, GAO rpt

  • 4
    Publicly Funded Forensic Crime Laboratories: Resources and Services, 2014 : Bureau of Justice Statistics Bulletin
    (12 p.) Published: 2016, Source: Office of Justice Programs (Department of Justice), SuDoc: J29.11:250151, Record Number: 2016 ASI 6066-25.266
    Data Summary: Forensic crime lab services and resources, by jurisdiction type, selected years 2002-14

  • 5
    Census of Publicly Funded Forensic Crime Laboratories, 2009 : Bureau of Justice Statistics Bulletin
    (14 p.) Published: 2012, Source: Office of Justice Programs (Department of Justice), Record Number: 2012 ASI 6066-25.226
    Data Summary: Forensic crime lab funding, employment, and requests for services, by jurisdiction type, selected years 2002-09

  • 6
    Peru Statistical Compendium, 2014 [Compendio Estadistico del Peru, 2014]
    Published: 2015, Source: Peru National Institute of Statistics and Informatics (Peru), Record Number: 2015 IIS 7260-S1
    Data Summary: Peru socioecon detailed indicators, 2014 Peru Natl Inst of Statistics and Informatics annual rpt

  • 7
    Peru Statistical Compendium, 2012
    Published: 2013, Source: Peru National Institute of Statistics and Informatics (Peru), Record Number: 2013 IIS 7260-S1
    Data Summary: Peru socioecon detailed indicators, 2012 Peru National Inst of Statistics and Informatics annual rpt

  • 8
    Publicly Funded Forensic Crime Laboratories: Quality Assurance Practices, 2014 : Bureau of Justice Statistics Bulletin
    (11 p.) Published: 2016, Source: Office of Justice Programs (Department of Justice), SuDoc: J29.11:250152, Record Number: 2016 ASI 6066-25.265
    Data Summary: Forensic crime lab quality assurance practices, by jurisdiction type, accreditation status, and other characteristics, selected years 2002-14

  • 9
    Research Data Management Services : SPEC Kits
    (220 p.) Published: 2014, Source: Association of Research Libraries, Record Number: 2014 SRI A3365-14.61
    Data Summary: Research data mgmt services of research libraries, incl mgmt plan consultation and training for researchers, archiving practices, staff and roles, and funding, May 2013 survey

  • 10
    Audit of the Federal Bureau of Investigation Laboratory's Forensic DNA Case Backlog : U.S. Department of Justice, Office of the Inspector General, Audit Division: Audit Reports
    (48 p.) Published: 2012, Source: Department of Justice, Record Number: 2012 ASI 6006-7.135
    Data Summary: FBI Laboratory forensic DNA case backlog, and case backlog reduction and info mgmt system implementation audit results, various periods 2003-12

  • 11
    Library and Information Science Education Statistical Report, 2012
    (347 p.) Published: 2013, Source: Association for Library and Information Science Education, Record Number: 2013 SRI A3235-1
    Data Summary: Library/info science school enrollment, staff and student characteristics, finances, and curricula, by school and degree program, 2012 annual rpt

  • 12
    Audit of the Federal Bureau of Investigation's Philadelphia Regional ComputerForensic Laboratory, Radnor, Pa. : U.S. Department of Justice, Office of the Inspector General, Audit Division: Audit Reports
    (36 p.) Published: 2015, Source: Department of Justice, SuDoc: J37.15:15-14, Record Number: 2015 ASI 6006-7.226
    Data Summary: Forensic crime labs DNA testing backlog and open service requests audit results for Philadelphia Regional Computer Forensic Laboratory, FY2011-13

  • 13
    Review of Medicare Contractor Information Security Program Evaluations for FY2012 : Department of Health and Human Services, Office of Inspector General Reports
    (23 p.) Published: 2014, Source: Department of Health and Human Services, Record Number: 2014 ASI 4006-11.378
    Data Summary: Medicare contractor info security gaps, by type, FY2011-12

  • 14
    Review of Medicare Contractor Information Security Program Evaluations for FY2013 : Department of Health and Human Services, Office of Inspector General Reports
    (19 p.) Published: 2015, Source: Department of Health and Human Services, Record Number: 2015 ASI 4006-11.425
    Data Summary: Medicare contractor info security gaps, by type, FY2011-13

  • 15
    Computer Programming and Consultancy Statistics. Eurostat: Statistics Explained : Eurostat: Statistics Explained
    (10 p.) Published: 2016, Source: European Union, Record Number: 2016 IIS 1600-S295.431
    Data Summary: Computer programming and consultancy services enterprises, employment, financial turnover, value added, capital investments, labor costs and productivity, and operating and investment rates, EU and other European countries, 2012, EU rpt

  • 16
    Report to Congress on Implementation of the Federal Information SecurityManagement Act of 2002, FY2012
    (67 p.) Published: 2013, Source: Office of Management and Budget, SuDoc: PREX2.37/2:2012, Record Number: 2013 ASI 104-44
    Data Summary: Info technology security requirements of Fed Info Security Mgmt Act, compliance by agencies, FY2012, annual rpt

  • 17
    Polar Weather Satellites: NOAA Is Working to Ensure Continuity But Needs to Quickly Address Information Security Weaknesses and Future Program Uncertainties
    (70 p.) Published: 2017, Source: Government Accountability Office, SuDoc: GA1.13:GAO-16-359, Record Number: 2017 ASI 26108-3285
    Data Summary: NOAA Joint Polar Satellite program costs and status, and implementation of info security protections for polar satellite data, various periods 2010-15, GAO rpt

  • 18
    Evaluation of DHS' Information Security Program for FY2014 : Department of Homeland Security Office of Inspector General Management Reports
    (62 p.) Published: 2015, Source: Department of Homeland Security, SuDoc: HS1.22:15-16, Record Number: 2015 ASI 8736-2.248
    Data Summary: Homeland Security Dept info security program and info systems compliance with Fed Info Security Mgmt Act, by subagency, various periods FY2012-14, annual rpt

  • 19
    Review of Medicare Contractor Information Security Program Evaluations for FY2011 : Department of Health and Human Services, Office of Inspector General Reports
    (22 p.) Published: 2014, Source: Department of Health and Human Services, Record Number: 2014 ASI 4006-11.335
    Data Summary: Info technology security requirements of Fed Info Security Mgmt Act, and compliance among Medicare contractors, FY2010-11

  • 20
    Report to Congress on Implementation of the Federal Information SecurityManagement Act of 2002, FY2011
    (63 p.) Published: 2012, Source: Office of Management and Budget, SuDoc: PREX2.37/2:2011, Record Number: 2012 ASI 104-44
    Data Summary: Info technology security requirements of Fed Info Security Mgmt Act, compliance by agencies, FY2011, annual rpt



*



David Dillard

 

NET-GOLD

http://groups.yahoo.com/group/net-gold


https://groups.io/org/groupsio/net-gold/archives

http://net-gold.3172864.n2.nabble.com/

 

Research Guides

https://sites.google.com/site/researchguidesonsites/

 

 

Research Paper Writing

https://sites.google.com/site/howtowriteasuperresearchpaper/

 Employment

https://sites.google.com/site/employmentsources/

Internships

https://sites.google.com/site/internshipsarticles/

Hospitality

https://sites.google.com/site/hospitalitydatabasesandtools/

 Disabilities And Employment

https://sites.google.com/site/disabilitynetsources/Home/employment-and-disabilities

Indoor Gardening

https://groups.yahoo.com/neo/groups/indoorgardeningurban/info

Educator-Gold

http://groups.yahoo.com/group/educator-gold/

K12ADMINLIFE

http://groups.yahoo.com/group/k12adminlife/

 

Blog

https://educatorgold.wordpress.com/

 

Research Guide:

Information Literacy

http://tinyurl.com/78a4shn

 

Twitter: davidpdillard

 

Bushell, R. & Sheldon, P. (Eds),

Wellness and Tourism: Mind, Body, Spirit,

Place, New York: Cognizant Communication Books.

Wellness Tourism: Bibliographic and Webliographic Essay

David P. Dillard

http://tinyurl.com/p63whl

 

Railtram Discussion Group

from the union pacific to britrail and beyond

https://groups.yahoo.com/neo/groups/railtram/info

 

Indoor Gardening

improve your chances for indoor gardening success

http://tech.groups.yahoo.com/group/indoorgardeningurban/

 

Sport-Med

https://www.jiscmail.ac.uk/lists/sport-med.html

http://groups.yahoo.com/group/sports-med/

 

Health Diet Fitness Recreation Sports Tourism

https://groups.yahoo.com/neo/groups/healthrecsport/info


 

 

 

 

 

 

.

 

.

 

Please Ignore All Links to JIGLU

in search results for Net-Gold and related lists.

The Net-Gold relationship with JIGLU has

been terminated by JIGLU and these are dead links.

http://groups.yahoo.com/group/Net-Gold/message/30664

http://health.groups.yahoo.com/group/healthrecsport/message/145


 

.

 

.

 









Comments