Description
Metadata
Settings
owl:sameAs
Inference Rule:
b3s
b3sifp
facets
http://www.w3.org/2002/07/owl#
ldp
oplweb
skos-trans
virtrdf-label
None
About:
2013
Sponge
Permalink
An Entity of Type :
owl:Thing
, within Data Space :
134.155.108.49:8890
associated with source
dataset(s)
Attributes
Values
rdfs:label
2013
is
dcterms:subject
of
Security and Pervasive Monitoring
Communication on the Functioning of the Safe Harbour from the Perspective of EU Citizens and Companies Established in the EU
Building Blocks for Smart Networks
Joint Spectrum Interference Resolution (JSIR) Procedures
OMB Memorandum M-14-03
Electronic and Mobile Commerce
NIST Special Publication 1163
MCloud
Cybersecurity: National Strategy, Roles, and Responsibilities Need to Be Better Defined and More Effectively Implemented
Designed-in Cyber Security for Cyber-Physical Systems
Rebuilding Trust in EU-US Data Flows
Measuring What Matters: Reducing Risk by Rethinking How We Evaluate Cybersecurity
Social Media Password Protection and Privacy-The Patchwork of State Laws and How It Affects Employers
2013 Data Breach Investigations Report
Information Technology Resource Management Glossary
Social Networking and Constituent Communications: Members' Use of Twitter and Facebook During a Two-Month Period in the 112th Congress
The Changing Textbook Industry
In the Matter of Epic Marketplace
Mobile Computing Decision Framework
Precision Tracking Space System
Polar Weather Satellites: NOAA Identified Ways to Mitigate Data Gaps, but Contingency Plans and Schedules Require Further Attention
Directive 2013/40/EU of the European Parliament and of the Council of 12 August 2013
The Department of Energy's July 2013 Cyber Security
Intercom Ventures v. FasTV
Air Force Social Media Guide
Information Security: Agency Responses to Breaches of Personally Identifiable Information Need to Be More Consistent
Peacetime Regime for State Activities in Cyberspace: International Law, International Relations and Diplomacy
An Assessment of the DoD Strategy for Operating in Cyberspace
Digital Asset Transfer Authority
Privacy Impact Assessment for EINSTEIN 3-Accelerated
Best Practices and Guidelines for Ad Networks to Address Piracy and Counterfeiting
Copyright Policy, Creativity, and Innovation in the Digital Economy
CRS Reports - 2013
New gTLD Collision Risk Mitigation
Tallinn Manual on the International Law Applicable to Cyber Warfare
Intelligence Issues for Congress
FTC Guidance to Search Engine Industry re: Need to Distinguish Between Advertisements and Search Results
Privacy Impact Assessment for the Enhanced Cybersecurity Services (ECS)
Inventory of Standards Relevant to Cloud Computing
NIST Special Publication 800-53
FTC v. Jesta Digital
The Next Great Copyright Act
Antiterrorism Operations and Intelligence Cell
Political Intelligence: Financial Market Value of Government Information Hinges on Materiality and Timing
Electric Vehicle-Smart Grid Interoperability Center
Opinion 03/2013 on Purpose Limitation
ISO 19115
Military and Security Developments Involving the People's Republic of China 2013
Terrorism, Miranda, and Related Matters
Raising the Bar for Cybersecurity
AllJoyn
Federal Information Security: Mixed Progress in Implementing Program Components; Improved Metrics Needed to Measure Effectiveness
Criminal Prohibitions on the Publication of Classified Defense Information
Army Networks: Size and Scope of Modernization Investment Merit Increased Oversight
Killer Robots: UK Government Policy on Fully Autonomous Weapons
Robotics and Autonomous Systems Special Interest Group
GPS Disruptions: Efforts to Assess Risks to Critical Infrastructure and Coordinate Agency Actions Should Be Enhanced
Bureau of the Public Debt: Areas for Improvement in Information Systems Controls
Next Generation Jammer: DOD Should Continue to Assess Potential Duplication and Overlap As Program Moves Forward
Advancing Smart Electricity Networks
Cybersecurity: Authoritative Reports and Resources
DoD Directive 5134.10
The Right to Blog
Administration Strategy on Mitigating the Theft of U.S. Trade Secrets
National Cyber Security Masterplan 2018
SEI Emerging Technology Center: Cyber Intelligence Tradecraft Project Summary of Key Findings
Proposal for a Directive of the European Parliament and of the Council concerning measures to ensure a high common level of network and information security across the Union
The Critical Infrastructure Gap: U.S. Port Facilities and Cyber Vulnerabilities
Increasing Access to the Results of Federally Funded Scientific Research
Integrating Diplomacy and Social Media: A Report of the First Annual Aspen Institute Dialogue on Diplomacy and Technology
President's Review Group on Intelligence and Communications Technologies
Protection of Freedoms Act 2012: Draft statutory guidance on the making or renewing of national security determinations allowing the retention of biometric data
Cybersecurity of Smart Grids (Summary Report)
Cloud Security Standards: What to Expect & What to Negotiate
Conflict and Negotiation in Cyberspace
Digital Economy Task Force
NSA Collecting Phone Records of Millions of Verizon Customers Daily
Fighting Identity Theft with the Red Flags Rule: A How-To Guide for Business
Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace
NIST Big Data Public Working Group
Authors Guild v. Google (Google II)
Application of Self-Regulatory Principles to the Mobile Environment
Towards Trustworthy Social Media and Crowdsourcing
Improving Cybersecurity
Information Resellers: Consumer Privacy Framework Needs to Reflect Changes in Technology and the Marketplace
Delivering on the Promise of Big Data and the Cloud
The Role of the National Science Foundation in the Origin and Evolution of Additive Manufacturing in the United States
Education-Status of the Department of Education's Inventory of Its Data Collections
Law and Ethics for Autonomous Weapon Systems: Why a Ban Won’t Work and How the Laws of War Can
Short Form Notice Code of Conduct To Promote Transparency In Mobile App Practices
ISO/IEC 2382-36:2013
Defense Acquisitions: DOD Efforts to Adopt Open Systems for Its Unmanned Aircraft Systems Have Progressed Slowly
Internet Pharmacies: Federal Agencies and States Face Challenges Combating Rogue Sites, Particularly Those Abroad
Hart v. Electronic Arts
NIST Special Publication 800-73-4
Cybersecurity of the Smart Grids
Mobile Privacy Disclosures: Building Trust Through Transparency
Declaration to be the World’s Most Advanced IT Nation
Army Networks: Opportunities Exist to Better Utilize Results from Network Integration Evaluations
◂◂ First
◂ Prev
Next ▸
Last ▸▸
Page 1 of 3
Go
Alternative Linked Data Views:
ODE
Raw Data in:
CXML
|
CSV
| RDF (
N-Triples
N3/Turtle
JSON
XML
) | OData (
Atom
JSON
) | Microdata (
JSON
HTML
) |
JSON-LD
About
OpenLink Virtuoso
version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software