Description
Metadata
Settings
owl:sameAs
Inference Rule:
b3s
b3sifp
facets
http://www.w3.org/2002/07/owl#
ldp
oplweb
skos-trans
virtrdf-label
None
About:
2014
Sponge
Permalink
An Entity of Type :
owl:Thing
, within Data Space :
134.155.108.49:8890
associated with source
dataset(s)
Attributes
Values
rdfs:label
2014
is
dcterms:subject
of
Global Cybercrime: The Interplay of Politics and Law
Cybersecurity Procurement Language for Energy Delivery Systems
Information Technology: Leveraging Best Practices and Reform Initiatives Can Help Defense Manage Major Investments
FAA Faces Significant Barriers to Safely Integrate Unmanned Aircraft Systems into the National Airspace System
Guidance Regarding Cyberspace Roles, Responsibilities, Functions, and Governance Within the DoD
Revenue and Customs Brief 9 (2014): Bitcoin and other Cryptocurrencies
Big Data and Privacy: A Technological Perspective
Best Practices for Data Destruction
NIST Special Publication 800-168
Nuclear Command, Control, and Communications: Review of DOD's Current Modernization Efforts
How Do We Know What Information Sharing Is Really Worth? Exploring Methodologies to Measure the Value of Information Sharing and Fusion Efforts
CRS Reports - 2014
Information and Communications in Japan 2014
Major Automated Information Systems: Selected Defense Programs Need to Implement Key Acquisition Practices
2013 Freedom of Information Act Report
Watching Below: Dimensions of Surveillance-by-UAVs in Canada
The Legal Needs of Emerging Online Media: The Online Media Legal Network After 500 Referrals
Autonomous Vehicle Technology: A Guide for Policymakers
Tax Information Security Guidelines For Federal, State and Local Agencies: Safeguards for Protecting Federal Tax Returns and Return Information
Australian Cyber Security Centre
Cloud Computing Policy
Handbook on European data protection law
Internet Domain Names: Background and Policy Issues
Energy Sector Cybersecurity Framework Implementation Guidance
National Cybersecurity Protection Act of 2014
Wireless Emergency Alerts (WEA) Cybersecurity Risk Management Strategy for Alert Originators
The Economics of Digital Currencies
Content of Premarket Submissions for Management of Cybersecurity in Medical Devices
Authors Guild v. HathiTrust
CNSSI No. 1253
Formal Opinion Interim No. 12-0006
Pan-American Governmental Access to Data in the Cloud
The Federal Government's Track Record on Cybersecurity and Critical Infrastructure
Unmanned Aerial Systems: Efforts Made toward Integration into the National Airspace Continue, but Many Actions Still Required
Cyber-Risk Oversight
Cybersecurity Enhancement Act of 2014
Information Security: IRS Needs to Address Control Weaknesses That Place Financial and Taxpayer Data at Risk
CryptoWall
NIST Roadmap for Improving Critical Infrastructure Cybersecurity
Technology Transfer: Federal Laboratory Consortium Should Increase Communication with Potential Customers to Improve Initiatives
Improving the Security of Consumer Financial Transactions
Preliminary Examination Instructions in view of the Supreme Court Decision in Alice Corporation Ply. Ltd. v. CLS Bank International, et al.
Inquiry Into Cyber Intrusions Affecting U.S. Transportation Command Contractors
OMB Memorandum M-15-01
Guidance for Industry: Internet/Social Media Platforms with Character Space Limitations-Presenting Risk and Benefit Information for Prescription Drugs and Medical Devices
Interested Parties Advancing Copyright
Denison v. Larkin
Notice of Completion of Notification of Cyber-Dependent Infrastructure and Process for Requesting Reconsideration of Determinations of Cyber Criticality
Guidelines on Regulating Robotics
Cybersecurity and the Smarter Grid
DoD Instruction 8500.01
Cyber Defence in the EU: Preparing for Cyber Warfare?
Cloud Computing: Additional Opportunities and Savings Need to Be Pursued
Consumer Guide to Protecting Privacy Online
Reducing Mobile Phone Theft and Improving Security,
Plain English ISO IEC 27000 2012 Information Security Definitions
Annual Assessment of the Internal Revenue Service Information Technology Program
Terrorist Identities Datamart Environment (TIDE) Fact Sheet
Protecting Student Privacy While Using Online Educational Services: Requirements and Best Practices
Authors Guild v. Google (Google II)
Fiscal Year 2014-2015 Guidance on Improving Federal Information Security and Privacy Management Practices
The Right to Privacy in the Digital Age
A Call for Action for Online Piracy and Counterfeiting Legislation
Medicaid: Use of Claims Data for Analysis of Provider Payment Rates
Net Losses: Estimating the Global Cost of Cybercrime
Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar
Initiative for ICT International Competitiveness Enhancement and International Expansion
NASA: Assessments of Selected Large-Scale Projects
A Criticism of the Current Security, Privacy and Accountability Issues in Electronic Health Records
Presidential Policy Directive 28: Signals Intelligence Activities
CTB-Locker
Cloud Service Level Agreement Standardisation Guidelines
Cybersecurity Workforce Assessment Act
NIST Special Publication 800-162
An Ethical Framework for Facial Recognition
The Future of Privacy
Report on the Telephone Records Program Conducted under Section 215 of the USA PATRIOT Act and on the Operations of the Foreign Intelligence Surveillance Court
Strategies to Mitigate Targeted Cyber Intrusions
Border Patrol Agent Pay Reform Act of 2014
Digital Accountability and Transparency Act
2014 Data Breach Investigations Report
Cyber Risks: The Growing Threat
U.S.-EU Cyber Cooperation
Guide to Undertaking Privacy Impact Assessments
Creative Content UK
Application of FinCEN's Regulations to Virtual Currency Software Development and Certain Investment Activity
Industrial Internet Consortium
Fox News Network v. TVEyes
ITI Recommendations to the Department of Homeland Security Regarding its Work Developing a Voluntary Program Under Executive Order 13636, "Improving Critical Infrastructure Cybersecurity"
Consumer Privacy Protection Principles: Privacy Principles for Vehicle Technologies and Services
Hackers Wanted: An Examination of the Cybersecurity Labor Market
Digital Arabic Content National Strategy
Risks to Consumers Posed by Virtual Currencies
Information Supplement: Third-Party Security Assurance
The Internet of Things: 2014 OECD Tech Insight Forum
Air Force Instruction 10-1701
FTC v. T-Mobile
Overview of the Baseline Safeguard Protections Under NCTC’s 2012 Attorney General Guidelines
Unmanned Aerial Systems: Department of Homeland Security's Review of U.S. Customs and Border Protection's Use and Compliance with Privacy and Civil Liberty Laws and Standards
◂◂ First
◂ Prev
Next ▸
Last ▸▸
Page 1 of 2
Go
Alternative Linked Data Views:
ODE
Raw Data in:
CXML
|
CSV
| RDF (
N-Triples
N3/Turtle
JSON
XML
) | OData (
Atom
JSON
) | Microdata (
JSON
HTML
) |
JSON-LD
About
OpenLink Virtuoso
version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software