Description
Metadata
Settings
owl:sameAs
Inference Rule:
b3s
b3sifp
facets
http://www.w3.org/2002/07/owl#
ldp
oplweb
skos-trans
virtrdf-label
None
About:
2012
Sponge
Permalink
An Entity of Type :
owl:Thing
, within Data Space :
134.155.108.49:8890
associated with source
dataset(s)
Attributes
Values
rdfs:label
2012
is
dcterms:subject
of
Space Acquisitions: DOD Faces Challenges in Fully Realizing Benefits of Satellite Acquisition Improvements
The Safety Challenge and Promise of Automotive Electronics: Insights from Unintended Acceleration
VA Administrative Investigations: Improvements Needed in Collecting and Sharing Information
Federal Information Technology Shared Services Strategy
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement
Unmanned Aircraft Systems: Measuring Progress and Addressing Potential Privacy Concerns Would Facilitate Integration into the National Airspace System
GAO Reports - 2012
Handbook for Safeguarding Sensitive Personally Identifiable Information
Roadshow Films Pty Ltd & Ors v iiNet Ltd
Recommendations for Standardized Implementation of Digital Privacy Controls
Report to the President: Realizing the Full Potential of Government-held Spectrum to Spur Economic Growth
Contracting Guidance to Support Modular Development
IT Supply Chain: National Security-Related Agencies Need to Better Address Risks
Updating U.S. Federal Cybersecurity Policy and Guidance
Recommendation of the Council on the Protection of Children Online
Report on a Digital Freedom Strategy in EU Foreign Policy
OMB Memorandum M-12-10
Effort to Consolidate Governmentwide Acquisition Data Systems Should Be Reassessed
Data Security Breach Notification Laws
Privacy Enforcement and Protection Unit
Significant Cyber Events Since 2006
Federal Telework: Program Measurement Continues to Confront Data Reliability Issues
Bollea v. Gawker Media
Unleashing the Potential of Cloud Computing in Europe-Accompanying Staff Working Document
Code of Best Practices in Fair Use for Academic and Research Libraries
A Strategy for E-procurement
Export Enforcement Coordination Center
Understanding Voice over Internet Protocol
The Networked Energy Web: The Convergence of Energy Efficiency, Smart Grid, and Distributed Power Generation as the Next Frontier of the ICT Revolution
Opinion 05/2012 on Cloud Computing
Information Technology: HUD's Fiscal Year 2011 Expenditure Plan Satisfies Statutory Conditions
Protecting Classified Information and the Rights of Criminal Defendants: The Classified Information Procedures Act
Security Categorization and Control Selection for National Security Systems
Recommendations for the Remediation of Bots in ISP Networks
Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy
In the Matter of Rules and Regulations Implementing the Telephone Consumer Protection Act of 1991
CJCSI 6211.02D
PortfolioStat
Enforceable Codes of Conduct: Protecting Consumers Across Borders
MHealth Task Force: Findings and Recommendations
In Short: Advertising & Privacy Disclosures in a Digital World
ICT for Disabled People
Medical Devices: FDA Should Expand Its Consideration of Information Security for Certain Types of Devices
Mobile Device Location Data: Additional Federal Actions Could Help Protect Consumer Privacy
Middle Class Tax Relief and Job Creation Act of 2012
Public Interest Declassification Board Reauthorization Act of 2012
Recommendations for Establishing an Identity Ecosystem Governance Structure for the National Strategy for Trusted Identities in Cyberspace
Cybersecurity: Managing Risks for Greater Opportunities
Medicare: Action Needed to Remove Social Security Numbers from Medicare Cards
Federal Support for and Involvement in State and Local Fusion Centers
Order to File Special Report
Towards a Comprehensive European Framework for Online Gambling
Selected Federal Data Security Breach Legislation
FM 3-55
Tetris Holding v. Xio Interactive
Cybersecurity: Threats Impacting the Nation
Consumers and Mobile Financial Services
Oracle America, Inc. v. Google
Privacy Considerations of Online Behavioural Tracking
Nanotechnology: Improved Performance Information Needed for Environmental, Health, and Safety Research
Study on Specialized Intellectual Property Courts
Executive Order 13587
IT Supply Chain: Additional Efforts Needed by National Security-Related Agencies to Address Risks
Leading Education by Advancing Digital Commission
Global Survey on Internet Privacy and Freedom of Expression
Espinoza v. County of Orange
NIST Special Publication 800-40
The Development and Diffusion of Digital Content
The Use of the Internet for Terrorist Purposes
Foreign Police Assistance: Defined Roles and Improved Information Sharing Could Enhance Interagency Collaboration
Unmanned Aircraft System Operations in UK AirspaceāGuidance
Best Practices to Address Online and Mobile Threats
Social Security Administration: Improved Planning and Performance Measures Are Needed to Help Ensure Successful Technology Modernization
Protection of Digital Computer and Communications Systems and Networks
DHS Records Working Group
Guidelines for Access, Retention, Use, and Dissemination by the National Counterterrorism Center and Other Agencies of Information in Datasets Containing Non-terrorism Information
ICS-CERT Year in Review: Industrial Control Systems Cyber Emergency Response Team, 2012
E-books: Developments and Policy Considerations
Creating Effective Cloud Computing Contracts for the Federal Government, Best Practices for Acquiring IT as a Service
Bringing e-commerce benefits to consumers
Lessons Learned: Roadblocks and Opportunities for Open Source Software (OSS) in U.S. Government
Data Breach Response Checklist
Digital Hubs Pilot Project
Investigative Report on the U.S. National Security Issues Posed by Chinese Telecommunications Companies Huawei and ZTE
Anonymisation: Managing Data Protection Risk, Code of Practice
Intelligence Community Legal Reference Book
Department of the Army, Information Collection
Intelligent Transportation Systems: Improved DOT Collaboration and Communication Could Enhance the Use of Technology to Manage Congestion
The Internet of Things: A Reality Check
Electricity Subsector Cybersecurity Risk Management Process
Defense Biometrics: Additional Training for Leaders and More Timely Transmission of Data Could Enhance the Use of Biometrics in Afghanistan
U.S. National Science Foundation: An Overview
FM 6-01.1
Facing Facts: Best Practices for Common Uses of Facial Recognition Technologies
Internet Global Growth: Lessons for the Future
Cyber Security Task Force: Public-Private Information Sharing
Application Whitelisting Explained
U.S. v. RockYou
Industry Botnet Group
◂◂ First
◂ Prev
Next ▸
Last ▸▸
Page 1 of 3
Go
Alternative Linked Data Views:
ODE
Raw Data in:
CXML
|
CSV
| RDF (
N-Triples
N3/Turtle
JSON
XML
) | OData (
Atom
JSON
) | Microdata (
JSON
HTML
) |
JSON-LD
About
OpenLink Virtuoso
version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software