tag:blogger.com,1999:blog-30061363633839462742024-03-05T17:22:18.725-08:00INFOPROACTIONDe l'information à la connaissance et l'action par les NTICUnknownnoreply@blogger.comBlogger77125tag:blogger.com,1999:blog-3006136363383946274.post-78031108646996612282011-08-03T08:57:00.000-07:002011-08-03T08:57:17.429-07:00NEW JOURNALISM?<br />
<a href="http://www.journalism.org/analysis_report/non_profit_news_1">ASSESSING A NEW LANDSCAPE IN JOURNALISM </a><br />
Project for Excellence in Journalism, July 18, 2011<br />
<br />
As traditional newsrooms have shrunk, a group of institutions and funders motivated by<br />
something other than profit are entering the journalism arena. This distinguishes them<br />
from the commercial news institutions that dominated the 20th century, whose primary<br />
sources of revenue -- advertising and circulation -- were self-evident.<br />
Who are these new players in journalism? Are these sites delivering, as they generally<br />
purport to be, independent and disinterested news reporting? Or are some of them more<br />
political and ideological in their reporting? How can audiences assess this for<br />
themselves? In short, what role are these operations playing in the changing ecosystem of<br />
news?<br />
Source US Embassy PARIS<br />
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3006136363383946274.post-39047496981956482362011-08-03T08:18:00.000-07:002011-08-03T08:21:19.682-07:00OWNI<a href="http://owni.fr/#aujourd-hui"><b><span class="Apple-style-span" style="font-size: large;">OWNI</span></b></a><br />
Cet "Objet Web Non Identifié" est un blog né dans la polémique contre la loi Hadopi et, plus généralement sur le rôle d'Internet dans la politique.-Politic Show)<br />
Il s'intéresse particulièrement aux reseaux sociaux et conseille les administrations et entreprises dans l'usage qu Web participatif.<br />
Site de "journalisme augmenté" , il recueille des données en coopération par exemple avec "60 millions de consommateurs" ou la Fondation France Libertés.A aussi passé un accord avec WikiLeaks...<br />
Sa notoriété lui permet d'installer une filiale dans la Silicon Valley.<br />
Nicols Voisin, jeune fondateur d'OWNI, vient d'e^tre nomm' au Conseil National du Numérique<br />
<a href="http://www.infoproaction.com/SOURCES/INTERNET/Information/WGI00index.htm">INDEX DE L'INFORMATION NUMERIQUE</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3006136363383946274.post-46980616768598592782011-07-21T14:18:00.000-07:002011-07-21T14:18:28.444-07:00Les Services secrets<br />
<b>Les Services secrets Archives inédites 1870-1989 </b><br />
<br />
Illustré de multiples documents : matériel d’espionnage, faux papiers, fiches de renseignement, dossiers biographiques, correspondances... ce bel ouvrage, Dans les Archives inédites des services secrets, publié aux éditions L’Iconoclaste et réalisé sous la direction scientifique de Bruno Fuligni et la direction éditoriale de Jean-Baptiste Bourrat, fait partie de la collection « Mémoires » lancée il y a 10 ans, par Sophie de Sivry.<br />
Deux années de travail et des dérogations exceptionnelles sur les affaires contemporaines ont été nécessaires pour rassembler et sélectionner plus de 800 pièces qui donnent aux événements un nouvel éclairage historique. 42 auteurs ont été choisis pour commenter et analyser les documents exhumés des principaux fonds d’archives du renseignement français dont notamment la Direction générale de la sécurité extérieure (DGSE) et la Direction centrale de la sécurité intérieure (DCRI) qui possèdent quatre « musées secrets » où sont exposés des trophées tels qu’un rouge à lèvres-pistolet employé par le KGB, une bombe de peinture à double fond ou une chaussure-micro soviétique, modèle 1960... Le livre se divise en trois parties, chacune préfacée, invitant le lecteur à découvrir les plus grandes affaires d’espionnage et de contre-espionnage français, de la défaite de 1870 à la fin de la Guerre froide. On pourra lire les aveux de Mata Hari, les confidences du secrétaire particulier de Staline, un rapport qui fait le point sur les relations entre les services secrets américains et français en Indochine ou encore la célèbre affaire Farewell du nom de code du Colonel du KGB, Vladimir Vetrov, qui communiqua à l’ex DST près de 3 000 documents contenus dans des microfilms et reproduits dans les pages du livre...<br />
Rencontre avec Bruno Fuligni et Jean-Baptiste Bourrat.<br />
<br />
Nathalie Jungerman<br />
<br />
FloriLettres<br />
Revue littéraire de la Fondation La Poste <a href="http://Florilettres%22%20%3Cflorilettres@laposte.net%3E/">Florilettres" <florilettres@laposte.net></florilettres@laposte.net></a><br />
<br />
<br />
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3006136363383946274.post-61821445041334535462011-07-19T07:37:00.000-07:002011-07-19T07:37:47.259-07:00COMMUNICATION: Etat des savoirs<br />
<div id="contenu">
<div id="ouvrage">
<div class="livre_ouvrage">
<div class="desc_ouvrage">
<h2>
<span class="titrelivre_acc"><a href="http://editions.scienceshumaines.com/la-communication-etat-des-savoirs_fr-306.htm">La communication. Etat des savoirs</a></span></h2>
<h3>
3e édition actualisée</h3>
<div class="sstitrelivre_acc">
Philippe Cabin et Jean-François Dortier</div>
<div class="livreinfos_acc">
6 mars 2008
- 416 pages
- ISBN : 9782912601636</div>
<div class="texte">
De la conversation ordinaire aux grands médias de
masse, des échanges privés à la communication dans l’entreprise, du
téléphone portable à Internet, des panneaux routiers aux satellites, la
communication est partout et a envahi nos vies.<br />Voilà pourquoi on n’hésite pas à parler aujourd’hui de « société de l’information et de la communication ».<br />Les sciences de l’information et de la communication se sont même constituées pour tenter de penser le phénomène.<br />Cet
ouvrage propose le bilan de cinquante ans de recherches sur la
communication et fait le point sur les grands enjeux liés aux
révolutions des nouvelles technologies.</div>
</div>
</div>
<div class="img_ouvrage">
<img alt="La communication. Etat des savoirs" src="http://editions.scienceshumaines.com/pics_bdd/images/12046341942_la_communication_258.jpg" style="border: 1px solid #999999;" /><br />
<a href="http://editions.scienceshumaines.com/index.php?controller=commande&action=panier&add_id_livre=306" title="ajouter au panier La communication. Etat des savoirs">
<img alt="ajouter au panier La communication. Etat des savoirs" src="http://editions.scienceshumaines.com/pics/esh/panier_gris.jpg" />
25 € </a>
</div>
<div class="separateur_acc_hide">
</div>
<div class="sstitre_ouvrage">
<h1>
<span class="sstitregris">présentation de l'</span><span class="sstitrenoir"> auteur</span> <span class="sstitregris">:</span></h1>
</div>
<div class="ouvrage">
</div>
Cet ouvrage a été coordonné par Philippe Cabin et Jean-François Dortier.<br />
<br />
Parmi les auteurs ayant participé à cet ouvrage:<br />
Daniel
Bougnoux, Jacques Cosnier, Daniel Dayan, Willem Doise, Gustave-Nicolas
Fischer, Patrice Flichy, Jacques Goldberg, Catherine Kerbrat-Orecchioni,
Pascal Lardellier, Edmond Marc Lipiansky, Philippe Meirieu, Bernard
Miège, Edgar Morin, Alex Mucchielli, Dominique Picard, Alain Rallet,
Emmanuel Sander, Yves Winkin, Dominique Wolton…<br />
<br />
<div class="separateur_acc_hide">
</div>
<div class="sstitre_ouvrage">
<h1>
<span class="sstitregris">au</span><span class="sstitrenoir"> sommaire</span> <span class="sstitregris">:</span></h1>
</div>
<div class="ouvrage">
</div>
<h3>
Introduction :</h3>
<h4>
La communication omniprésente mais toujours imparfaite</h4>
Jean-François Dortier<br />
<br />
<h3>
Première partie – La communication : enjeux et modèles</h3>
<br /><h4>
• L’enjeu humain de la communication </h4>
Edgar Morin <br />
<h4>
• La communication animale </h4>
Jacques Goldberg <br />
<h4>
• Pour une psychologie de la communication</h4>
Edmond Marc<br />
<h4>
• Les modèles de la communication </h4>
Alex Mucchielli<br />
<h4>
• Les sciences de l’information et de la communication </h4>
Karine Philippe<br />
<br /><br /><h3>
Deuxième partie – La communication interpersonnelle</h3>
<br /><h4>
• Points de repère : Théories et modèles </h4>
<h4>
<br />• Le face-à-face et ses enjeux </h4>
Edmond Marc<br />
<h4>
• Vers une anthropologie de la communication ? </h4>
Yves Winkin<br />
<h4>
• Le « collège invisible » </h4>
Jean-Baptiste Fages<br />
<h4>
• Gregory Bateson (1904-1980).</h4>
<h4>
Penser le changement </h4>
Xavier de La Vega<br />
<h4>
• Les gestes du dialogue </h4>
Jacques Cosnier<br />
<h4>
• L’analyse des conversations </h4>
Catherine kerbrat-Orecchioni<br />
<h4>
• Les rituels de l’interaction </h4>
Dominique Picard<br />
<h4>
• Empathie et communication </h4>
<h4>
Comprendre autrui et percevoir ses émotions </h4>
Jacques Cosnier<br />
<h4>
• Les lois de la sociabilité </h4>
Xavier Molénat<br />
<br /><h3>
Troisième partie – La communication dans les groupes</h3>
<br /><h4>
• Communication et organisation </h4>
Philippe Cabin<br />
<h4>
• Les maux de la communication interne </h4>
Michel Augendre<br />
<h4>
• Les espaces de travail. Enjeux humains </h4>
Gustave-Nicolas Fischer<br />
<h4>
• Comment se crée le consensus </h4>
Entretien avec Willem Doise<br />
<h4>
• L’approche communicationnelle </h4>
Alex Mucchielli <br />
<h4>
• Les apports de l’analyse transactionnelle à la communication</h4>
Jean-Yves Fournier<br />
<h4>
• Le formateur et la communication </h4>
Entretien avec Philippe Meirieu<br />
<h4>
<br /></h4>
<h3>
Quatrième partie – Médias - Information – Communication</h3>
<br />
<h4>
• Comment se produit l’information ? </h4>
Jean-François Dortier<br />
<h4>
• La réception, une énigme sociologique </h4>
Xavier Molénat<br />
<h4>
• Pourquoi des médiologues ? </h4>
Daniel Bougnoux<br />
<h4>
• La publicité entre manipulation et création </h4>
Vincent Troger<br />
<h4>
• Il ne faut pas avoir peur des images </h4>
Entretien avec Daniel Bougnoux<br />
<h4>
• Espace public et opinion : de la presse écrite à Internet </h4>
Marc Lits<br />
<h4>
• Le sens des cérémonies télévisées </h4>
Entretien avec Daniel Dayan<br />
<h4>
<br /></h4>
<h3>
Cinquième partie – Des nouvelles technologies à la société de l’information</h3>
<br />
<h4>
</h4>
<h4>
• Nouvelles technologies, nouveaux usages ? </h4>
Bernard Miège<br />
<h4>
• Communication à distance : au-delà des mythes </h4>
Alain Rallet<br />
<h4>
• Internet : le pouvoir de l’imagination. </h4>
<h4>
A propos du livre de Manuel Castells : la galaxie Internet</h4>
Sylvain Allemand<br />
<h4>
• Au cœur de l’imaginaire technique </h4>
Entretien avec Patrice Flichy<br />
<h4>
• Les communications de l’intimité </h4>
Patrice Flichy<br />
<h4>
• Le net sentimental </h4>
Pascal Lardellier<br />
<h4>
• Les mythes de la communication</h4>
Nicolas Journet<br />
<h4>
• Pour une cohabitation… culturelle </h4>
Entretien avec Dominique Wolton<br />
<h4>
• Vers une intelligence collective ? </h4>
Jean-François Dortier<br />
<h4>
• Comment Internet a changé notre façon de penser ? </h4>
Emmanuel Sander<br />
<h4>
• Le web mode d’emploi </h4>
<br /><h3>
Annexes</h3>
<h4>
• Mots clés </h4>
<h4>
• Bibliographie générale</h4>
<h4>
• Liste des auteurs </h4>
<h4>
• Index thématique </h4>
<h4>
• Index des noms de personnes</h4>
<br /><br />
</div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3006136363383946274.post-52707157293329788212011-07-14T01:01:00.000-07:002011-07-14T01:01:13.529-07:00Lobbying<br />
<b>Le Lobbying à rebours</b><br />
<b>L'influence du politique sur la stratégie des grandes entreprises</b><br />
Cornelia Woll <a href="http://www.pressesdesciencespo.fr/fr/livre/?GCOI=27246100497590">Presses de Sciences Po, juin 2011, 284 pages</a><br />
Le lobbying des grandes entreprises est-il assez puissant pour faire pencher les décisions politiques en leur faveur ? L'exemple des « géants » américains et européens de l’aviation civile ou des télécommunications face aux objectifs de libéralisation mondiale de ces secteurs montre au contraire que ces entreprises se sont, de façon surprenante, adaptées aux objectifs des politiques : elles ont fini par soutenir la libéralisation, au risque de mettre en péril leurs positions dominantes sur les marchés nationaux. Loin de dicter aux États la marche à suivre ces vingt dernières années en matière de libéralisation, plus incertaines que l’on imagine quant à leurs préférences et à leurs intérêts économiques sur ce sujet, ces entreprises ont défini leurs choix en fonction du contexte institutionnel et politique national. Que ces décisions se révèlent favorables à l’intérêt général ou non, l’arbitrage ultime est revenu aux décideurs politiques et administratifs, ces derniers exerçant un « lobbying à rebours » sur les entreprises. Telle est la thèse iconoclaste de ce livre qui permet de mieux appréhender succès, limites et influence réelle du secteur privé sur les politiques publiques. Une passionnante histoire de la libéralisation des services, écrite dans un style alerte.<br />
<br />
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3006136363383946274.post-44853633891145899042011-07-11T00:08:00.000-07:002011-07-11T00:09:00.586-07:00<br />
<br />
<a href="http://wegf.org/fr/" target="_blank">World Electronic government Forum(fr) </a><br />
<br />
<strong><a href="http://wegf.org/fr/alertes-email/">Recevez les alertes email du WEGF</a></strong><br />
<br />
<a href="http://www.infoproaction.com/GEOSCOPIE/ACTEURS/Public/indexgeopublic">INDEX GEOPUBLIC</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3006136363383946274.post-11905591728250697752011-01-19T14:08:00.000-08:002011-01-19T14:08:16.011-08:00 Un blog sur la mediologie<br />
<a href="http://www.huyghe.fr/">http://www.huyghe.fr/</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3006136363383946274.post-91995946433940277722010-07-31T07:41:00.000-07:002010-07-31T07:41:55.650-07:00Une nouvelle académie du renseignementFormation: Une nouvelle académie du renseignement<br />
Sources: blog ACTEURS PUBLICS<br />
<br />
Dans le cadre de la réforme du renseignement français lancée en 2008, une nouvelle "académie du renseignement" vient d’être créée. Elle concourt "à la formation du personnel des services de renseignement".<br />
<br />
Le décret interministériel, publié le 16 juillet au Journal officiel, précise que cette académie a pour mission de "concevoir, organiser et mettre en œuvre des activités de formation initiale et continue" des agents du renseignement, de favoriser la coopération entre les services et de participer aux actions de sensibilisation du renseignement.<br />
<br />
Elle participe à la formation du personnel des services de renseignement placé sous l’autorité des ministres chargés de la Sécurité intérieure, de la Défense, de l’Économie et du Budget, "au renforcement des liens au sein de la communauté française du renseignement ainsi qu’à la diffusion de la culture du renseignement".<br />
<br />
La création de cette académie concrétise la centralisation et le rapprochement des services de renseignement, conformément à la réforme du renseignement français lancée au printemps 2008 par le Livre blanc de la défense et de la sécurité. Cette réforme, bouclée fin 2008, avait notamment été marquée par la fusion entre les Renseignements généraux (RG) et la Direction de la surveillance du territoire (DST) au sein d’une Direction centrale du renseignement intérieur (DCRI) et la création d’un Conseil de défense et de sécurité nationale (CDSN)<br />
à l’Élysée.<br />
<br />
Environ 12 000 hommes et femmes sont chargés de la collecte du renseignement ou du contre-espionnage français.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3006136363383946274.post-45961037811081439102010-07-29T07:52:00.000-07:002010-07-29T07:52:26.494-07:00GLOBAL VOICESUn site de SERVICES LINGUISTIQUES<br />
<br />
http://globalvoices.com/Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3006136363383946274.post-29963907803977814772010-03-30T02:48:00.000-07:002010-03-30T03:25:32.242-07:00Voir et pouvoir: qui nous surveille?"Voir et pouvoir: qui nous surveille? "par Jean-Gabriel Ganascia, Le Pommier , 255 pages. Spécialiste des sciences de la cognition et de l'intelligence artificielle.<br /><br />Dans le passé l'information parvenait aux citoyens de manière hiérarchisée (comme le panopticon de J.Bentham) par des organismes spécialisés (communiqués de presse, annonces, journaux...) mais la rediffusion était physiquement limitée (conversation, enseignement )<br />Dans l'actuelle infosphere chaque citoyen peut informer tous les autres, à tous moments et en tous lieux et quelle que soit sa position dans la société (exemples des manifestants chinois ou iraniens<br />Les communicants sont d'une part les humains , d'autre part des "orins" , (organismes d'information), plus ou moins autonomes, machines, avatars de Second life, drones télécommandées etc...Cette structure permet de voir et d'être vu .Nous surveillons les autres tout en étant surveillés.<br />Ceci permet aussi aux groupes de pression de diffuser, voire de créer de l'opinion.<br />L'auteur souligne les risques d'un débat social où , grâce aux blogs, au Web, à Twitter, chacun peut peser sur l'opinion sans beaucoup réfléchir et sans légitimité.<br />Il y voit un danger pour la politique à long terme qui demande réflexion et argumentation et non pression de l'immédiat et de l'humeur renforcée par les machines...Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3006136363383946274.post-62639480438384052252009-11-25T02:16:00.000-08:002010-02-21T03:13:15.044-08:00<a href="http://mail.google.com/mail/?tab=om#inbox"><br /></a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3006136363383946274.post-79107519137348596252009-07-15T01:33:00.000-07:002009-07-15T01:55:08.404-07:00Information Technologies – Documents on the Web – June 2009<div style="text-align: center; font-weight: bold;"><span style="font-size:130%;">GOVERNMENT DOCUMENTS:<br /></span></div><br /><br />TELECOMMUNICATIONS: Preliminary Observations about <a href="http://www.gao.gov/new.items/d09800t.pdf">Consumer Satisfaction</a> and Problems with Wireless Phone Service and FCC’s Efforts to Assist Consumers with Complaints<br />Mark Goldstein, Director, Physical Infrastructure Issues. Government Accountability Office (GAO). Testimony before the Committee on Commerce, Science, and Transportation, U.S. Senate. June 17, 2009. 22 pages. <br /><br />The use of wireless phone service in the United States has risen dramatically over the last 20 years, with an estimated 270 million subscribers as of December 2008. Concerns have been raised in recent years about the quality of this service, including specific concerns about billing and carriers’ contract terms, such as fees charged for terminating service before the end of a contract period. This testimony provides preliminary information on consumers’ current satisfaction with wireless phone service and problems consumers have experienced with this service, and FCC’s efforts to assist wireless consumers with complaints.<br /><br /><br /><a href="http://assets.opencrs.com/rpts/R40616_20090601.pdf"><span style="font-weight: bold;">Access to Broadband Networks: The Net Neutrality Debate</span></a><br />Angele A. Gilroy. Congressional Research Service (CRS). June 1, 2009. 12 pages.<br /><br />As congressional policymakers continue to debate telecommunications reform, a major point of contention is the question of whether action is needed to ensure unfettered access to the Internet. The move to place restrictions on the owners of the networks that compose and provide access to the Internet, to ensure equal access and non-discriminatory treatment, is referred to as net neutrality. There is no single accepted definition of net neutrality. Most agree, however, that any such definition should include the general principles that owners of the networks that compose and provide access to the Internet should not control how consumers lawfully use that network, and they should not be able to discriminate against content provider access to that network.<br /><br /><a href="http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-291012A1.pdf">BRINGING BROADBAND TO RURAL AMERICA: REPORT ON A RURAL BROADBAND STRATEGY</a><br />Federal Communications Commission (FCC). May 22, 2009. 83 pages.<br /><br />For many Americans, a world without broadband is unimaginable. But we have not succeeded in bringing broadband to everyone. For years, large parts of rural America have languished on the sidelines of the digital revolution. Rural governments and businesses are missing opportunities to function more efficiently and effectively. Shortly after President Obama took office, his administration began to play an important leadership role in the effort to expand broadband penetration throughout the nation. The solutions for rural broadband should reflect consideration of the full range of technological options available, and should not elevate the need for short-term progress over longer-term objectives.<br /><br /><a href="http://www.gao.gov/new.items/d09670t.pdf">GLOBAL POSITIONING SYSTEM: </a> Significant Challenges in Sustaining and Upgrading Widely Used Capabilities<br />Cristina T. Chaplain, Director, Acquisition and Sourcing Management. Government Accountability Office (GAO). Testimony before the Subcommittee on National Security and Foreign Affairs, Committee on Oversight and Government Reform, U.S. House of Representatives. May 7, 2009. 15 pages.<br /><br />The Global Positioning System (GPS), which provides position, navigation, and timing data to users worldwide, has become essential to U.S. national security and a key tool in an expanding array of public service and commercial applications at home and abroad. The United States provides GPS data free of charge. The Air Force, which is responsible for GPS acquisition, is in the process of modernizing GPS. In light of the importance of GPS, the modernization effort, and international efforts to develop new systems, GAO was asked to undertake a broad review of GPS. Specifically, GAO assessed progress in acquiring GPS satellites, acquiring the ground control and user equipment necessary to leverage GPS satellite capabilities, and evaluated coordination among federal agencies and other organizations to ensure GPS missions can be accomplished.<br /><br /><br /><a href="http://www.gao.gov/new.items/d09661t.pdf"><span style="font-weight: bold;">Information Security: Cyber Threats and Vulnerabilities</span></a> Place Federal Systems at Risk<br />Gregory C. Wilshusen, Director, Information Security Issues. Government Accountability Office (GAO). Testimony before the Subcommittee on Government Management, Organization, and Procurement, Committee on Oversight and Government Reform, U.S. House of Representatives. May 5, 2009. 21 pages.<br />http://www.gao.gov/new.items/d09661t.pdf<br />The need for a vigilant approach to information security has been demonstrated by the pervasive and sustained computerbased (cyber) attacks against the United States and others that continue to pose a potentially devastating impact to systems and the operations and critical infrastructures that they support. GAO was asked to describe cyber threats to federal information systems and cyberbased critical infrastructures and control deficiencies that make these systems and infrastructures vulnerable to those threats.<br /><br /><br />TELECOMMUNICATIONS: <a style="font-weight: bold;" href="http://www.gao.gov/new.items/d09494.pdf">Broadband Deployment Plan Should Include Performance Goals and Measures to Guide Federal Investment</a><br />Government Accountability Office (GAO). Report to the Chairman, Committee on Energy and Commerce, U.S. House of Representatives. May 2009. 44 pages.<br /><br />The United States ranks 15th among the 30 democratic nations of the Organization for Economic Co-operation and Development (OECD) on one measure of broadband (i.e., high-speed Internet) subscribership. The Federal Communications Commission (FCC) has regulatory authority over broadband, and several federal programs fund broadband deployment. This congressionally requested report discusses the federal broadband deployment policy, principal federal programs, and stakeholders’ views of those programs; how the policies of OECD nations with higher subscribership rates compare with U.S. policy; and actions the states have taken to encourage broadband deployment.<br /><br /><br /><a href="http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf"><span style="font-weight: bold;">CybeRspACe polICy RevIew: Assuring a Trusted and Resilient Information and Communications Infrastructure</span></a><br />Executive Office of the President. April 17, 2009. 76 pages.<br /><br />The architecture of the Nation’s digital infrastructure, based largely upon the Internet, is not secure or resilient. Without major advances in the security of these systems or significant change in how they are constructed or operated, it is doubtful that the United States can protect itself from the growing threat of cybercrime and state-sponsored intrusions and operations. The U.S. digital infrastructure has already suffered intrusions that have allowed criminals to steal hundreds of millions of dollars and nation-states and other entities to steal intellectual property and sensitive military information. Other intrusions threaten to damage portions of U.S. critical infrastructure. These and other risks have the potential to undermine the Nation’s confidence in the information systems that underlie economic and national security interests.<br /><br /><br /><a href="http://www.ftc.gov/reports/mobilemarketplace/mobilemktgfinal.pdf"><span style="font-weight: bold;">Beyond Voice: Mapping the Mobile Marketplace</span></a><br />Federal Trade Commission (FTC). Staff Report. April 2009. 54 pages.<br /><br />Mobile devices, once associated only with voice telephone service, have become the launching pads for new data-driven technologies and services. Today, consumers use their mobile devices for myriad purposes including “chatting” through text messaging, taking pictures, browsing the Web, making purchases, listening to music, viewing videos, playing games across cyberspace, and keeping track of friends and relatives. This report explores these new developments and their impact on mobile commerce (“M-commerce”).<br /><br /><a href="http://assets.opencrs.com/rpts/R40436_20090320.pdf"><span style="font-weight: bold;">Broadband Infrastructure Programs in the American Recovery and Reinvestment Act</span></a><br />Lennard G. Kruger. Congressional Research Service (CRS). March 20, 2009. 14 pages.<br /><br />The American Recovery and Reinvestment Act (ARRA, P.L. 111-5) provides $7.2 billion primarily for broadband grant programs to be administered by two separate agencies: the National Telecommunications and Information Administration (NTIA) of the Department of Commerce (DOC) and the Rural Utilities Service (RUS) of the U.S. Department of Agriculture (USDA). The unprecedented scale and scope of the ARRA broadband programs, coupled with the short time frame for awarding grants, presents daunting challenges with respect to program implementation as well as Congressional oversight. Congress is closely monitoring how equitably and effectively broadband grants are allocated among states and the various stakeholders, and to what extent the programs fulfill the goals of short term job creation and the longer term economic benefits anticipated from improved broadband availability, access, and adoption.<br /><br /><br /><a style="font-weight: bold;" href="http://assets.opencrs.com/rpts/RL30719_20090319.pdf">Broadband Internet Access and the Digital Divide: </a> Federal Assistance Programs<br />Lennard G. Kruger and Angele A. Gilroy. Congressional Research Service (CRS). March 19, 2009. 30 pages.<br /><br />It is expected that the Obama Administration will ultimately develop a national broadband policy or strategy that will seek to reduce or eliminate the "digital divide" with respect to broadband. It is likely that elements of a national broadband policy, in tandem with broadband investment measures in the American Recovery and Reinvestment Act, will significantly shape and expand federal policies and programs to promote broadband deployment and adoption. A key issue is how to strike a balance between providing federal assistance for unserved and underserved areas where the private sector may not be providing acceptable levels of broadband service, while at the same time minimizing any deleterious effects that government intervention in the marketplace may have on competition and private sector investment.<br /><br /><br /><a href="http://assets.opencrs.com/rpts/RS22444_20090319.pdf"><span style="font-weight: bold;">Net Neutrality: Background and Issues</span></a><br />Angele A. Gilroy. Congressional Research Service (CRS). March 19, 2009. 9 pages.<br /><br />Concern over whether it is necessary to take steps to ensure access to the Internet for content, services, and applications providers, as well as consumers, and if so, what these should be, is a major focus in the debate over telecommunications reform. Some policymakers contend that more specific regulatory guidelines may be necessary to protect the marketplace from potential abuses which could threaten the net neutrality concept. Others contend that existing laws and Federal Communications Commission (FCC) policies are sufficient to deal with potential anti-competitive behavior and that such regulations would have negative effects on the expansion and future development of the Internet. A consensus on this issue has not yet formed, and the 111th Congress, to date, has not introduced stand-alone legislation to address this issue.<br /><a href="http://opencrs.com/document/R40427"><br /><span style="font-weight: bold;">Comprehensive National Cybersecurity Initiative: </span></a> Legal Authorities and Policy Considerations<br />John Rollins and Anna C. Henning. Congressional Research Service (CRS). March 10, 2009. 21 pages.<br /><br />Federal agencies report increasing cyber-intrusions into government computer networks, perpetrated by a range of known and unknown actors. In response, the President, legislators, experts, and others have characterized cybersecurity as a pressing national security issue. Like other national security challenges in the post-9/11 era, the cyber threat is multi-faceted and lacks clearly delineated boundaries. Some cyber attackers operate through foreign nations military or intelligence-gathering operations, whereas others have connections to terrorist groups or operate as individuals. Some cyber threats might be viewed as international or domestic criminal enterprises.<br /><br /><br /><a href="http://www.gao.gov/new.items/d09253.pdf"><span style="font-weight: bold;">TELECOMMUNICATIONS: Long-Term Strategic Vision</span></a> Would Help Ensure Targeting of E-rate Funds to Highest-Priority Uses<br />Government Accountability Office (GAO). Report to Congressional Requesters. March 2009. 83 pages.<br /><br />The Federal Communications Commission’s (FCC) Schools and Libraries Universal Service Support Mechanism -- also known as the E-rate program -- is a significant source of federal funding for information technology for schools and libraries, providing about $2 billion a year. As requested, GAO assessed issues related to the E-rate program’s long-term goals, including key trends in the demand for and use of E-rate funding and the implications of these trends; the rate of program participation, participants’ views on requirements, and FCC’s actions to facilitate participation; and FCC’s performance goals and measures for the program and how they compare to key characteristics of successful goals and measures.<br /><br /><br /><div style="text-align: center;"><span style="font-size:130%;"><span style="font-weight: bold;">THINK TANKS AND RESEARCH CENTERS:</span><br /></span></div><br />The opinions expressed in these publications do not necessarily reflect the views of the U.S. Government<br /><br /><br /><a href="http://www.heritage.org/Research/HomelandSecurity/upload/wm_2490.pdf"><span style="font-weight: bold;">The SAFETY Act: Obama Cyber Plans and the Private Sector</span></a><br />Jena Baker McNeill. The Heritage Foundation. WebMemo No. 2490. June 17, 2009. 2 pages.<br /><br />On May 29, the Obama Administration released the results of its 60-day cyber review. The review correctly emphasized the vital role of the private sector in any future national cybersecurity strategy. Involving the private sector effectively, however, will require a liability protection regime -- one that encourages industry to invest in cybertechnologies that protect against acts of cyberterrorism.<br /><br /><a href="http://www.pewinternet.org/%7E/media//Files/Reports/2009/Home-Broadband-Adoption-2009.pdf"><span style="font-weight: bold;">Home Broadband Adoption 2009</span></a><br />John Horrigan. The Pew Internet & American Life Project. June 17, 2009. 50 pages.<br /><br />This report shows 63% of adult Americans now have broadband Internet connections at home, a 15% increases from a year earlier. April’s level of high-speed adoption represents a significant jump from figures gathered since the end of 2007 (54%). The growth in home broadband adoption occurred even though survey respondents reported paying more for broadband compared to May 2008. Last year, the average monthly bill for broadband Internet service at home was $34.50, a figure that stands at $39.00 in April 2009.<br /><br /><br /><a href="http://www.pewinternet.org/%7E/media//Files/Reports/2009/The-State-of-Music-Online_-Ten-Years-After-Napster.pdf"><span style="font-weight: bold;">The State of Music Online: Ten Years After Napster</span></a><br />Mary Madden. The Pew Internet & American Life Project. June 15, 2009. 18 pages.<br /><br />In the decade since Napster’s launch, selling recorded music has become as much of an art as making the music itself. The music industry has been on the front lines of the battle to convert freeloaders into paying customers, and their efforts have been watched closely by other digitized industries -- newspapers, book publishing and Hollywood among them.<br /><br /><a href="http://www.heritage.org/Research/NationalSecurity/upload/hl_1123.pdf"><span style="font-weight: bold;">The Confluence of Cyber Crime and Terrorism</span></a><br />Steven P. Bucci. The Heritage Foundation. Heritage Lecture No. 1123. June 12, 2009. 7 pages.<br /><br />Today the world faces a wide array of cyber threats. The majority of these threats are aimed at the Western democracies and the Western-leaning countries of other regions. The reason for this is simple: They are ripe targets. These countries are either highly dependent, almost completely in some cases, on cyber means for nearly every significant societal interaction or are racing toward that goal.<br /><br /><br /><a href="http://www.itif.org/files/Wireless_testimony.pdf"><span style="font-weight: bold;">Wireless Taxation, Economic Growth and Economic Opportunity</span></a><br />Robert D. Atkinson. Information Technology and Innovation Foundation (ITIF). June 9, 2009. 7 pages.<br /><br />In a testimony before the House Judiciary Subcommittee on Commercial and Administrative Law, the author discusses why discriminatory taxes on wireless services have a negative impact on economic growth and innovation. According to him, at minimum, any given tax should not significantly change consumer behavior, be borne predominately by low-income consumers or households, and inhibit economic growth -- and a discriminatory tax on wireless services would violate all three principles.<br /><br /><br /><a href="http://www.techpolicyinstitute.org/files/hahn_wallsten_national_bbd_plan_tpi2.pdf"><span style="font-weight: bold;">An Economic Perspective on a U.S. National Broadband Plan</span></a><br />Robert Hahn and Scott Wallsten. Technology Policy Institute. June 8, 2009. 23 pages.<br /><br />This paper responds to the U.S. Federal Communications Commission’s April 2009 request for guidance in designing a national broadband plan. The authors argue that the U.S. market for Internet services is working well overall, as evidenced by nearly ubiquitous coverage, rapid adoption, large investments, and increasing speeds. Still, it is not working well for all people in all places, and the authors offer a framework consisting of nine recommendations for considering policies intended to mitigate those issues.<br /><br /><br /><a href="http://www.knowprivacy.org/report/KnowPrivacy_Final_Report.pdf"><span style="font-weight: bold;">KnowPrivacy: The Current State of Web Privacy,</span></a> Data Collection, and Information Sharing University of California, Berkeley, School of Information. June 1, 2009. 44 pages.<br /><br />Online privacy and behavioral profiling are of growing concern among both consumers and government officials. In this report, the authors examine both the data handling practices of popular websites and the concerns of consumers in an effort to identify problematic practices. They conclude by offering potential solutions to realign privacy practices with consumers’ expectations.<br /><br /><br /><a href="http://www.techpolicyinstitute.org/files"><span style="font-weight: bold;">ICANN AT A CROSSROADS: A PROPOSAL FOR BETTER GOVERNANCE AND PERFORMANCE</span></a><br />Thomas M. Lenard and Lawrence J. White. Technology Policy Institute. June 2009. 57 pages.<br />/lenard%20white%20comments%20ntia%20docket%2009042068-9689-011.pdf<br />This paper evaluates the structure and governance of ICANN. In particular, it reviews ICANN’s structure and functions, and also the structures of a number of other organizations that perform a roughly comparable range of private-sector and quasi-governmental coordination and standard-setting functions, to explore what might be applicable to ICANN.<br /><br /><a href="http://pff.org/issues-pubs/pops/2009/pop16.12-cyberbullying-education-better-than-regulation.pdf"><span style="font-weight: bold;">Cyberbullying Legislation: Why Education is Preferable to Regulation</span></a><br />Berin Szoka and Adam Thierer. The Progress & Freedom Foundation (PFF). Progress on Point Volume 16, Issue 12. June 2009. 26 pages.<br /><br />Cyberbullying is a rising online safety concern. Evidence suggests that cyberbullying is on the rise and can have profoundly damaging consequences for children. In the wake of a handful of high-profile cyberbullying incidents that resulted in teen suicides, some state lawmakers began floating legislation to address the issue. More recently, two very different federal approaches have been proposed. One approach is focused on the creation of a new federal felony to punish cyberbullying, which would include fines and jail time for violators. The other legislative approach is education-based and would create an Internet safety education grant program to address the issue in schools and communities.<br /><br /><br /><a href="http://pff.org/issues-pubs/pops/2009/pop16.11-COPPA-and-age-verification.pdf"><span style="font-weight: bold;">COPPA 2.0: The New Battle over Privacy, Age Verification, Online Safety & Free Speech</span></a> Berin Szoka and Adam Thierer. The Progress & Freedom Foundation (PFF). Progress on Point Volume 16, Issue 11. June 2009. 36 pages.<br /><br />Online privacy, child safety, free speech and anonymity are on a collision course. The 1998 Children’s Online Privacy Protection Act (COPPA) already mandates certain online privacy protections for children under 13, but many advocate expanding online privacy protections for both adolescents and adults. Furthermore, efforts continue at both the federal and state levels to institute new regulations, such as age verification mandates, aimed at ensuring the safety of children online. There is an inherent tension between these objectives: attempts to achieve perfectly “safe” online environments will likely require the surrender of some privacy and speech rights, including the right to speak anonymously.<br /><br /><br /><a href="http://www.pewinternet.org/%7E/media//2009/PIP%20-%20Online%20Classifieds.pdf%20/Files/Reports"><span style="font-weight: bold;">Online Classifieds</span></a><br />Sydney Jones. The Pew Internet & American Life Project. May 22, 2009. 14 pages.<br /><br />The number of online adults who have used online classified ads has more than doubled in the past four years. Almost half (49%) of Internet users say they have ever used online classified sites, compared with 22% of online adults who had done so in 2005. On any given day about a tenth of Internet users (9%) visit online classified sites, up from 4% in 2005. These findings highlight the growing importance of such sites to Internet users and reflect the changes in the audience for classified ads -- both those who place them and those who make purchases -- that have devastated a key revenue source for traditional newspapers.<br /><br /><br /><a href="http://www.heritage.org/Research/NationalSecurity/upload/bg_2273.pdf"><span style="font-weight: bold;">Social Networking and National Security:</span></a> How to Harness Web 2.0 to Protect the Country James Jay Carafano. The Heritage Foundation. Backgrounder No. #2273. May 18, 2009. 6 pages.<br /><br />The growth of Web 2.0, its expanding global reach, and potential new technologies to further its use and adoption argue that today's social networking is a change in the form of human communication that cannot be ignored. Online social networks have impacted every field of human endeavor from education to health care. National security is no exception.<br /><br /><br /><a href="http://www.phoenix-center.org/perspectives/Perspective09-01Final.pdf"><span style="font-weight: bold;">Normalizing Broadband Connections</span></a><br />George S. Ford. Phoenix Center for Advanced Legal and Economic Public Policy Studies. Perspectives # 09-01. May 12, 2009. 9 pages.<br /><br />As governments around the world, including the United States, place increased emphasis on the deployment and adoption of broadband technology, it becomes increasingly important that countries have appropriate and correct benchmarks by which to measure progress. The most-cited international statistics comparing broadband adoption are the broadband subscriptions per capita “rankings” published twice a year by the OECD. In this document, the author explains the fundamental flaws in the OECD’s approach -- namely that measuring fixed broadband subscriptions per capita is not a “penetration” measurement because fixed broadband is purchased on a per-location, not per-person basis -- and outlines one possible method of comparing broadband adoption among industrialized economies: the number of broadband connections per telephone lines.<br /><br /><br /><a href="http://www.itif.org/files/2009-FederalCookies.pdf"><span style="font-weight: bold;">Federal Government Policy on the Use of Persistent Internet Cookies: Time for Change or More of the Same?</span></a> Daniel Castro. Information Technology and Innovation Foundation (ITIF). May 2009. 13 pages.<br /><br />In the digital world a decade is a long time, yet federal government websites are using the same restrictive policy on “cookies“ (small data files stored on a user’s computer) established during the Clinton administration. In this report, the author looks at the origins of this federal government policy, the current uses of persistent cookies, and proposes a new framework for the use of persistent cookies on government websites given current trends in e-government. The goal, he argues, should be to loosen the restrictions on the use of cookies and balance privacy against other equally important goals such as usability, accessibility and transparency.<br /><br /><br /><a href="http://www.techpolicyinstitute.org/files/in%20defense%20of%20data.pdf"><span style="font-weight: bold;">IN DEFENSE OF DATA: INFORMATION AND THE COSTS OF PRIVACY</span></a><br />Thomas M. Lenard and Paul H. Rubin. Technology Policy Institute. May 2009. 56 pages.<br /><br />The commercial use of information on the Internet has produced substantial benefits for consumers. But, as the use of information online has increased, so have concerns about privacy. This paper discusses how the use of individuals’ information for commercial purposes affects consumers, and the implications of restricting information availability in the interest of privacy.<br /><br /><br /><a href="http://www.americanprogress.org/issues/2009/05/pdf/distancelearning.pdf">Getting Students More Learning Time Online: Distance Education in Support of Expanded Learning Time in K-12 Schools</a><br />Cathy Cavanaugh. Center for American Progress. May 2009. 28 pages.<br /><br />Complementary changes within the K-12 education community are sweeping schools in the form of one-to-one computing, online learning for students and teachers, and differentiated instruction. Students can choose from among schools, courses, and powerful educational tools and resources that never before existed. As a result, education for many students today bears little resemblance to their parents’ education. This transformation is a positive change when students are connected with the tools and opportunities that meet their individual needs.<br /><br /><br /><a href="http://www.americanprogress.org/issues/2009/05/pdf/health_it.pdf"><span style="font-weight: bold;">A Historic Opportunity: Wedding Health Information Technology to Care Delivery Innovation and Provider Payment Reform</span></a><br />Todd Park and Peter Basch. Center for American Progress. May 2009. 29 pages.<br /><br />The $19 billion health information technology investment authorized under the American Recovery and Reinvestment Act’s HITECH program presents a landmark opportunity to catalyze improvement of the U.S. health care system. This key piece of President Obama’s policy agenda encourages doctors and hospitals to embrace health IT solutions in order to strengthen and modernize the infrastructure upon which the health care system runs. This critical health IT investment program will fail, however, if it is treated as a pure technology implementation program.<br /><br /><br /><a href="http://www.nber.org/papers/w14975.pdf?new_window=1"><span style="font-weight: bold;">THE DISTINCT EFFECTS OF INFORMATION TECHNOLOGY AND COMMUNICATION TECHNOLOGY ON FIRM ORGANIZATION</span></a><br />Nicholas Bloom, Luis Garicano, Raffaella Sadun and John Van Reenen. National Bureau of Economic Research (NBER). Working Paper No. 14975. May 2009. 58 pages.<br /><br />Empirical studies on information communication technologies (ICT) typically aggregate the "information" and "communication" components together. The authors show theoretically and empirically that these have very different effects on the empowerment of employees, and by extension on wage inequality. Using an original dataset of firms in the US and seven European countries, they study the impact of ICT on worker autonomy, plant manager autonomy and spans of control. They find that better information technologies (Enterprise Resource Planning for plant managers and CAD/CAM for production workers) are associated with more autonomy and a wider span of control. By contrast, communication technologies (like data networks) decrease autonomy for both workers and plant managers.).<br /><br /><br /><a href="http://www.pewinternet.org/%7E/media//Files/Reports/2009/The_Internets_Role_in_Campaign_2008.pdf"><span style="font-weight: bold;">The Internet's Role in Campaign 2008</span></a><br />Aaron Smith. The Pew Internet & American Life Project. April 15, 2009. 92 pages.<br /><br />Some 74% of Internet users -- representing 55% of the entire adult population -- went online in 2008 to get involved in the political process or to get news and information about the election. This marks the first time that a Pew Internet & American Life Project survey has found that more than half of the voting-age population used the Internet to get involved in the political process during an election year. Several online activities rose to prominence in 2008. In particular, Americans were eager to share their views on the race with others and to take part in the online debate on social media sites such as blogs and social networking sites.<br /><br /><br />Smart Grid, Smart Broadband, Smart Infrastructure: Melding Federal Stimulus Programs to Ensure More Bang for the Buck<br />Peter Swire. Center for American Progress. April 2009. 16 pages.<br />http://www.americanprogress.org/issues/2009/04/pdf/smart_infrastructure.pdf<br />To use the economic stimulus funding in the American Recovery and Reinvestment Act of 2009 far more efficiently to achieve a diverse set of closely related goals, construction of the electricity grid and the broadband network should go hand in hand, and be combined with other parts of the Act, such as health care information technology, education reform, weatherization initiatives, and future policy initiatives to create a nationwide smart infrastructure.<br /><br /><br />ICANN’s Economic Reports: Finding the Missing Pieces to the Puzzle<br />Michael D. Palage. The Progress & Freedom Foundation (PFF). Progress Snapshot Volume 5, Issue 4. April 2009. 10 pages.<br />http://pff.org/issues-pubs/ps/2009/pdf/ps5.4icanns-economic-reports.pdf<br />The global business community and a number of national governments have expressed significant concerns about ICANN’s proposal for processing large numbers of applications for new Top Level Domains (gTLDs) such as .BLOG, .NYC or .WEB. The community has been especially concerned about the economic reports used by ICANN to justify its decisions as to whether, and how, to implement applications for new gTLDs. Among the greatest sources of concern has been the failure of ICANN staff to issue a complete public response to the ICANN Board’s October 2006 demand that ICANN Staff commission an independent study by a reputable economic consulting firm or organization to deliver findings on economic questions relating to the domain registration market.<br /><br /><br />The Mobile Difference<br />John Horrigan. The Pew Internet & American Life Project. March 25, 2009. 129 pages.<br />http://www.pewinternet.org/~/media//Files/Reports/2009/The_Mobile_Difference.pdf<br />Some 39% of Americans have positive and improving attitudes about their mobile communication devices, which in turn draws them further into engagement with digital resources -- on both wireless and wireline platforms. Mobile connectivity is now a powerful differentiator among technology users. Those who plug into the information and communications world while on-the-go are notably more active in many facets of digital life than those who use wires to jack into the Internet and the 14% of Americans who are off the grid entirely.<br /><br /><br />The First Annual New Millennium Research Council Survey on Consumers, Cell Phones and the Economy<br />New Millennium Research Council (NMRC). March 2009. 46 pages.<br />http://www.newmillenniumresearch.org/archive/031909_NMRC_ORC_cellphone_survey.pdf<br />Deepening concerns about the recession already have caused millions of U.S. consumers to cut back on their cell phone spending and millions more are poised to join their ranks if the economic downturn continues as expected for another six months, according to this survey. The resulting shift in consumer habits is likely to come at the expense of contract-based cell phone service as more consumers seek to save money by using prepaid cell phones and cutting out cell phone “extras.”<br /><br /><br />Innovation and Cybersecurity Regulation<br />James A. Lewis. Center for Strategic and International Studies (CSIS). March 2009. 3 pages.<br />http://www.csis.org/media/csis/pubs/090327_lewis_innovation_cybersecurity.pdf<br />The market has failed to secure cyberspace. A ten-year experiment in faith-based cybersecurity has proven this beyond question. A new Federal approach to cybersecurity will fail if it does not elicit actions that the private sector will not otherwise perform. Finding a new and more balanced approach will not be easy. The intellectual heritage of deregulation lives in assertions such as any regulation to improve security will hurt innovation. Innovation is a complex process, and simple statements about cause and effect deserve only skepticism.<br /><br /><br /><a href="http://www.techpolicyinstitute.org/files/wallsten_unbundling_march_2009.pdf"><span style="font-weight: bold;">Net Neutrality, Unbundling, and their Effects on International Investment in Next-Generation Networks</span></a><br />Scott J. Wallsten and Stephanie Hausladen. Technology Policy Institute. March 2009. 24 pages.<br /><br />This paper examines the net neutrality debate in countries outside the U.S., particularly in the EU. Most appear to have endorsed the idea of net neutrality and believe that policies promoting unbundling -- mandatory network sharing -- will ensure neutral networks. The authors argue that unbundling may not necessarily affect incumbent incentives to prioritize certain traffic. Because unbundling can affect investment incentives, they use a new dataset to examine empirically the effects of unbundling on investment in new fiber networks in Europe. They find a significant negative correlation between the number of unbundled DSL connections per capita and the number of fiber connections.<br /><br /><br /><a href="http://www.nw3c.org/downloads/2008_IC3_Annual%20Report_3_27_09_small.pdf"><span style="font-weight: bold;">2008 INTERNET CRIME REPORT</span></a><br />Internet Crime Complaint Center (IC3). U.S. Department of Justice. March 2009. 28 pages.<br /><br />The 2008 Internet Crime Report is the eighth annual compilation of information on complaints received and referred by the Internet Crime Complaint Center (IC3) to law enforcement or regulatory agencies for appropriate action. From January 1, 2008 - December 31, 2008, the IC3 website received 275,284 complaint submissions. This is a (33.1%) increase when compared to 2007 when 206,884 complaints were received. These filings were composed of complaints primarily related to fraudulent and non-fraudulent issues on the Internet.<br /><br /><br /><a href="http://www.newamerica.net/publications/policy/rise_intranet_era"><span style="font-weight: bold;">The Rise of the Intranet Era: Media, Research and Policy in an Age of Communications Revolution</span></a><br />Sascha Meinrath and Victor Pickard. New America Foundation. February 20, 2009.<br /><br />If the previous ten years were "The Internet Decade," then the next decade may be dubbed the "Age of the Intranet." This study explores the notion of a "community Intranet" -- an expanded network of networks spanning a neighborhood, municipality, or geographic region. By amplifying community interconnectedness, Intranets promise to enable new forms of political and democratic engagement that expand upon present day networks and models of cooperation. Intranets are often decentralized and ad-hoc, with no one entity owning the entire infrastructure or controlling expansion of or access to the infrastructure. These arrangements create new challenges for surveillance and command and control as well as new opportunities for participatory media and information dissemination.<br /><br /><br /><a href="http://www.nber.org/papers/w14758.pdf?new_window=1"><span style="font-weight: bold;">THE BROADBAND BONUS: ACCOUNTING FOR BROADBAND INTERNET'S IMPACT ON U.S. GDP</span></a><br />Shane Greenstein and Ryan C. McDevitt. National Bureau of Economic Research (NBER). Working Paper No. 14758. February 2009. 64 pages.<br /><br />How much economic value did the diffusion of broadband create? The authors provide benchmark estimates for 1999 to 2006. They observe $39 billion of total revenue in Internet access in 2006, with broadband accounting for $28 billion of this total. Depending on the estimate, households generated $20 to $22 billion of the broadband revenue. Approximately $8.3 to $10.6 billion was additional revenue created between 1999 and 2006. That replacement is associated with $4.8 to $6.7 billion in consumer surplus, which is not measured via Gross Domestic Product (GDP).<br /><br /><br /><br /><a href="http://france.usembassy.gov/web-alert.html"><span style="font-weight: bold;">Previous issues of Information Technologies</span></a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3006136363383946274.post-43165823306053581392009-04-16T08:38:00.000-07:002009-04-16T08:59:17.979-07:00TECHNOLOGIES DU LANGAGE<a href="http://aixtal.blogspot.com/">TECHNOLOGIES DU LANGAGE</a><br />Une reflexion sur le langage à partir des outils du Web<br /><br /><a href="http://www.lemondedublog.com/">LE MONDE DU BLOG</a> : actualité du blog, des réseaux sociaux, du Web2<br /><br />Voir <a href="http://www.geoscopies.net/infoproaction/ideoscope/methodes/27sciling.php">LINGUISTIQUE </a><br /><br /><a href="http://www.geoscopies.net/infoproaction/cyberscope/internet/020web2.php"> </a><a href="http://www.geoscopies.net/infoproaction/ideoscope/methodes/27sciling.php"></a><a href="http://www.geoscopies.net/infoproaction/cyberscope/internet/020web2.php">et WEB2</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3006136363383946274.post-4608979924650380762009-03-31T23:53:00.000-07:002009-04-01T00:10:50.323-07:00CYBERTECHNOLOGY USADocuments on the Web are available at: http://france.usembassy.gov/web-alert.html <br /><br />The opinions expressed in these publications do not necessarily reflect the views of the U.S. Government<br /><br /><br /><span style="font-weight:bold;"><br /><a href="http://www.gao.gov/new.items/d09432t.pdf ">National Cybersecurity Strategy</a></span>: Key Improvements Are Needed to Strengthen the Nation's Posture<br />David Powner, Director, Information Technology Management Issues. Government Accountability Office (GAO). Testimony before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, Committee on Homeland Security, U.S. House of Representatives. March 10, 2009. 18 pages.<br /><br />Pervasive and sustained computer-based attacks against federal and private-sector infrastructures pose a potentially devastating impact to systems and operations and the critical infrastructures that they support. To address these threats, President Bush issued a 2003 national strategy and related policy directives aimed at improving cybersecurity nationwide. Congress and the Executive Branch, including the new administration, have subsequently taken actions to examine the adequacy of the strategy and identify areas for improvement. GAO has, nevertheless, identified this area as high risk and has reported on needed improvements in implementing the national cybersecurity strategy. In this testimony, GAO summarizes key reports and recommendations on the national cybersecurity strategy and the views of experts on how to strengthen the strategy.<br /><br /><span style="font-weight:bold;"><br /><a href="http://assets.opencrs.com/rpts/R40427_20090310.pdf ">Comprehensive National Cybersecurity Initiative</a></span>: Legal Authorities and Policy Considerations<br />John Rollins. Congressional Research Service (CRS). March 10, 2009. 21 pages.<br /><br />Federal agencies report increasing cyber-intrusions into government computer networks, perpetrated by a range of known and unknown actors. In response, the President, legislators, experts, and others have characterized cybersecurity as a pressing national security issue. Like other national security challenges in the post-9/11 era, the cyber threat is multi-faceted and lacks clearly delineated boundaries. Some cyber attackers operate through foreign nations’ military or intelligence-gathering operations, whereas others have connections to terrorist groups or operate as individuals. Some cyber threats might be viewed as international or domestic criminal enterprises. This report discusses the legal issues and addresses policy considerations related to the Comprehensive National Cybersecurity Initiative (CNCI).<br /><br /><span style="font-weight:bold;"><br /><a href="http://assets.opencrs.com/rpts/RL30719_20090220.pdf ">Broadband Internet Access and the Digital Divide</a></span>: Federal Assistance Programs<br />Lennard G. Kruger and Angele A. Gilroy. Congressional Research Service (CRS). February 20, 2009. 30 pages.<br /><br />Economic stimulus legislation enacted by the 111th Congress includes provisions that provide federal financial assistance for broadband deployment. On February 17, 2009, President Obama signed P.L. 111-5, the American Recovery and Reinvestment Act (ARRA). The ARRA provides a total of $7.2 billion for broadband, consisting of $4.7 billion to NTIA/DOC for a newly established Broadband Technology Opportunities Program and $2.5 billion to existing RUS/USDA broadband programs. It is expected that the Obama Administration will ultimately develop a national broadband policy or strategy that will seek to reduce or eliminate the “digital divide” with respect to broadband. It is likely that elements of a national broadband policy, in tandem with broadband investment measures in the American Recovery and Reinvestment Act, will significantly shape and expand federal policies and programs to promote broadband deployment and adoption. A key issue is how to strike a balance between providing federal assistance for unserved and underserved areas where the private sector may not be providing acceptable levels of broadband service, while at the same time minimizing any deleterious effects that government intervention in the marketplace may have on competition and private sector investment.<br /><br /><br /><span style="font-weight:bold;">The Evolving Broadband Infrastructure<a href="http://assets.opencrs.com/rpts/R40230_20090219.pdf "></a></span>: Expansion, Applications, and Regulation<br />Patricia Moloney Figliola, Angele A. Gilroy and Lennard G. Kruger. Congressional Research Service (CRS). February 19, 2009. 28 pages.<br /><br />Over the past decade, the telecommunications sector has undergone a vast transformation fueled by rapid technological growth and subsequent evolution of the marketplace. Much of the U.S. policy debate over the evolving telecommunications infrastructure is framed within the context of a “national broadband policy.” The way a national broadband policy is defined, and the particular elements that might constitute that policy, determine how and whether various stakeholders might support or oppose a national broadband initiative. The issue for policymakers is how to craft a comprehensive broadband strategy that not only addresses broadband availability and adoption problems, but also addresses the long term implications of next-generation networks on consumer use of the Internet and the implications for a regulatory framework that must keep pace with evolving telecommunications technology.<br /><br /><br /><span style="font-weight:bold;">Self-Regulatory Principles For Online Behavioral Advertising<a href="http://www.ftc.gov/os/2009/02/P085400behavadreport.pdf"></a></span><br />Federal Trade Commission (FTC). February 2009. 55 pages.<br /> <br />Since the emergence of “e-commerce” in the mid-1990s, the online marketplace has continued to expand and evolve, creating new business models that allow greater interactivity between consumers and online companies. This expanding marketplace has provided many benefits to consumers, including free access to rich sources of information and the convenience of shopping for goods and services from home. At the same time, the ease with which companies can collect and combine information from consumers online has raised questions and concerns about consumer privacy. This Report constitutes the next step in an ongoing process to examine behavioral advertising that involves the FTC, industry, consumer and privacy organizations, and individual consumers. Some companies and industry groups have begun to develop new privacy policies and self-regulatory approaches, but more needs to be done to educate consumers about online behavioral advertising and provide effective protections for consumers’ privacy.<br /><br /><br /><span style="font-weight:bold;">Infrastructure Programs: What's Different About Broadband?<a href="http://assets.opencrs.com/rpts/R40149_20090122.pdf "></a></span><br />Charles B. Goldfarb and Lennard G. Kruger. Congressional Research Service (CRS). January 22, 2009. 25 pages.<br /><br />Broadband network deployment projects represent large scale, long term investments that affect the overall productivity of economic activity in the geographic areas in which they are built, and thus fit the conventional definition of infrastructure. But they also have several characteristics that distinguish them from traditional infrastructure projects. The leadership in both houses of Congress as well as the Obama administration have announced plans to include a broadband component in the infrastructure portion of any economic stimulus package. At the least, the unique characteristics of broadband infrastructure impose very complex policy objectives for any broadband infrastructure program -- to foster infrastructure investment that would not otherwise be made and to create additional jobs and spending, without distorting competition among the different broadband network technologies, without discouraging investment and innovation by independent applications providers that need access to broadband networks, and without subsidizing multiple inefficient providers unnecessarily.<br /><br /><span style="font-weight:bold;"><br /><a href="http://assets.opencrs.com/rpts/RL34693_20090116.pdf ">Privacy Law and Online Advertising</a>:</span> Legal Analysis of Data Gathering By Online Advertisers Such As Double Click and Nebu-Ad<br />Kathleen Ann Ruane. Congressional Research Service (CRS). January 16, 2009. 14 pages.<br /><br />To produce revenue, websites have placed advertisements on their sites. Advertisers will pay a premium for greater assurance that the advertisement they are purchasing will be seen by users that are most likely to be interested in the product or service offered. As a result, technology has been developed which enables online advertisements to be targeted directly at individual users based on their web surfing activity. This practice is widely known as “behavioral” or “e-havioral” advertising. This individual behavioral targeting has raised a number of privacy concerns. There are no current federal regulations specific to online behavioral advertising. The Federal Trade Commission (FTC) has put forth a number of guiding principles intended to aid the industry in creating self-regulatory principles. The FTC maintains that self-regulation is preferable to government intervention in this case. The 110th Congress has expressed interest in this issue.<br /><br /><br /><span style="font-weight:bold;">Health Information Technology:<a href="http://www.gao.gov/new.items/d09312t.pdf "></a></span> Federal Agencies' Experiences Demonstrate Challenges to Successful Implementation<br />Valerie C. Melvin, Director, Human Capital and Management Information Systems Issues. Government Accountability Office (GAO). Testimony before the Committee on Health, Education, Labor, and Pensions, U.S. Senate. January 15, 2009. 25 pages.<br /><br />As GAO and others have reported, the use of information technology (IT) has enormous potential to help improve the quality of health care and is important for improving the performance of the U.S. health care system. Given its role in providing health care, the federal government has been urged to take a leadership role to improve the quality and effectiveness of health care, and it has been working to promote the nationwide use of health IT for a number of years. Achieving widespread adoption and implementation of health IT, however, has proven challenging, and the best way to accomplish this transition remains subject to much debate. At the committee's request, this testimony discusses important issues identified by GAO that have broad relevance to the successful implementation of health IT to improve the quality of health care.<br /><br /><br /><span style="font-weight:bold;">THINK TANKS AND RESEARCH CENTERS:</span><br /><br /><span style="font-weight:bold;">Measuring the Effectiveness of the Broadband Stimulus Plan<a href="http://www.techpolicyinstitute.org/files/wallsten_evaluating_broadband_stimulus_plan.pdf "></a></span><br />Scott Wallsten. Technology Policy Institute. March 17, 2009. 6 pages.<br /><br />The newly enacted economic stimulus package includes $7.2 billion in grants, loans, and loan guarantees to bring broadband to rural areas lacking high-speed Internet services. The American Recovery and Reinvestment Act of 2009 charges government agencies not only with choosing grant recipients and setting performance benchmarks, but also with measuring results. Only a carefully preplanned evaluation strategy will enable them to accurately assess the effectiveness of the broadband stimulus.<br /><br /><br /><span style="font-weight:bold;">Using Competitive Bidding to Reform the Universal Service High Cost Fund<a href=" http://www.techpolicyinstitute.org/files/wallsten%20testimony%20on%20universal%20service%20for%203-121.pdf "></a></span><br />Scott Wallsten. Technology Policy Institute. Testimony before the Subcommittee on Communications, Technology, and the Internet, Committee on Energy and Commerce, U.S. House of Representatives. March 12, 2009. 4 pages.<br />According to the author, the current universal service program high cost fund is inefficient, inequitable, and growing at an alarming rate, having increased from $1.7 billion in 1999 to $4.2 billion in 2007. Especially because the program is funded by taxes on telecommunications services paid by all users, including low-income people, the program is in urgent need of reform. The current high-cost mechanism is not only expensive, but also discourages competition and does little to benefit consumers. In order to increase buildout, increase penetration, and reduce costs, he adds, one must eliminate the current system and replace it with competitive procurement.<br /><br /><br /><span style="font-weight:bold;">The Need for Speed: The Importance of Next-Generation Broadband Networks<a href="http://www.itif.org/files/2009-needforspeed.pdf "></a></span><br />Rob Atkinson, Stephen Ezell, Daniel Castro and George Ou. The Information Technology & Innovation Foundation (ITIF). March 5, 2009. 38 pages.<br /><br />This report argues that supporting the deployment of faster broadband networks will be crucial to enabling next-generation Web-based applications and services that will play important roles in improving quality of life and boosting economic growth. While getting broadband service to the Americans who lack it is an important policy target, next-generation broadband will deliver a wave of new benefits to consumers, society, businesses, and the economy.<br /><br /><br /><span style="font-weight:bold;">Promoting Platform Parity: Equal Pay for Equal Music<a href="http://www.itif.org/files/WM-2009-01-radio.pdf "></a></span><br />Daniel Castro. The Information Technology & Innovation Foundation (ITIF). WebMemo. March 4, 2009. 3 pages.<br /><br />This WebMemo argues that Congress should promote technology neutral policies that do not unfairly advantage or disadvantage any particular technology or business model. Moreover, Congress should ensure that the rules and regulations governing the royalty rate setting process are fair and reasonable for all broadcast platforms. As Congress considers “The Performance Rights Act,” a bill to eliminate the exemption on performance royalties that terrestrial radio has enjoyed for years, it should keep these principles in mind.<br /><br /><br /><span style="font-weight:bold;">ICANN AT A CROSSROADS: A PROPOSAL FOR BETTER GOVERNANCE AND PERFORMANCE<a href="http://www.techpolicyinstitute.org/files/icann%20at%20a%20crossroads1.pdf "></a></span><br />Thomas M. Lenard and Lawrence J. White. Technology Policy Institute. March 2009. 53 pages.<br /><br />The Internet Corporation for Assigned Names and Numbers (ICANN) has operated under a Memorandum of Understanding (MOU) with the U.S. Department of Commerce (DOC) since 1998. The MOU was replaced in September 2006 by the Joint Project Agreement (JPA) between ICANN and the DOC, which expires in August 2009. At that time, a decision needs to be made about ICANN’s future. Should the JPA tie with the U.S. Government be retained? Or should the link be wholly severed, as ICANN advocates? And, in either case, what governance structure would best promote Internet efficiency and innovation? This paper evaluates the structure and governance of ICANN to help inform the upcoming decision. In particular, it reviews ICANN’s structure and functions, and also the structures of a number of other organizations that perform a roughly comparable range of private-sector and quasi-governmental coordination and standard-setting functions, to explore what might be applicable to ICANN.<br /><br /><br /><span style="font-weight:bold;">Twenty Most Important Controls and Metrics for Effective Cyber Defense and Continuous FISMA Compliance<a href="http://www.csis.org/media/csis/pubs/090223_cag_1_0_draft4.1.pdf "></a></span><br />John Gilligan. Center for Strategic & International Studies (CSIS). Draft 1.0. February 23, 2009. 40 pages.<br /><br />Securing our Nation against cyber attacks has become one of the Nation’s highest priorities. To achieve this objective, networks, systems, and the operations teams that support them must vigorously defend against external attacks. Furthermore, for those external attacks that are successful, defenses must be capable of thwarting, detecting, and responding to follow‐on attacks on internal networks as attackers spread inside a compromised network. A central tenet of the US Comprehensive National Cybersecurity Initiative (CNCI) is that ‘offense must inform defense’. In other words, knowledge of actual attacks that have compromised systems provides the essential foundation on which to construct effective defenses.<br /><br /><br /><span style="font-weight:bold;">Losing Our Technology Advantage<a href="http://www.brookings.edu/opinions/2009/0217_technology_west.aspx "></a></span><br />Darrell M. West. Brookings Institution. StateTech Magazine. February 17, 2009.<br /><br />Once on the cutting edge of technological innovation and access, U.S. high-tech now lags behind. The erosion of high-tech leadership has serious consequences for commerce, politics and entertainment. The slow speed on America’s information superhighways means many Americans are not able to take full advantage of advanced media applications such as the downloading of film and video for entertainment. At the same time, government agencies are not able to guarantee confidentiality of medical records, employment data or official transactions. Schools are not able to take advantage of online instructional material requiring fast download speeds. And businesses do not have the infrastructure required to develop new jobs. Striving to stay competitive, the United States must invest more in its technology infrastructure. This includes tax credits for private-sector research and development, greater support for higher education, and adult training programs that help workers transition to a 21st century economy.<br /><br /><br /><span style="font-weight:bold;">Twitter and status updating<a href="http://www.pewinternet.org/~/media//Files/Reports/2009/PIP%20Twitter%20Memo%20FINAL.pdf "></a></span><br />Amanda Lenhart and Susannah Fox. The Pew Internet & American Life Project. Data Memo. February 12, 2009. 6 pages.<br /><br />In the past three years, developments in social networking and Internet applications have begun providing Internet users with more opportunities for sharing short updates about themselves, their lives, and their whereabouts online. Users may post messages about their status, their moods, their location and other tidbits on social networks and blogging sites, or on applications for sending out short messages to networks of friends like Twitter, Yammer and others. As of December 2008, 11% of online American adults said they used a service like Twitter or another service that allowed them to share updates about themselves or to see the updates of others.<br /><br /><br /><span style="font-weight:bold;">The Next Wave of E-Government<a href="http://statetechmag.com/events/updates/the-next-wave-of-e-government.html"></a></span><br />Daniel Castro and Robert Atkinson. The Information Technology & Innovation Foundation (ITIF). StateTech Magazine. February 2, 2009.<br /> <br />The first two waves of the IT revolution offered state and local IT leaders amazing opportunities to make government more efficient, improve services and increase transparency. Today, an emerging third wave is making it possible for governments to solve pressing public problems in fundamentally new ways.<br /><br /><br /><span style="font-weight:bold;">The Digital Economy Fact Book,<a href="http://www.pff.org/issues-pubs/books/factbook_10th_Ed.pdf "></a></span> Tenth Edition<br />Grant Eskelsen, Adam Marcus and W. Kenneth Ferree. The Progress & Freedom Foundation (PFF). February 2009. 192 pages.<br /><br />Events in the past year have illustrated how business models continue to change and evolve in response to the widespread use of the Internet and other digital technologies. Communications network policies have dominated policy discussions in Washington, including network management practices and network access policies. Debates on how to best update public safety communication networks for first responders continue in light of the failed public private spectrum proposal. New online advertising models have opened new revenue streams but have also raised privacy and market power concerns. The entertainment and media sectors continue to seek a balance between fully exploiting online avenues of distribution and copyright protection. The fallout from these events is sure to shape the evolution of e-commerce for years to come. The new administration is expected to drive public policy concerning the tech and telecom industries in a new direction. In the long term, it may be the administrations’ positions on macro issues relating to free trade, liberal movement of capital and labor, and education policy that will have the greatest impact on the communications and technology sectors over the next several years.<br /><br /><br /><span style="font-weight:bold;"><a href="http://www.nber.org/papers/w14750.pdf ">The Internet and Local Wages: Convergence or Divergence?</a></span><br />Chris Forman, Avi Goldfarb and Shane Greenstein. National Bureau of Economic Research (NBER). Working Paper No. 14750. February 2009. 51 pages.<br /><br />Did the diffusion of the Internet lead to convergence or divergence of local wages? The authors examine the relationship between business use of advanced Internet technology and regional variation in US wage growth between 1995 and 2000. They show that business use of advanced Internet technology is associated with wage growth but find no evidence that the Internet contributed to regional wage convergence. Advanced Internet technology is only associated with wage growth in places that were already well off in terms of income, education, population, and industry. Overall, advanced Internet explains one-quarter of the difference in wage growth between these counties and all others.<br /><br /><br /><span style="font-weight:bold;">Generations Online in 2009<a href="http://www.pewinternet.org/~/media//Files/Reports/2009/PIP_Generations_2009.pdf "></a></span><br />Sydney Jones and Susannah Fox. The Pew Internet & American Life Project. Data Memo. January 28, 2009. 9 pages.<br /><br />Over half of the adult Internet population is between 18 and 44 years old. But larger percentages of older generations are online now than in the past, and they are doing more activities online, according to surveys taken from 2006-2008. Contrary to the image of Generation Y as the "Net Generation," Internet users in their 20s do not dominate every aspect of online life. Generation X is the most likely group to bank, shop, and look for health information online. Boomers are just as likely as Generation Y to make travel reservations online. And even Silent Generation Internet users are competitive when it comes to email.<br /><br /><br /><span style="font-weight:bold;">OBAMA’S ONLINE OPPORTUNITIES II<a href="http://www.pewinternet.org/~/media//Files/Reports/2009/PIP_Broadband%20Barriers.pdf "></a></span><br />John B. Horrigan. The Pew Internet & American Life Project. Data Memo. January 21, 2009. 3 pages.<br /><br />Investment in broadband has become part of the broader discussion about President Obama’s economic stimulus package. Even though the size of the stimulus and the share that might be devoted to broadband are still unspecified, it seems likely that the new Administration will take steps to encourage investment in broadband infrastructure. Although job creation is the main topic in this debate, there are really three policy goals associated with broadband in the stimulus package: creating new jobs, creating new broadband subscribers, and improving the broadband experience for all subscribers through faster networks.<br /><br /><br /><span style="font-weight:bold;">Adults and social network websites<a href="http://www.pewinternet.org/~/media//Files/Reports"></a></span><br />Amanda Lenhart. The Pew Internet & American Life Project, Data Memo. January 14, 2009. 17 pages.<br />/2009/PIP_Adult_social_networking_data_memo_FINAL.pdf.pdf <br />The share of adult Internet users who have a profile on an online social network site has more than quadrupled in the past four years -- from 8% in 2005 to 35% in 2009. Still, younger online adults are much more likely than their older counterparts to use social networks, with 75% of adults 18-24 using these networks, compared to just 7% of adults 65 and older. At its core, use of online social networks is still a phenomenon of the young. Overall, personal use of social networks seems to be more prevalent than professional use of networks, both in the orientation of the networks that adults choose to use as well as the reasons they give for using the applications. Most adults, like teens, are using online social networks to connect with people they already know.<br /><br /><br /><span style="font-weight:bold;">Improving Quality of Life Through Telecommuting<a href="http://www.itif.org/files/Telecommuting.pdf "></a></span><br />Wendell Cox. The Information Technology & Innovation Foundation (ITIF). January 14, 2009. 24 pages.<br /><br />The number of jobs filled by telecommuters could grow nearly four-fold to 19 million and deliver substantial economic, environmental and quality of life benefits for the United States over the next 12 years. Spurred by advances in IT, especially the spread of broadband, telecommuting is already the fastest growing mode of getting from home to work. Thanks to its potential to cut costs, increase productivity, and expand the universe of potential employees, telecommuting is also emerging as a standard business strategy for a larger number of organizations. This report calls for government to pursue policies to accelerate and maximize telecommuting, including spurring the deployment and adoption of broadband, which is an essential facilitator of telecommuting. <br /><br /><br /><span style="font-weight:bold;">The Digital Road to Recovery: <a href="http://www.itif.org/files/roadtorecovery.pdf "></a></span> A Stimulus Plan to Create Jobs, Boost Productivity and Revitalize America<br />Robert Atkinson, Daniel Castro and Stephen Ezell. The Information Technology & Innovation Foundation (ITIF). January 7, 2009. 22 pages.<br /><br />Investing in new economy digital infrastructures will provide significant opportunities not just for short-term stimulus and job creation, but also longer term economic and social benefits. This report provides a detailed analysis and estimate of the short-term jobs impacts of spurring investment in three critical digital networks: broadband networks, the smart grid (making the electric distribution system intelligent) and health IT, and outlines policy steps to spur this investment. It finds that investments in America’s digital infrastructure will spur significant job creation in the short run. Specifically, it estimates that spurring an additional investment of $30 billion in America’s IT network infrastructure in 2009 will create approximately 949,000 U.S. jobs.<br /><br /><br /><span style="font-weight:bold;">Building a 21st Century Broadband Superhighway<a href="http://www.newamerica.net/files/21stCenturyBroadbandSuperhighway.pdf "></a></span>: A CONCRETE BUILD-OUT PLAN TO BRING HIGH-SPEED FIBER CONNECTIONS TO EVERY COMMUNITY<br />Benjamin Lennett and Sascha Meinrath. New America Foundation, Wireless Future Program. Issue Brief #24. January 2009. 6 pages.<br /><br />Although members of Congress and the incoming Obama administration have all expressed interest in a national effort to promote universal broadband, the discussion thus far has lacked a coherent means to correct the current market failures and keep pace as other nations have raced ahead. Critical questions remain unanswered; namely, what will a government investment look like and how will it create a more open, competitive, affordable, universally accessible high-speed communications network, and avoid reinforcing the deficiencies that have lead to our current woeful international standing?<br /><br /><br />The Broadband Bonus: Accounting for <span style="font-weight:bold;">Broadband Internet’s Impact on U.S<a href="http://www.techpolicyinstitute.org/files/greenstein_and_mcdevitt_20091.pdf "></a></span>. GDP<br />Shane Greenstein and Ryan C. McDevitt. Technology Policy Institute. January 2009. 64 pages.<br /><br />How much economic value did the diffusion of broadband create? The authors provide benchmark estimates for 1999 to 2006. They observe $39 billion of total revenue in Internet access in 2006, with broadband accounting for $28 billion of this total. Depending on the estimate, households generated $20 to $22 billion of the broadband revenue. Approximately $8.3 to $10.6 billion was additional revenue created between 1999 and 2006. That replacement is associated with $4.8 to $6.7 billion in consumer surplus, which is not measured via Gross Domestic Product (GDP). An Internet-access Consumer Price Index (CPI) would have to decline by 1.6% to 2.2% per year for it to reflect the creation of value. These estimates both differ substantially from those typically quoted in Washington policy discussions, and they shed light on several broadband policy issues, such as why relying on private investment worked to diffuse broadband in many US urban locations at the start of the millennium.<br /><br /><br /><span style="font-weight:bold;">ENHANCING CHILD SAFETY AND ONLINE TECHNOLOGIES<a href="http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/ISTTF_Final_Report.pdf "></a></span><br />Final Report of the Internet Safety Technical Task Force to the Multi-State Working Group on Social Networking of State Attorneys General of the United States. December 31, 2008. 278 pages.<br /><br />Many youth in the United States have fully integrated the Internet into their daily lives. For them, the Internet is a positive and powerful space for socializing, learning, and engaging in public life. Along with the positive aspects of Internet use come risks to safety, including the dangers of sexual solicitation, online harassment, and bullying, and exposure to problematic and illegal content. The Multi-State Working Group on Social Networking, comprising 50 state Attorneys General, asked this Task Force to determine the extent to which today’s technologies could help to address these online safety risks, with a primary focus on social network sites in the United States. To answer this question, the Task Force brought together leaders from Internet service providers, social network sites, academia, education, child safety and public policy advocacy organizations, and technology development.<br /><br /><span style="font-weight:bold;"><br />Simply Green: A Few Steps in the Right Direction toward Integrating Sustainability into Public Sector IT<a href="http://media.centerdigitalgov.com/website/Simply_Green.pdf "></a></span><br />Center for Digital Government. December 2008. 24 pages.<br /><br />There may be no single, simple answer to the complex issue of climate change. Yet there are simple steps that the public sector IT community can take in responding to renewed concerns about environmental sustainability while institutionalizing greater efficiencies into its operations.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3006136363383946274.post-37728178235229140422009-02-16T03:07:00.002-08:002009-03-04T01:55:37.352-08:00LE SILENCE<span style="font-weight:bold;">"Parmi les gens qui n'ont rien à dire, je préfère ceux qui se taisent" <span style="font-style:italic;"></span></span><br /><span style="font-weight:bold;">Pierre DAC</span>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3006136363383946274.post-8305375649235324422009-02-16T03:07:00.001-08:002009-02-16T03:07:46.218-08:00THE NEW WASHINGTON PRESS CORPS<span style="font-weight:bold;">THE NEW WASHINGTON PRESS CORPS</span><br />Pew Research Center’s Project on Excellence in Journalism, February 11, 2009<br />http://www.journalism.org/analysis_report/new_washington_press_corps<br />In the past two decades, the makeup of the Washington D.C. press corps has been fundamentally transformed. While the old media have shrunk alarmingly, two new elements have risen up to virtually replace them in number. What are the implications for news consumers in the U.S. and abroad? This report on the changing Washington media landscape addresses those questions.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3006136363383946274.post-2133656565612135952009-01-21T01:27:00.000-08:002009-01-21T01:36:46.230-08:00SECURITE INTERNET (USA)<span style="font-family: arial;">Source: </span><a style="font-family: arial;" href="http://france.usembassy.gov/economics.html">US Embassy</a><br /><br /><br /><a style="font-family: arial;" href="http://www.csis.org/media/csis/pubs/081208_securingcyberspace_44.pdf">Securing Cyberspace for the 44th Presidency</a><br /><span style="font-family: arial;">CSIS Commission on Cybersecurity for the 44th Presidency. Center for Strategic and International Studies (CSIS). December 2008. 96 pages.</span><br /><br /><span style="font-family: arial;">Inadequate cybersecurity and loss of information has inflicted unacceptable damage to U.S. national and economic security. America’s failure to protect cyberspace is one of the most urgent national security problems facing the new administration that will take office in January 2009. This report lays out a series of recommendations for a comprehensive national approach to securing cyberspace.</span><br /><br /><a style="font-family: arial;" href="http://www.gao.gov/new.items/d08825.pdf">Critical Infrastructure Protection</a><span style="font-family: arial;">: DHS Needs to Fully Address Lessons Learned from Its First Cyber Storm Exercise</span><br /><span style="font-family: arial;">Government Accountability Office (GAO). Report to Congressional Requesters. September 2008. 39 pages.</span><br /><br /><span style="font-family: arial;">Federal policies establish the Department of Homeland Security (DHS) as the focal point for the security of cyberspace. As part of its responsibilities, DHS is required to coordinate cyber attack exercises to strengthen public and private incident response capabilities. One major exercise program, called Cyber Storm, is a large-scale simulation of multiple concurrent cyber attacks involving the federal government, states, foreign governments, and private industry. To date, DHS has conducted Cyber Storm exercises in 2006 and 2008. GAO agreed to identify the lessons that DHS learned from the first Cyber Storm exercise, assess DHS's efforts to address the lessons learned from this exercise, and identify key participants' views of their experiences during the second Cyber Storm exercise.</span><br /><br /><br /><a style="font-family: arial;" href="http://www.ftc.gov/os/2008/10/081021taskforcereport.pdf">The President's Identity Theft Task Force Report</a><br /><span style="font-family: arial;">Federal Trade Commission (FTC). September 2008. 70 pages.</span><br /><br /><span style="font-family: arial;">Two years ago, the President launched a new era in the fight against identity theft by issuing an executive order establishing the Identity Theft Task Force. The executive order charged 15 federal departments and agencies with crafting a comprehensive national strategy to combat more effectively this pernicious crime, which afflicts millions of Americans each year and, in some cases, causes devastating damage to its victims. One year later, on April 11, 2007, the Task Force submitted its Strategic Plan to the President. The Strategic Plan examined the nature and scope of identity theft and offered a far-reaching series of recommendations to reduce its incidence and impact. This report documents the Task Force’s efforts to implement the Strategic Plan’s recommendations.</span><br /><br /><br /><a style="font-family: arial;" href="http://www.heritage.org/Research/NationalSecurity/upload/bg_2218.pdf">Building Cyber Security Leadership for the 21st Century</a><br /><span style="font-family: arial;">James Jay Carafano and Eric Sayers. The Heritage Foundation. Backgrounder No. 2218. December 16, 2008. 7 pages.</span><br /><br /><span style="font-family: arial;">The issue of cyber security, cyber competitiveness, and cyberwarfare has weighed heavily on the minds of policymakers as the severity and complexity of malicious cyber attacks have intensified over the past decade. These attacks, directed against both the public and private sectors, are the product of a heterogeneous network of state and non-state actors whose actions are motivated by a host of factors. Helping to ensure that the federal government achieves a high level of competency on cyber security issues is an imperative for the next Congress.</span><br /><br /><span style="font-family: arial;">Voir </span><a style="font-family: arial;" href="http://www.geoscopies.net/infoproaction/cyberscope/internet/030sec.php">Securité Internet</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3006136363383946274.post-63189708650829763962009-01-21T01:09:00.001-08:002009-01-21T01:24:50.897-08:00ECONOMIE DES NTIC aux USA<span style="font-family: arial;"></span><br />Sources:<a href="http://france.usembassy.gov/economics.html"> US Embassy</a><br /><br /><a href="http://www.pewinternet.org/pdfs/PIP_Obama.and.Tech.pdf"><span style="font-family: arial;">Obama’s Online Opportunities</span></a><br /><span style="font-family: arial;">John B. Horrigan. The Pew Internet & American Life Project. Data Memo. December 4, 2008. 3 pages.</span><br /><span style="font-family: arial;">http://www.pewinternet.org/pdfs/PIP_Obama.and.Tech.pdf </span><br /><span style="font-family: arial;">There is no shortage of suggestions to the incoming Obama administration about what to do about communications policy in the United States. America’s middling standing in world rankings on broadband adoption has served as a call to arms for the new administration to develop a national broadband strategy to boost the economy, aid the environment and improve delivery of health care and government services.</span><br /><br /><span style="font-family: arial;"><a href="http://www.gao.gov/new.items/d09133.pdf">Radio Communications: </a> Congressional Action Needed to Ensure Agencies Collaborate to Develop a Joint Solution</span><br /><span style="font-family: arial;">Government Accountability Office (GAO). Report to the Committee on Homeland Security and Governmental Affairs, U.S. Senate. December 2008. 59 pages.</span><br /><span style="font-family: arial;"></span><br /><span style="font-family: arial;">The Integrated Wireless Network (IWN) was intended to be a collaborative effort among the Departments of Justice (DOJ), Homeland Security (DHS), and the Treasury to provide secure, seamless, interoperable, and reliable nationwide wireless communications in support of federal agents and officers engaged in law enforcement, protective services, homeland defense, and disaster response missions. GAO was asked to determine the extent to which the three departments are developing a joint radio communications solution.</span><br /><br /><a href="http://www.csis.org/media/csis/pubs/081028_telecomm_task_group.pdf"><span style="font-family: arial;">Telecommunications Task Group Final Report</span></a><br /><span style="font-family: arial;">Center for Strategic and International Studies (CSIS). October 28, 2008. 23 pages.</span><br /><span style="font-family: arial;">http://www.csis.org/media/csis/pubs/081028_telecomm_task_group.pdf </span><br /><span style="font-family: arial;">The Telecommunications Infrastructure of the United States is arguably one of the fundamental enablers of virtually all other critical infrastructures on which the nation depends. This paper describes the current status of cyber security within the telecommunications infrastructure, defines the interdependencies between the telecommunications infrastructure and the other critical infrastructures, and develops recommendations for expanding and enhancing the cyber security of the collective telecommunications infrastructure.</span><br /><br /><br /><span style="font-family: arial;"><a href="http://www.ntia.doc.gov/osmhome/reports/Incentives_Plan.pdf">SPECTRUM MANAGEMENT FOR THE 21ST CENTURY: </a> PLAN TO IDENTIFY AND IMPLEMENT INCENTIVES THAT PROMOTE MORE EFFICIENT AND EFFECTIVE USE OF SPECTRUM</span><br /><span style="font-family: arial;">National Telecommunications and Information Administration (NTIA). U.S. Department of Commerce. November 2008. 21 pages.</span><br /><span style="font-family: arial;"></span><br /><span style="font-family: arial;">In May 2003, the President committed the Administration to the development of a United States Spectrum Policy that promotes economic prosperity and national security through the 21st century. Since then, the Executive Branch has worked to implement the President’s Spectrum Policy Initiative. Pursuant to the President’s directive, NTIA has developed this plan to expand on existing policies that identify and implement incentives that are appropriate to Federal Government users; and address incentives more broadly and develop possible legislative recommendations to increase the FCC’s incentive authority.</span><br /><br /><span style="font-family: arial;"><a href="http://www.nrdc.org/energy/consoles/files/consoles.pdf">Lowering the Cost of Play: </a> Improving Energy Efficiency of Video Game Consoles</span><br /><span style="font-family: arial;">Natural Resources Defense Council (NRDC). Issue Paper. November 2008. 29 pages.</span><br /><span style="font-family: arial;"></span><br /><span style="font-family: arial;">More than 40 percent of all homes in the United States contain at least one video game console. Video game consoles consumed an estimated 16 billion kilowatt-hours per year -- roughly equal to the annual electricity use of the city of San Diego. This issue paper provides recommendations for users, video game console manufacturers, component suppliers and the software companies that design games for improving the efficiency of video game consoles already in homes as well as future generations of machines.</span><br /><br /><span style="font-family: arial;"><a href="http://www.newmillenniumresearch.org/archive/120408_prepaid_myths_survey_report.pdf">PREPAID PHONES IN THE U.S</a>.: MYTHS, LACK OF CONSUMER KNOWLEDGE BLOCKING WIDER USE</span><br /><span style="font-family: arial;">New Millennium Research Council. December 4, 2008. 34 pages.</span><br /><span style="font-family: arial;"></span><br /><span style="font-family: arial;">A combination of consumer uncertainty and myths about prepaid phones may account for the lower level of use in the U.S.: although about four out of five Americans (79 percent) own a cell phone, fewer than one in five (16 percent) of Americans with cell phones have a prepaid phone. Of the balance, 85 percent have “postpaid”/contract-based service where they pay a monthly fee.</span><br /><br /><br /><span style="font-family: arial;">Distance Isn’t Quite Dead: <a href="http://www.iie.com/publications/wp/wp08-10.pdf">Recent Trade Patterns and Modes of Supply in Computer and Information Services in the United States and NAFTA Partners</a></span><br /><span style="font-family: arial;">Jacob Funk Kirkegaard. Peterson Institute for International Economics. Working Paper No. 08-10. October 2008. 73 pages.</span><br /><span style="font-family: arial;"></span><br /><span style="font-family: arial;">This paper describes developments in US and regional NAFTA trade patterns in computer and information services (C&IS) in recent years, with particular emphasis on the relative importance of and trends in different modes of supply of C&IS. The study of C&IS trade warrants attention due to C&IS’s general characteristics as an enabling technology, which, as input to other sectors and products, have been found to positively affect productivity in the United States. Secondly, C&IS trade is intuitively among the most digitizable of commercial services and accordingly can be expected to be perhaps the most internationally tradable among commercial service categories. Investigating C&IS trade trends might therefore reveal early results also relevant for other, less immediately digitizable commercial services.</span><br /><br /><span style="font-family: arial;">Homes with Tails: WHAT IF YOU COULD <a href="http://www.newamerica.net/files/HomesWithTails_wu_slater.pdf">OWN YOUR INTERNET CONNECTION?</a></span><br /><span style="font-family: arial;">Derek Slater and Tim Wu. New America Foundation. Wireless Future Program. Working Paper #23. November 2008. 17 pages.</span><br /><span style="font-family: arial;"></span><br /><span style="font-family: arial;">For the vast majority of homes, copper wires remain the principal means of getting broadband services. The deployment of fiber optic connections to the home would enable exponentially faster connections, and few dispute that upgrading to more robust infrastructure is essential to America’s economic growth. The costs of such an upgrade, however, are daunting for private sector firms and even for governments. These facts add up to a public policy challenge. In this paper, the authors propose and describe a new way to encourage broadband deployment.</span><br /><br /><br /><a href="http://www.cato.org/pubs/pas/pa-626.pdf"><span style="font-family: arial;">The Durable Internet: Preserving Network Neutrality without Regulation</span></a><br /><span style="font-family: arial;">Timothy B. Lee. Cato Institute. Policy Analysis No. 626. November 12, 2008. 44 pages.</span><br /><span style="font-family: arial;"></span><br /><span style="font-family: arial;">An important reason for the Internet’s remarkable growth over the last quarter century is the “end-to-end” principle that networks should confine themselves to transmitting generic packets without worrying about their contents. Not only has this made deployment of Internet infrastructure cheap and efficient, but it has created fertile ground for entrepreneurship. On a network that respects the end-to-end principle, prior approval from network owners is not needed to launch new applications, services, or content. In recent years, self-styled “network neutrality” activists have pushed for legislation to prevent network owners from undermining the end-to end principle. Although the concern is understandable, such legislation would be premature. Physical ownership of Internet infrastructure does not translate into a practical ability to control its use. Regulations are unnecessary because even in the absence of robust broadband competition, network owners are likely to find deviations from the end-to-end principle unprofitable.</span><br /><br /><span style="font-family: arial;">http://www.cato.org/pubs/pas/pa-626.pdf<br /><br />Voir </span><a style="font-weight: bold; font-family: arial;" href="http://www.geoscopies.net/sources/INTERNET/sit85opimedint.php">Internet sur Internet</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3006136363383946274.post-37383044682987334822009-01-21T00:50:00.000-08:002009-01-21T01:07:42.035-08:00INFORMATION NUMERIQUE<span style="font-family: arial;">Source: </span><a style="font-family: arial;" href="http://france.usembassy.gov/economics.html">france.usembassy </a><br /><br /><a style="font-family: arial;" href="http://http://www.itif.org/files/Network_Management.pdf">A Policymaker's Guide to Network Management</a><br /><span style="font-family: arial;">George Ou. Information Technology and Innovation Foundation (ITIF). December 2008. 58 pages.</span><br /><br /><span style="font-family: arial;">In this report, the author explains how advanced networks actually work and documents how, if Internet service providers (ISPs) are to provide customers a good Internet service and operate their networks efficiently, they must be able to allocate bandwidth between users and apply network management tools to shape traffic from multiple applications. He argues, however, that ISPs can and should do this in a fair and non-discriminatory manner.</span><br /><br /><br /><a style="font-family: arial;" href="http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Overview_MR.pdf">News and information as digital media come of age</a><br /><span style="font-family: arial;">Persephone Miel and Robert Faris. Berkman Center for Internet and Society at Harvard University. December 2008. 52 pages.</span><br /><br /><span style="font-family: arial;">Every day, more people turn to the Internet as a primary source of news: reading blogs, visiting aggregators and online news sites, watching video clips, listening to podcasts, and opening links in emails from friends. Members of this growing audience are not only consumers of the news -- many are shaping the news agenda for themselves and others: selecting, combining, and commenting on stories as well as creating their own. The United States is now several years into what promises to be a transformation of the media. It is driven by the rapid expansion of the number of people and organizations newly engaged as authors, editors, and publishers. In the United States and other developed countries, this expansion is occurring in tandem with serious contractions in the traditional news media. This paper explores the impact of the remarkable array of new media structures that have arisen to take advantage of these new opportunities and evaluates the problems and limitations associated with these changes.</span><br /><br /><a style="font-family: arial;" href="http://http://www.pewinternet.org/pdfs/PIP_FutureInternet3.pdf">The Future of the Internet III</a><br /><span style="font-family: arial;">Janna Quitney Anderson and Lee Rainie. The Pew Internet & American Life Project. Report. December 14, 2008. 138 pages.</span><br /><br /><span style="font-family: arial;">Experts expect major tech advances as the phone becomes a primary device for online access, voice-recognition improves, and the structure of the Internet itself improves. They disagree however about whether this will lead to more social tolerance, more forgiving human relations, or better home lives.</span><br /><br /><br /><a style="font-family: arial;" href="http://www.pewinternet.org/pdfs/PIP_Adult_gaming_memo.pdf">Adults and video games</a><br /><span style="font-family: arial;">Amanda Lenhart, Sydney Jones and Alexandra Rankin Macgill. The Pew Internet & American Life Project. Data Memo. December 7, 2008. 9 pages.</span><br /><span style="font-family: arial;">http://www.pewinternet.org/pdfs/PIP_Adult_gaming_memo.pdf </span><br /><span style="font-family: arial;">More than half -- 53% -- of all American adults play video games of some kind, whether on a computer, on a gaming console, on a cell phone or other handheld device, on a portable gaming device, or online. About one in five adults (21%) play everyday or almost everyday. While the number of video gamers among adults is substantial, it is still well under the number of teens who play, as fully 97% of teens play video games.</span><br /><br /><br /><a style="font-family: arial;" href="http://people-press.org/reports/pdf/479.pdf">Internet Overtakes Newspapers As News Source</a><br /><span style="font-family: arial;">Andrew Kohut and Michael Remez. The Pew Research Center for the People & the Press. December 23, 2008. 7 pages.</span><br /><span style="font-family: arial;">http://people-press.org/reports/pdf/479.pdf </span><br /><span style="font-family: arial;">The Internet, which emerged this year as a leading source for campaign news, has now surpassed all other media except television as a main source for national and international news. Currently, 40% say they get most of their news about national and international issues from the internet, up from just 24% in September 2007. For the first time, more people say they rely mostly on the Internet for news than cite newspapers (35%). Television continues to be cited most frequently as a main source for national and international news, at 70%.</span><br /><br /><br /><a style="font-family: arial;" href="http://www.newamerica.net/files/Meinrath_MuniWireless_Best_Practices.pdf">FIVE GUIDEPOSTS FOR THE FUTURE OF MUNICIPAL WIRELESS</a><br /><span style="font-family: arial;">Sascha D. Meinrath. New America Foundation. Wireless Future Program. Issue Brief #24. December 2008. 4 pages.</span><br /><br /><span style="font-family: arial;">As municipalities rethink their broadband strategies, they should be looking to implement five best practices to support liberation and avoid lock-in: build hybrid infrastructures, utilize open technology, prioritize competition, think holistically, and Embrace change as the new status quo.</span><br /><a style="font-family: arial;" href="http://www.pewinternet.org/pdfs/PIP_Tech_Failure.pdf"><br />When Technology Fails</a><br /><span style="font-family: arial;">John B. Horrigan and Sydney Jones. The Pew Internet & American Life Project. Data Memo. November 16, 2008. 14 pages.</span><br /><br /><span style="font-family: arial;">Modern information and communication technologies open doors to a wealth of information. But many users find it difficult to set up these devices and frustrating when they break. Half (48%) of adults who use the Internet or have a cell phone say they usually need someone else to set up a new device for them or show them how to use it. And many users of various devices and services encounter breakdowns from time to time. Coping with these failures helps to distance users from technology use.</span><br /><br /><span style="font-family: arial;">From "Dinosaurs" to Digital: An Examination of </span><a style="font-family: arial;" href="/http://pff.org/issues-pubs/pops/2008/pop15.19fromdinosaurstodigital.pdf">Ongoing Innovations in Copyright Industries</a><br /><span style="font-family: arial;">Andrea Siwek. The Progress & Freedom Foundation. Progress on Point # 15.19. December 2008. 10 pages.</span><br /><br /><span style="font-family: arial;">Cynics often argue that in the digital age “old media” has become obsolete. Despite such hyperbole, “old media” remains viable in the digital age. Various business model and technology innovations across a broad range of mediums are ensuring that these industries do not get bypassed as a result of new technologies. The Internet has changed two fundamental aspects for copyright industries and creators: the cost of distributing content and the means by which it is distributed. This paper explores how the traditional media industries are working innovatively to adapt to these changes to have not only a presence but a purpose in the digital age.</span><br /><br /><a style="font-family: arial;" href="http://www.sloanconsortium.org/publications/survey/pdf/staying_the_course.pdf">Staying the Course: Online Education in the United States, 2008</a><br /><span style="font-family: arial;">Elaine Allen and Jeff Seaman. The Sloan Consortium. November 2008. 28 pages.</span><br /><span style="font-family: arial;">http://www.sloanconsortium.org/publications/survey/pdf/staying_the_course.pdf </span><br /><br /><span style="font-family: arial;">The number of students taking at least one online course continues to expand at a rate far in excess of the growth of overall higher education enrollments. The most recent estimate, for fall 2007, places this number at 3.94 million online students, an increase of 12.9 percent over fall 2006. This study is aimed at answering some of the fundamental questions about the nature and extent of online education.</span><br /><br /><br /><span style="font-family: arial;">Voir </span><a style="font-family: arial;" href="http://www.geoscopies.net/ifoproaction/cyberscope/creation/378foadsou.php">Teleformation</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3006136363383946274.post-71515367281653052682008-11-08T00:21:00.000-08:002008-11-08T00:33:08.305-08:00USA: TECHNOLOGIES DE L'INFORMATION<span style="font-weight:bold;">GOVERNMENT DOCUMENTS:</span>Information Research Center (IRC)<br />Embassy of the United States of America<br />RaphaelVF@state.gov<br /><br /><br /><span style="font-weight:bold;">INFORMATION TECHNOLOGY: </span> <br /><br />Management Improvements Needed on the Department of Homeland Security’s Next Generation Information Sharing System<br />Government Accountability Office (GAO). Report to Congressional Committees. October 2008. 58 pages.<br />http://www.gao.gov/new.items/d0940.pdf<br />The Department of Homeland Security (DHS) is responsible for coordinating the federal government's homeland security communications with all levels of government. In support of this mission, DHS implemented, and has been enhancing, the Homeland Security Information Network (HSIN). It also has proposed a follow-on system, called Next Generation HSIN (HSIN Next Gen). GAO was asked to determine whether DHS has stopped further improvements on HSIN and if so, the department's rationale for doing so and plans for acquiring its proposed follow-on system HSIN Next Gen, and whether the department is effectively managing the HSIN Next Gen acquisition.<br /><br /><br /><span style="font-weight:bold;">DIGITAL TELEVISION TRANSITION:</span> <br />Information on the Implementation of the Converter Box Subsidy Program and Consumer Participation in the Program<br />Mark L. Goldstein, Director, Physical Infrastructure. Government Accountability Office (GAO). Testimony before the Committee on Commerce, Science, and Transportation, U.S. Senate. September 23, 2008. 16 pages.<br />http://www.gao.gov/new.items/d081181t.pdf<br /><br />DIGITAL TELEVISION TRANSITION: Information on the Implementation of the Converter Box Subsidy Program and Consumer Participation in the Program<br />Mark L. Goldstein, Director, Physical Infrastructure. Government Accountability Office (GAO). Testimony before the Subcommittee on Telecommunications and the Internet, Committee on Energy and Commerce, U.S. House of Representatives. September 16, 2008. 16 pages.<br />http://www.gao.gov/new.items/d081161t.pdf<br /><br />DIGITAL TELEVISION TRANSITION: Implementation of the Converter Box Subsidy Program Is Under Way, but Preparedness to Manage an Increase in Subsidy Demand Is Unclear<br />Government Accountability Office (GAO). Report to Congressional Requesters. September 2008. 46 pages.<br />http://www.gao.gov/new.items/d081040.pdf<br />The Digital Television Transition and Public Safety Act of 2005 requires all full-power television stations in the United States to cease analog broadcasting after February 17, 2009, known as the digital television (DTV) transition. The National Telecommunications and Information Administration (NTIA) is responsible for implementing a subsidy program to provide households with up to two $40 coupons toward the purchase of converter boxes. In this requested report, GAO examines what consumer education efforts have been undertaken by private and federal stakeholders and how effective NTIA has been in implementing the converter box subsidy program, and to what extent consumers are participating in the program. <br /><br /><br /><span style="font-weight:bold;">ELECTRONIC WASTE: </span> HARMFUL U.S. EXPORTS FLOW VIRTUALLY UNRESTRICTED BECAUSE OF MINIMAL EPA ENFORCEMENT AND NARROW REGULATION<br />John B. Stephenson, Director, Natural Resources and Environment. Government Accountability Office (GAO). Testimony before the Subcommittee on Asia, the Pacific, and the Global Environment, Committee on Foreign Affairs, U.S. House of Representatives. September 17, 2008. 21 pages.<br />http://www.gao.gov/new.items/d081166t.pdf<br /><br />ELECTRONIC WASTE: EPA Needs to Better Control Harmful U.S. Exports through Stronger Enforcement and More Comprehensive Regulation<br />Government Accountability Office (GAO). Report to the Chairman, Committee on Foreign Affairs, U.S. House of Representatives. August 2008. 67 pages.<br />http://www.gao.gov/new.items/d081044.pdf<br />Increasingly, U.S. consumers are recycling their old electronics to prevent the environmental harm that can come from disposal. Concerns have grown, however, that some U.S. companies are exporting these items to developing countries, where unsafe recycling practices can cause health and environmental problems. Items with cathode-ray tubes (CRT) are particularly harmful because they can contain 4 pounds of lead, a known toxin. To prevent this practice, since January 2007, EPA began regulating the export of CRTs under its CRT rule, which requires companies to notify EPA before exporting CRTs. In this context, GAO examined the fate of exported used electronics, the effectiveness of regulatory controls over the export of these devices, and options to strengthen federal regulation of exported used electronics.<br /><br /><br /><span style="font-weight:bold;">CRITICAL INFRASTRUCTURE PROTECTION</span>:<br /> DHS Needs to Better Address Its Cybersecurity Responsibilities<br />Government Accountability Office (GAO). Testimony before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, Committee on Homeland Security, U.S. House of Representatives. September 16, 2008. 19 pages.<br />http://www.gao.gov/new.items/d081157t.pdf<br />Recent cyber attacks demonstrate the potentially devastating impact these pose to the U.S. computer systems and to the federal operations and critical infrastructures that they support. They also highlight that the United States need to be vigilant against individuals and groups with malicious intent, such as criminals, terrorists, and nation-states perpetuating these attacks. Federal law and policy established the Department of Homeland Security (DHS) as the focal point for coordinating cybersecurity, including making it responsible for protecting systems that support critical infrastructures, a practice commonly referred to as cyber critical infrastructure protection. Since 2005, GAO has reported on the responsibilities and progress DHS has made in its cybersecurity efforts. GAO was asked to summarize its key reports and their associated recommendations aimed at securing the U.S. cyber critical infrastructure.<br /><br /><br /><span style="font-weight:bold;">INFORMATION SECURITY:</span><br /> Actions Needed to Better Protect Los Alamos National Laboratory’s Unclassified Computer Network<br />Government Accountability Office (GAO). Report to Congressional Committees. September 2008. 49 pages.<br />http://www.gao.gov/new.items/d081001.pdf<br />The Los Alamos National Laboratory (LANL), which is operated by the National Nuclear Security Administration (NNSA), has experienced security lapses protecting information on its unclassified computer network. The unclassified network contains sensitive information. GAO assessed the effectiveness of the security controls LANL has in place to protect information transmitted over its unclassified computer network, assessed whether LANL had implemented an information security program for its unclassified network, and examined expenditures to protect LANL's unclassified network from fiscal years 2001 through 2007.<br /><br /><br /><span style="font-weight:bold;">Trends in Telephone Service</span><br />Industry Analysis and Technology Division. Wireline Competition Bureau. Federal Communications Commission (FCC). August 2008. 178 pages.<br />http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-284932A1.pdf<br />This report presents information about the size, growth, and development of the telephone industry, including data on market shares, minutes of calling, number of lines, and telephone subscribership. It also provides information about access charges, telephone rates and price changes, consumer expenditures for service, employment, infrastructure, international telephone traffic, local competition, long distance carriers, residential telephone usage, and universal service support.<br /><br /><br /><span style="font-weight:bold;">CYBER ANALYSIS AND WARNING:</span> DHS Faces Challenges in Establishing a Comprehensive National Capability<br />Government Accountability Office (GAO). Report to the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, Committee on Homeland Security, U.S. House of Representatives. July 2008. 67 pages.<br />http://www.gao.gov/new.items/d08588.pdf<br />Cyber analysis and warning capabilities are critical to thwarting computer-based (cyber) threats and attacks. The Department of Homeland Security (DHS) established the United States Computer Emergency Readiness Team (US-CERT) to, among other things, coordinate the nation's efforts to prepare for, prevent, and respond to cyber threats to systems and communications networks. GAO's objectives were to identify key attributes of cyber analysis and warning capabilities, compare these attributes with US-CERT's current capabilities to identify whether there are gaps, and identify US-CERT's challenges to developing and implementing key attributes and a successful national cyber analysis and warning capability.<br /><br /><br />Roundtable Discussion on Phishing Education<br />Division of Consumer and Business Education and Division of Marketing Practices. Federal Trade Commission (FTC). July 2008. 15 pages.<br />http://www.ftc.gov/os/2008/07/080714phishingroundtable.pdf<br />Phishing uses deceptive spam that appears to be coming from legitimate, well-known sources to trick consumers into divulging sensitive or personal information, such as credit card numbers, other financial data, or passwords, either through a reply email or a link to a copycat of the purported source’s website. During the July 2007 Spam Summit of the Federal Trade Commission, panelists identified consumer and business education as a key tool for helping to reduce the number of consumers who fall victim to phishing scams.<br /><br /><br /><span style="font-weight:bold;">THINK TANKS AND RESEARCH CENTERS:</span><br /><br />The opinions expressed in these publications do not necessarily reflect the views of the U.S. Government<br /><br /><br /><span style="font-weight:bold;">Networked Families</span><br />The Pew Internet & American Life Project. October 19, 2008. 44 pages.<br />http://www.pewinternet.org/pdfs/PIP_Networked_Family.pdf<br />The Internet and cell phones have become central components of modern family life. Among all household types, the traditional nuclear family has the highest rate of technology usage and ownership. Households with a married couple and minor children are more likely than other household types -- such as single adults, homes with unrelated adults, or couples without children -- to have cell phones and use the Internet. Cell phones allow family members to stay more regularly in touch even when they are not physically together. Moreover, many members of married-with-children households view material online together.<br /><br /><br /><span style="font-weight:bold;">A Comparison of the Technology Policies of Barack Obama and John McCain</span><br />Arlene Holen. Technology Policy Institute. Policy Perspective. October 8, 2008. 4 pages.<br />http://www.techpolicyinstitute.org/files/a%20comparison%20of%20the%20technology%20policies%20of%20barack%20obama%20and%20john%20mccain.pdf<br />This comparison is drawn from and adheres closely to statements on the presidential candidates’ websites. Both websites list technology among the issues most important to their campaigns. The comparison summarizes the candidates’ views on key issues and highlights important similarities and differences. Both candidates share the goals of strengthening American science, technology and innovation; developing a skilled workforce; enhancing intellectual property protection; and encouraging a modern communications infrastructure. Some of their policy approaches are quite different however. For example, they differ sharply in emphasizing increased federal spending vs. tax incentives to achieve policy goals and in their positions on network neutrality.<br /><span style="font-weight:bold;">Comparing the Candidates’ Technology and Innovation Policies</span><br />Stephen J. Ezell and Robert D. Atkinson. Information Technology and Innovation Foundation (ITIF). September 29, 2008. 19 pages.<br />http://www.itif.org/files/2008-CampaignTechAgenda.pdf<br />Innovation drives long-term national economic growth and has in fact been responsible for 80 percent of the growth in the U.S. economy since World War II. This places technology and innovation squarely at the center of the issue -- the economy -- that voters have identified as the most important in the 2008 Presidential election. Both John McCain and Barack Obama’s campaigns increasingly recognize the central role that science, technology, and innovation play in economic growth and have developed specific policy positions on these issues. This ITIF policy brief compares and assesses the candidates’ technology and innovation policies across a number of specific issues areas, including: taxes, R&D funding, broadband and net neutrality, e-government, digital transformation, education and workforce development, trade, patent and intellectual property, and energy and the environment.<br /><br /><span style="font-weight:bold;">BEING ONLINE IS NOT ENOUGH: STATE ELECTIONS WEB SITES</span><br />The Pew Center on the States. October 2008. 36 pages.<br />http://www.pewtrusts.org/uploadedFiles/wwwpewtrustsorg/Reports/Election_reform/VIP_FINAL_101408_WEB.pdf<br />Many of those going to the polls on November 4 will be first-time voters who will need to know how to register to vote, where to vote and, likely, who and what are on the ballots for the 2008 elections. Today’s technology should make it easier for these first-time voters. While it is clear that the Internet helps people search for and use information, it is not clear, however, that voters will in fact find the information they are looking for or that the information they do find will help them vote in the coming elections.<br /><br /><br />Digital Quality of Life: Understanding the Personal and Social Benefits of the Information Technology Revolution<br />Robert D. Atkinson and Daniel D. Castro. Information Technology and Innovation Foundation (ITIF). October 2008. 185 pages.<br />http://www.itif.org/files/DQOL.pdf<br />In the new global economy, information technology (IT) is the major driver of both economic growth and improved quality of life. In its 2007 report, the ITIF documented how IT, since the mid-1990s, has been the principal driver of increased economic growth not only in the United States but also in many other nations. IT is also at the core of dramatic improvements in the quality of life for individuals around the world. In this new report, the authors show how IT is the key enabler of many, if not most, of today’s key innovations and improvements in our lives and society -- from better education and health care, to a cleaner and more energy-efficient environment, to safer and more secure communities and nations.<br /><br /><br />Do High Call Termination Rates Deter Broadband Deployment?<br />T. Randolph Beard and George S. Ford. Phoenix Center for Advanced Legal and Economic Public Policy Studies. Policy Bulletin No. 22. October 2008. 9 pages.<br />http://www.phoenix-center.org/PolicyBulletin/PCPB22Final.pdf<br />Does the current way by which providers compensate each other for the exchange of Voice over Internet Protocol (VoIP), wireless, local and long-distance calls inhibit broadband deployment? The question is timely, as the Federal Communications Commission is presently considering a comprehensive intercarrier compensation reform proposal that would establish lower and more uniform rates for the transport and termination of all forms of traffic, regardless of point-of-origin and technology.<br /><br /><br /><span style="font-weight:bold;">The Lobby that Cried Wolf</span><br />Benjamin Lennett. New America Foundation. Wireless Future Program. Issue Brief #23. October 2008. 14 pages.<br />http://www.newamerica.net/files/Lobby_That_Cried_Wolf.pdf<br />In an October 2007 letter to the Federal Communications Commission (FCC), executives from the four largest TV networks told the Commission that proposals to allow low-power Wi-Fi type devices to operate on vacant TV channels, “could cause permanent damage to over-the-air digital television reception." Such a dire warning would ring alarm bells for policymakers, if not for the fact that similar nightmare scenarios have been predicted before. In numerous public relations and lobbying campaigns, broadcasters and their respective lobbies have relied upon similar doomsday pronouncements to inhibit competition and maintain their exclusive control over the valuable, but grossly under-utilized, broadcast spectrum.<br /><br /><br /><span style="font-weight:bold;">Net Neutrality Regulation in the United States</span><br />Barbara S. Esbin. The Progress and Freedom Foundation (PFF). Progress Snapshot Release 4.21. October 2008. 3 pages.<br />http://pff.org/issues-pubs/ps/2008/pdf/ps4.21pointofview.pdf<br />The United States moved closer to “Net Neutrality” regulation this year when the Federal Communications Commission found that Comcast, a cable broadband Internet service provider, violated a set of Internet policy principles the FCC adopted in 2005 by limiting peer-to-peer (P2P) traffic. The ruling was the culmination of a ten-year effort that began as a call for wholesale “open access” to the cable platform for third-party Internet service providers.<br /><br /><br /><span style="font-weight:bold;">Networked Workers</span><br />The Pew Internet & American Life Project. September 24, 2008. 57 pages.<br />http://www.pewinternet.org/pdfs/PIP_Networked_Workers_FINAL.pdf<br />The majority of employed adults (62%) use the Internet or email at their job, and many have cell phones and Blackberries that keep them connected even when they are not at work. Working Americans express mixed views about the impact of technology on their work lives. On the one hand, they cite the benefits of increased connectivity and flexibility that the Internet and all of their various gadgets afford them at work. On the other hand, many workers say these tools have added stress and new demands to their lives.<br /><br /><br /><span style="font-weight:bold;">Teens, Video Games and Civics</span><br />The Pew Internet & American Life Project. September 16, 2008. 76 pages.<br />http://www.pewinternet.org/pdfs/PIP_Teens_Games_and_Civics_Report_FINAL.pdf<br />The first national survey of its kind finds that virtually all American teens play computer, console, or cell phone games and that the gaming experience is rich and varied, with a significant amount of social interaction and potential for civic engagement. Game playing, however, sometimes involves exposure to mature content, with almost a third of teens playing games that are listed as appropriate only for people older than they are.<br /><br /><br /><span style="font-weight:bold;">The DTV Coupon Program: A Boon to Retailers, not Consumer</span>s<br />Scott Wallsten. Technology Policy Institute. Policy Perspective. September 15, 2008. 4 pages.<br />http://www.techpolicyinstitute.org/files/the_dtv_coupon_program.pdf<br />In principle, the DTV coupon program reduces the cost to households of the digital transition by allowing them to spend $40 less on a converter box than they otherwise would. This analysis reveals, however, that coupon program has created a floor on the price of these converter boxes. Because consumers pay $0 with the coupon for any box priced $40 or less, retailers have little incentive to reduce the price below $40. An analysis of converter box prices at retailers around the country suggests that the coupon program has increased the price of converter boxes by $21-34.<br /><br /><br /><span style="font-weight:bold;">USE OF CLOUD COMPUTING APPLICATIONS AND SERVICES</span><br />John B. Horrigan. The Pew Internet & American Life Project. Data Memo. September 12, 2008. 9 pages.<br />http://www.pewinternet.org/pdfs/PIP_Cloud.Memo.pdf<br />Some 69% of online Americans use webmail services, store data online, or use software programs such as word processing applications whose functionality is located on the web. In doing so, these users are making use of “cloud computing,” an emerging architecture by which data and applications reside in cyberspace, allowing users to access them through any web-connected device.<br /><br /><br /><span style="font-weight:bold;">Cybersecurity Economic Issues</span>: Corporate Approaches and Challenges to Decisionmaking<br />Rand Corporation. Research Brief. September 2008. 5 pages.<br />http://www.rand.org/pubs/research_briefs/2008/RAND_RB9365.pdf<br />This research brief presents findings that address key cybersecurity concerns, perceptions of the importance of cybersecurity, and considerations for cybersecurity investment decisions. In particular, it suggests that companies, the government, and other organizations can help improve our understanding of cybersecurity economics by monitoring cybersecurity incidents and responses, soliciting and using standard terminology and measures, and sharing data whenever possible.<br /><br /><br /><span style="font-weight:bold;">Time for a Post-Partisan Broadband Debate</span><br />Robert D. Atkinson. Information Technology and Innovation Foundation (ITIF). September 2008. 4 pages.<br />http://www.itif.org/files/Post-PartisanBroadbandDebate.pdf<br />In the last few years, the debate over broadband policy has become increasingly partisan and bitter. In this Report, the author argues that it is time to move beyond the partisan bickering. By reviewing the merits and shortcomings of each side’s position, the author draws a blueprint for pragmatic broadband progress in the areas of the U.S. broadband position, net neutrality, the role of competition and overall broadband policy.<br /><br /><br />THE ECONOMICS OF AUCTIONING DTV WHITE SPACE SPECTRUM<br />Michael Calabrese and Gregory Rose. New America Foundation. Wireless Future Program. Working Paper #22. September 2008. 31 pages.<br />http://www.newamerica.net/files/NoWindfallInWS_CalRose.pdf<br />A one-time auction of the guard band and other vacant channels in each local television market -- so-called "spectrum white space" -- would provide minimal revenue to the Treasury, while simultaneously ensuring that most of this unused "beachfront" spectrum will remain fallow, stifling the broadband services and innovation that could generate far more long-term economic activity. Alternatively, opening unlicensed access to the DTV white space for use by all American homes and businesses would do far more to promote opportunities for broadband deployment, innovation and efficient utilization of this spectrum.<br /><br /><br /><span style="font-weight:bold;">Podcast Downloading 2008</span><br />Mary Madden and Sydney Jones. The Pew Internet & American Life Project. Data Memo. August 28, 2008. 5 pages.<br />http://www.pewinternet.org/pdfs/PIP_Podcast_2008_Memo.pdf<br />As gadgets with digital audio capability proliferate, podcast downloading continues to increase. Currently, 19% of all Internet users say they have downloaded a podcast so they could listen to it or view it later. This most recent percentage is up from 12% of Internet users who reported downloading podcasts in an August 2006 survey and 7% in a February-April 2006 survey. Still, podcasting has yet to become a fixture in the everyday lives of Internet users, as very few Internet users download podcasts on a typical day.<br /><br /><br /><span style="font-weight:bold;">Whither the internet?</span><br />The Pew Internet & American Life Project. August 27, 2008. 6 pages.<br />http://www.pewinternet.org/pdfs/PIP-IGFsurvey.pdf<br />Last November, hundreds of government, industry leaders and Internet activists from around the world gathered in Rio de Janeiro for the second Internet Governance Forum. A survey conducted at the forum shows attendees want an online Bill of Rights and more competition among service providers<br /><br /><br /><span style="font-weight:bold;">The Engaged E-patient Population</span><br />Susannah Fox. The Pew Internet & American Life Project. August 26, 2008. 4 pages.<br />http://www.pewinternet.org/pdfs/PIP_Health_Aug08.pdf<br />The Pew Internet Project estimates that between 75% and 80% of Internet users have looked online for health information. Information gathering has become a habit for many Americans, particularly those in the 55% of households with broadband connections. For example, 78% of home broadband users look online for health information, compared with 70% of home dial-up users. Home broadband users are twice as likely as home dial-up users to do health research on a typical day -- 12% vs. 6%.<br /><br /><br />KEY NEWS AUDIENCES NOW BLEND ONLINE AND TRADITIONAL SOURCES<br />The Pew Research Center for the People & the Press. August 17, 2008. 129 pages.<br />http://people-press.org/reports/pdf/444.pdf<br />For more than a decade, the audiences for most traditional news sources have steadily declined, as the number of people getting news online has surged. Today, however, a sizable minority of Americans find themselves at the intersection of these two long-standing trends in news consumption. Integrators, who get the news from both traditional sources and the Internet, are a more engaged, sophisticated and demographically sought-after audience segment than those who mostly rely on traditional news sources. Integrators share some characteristics with a smaller, younger, more Internet savvy audience segment, Net-Newsers, who principally turn to the web for news, and largely eschew traditional sources.<br /><br /><br /><span style="font-weight:bold;">Search Engine Use</span><br />Deborah Fallows. The Pew Internet & American Life Project. Data Memo. August 6, 2008. 6 pages.<br />http://www.pewinternet.org/pdfs/PIP_Search_Aug08.pdf<br />The percentage of Internet users who use search engines on a typical day has been steadily rising from about one-third of all users in 2002, to a new high of just under one-half (49%). With this increase, the number of those using a search engine on a typical day is pulling ever closer to the 60% of Internet users who use email.<br /><br /><br /><span style="font-weight:bold;">State and Federal Electronic Government in the United States, </span>2008<br />Darrell M. West. Governance Studies. The Brookings Institution. August 2008. 19 pages.<br />http://www.brookings.edu/~/media/Files/rc/reports/2008/0826_egovernment_west/0826_egovernment_west.pdf<br />This report assesses the nature of American state and federal electronic government in 2008 by examining whether e-government effectively capitalizes on the interactive features available on the World Wide Web to improve service delivery and public outreach. Although considerable progress has been made over the past decade, e-government has fallen short of its potential to transform public-sector operations. This report closes by suggesting how public officials can take maximum advantage of technology to improve government performance.<br /><br /><br />Improving Technology Utilization in Electronic Government around the World, 2008<br />Darrell M. West. Governance Studies. The Brookings Institution. August 2008. 32 pages.<br />http://www.brookings.edu/~/media/Files/rc/reports/2008/0817_egovernment_west/0817_egovernment_west.pdf<br />Despite the great promise of technological advancement, public sector innovation has tended to be small-scale and gradual. Factors such as institutional arrangements, budget scarcity, group conflict, cultural norms and prevailing patterns of social and political behavior have restricted government actions. Because governments are divided into competing agencies and jurisdictions, policymakers struggle to get bureaucrats to work together in promoting technological innovation. Budget considerations prevent government offices from placing services online and using technology for democratic outreach. Cultural norms and patterns of individual behavior affect the manner in which technology is used by citizens and policymakers.<br /><br /><br />Previous issues of Information Technologies -- Documents on the Web are available at: http://france.usembassy.gov/economics.html<br /><br />Voir aussi: <span style="font-weight:bold;">Index de l'Internet<a href="http://www.geoscopies.net/infoproaction/cyberscope/internet/000intindex.php"></a></span>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3006136363383946274.post-35131110916416693812008-09-20T02:18:00.000-07:002008-09-20T02:32:51.011-07:00HISTOIRE DU RISQUE ECONOMIQUE1-Longtemps, on s'est couché de bonne heure. Les hommes passaient leur journée dans les bois, à la recherche de gibiers et de fruits. Monopolisant le temps disponible, l'économie était cependant une pratique simple et modeste, se limitant à fournir ce dont les hommes avaient besoin pour se nourrir, s'abriter, se chauffer, honorer leurs femmes puis leurs dieux . <p></p> <p style="margin-bottom: 0cm;"><span style="font-size:85%;"> Le risque économique provenait de la nature (climat, épidémies, animaux féroces...). Mais déjà aussi des autres hommes, nomades de la terre ou de la mer. Et cela d'autant plus que les progrès de l'économie sédentaire favorisaient la multiplication et la survie des hommes, donc les cibles pour les prédateurs de ressources, de territoires, de femmes et de vies humaines. </span> </p> <ol start="2"><li><p style="margin-bottom: 0cm;"><span style="font-size:85%;">3000 ans avant J.C, dans le Croissant fertile du Moyen Orient, l'agriculture irriguée, l'élevage , le stockage permettaient la création des grandes cités, des états policés, des empires. On n'était plus dans la survie du Neanderthal; on entrait dans l'Age des civilisations organisées où l'économie jouait un rôle important mais non exclusif à côté de la politique , du droit, de la guerre et de la religion .</span></p> </li></ol> <ol start="3"><li><p style="margin-bottom: 0cm;"><span style="font-size:85%;">Cependant les techniques économiques n'ont cessé de progresser en efficacité et dans leur maîtrise du temps et de l'espace.</span></p> </li></ol> <ul><li><span style="font-size:85%;"> Dans la production agricole. Avec les défrichements médiévaux, la découverte des plantes américaines et l'assolement, l'assolement, l'apport massif d' amendements et engrais venus d'usines lointaines, la colonisation des grandes steppes continentales par le brûlis, le dry farming, les convois d'immigrants, l'enclos de barbelés. Puis l'agriculture scientifique hyperproductive.....</span></li></ul> <ul><li><span style="font-size:85%;"> Dans l'industrie, la maitrise de la mine et des métaux , puis de l'énergie, la création de matériaux nouveaux avec la chimie,la mécanisation, le travail organisé à flux tendus et à distance, de plus en plus loin des consommateurs. </span></li></ul><p style="margin-bottom: 0cm;"> </p> <ul><li><span style="font-size:85%;"> Le commerce aussi élargit l'espace et la durée des activités économiques.A l'origine, simple troc de proximité, il devient continental (grandes foires du Moyen Age) et intercontinental (route de la soie, commerce des épices, commerce triangulaire de l'Atlantique...)</span></li></ul> <ol start="4"><li><p style="margin-bottom: 0cm;"><span style="font-size:85%;">Tout ceci est allé de pair avec une organisation des sociétés liée au progrès économique </span> </p> </li></ol> <ul><li><span style="font-size:85%;"> La production économique appelait une organisation de la propriété des territoires et des biens . Et surtout du travail humain : esclavage, servage, statut de l'artisan, contrat et droit du travail, travail programmé dans les manufactures et les mines, assistance sociale à la reproduction de la force de travail.. </span></li></ul><p style="margin-bottom: 0cm;"> </p> <ul><li><span style="font-size:85%;"> Le crédit, puis la société de capitaux, donnent du temps et de la confiance pour entreprendre des tâches de longue haleine (dénouement des cycles commerciaux longs , grands travaux, fabrications de masse...) . Dès la fin du moyen Age, les banquiers jouent un rôle croissant, certes pour financer l'économie, mais aussi les dépenses publiques bien plus rentables de l'accès au pouvoir (ex: les candidatures aux élections impériales) , l'ostentation et la guerre des Princes.</span></li></ul> <ul><li><span style="font-size:85%;"> La monnaie et la comptabilité représentent, par l'abstraction, des valeurs économiques, ce qui facilite les calculs...et les combinaisons hâtives ou douteuses. </span></li></ul><p style="margin-bottom: 0cm;"> </p> <ol start="5"><li><p style="margin-bottom: 0cm;"><span style="font-size:85%;">C'est aussi le début d'une indépendance croissante de la finance par rapport à l'économie réelle des biens et services</span></p> </li></ol> <ul><li><span style="font-size:85%;">La banque, la finance hors banque (la Bourse par exemple) et la monnaie ont en commun de ne pas représenter directement des valeurs concrètes mais des notions assez subjectives comme la confiance, la valorisation du temps et celle des risques . </span></li></ul><p style="margin-bottom: 0cm;"> </p> <ul><li><span style="font-size:85%;">Il s'y ajoute l'extrême facilité pour créer et distribuer des ressources de paiement qui viennent en concurrence avec celles qui proviennent de l'économie proprement dit , c'est à dire la rémunération du bien ou service fourni à autrui. </span></li></ul><p style="margin-bottom: 0cm;"> </p> <ul><li><span style="font-size:85%;">Or ce n'est pas l'activité économique proprement dite qui crée la valeur, mais la quantité d'argent, que l'on peut attribuer à un produit . Et cela quelle que soit l'origine de cet argent: salaire, transfert social en provenance de l'Etat-providence, vol, spéculation boursière. cession d'actif, crédit, création monétaire...</span></li></ul> <p style="margin-top: 0.18cm; margin-bottom: 0.18cm;"> </p><ul><li><span style="font-family:Arial,sans-serif;"><span style="font-size:85%;">Pour compliquer le tout, la financiarisation a puissamment déplacé les méthodes et les enjeux de l'économie. </span></span></li></ul><p style="margin-top: 0.18cm; margin-bottom: 0.18cm;"> </p> <p style="margin-top: 0.18cm; margin-bottom: 0.18cm;"> <span style="font-family:Arial,sans-serif;"><span style="font-size:85%;">Comment? La financiarisation a commencé depuis longtemps avec le crédit, l'endossement et la négociation des effets de commerce, la multiplication des monnaies métalliques en provenance d'Amérique, les monnaies de compte , la création des banques centrales régulatrices et l'abandon de l'or comme moyen de paiement en 1976. </span></span> </p> <p style="margin-top: 0.18cm; margin-bottom: 0.18cm;"> <span style="font-family:Arial,sans-serif;"><span style="font-size:85%;">Dans les vingt dernières années la déréglementation , l'internationalisation des mouvements de capitaux, l'apparition des produits dérivés et des marchés de risques, l'intervention d'opérateurs non bancaires ont considérablement accru la circulation financière indépendamment de tout objectif économique classique (produire pour satisfaire un besoin)..</span></span></p> <p style="margin-top: 0.18cm; margin-bottom: 0.18cm;"> <span style="font-family:Arial,sans-serif;"><span style="font-size:85%;">Aujourd'hui les actifs financiers représentent quatre fois le PIB mondial, les échanges de devises représentent environ 500 fois les flux commerciaux réels de biens et services. C'est beaucoup plus que l'huile de rouage nécessaire pour l'économie réelle.</span></span></p> <p style="margin-top: 0.18cm; margin-bottom: 0.18cm;"> <span style="font-family:Arial,sans-serif;"><span style="font-size:85%;">Tout ceci a désarmé les opérateurs et régulateurs traditionnels de la finance (banques commerciales, banques centrales, états). Les grands organismes internationaux de type FMI-Banque Mondiale sont eux aussi très loin de faire le poids devant un marché aussi puissant qui définit de fait les critères de décision (au profit de qui?) les rendements exigés du capital et qui s'autorise bien des bulles spéculatives et des crises. </span></span> </p> <p style="margin-top: 0.18cm; margin-bottom: 0.18cm;"> <span style="font-family:Arial,sans-serif;"><span style="font-size:85%;">Où est, dans tout cela l'économie de grand papa, où Ford gagnait sa vie en proposant des automobiles que pouvaient acheter ses ouvriers? où les institutions publiques définissaient les règles acceptables de la compétition pour les richesses? </span></span> </p> <p style="margin-top: 0.18cm; margin-bottom: 0.18cm;"> <span style="font-family:Arial,sans-serif;"><span style="font-size:85%;">Rome n'est plus dans Rome et l'économie réelle a sombré dans la finance virtuelle. Tout ceci évolue très vite et se trouve hors de portée des décideurs privés ou publics les plus légitimes..</span></span></p> <ul><li><span style="font-size:85%;">La monnaie, symbôle d'une richesse concrète, est vite devenue une source autonome de revenus donc de richesses. </span></li></ul><p style="margin-bottom: 0cm;"> </p> <p style="margin-bottom: 0cm;"><span style="font-size:85%;">Les Monarques, maîtres des horloges chargés des régulations, n'ont pas hésité à rogner sur la quantité de métal précieux inclus dans la monnaie. Ils ont ainsi inventé l'inflation qui, avec les impôts, les emprunts plus ou moins obligatoires et mal remboursés et la création de monnaie-papier (assignats), ont financé les grandes faillites de la Cour (Louis XVI?) et surtout les guerres puis les indispensables démagogies.</span></p> <p style="margin-bottom: 0cm;"><span style="font-size:85%;">6- L'extraordinaire instinct de survie de l'homme du Neanderthal le conduisait à privilégier par nécessité une économie très concrète. Comme chez les truites d'élevage incapables de survivre dans la nature sans croquettes, cet instinct est aujourd'hui très dégradé, au mieux dans l'amélioration du pouvoir d'achat, au pire en caprice d'acquisition du dernier gadget à la mode...Le vouloir d'achat prend le pas sur le pouvoir d'achat et même sur les besoins réeels.</span></p> <p style="margin-bottom: 0cm;"><span style="font-size:85%;">A côté de cela s'est développé, du moins chez les "élites" le puissant instinct du pouvoir politique ou idéologique, qui porte à son actif la formation et le fonctionnement des grands ensembles territoriaux et des communautés religieuses ou culturelles, mais aussi la quasi-totalité des grandes guerres et des dépenses somptuaires ou démagogiques. Il est lui aussi souvent dégradé en volonté de prestige ou revendication d'identité. </span> </p> <p style="margin-bottom: 0cm;"><span style="font-size:85%;">Dans un cas comme dans l'autre , aspiration économique ou ambition politique, la tentation était grande de transformer en absolu une activité subordonnée. En créant des règles (lois, institutions, organisations...) et même des postulats philosophiques. Ceux de la pensée politique sont bien connus, autour de la Nation, du Roi, du peuple souverain etc...</span></p> <p style="margin-bottom: 0cm;"><span style="font-size:85%;">Ceux de la pensée économique ont été plus longs à se manifester comme des absolus, mais c'est le cas depuis deux siècles au moins: évangiles selon Saint Marx et Saint Adam Smith, homo economicus, anticipations rationnelles, concurrence, paradigme des marchés autorégulés, marchés incontestés...).</span></p> <p style="margin-bottom: 0cm;"><span style="font-size:85%;">Il s'agit d'une sorte de religion, ou du moins de pensée unique, qui propose ses méthodes et ses objectifs à la vie concrète dans l'économie mais aussi dans l'organisation du politique, du social et même de la vie individuelle (socioeconomie) </span> </p> <p style="margin-bottom: 0cm;"><span style="font-size:85%;">Les détenteurs de savoirs techniques (ingénieurs, biologistes, guerriers, prédicateurs) sont rarement modestes . Ils extrapolent leurs savoirs jusqu'à un absolu déraisonnable et on trouve toujours un Faust, un Docteur Mabuse ou Frankenstein, un Hitler pour exagérer sans humour jusqu'à l'absurde ou l'horreur. </span> </p> <p style="margin-bottom: 0cm;"> </p> <p style="margin-bottom: 0cm;"><span style="font-size:85%;">Comme toute pulsion forte, la recherche du pouvoir ou simplement d'une satisfaction économique ou politique; exercée par un acteur assez puissant, peut susciter un changement destabilisant pour autrui, c'est à dire un risque.</span></p> <p style="margin-bottom: 0cm;"><span style="font-size:85%;">Chose plus grave, les techniques d'influence économique (publicité, appel à la crédulité publique, création de valeur « out of nothing » ) et d'influence politique (propagande, menace, agression...) sont desormais largement vulgarisées entre des mains non innocentes: mafias, délinquants financiers, groupes terroristes,</span></p> <p style="margin-top: 0.18cm; margin-bottom: 0.18cm;"> <span style="font-size:85%;">Ouvrons notre journal. Croyances totalitaires, anticipations rationnelles et marchés auto-régulés, bulles et subprimes, énormité de la dette américaine, traders-fous, patrons-voyous, politiciens mégalomanes, médiatisations narcissiques, surconsommations chauffées à la publicité, pollutions, génie génétique, drogues et addictions médicamenteuses, nanotechnologies</span>...</p> <p style="margin-top: 0.18cm; margin-bottom: 0.18cm;"> <span style="font-size:85%;">Nous avons longuement forgé des instruments prométhéens , économie, politique, science, communication qui nous échappent et nous menacent.</span></p> <p style="margin-top: 0.18cm; margin-bottom: 0.18cm;"> <span style="font-size:85%;">Le bonheur tranquille n'est plus ni dans les prés, ni dans les bois, ni encore moins dans la Cité radieuse promise par les politiciens.</span></p> <p style="margin-top: 0.18cm; margin-bottom: 0.18cm; text-align: center;"> <span style="font-size:85%;">So what?</span></p> <p style="margin-bottom: 0cm;"><br /></p>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3006136363383946274.post-89619002049147290362008-08-20T00:37:00.000-07:002008-08-20T00:46:47.790-07:00Le WIKI professionnel de l'American Libray Association<a style="font-weight: bold;" href="http://wikis.ala.org/professionaltips/index.php/Main_Page">Le WIKI professionnel de l'American Library Association </a>est un remarquable manuel en ligne des techniques d'information en bibliotheques<br /><br />Administration and Management:<br /><br />Advocacy and Public Relations | Budgeting and Finance | Buildings | Disaster Response | Equipment and Facilities Management | Fundraising | Information Technology and Library Systems | Human Resources | Knowledge Management | Leadership | Outsourcing | Personal Career Development | Planning and Assessment | Policy Development | Recruitment and Retention | Staff Development | Standards | Statistics<br /><br /><br />Collection Development, Organization, and Services:<br /><br />Acquisitions | Cataloging and Classification | Circulation | Collection Development | Government Documents | InterLibrary Loan | Preservation | Processing Tools | Serials | Special Collections<br /><br /><br />Diversity:<br /><br />Diversity in the Workplace | Serving Multicultural Populations<br /><br />Equity of Access:<br /><br />Overview | Access to Facilities, including ADA issues | Access to Resources | Outreach | Services to Special Populations | Serving Speakers of Languages Other than English<br /><br /><br />Fun Facts and Firsts:<br /><br />Fun Facts | Firsts | Fun Facts About ALA's Literature and Media Awards | For Our Environment: "Green" Ideas You Can Use<br /><br /><br />Intellectual Freedom:<br /><br />Censorship | Copyright | Ethics<br /><br /><br />Readers' Advisory and ALA's Literature and Media Awards:<br /><br />Book Discussion Groups | Readers' Advisory | Media Awards | Media Awards Acceptance Speeches | Other Media Awards<br /><br />21st Century Literacy:<br /><br />Adult Literacy | Information Literacy | Using Current Technologies<br /><br /><br />Standards and Guidelines:<br /><br />ALA Standards | Other Standards | Standards Development<br /><br /><br />Type of Library<br /><br />Academic | Archives | Digital | Government | Joint-Use | Multitype Library Cooperatives | Public | School | Special | Specialized Library Agencies | State Library Agencies | Trustees | Vendors and Library Suppliers<br /><br /><br />Type of Library Worker:<br /><br />Independent and Consultants | International Library Worker | Job Seeker | Library Advocates | Support Staff | Trustees | Vendors and Library Suppliers | Volunteers<br /><br /><br />User Services:<br /><br />Access Services | Adult Library Services | Bibliographic Instruction | Bibliotherapy | Boys | Business Support | Children's Services | Genealogical Research | Homeless Library Patrons | Reference | Storytelling | Teens and Young Adults | Unattended Children in Libraries<br /><br /><br />Visioning:<br /><br />Resources<br /><br /><br />Voir aussi <a href="http://www.geoscopies.net/sources/BIBLIO/b001bib.php"> <span style="font-weight: bold;">Bibliotheques et centres de documentation</span></a><br /><br /><a href="http://www.geoscopies.net/infoproaction/cyberscope/information/100infindex.php">Information sur Internet</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3006136363383946274.post-39268885018225347012008-07-31T08:07:00.000-07:002008-07-31T08:18:42.013-07:00US TECHNOLOGIES Summer 2008<a href="http://www.ftc.gov/os/2008/07/P034305FY0dncreport.pdf"><span style="font-weight:bold;">National Do Not Call Registry:</span></a> Annual Report to Congress for FY 2007 Pursuant to the Do-Not-Call Implementation Act on Implementation of the National Do Not Call Registry<br />Federal Trade Commission (FTC). July 2008. 20 pages.<br />http://www.ftc.gov/os/2008/07/P034305FY0dncreport.pdf<br /><br />The National Do Not Call Registry is, by virtually every available measure, an effective consumer protection initiative. By the end of FY 2007, there were more than 145 million telephone numbers on the National Registry. The available data show that compliance with the National Registry provisions of the Amended Telemarketing Sales Rule (“Amended TSR”) is high and that, as a result, consumers are receiving fewer unwanted telemarketing calls. The National Registry received over 19 million new registrations during FY 2007. Approximately 66,000 sellers, telemarketers, and exempt organizations accessed the National Registry during the fiscal year, with over 6,000 of those entities paying fees totaling more than $21.5 million. The FTC initiated three new cases alleging violations of the National Registry and resolved or added defendants to eight cases that were filed before FY 2007 but were still pending.<br /><br /><br /><span style="font-weight:bold;">Privacy:</span> Congress Should Consider Alternatives for <a href="http://www.gao.gov/new.items/d08795t.pdf">Strengthening Protection of Personally Indentifiable Information</a><br />Linda Koontz. Director. Information Management Issues. Government Accountability Office (GAO). Testimony before the Committee on Homeland Security and Governmental Affairs, U.S. Senate. June 18, 2008. 27 pages.<br /><br />Concerns have been raised about the privacy and security of personal information in light of advances in information technology and the increasingly sophisticated ways in which the government obtains and uses information. Federal agencies' use of personal information is governed by the Privacy Act of 1974 and the E-Government Act of 2002, while the Office of Management and Budget (OMB) provides implementation guidance and oversight. These laws and guidance are based on the Fair Information Practices, a set of widely accepted principles for protecting privacy. GAO was asked to testify on its report concerning the sufficiency of privacy protections afforded by existing laws and guidance.<br /><br /><br /><a href="http://www.gao.gov/new.items/d08881t.pdf"><span style="font-weight:bold;">DIGITAL TELEVISION TRANSITION:</span></a> Broadcasters’ Transition Status, Low-Power Station Issues, and Information on Consumer Awareness of the DTV Transition<br />Mark L. Goldstein. Director. Physical Infrastructure Issues. Government Accountability Office (GAO). Testimony before the Subcommittee on Telecommunications and the Internet, Committee on Energy and Commerce, U.S. House of Representatives. June 10, 2008. 23 pages.<br />http://www.gao.gov/new.items/d08881t.pdf<br />This requested report examines the status of broadcast stations in transitioning to digital, the extent to which broadcast stations are encountering issues, and the actions the Federal Communications Commission (FCC) has taken to guide broadcasters in the digital transition. Television broadcast stations have made substantial progress in transitioning to digital television, with the vast majority already transmitting a digital signal. Approximately 91 percent of the 1,122 full-power stations responding to this survey are currently transmitting a digital signal, with approximately 68 percent of survey respondents transmitting their digital signal at full strength and 68 percent transmitting their digital signal on the channel from which they will broadcast after the transition date. Some stations, however, still need to complete construction of their final digital facilities, and others need to relocate their digital channel to complete the transition.<br /><br /><br />Broadband Internet Access and the Digital Divide: Federal Assistance Programs<br />Lennard G. Kruger and Angele A. Gilroy. Congressional Research Service (CRS). June 4, 2008. 38 pages.<br />http://www.ipmall.info/hosted_resources/crs/RL30719_080604.pdf<br />Broadband technologies are currently being deployed primarily by the private sector throughout the United States. While the numbers of new broadband subscribers continue to grow, studies and data suggest that the rate of broadband deployment in urban and high income areas may be outpacing deployment in rural and low-income areas. Some policymakers, believing that disparities in broadband access across American society could have adverse economic and social consequences on those left behind, assert that the federal government should play a more active role to avoid a “digital divide” in broadband access. One approach is for the federal government to provide financial assistance to support broadband deployment in underserved areas. Others, however, believe that federal assistance for broadband deployment is not appropriate. Some opponents question the reality of the “digital divide,” and argue that federal intervention in the broadband marketplace would be premature and, in some cases, counterproductive.<br /><br /><br /><a href="http://www.ipmall.info/hosted_resources/crs/RL33542_080527.pdf">Broadband Internet Regulation and Access:</a> Background and Issues<br />Angele A. Gilroy and Lennard G. Kruger. Congressional Research Service (CRS). May 27, 2008. 23 pages.<br /><br />Some areas of the nation -- particularly rural and low-income communities -- continue to lack full access to high-speed broadband Internet service. In order to address this problem, the 110th Congress is examining a wide range of issues including the scope and effect of federal broadband financial assistance programs (including universal service and the broadband programs at the U.S. Department of Agriculture’s Rural Utilities Service), and the impact of telecommunications regulation and new technologies on broadband deployment. One facet of the debate over broadband services focuses on whether present laws and subsequent regulatory policies are needed to ensure the development of competition and its subsequent consumer benefits, or conversely, whether such laws and regulations are overly burdensome and discourage investment in and deployment of broadband services.<br /><br /><br /><a href="http://www.ipmall.info/hosted_resources/crs/RL33816_080515.pdf">Broadband Loan and Grant Programs in the USDA’s Rural Utilities Service</a><br />Lennard G. Kruger. Congressional Research Service (CRS). May 15, 2008. 35 pages.<br /><br />Some key issues pertinent to a consideration of the Rural Utilities Service (RUS) at the U.S. Department of Agriculture (USDA) broadband programs include restrictions on applicant eligibility, how “rural” is defined with respect to eligible rural communities, how to address assistance to areas with preexisting broadband service, technological neutrality, funding levels and mechanisms, and the appropriateness of federal assistance. Ultimately, any modification of rules, regulations, or criteria associated with the RUS broadband program will likely result in “winners and losers” in terms of which companies, communities, regions of the country, and technologies are eligible or more likely to receive broadband loans and grants.<br /><br /><a href="http://www.ipmall.info/hosted_resources/crs/RL33586_080515.pdf"><br />The Federal Networking and Information Technology Research and Development Program</a>: Funding Issues and Activities<br />Patricia Moloney Figliola. Congressional Research Service (CRS). May 15, 2008. 19 pages.<br /><br />Proponents of federal support of information technology (IT) R&D assert that it has produced positive outcomes for the country and played a crucial role in supporting long-term research into fundamental aspects of computing. Government-funded IT research often leads to open standards, something that many perceive as beneficial, encouraging deployment and further investment. Industry, on the other hand, is more inclined to invest in proprietary products and will diverge from a common standard when there is a potential competitive or financial advantage to do so. Finally, proponents of government support believe that the outcomes achieved through the various funding programs create a synergistic environment in which both fundamental and application-driven research are conducted, benefitting government, industry, academia, and the public. Critics assert that the government, through its funding mechanisms, may be picking “winners and losers” in technological development, a role more properly residing with the private sector. For example, the size of the NITRD Program may encourage industry to follow the government’s lead on research directions rather than selecting those directions itself.<br /><br /><br /><span style="font-weight:bold;"><a href="http://www.ipmall.info/hosted_resources/crs/RL31953_080514.pdf">“Spam”:</a></span> An Overview of Issues Concerning Commercial Electronic Mail<br />Patricia Moloney Figliola. Congressional Research Service (CRS). May 14, 2008. 21 pages.<br /><br />Spam, also called unsolicited commercial email (UCE) or “junk email,” aggravates many computer users. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment, and that some consumers want to receive such solicitations. On December 16, 2003, President Bush signed into law the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act, P.L. 108-187. It went into effect on January 1, 2004. The CAN-SPAM Act does not ban UCE. Rather, it allows marketers to send commercial email as long as it conforms with the law, such as including a legitimate opportunity for consumers to “opt-out” of receiving future commercial emails from that sender. Proponents of CAN-SPAM have argued that consumers are most irritated by fraudulent email, and that the law should reduce the volume of such email because of the civil and criminal penalties included therein. Opponents counter that consumers object to unsolicited commercial email, and since the law legitimizes commercial email (as long as it conforms with the law’s provisions), consumers actually may receive more, not fewer, UCE messages.<br /><br /><br /><a href="http://">Broadband over Powerlines: Regulatory and Policy Issues</a><br />Patricia Moloney Figliola. Congressional Research Service (CRS). May 13, 2008. 21 pages.<br /><br />Congress has expressed significant interest in increasing the availability of broadband services throughout the nation. Broadband over powerlines (BPL) has the potential to play a significant role in increasing the competitive landscape of the communications industry as well as extend the reach of broadband to a greater number of Americans. BPL, like any technology, has its advantages and disadvantages. Proponents state that BPL is less expensive to deploy than the cable and telephone companies’ broadband offerings; it does not require upgrades to the actual electric grid; and, it is not limited by some technical constraints of its competitors. However, critics are concerned that BPL interferes with licensed radio frequencies used for amateur radio, government, and emergency response.<br /><br /><a href="http://www.cbo.gov/ftpdocs/91xx/doc9168/05-20-HealthIT.pdf"><br /><span style="font-weight:bold;">Evidence on the Costs and Benefits of Health Information Technology</span></a><br />Peter R. Orszag. Director. Congressional Budget Office (CBO). CBO Paper. May 2008. 46 pages.<br /><br />Health information technology (health IT) plays a key role in health care. Providers such as physicians and hospitals generate and process information as they provide care to patients. Managing that information and using it productively pose a continuing challenge, particularly in light of the complexity of the U.S. health care sector, with its many different types of providers, services, and settings for care. Health IT has the potential to significantly increase the efficiency of the health sector by helping providers manage information. It could also improve the quality of health care and, ultimately, the outcomes of that care for patients. In this paper, prepared at the request of the Chairman of the Senate Budget Committee, the Congressional Budget Office examines the evidence on the costs and benefits of health IT, possible barriers to a broader distribution and use of it in hospitals and clinicians’ offices, and possible options for the federal government to promote use of health IT.<br /><br /><br /><span style="font-weight:bold;"><a href="http://www.gao.gov/new.items/d08510.pdf">DIGITAL TELEVISION TRANSITION:</a></span> Majority of Broadcasters Are Prepared for the DTV Transition, but Some Technical and Coordination Issues Remain<br />Government Accountability Office (GAO). Report to Congressional Requesters. April 2008. 38 pages.<br /><br />This requested report examines the status of broadcast stations in transitioning to digital, the extent to which broadcast stations are encountering issues, and the actions the Federal Communications Commission (FCC) has taken to guide broadcasters in the digital transition. To address these issues, GAO conducted a Web-based survey of full-power television broadcast stations. GAO surveyed 1,682 stations and obtained completed questionnaires from 1,122 stations, for a response rate of 66.7 percent.<br /><br /><br /><span style="font-weight:bold;">THINK TANKS AND RESEARCH CENTERS:</span><br /><br />The opinions expressed in these publications do not necessarily reflect the views of the U.S. Government<br /><br /><br /><span style="font-weight:bold;">HOME BROADBAND ADOPTION 2008</span><br />John B. Horrigan. The Pew Internet & American Life Project. Report. July 2008. 31 pages.<br />http://www.pewinternet.org/pdfs/PIP_Broadband_2008.pdf<br />Some 55% of all adult Americans now have a high-speed Internet connection at home. The percentage of Americans with broadband at home has grown from 47% in early 2007. Poorer Americans saw no growth in broadband adoption in the past year while at the same time nearly one-third of broadband users pay more to get faster connections.<br /><br /><span style="font-weight:bold;"><br />THE INTERNET AND THE 2008 ELECTION</span><br />Aaron Smith and Lee Rainie. The Pew Internet & American Life Project. Report. June 15, 2008. 27 pages.<br />http://www.pewinternet.org/pdfs/PIP_2008_election.pdf<br />A record-breaking 46% of Americans have used the Internet, e-mail or cell phone text messaging to get news about the campaign, share their views and mobilize others. A significant number of voters are also using the Internet to gain access to campaign events and primary documents. Some 39% of online Americans have used the Internet to access "unfiltered" campaign materials, which includes video of candidate debates, speeches and announcements, as well as position papers and speech transcripts. Online activism using social media has also grown substantially since the first time the Pew Center probed this issue during the 2006 midterm elections.<br /><br /><br /><span style="font-weight:bold;">JOB OPPORTUNITIES FOR THE GREEN ECONOMY:</span> A STATE-BY-STATE PICTURE OF OCCUPATIONS THAT GAIN FROM GREEN INVESTMENTS<br />Robert Pollin and Jeannette Wicks-Lim. Political Economy Research Institute. University of Massachusetts, Amherst. June 2008. 15 pages.<br />http://www.bluegreenalliance.org/atf/cf/%7B3637E5F0-D0EA-46E7-BB32-74D973EFF334%7D/NRDC_report_May28.pdf<br />This report provides a snapshot of what kinds of jobs are needed to build a green economy in the United States. The authors focus on six key strategies for attacking global warming and highlight some of the major “green jobs” associated with each of these approaches: building retrofitting, mass transit, energy-efficient automobiles, wind power, solar power, and cellulosic biomass fuels. Millions of U.S. workers -- across a wide range of familiar occupations, states, and income and skill levels -- will all benefit from the project of defeating global warming and transforming the United States into a green economy.<br /><br /><span style="font-weight:bold;"><br />RURAL BROADBAND AND THE TV WHITE SPACE</span>: HOW UNLICENSED ACCESS TO VACANT TELEVISION CHANNELS CAN BRING AFFORDABLE WIRELESS BROADBAND TO RURAL AMERICA<br />Benjamin Lennett. New America Foundation. Wireless Future Program. Issue Brief #22. June 2008. 4 pages.<br />http://www.newamerica.net/files/Rural_Broadband_and_TV_WhiteSpace.pdf<br />In 2004, the FCC initiated a proceeding to determine rules to allow the unlicensed operation of wireless communication devices in unused television band spectrum between channels 2 and 51. These vacant and unassigned television channels, known as the TV “white spaces,” would help make affordable wireless broadband in rural America a reality.<br /><br /><span style="font-weight:bold;"><br />THE INTERNET AND CONSUMER CHOICE</span><br />John B. Horrigan. The Pew Internet & American Life Project. Report. May 18, 2008. 42 pages.<br />http://www.pewinternet.org/pdfs/PIP_Consumer.Decisions.pdf<br />Networked information gives consumers ready access to resources that can provide clues about product quality, terms of service, and other features. This report examines the process by which people come to purchase three types of products that, in different ways, are likely to be influenced by online information. This reports finds that the Internet plays an important role in how people conduct research for purchases, but it is just one among a variety of sources people use and usually not the key factor in final purchasing decisions.<br /><br /><br /><span style="font-weight:bold;">EXPLAINING INTERNATIONAL BROADBAND LEADERSHIP</span><br />Robert D. Atkinson, Daniel K. Correa and Julie A. Hedlund. Information Technology and Innovation Foundation (ITIF). May 2008. 108 pages.<br />http://www.itif.org/files/ExplainingBBLeadership.pdf<br />It is hard to follow broadband telecommunications policy without hearing almost weekly that the United States ranks 15th out of 30 Organization for Economic Cooperation and Development (OECD) nations in broadband adoption. But it is much less apparent why the United States is behind. Indeed, relatively little work has been done to understand why some nations are ahead, and why some, like the United States, are lagging. By examining OECD nations through statistical analysis and in-depth case studies of nine nations, including the United States, this report identifies factors that have spurred broadband performance in other nations, presents key findings that government and the technology industry must recognize if they are to find the right course for the United States, and proposes key policy recommendations that will drive greater broadband performance.<br /><br /><span style="font-weight:bold;"><br />UNDERSTANDING INTERNATIONAL BROADBAND COMPARISONS</span><br />Scott Wallsten. Technology Policy Institute. May 2008. 56 pages.<br />http://www.techpolicyinstitute.org/files/wallsten_international_broadband_comparisons.pdf<br />Discussions about broadband policy in the United States today inevitably begin by citing OECD estimates. Many analysts interpret the low ranking of the U.S. in broadband penetration relative to other OECD countries as meaning that U.S. broadband policy has been a failure. Whatever the relationship between rankings and policy, the OECD estimates are inaccurate and therefore misleading. In fact, broadband is nearly universally available in the U.S. and the U.S. compares favorably to other rich countries in terms of broadband penetration, speeds, and in broader measures of information and communications technology.<br /><br /><br /><span style="font-weight:bold;">THE BROADBAND EFFICIENCY INDEX: </span> WHAT REALLY DRIVES BROADBAND ADOPTION ACROSS THE OECD?<br />George S. Ford, Thomas M. Koutsky and Lawrence J. Spiwak. Phoenix Center for Advanced Legal and Economic Public Policy Studies. Policy Paper Number 33. May 2008. 27 pages.<br />http://www.phoenix-center.org/pcpp/PCPP33Final.pdf<br />In this paper, the authors assess the performance and efficiency of OECD countries with respect to broadband Internet subscription. Using the econometric technique of Stochastic Frontier Analysis, they estimate scores indicating the efficiency with which a country converts its economic and demographic endowments into broadband subscriptions. With very few exceptions, they find that broadband subscription in OECD countries is consistent with those endowments -- about two thirds of OECD countries have an efficiency rate of 95% or better. Significantly, the United States has an efficiency index of 96.7%, which is slightly higher than Japan (96.3%) and Korea (95.8%). Consistent with earlier research, they find that economic and demographic endowments explain nearly all of the variation in broadband subscriptions (91%).<br /><br /><br /><span style="font-weight:bold;">REVERSE AUCTIONS AND UNIVERSAL TELECOMMUNICATIONS SERVICE:</span> LESSONS FROM GLOBAL EXPERIENCE<br />Scott Wallsten. Technology Policy Institute. April 2008. 20 pages.<br />http://www.techpolicyinstitute.org/files/wallsten_global_reverse_auctions-1.pdf<br />The United States now spends around $7 billion on universal service programs -- subsidies intended to ensure that the entire country has access to telecommunications services. Most of this money supports telecommunications service in “high cost” (primarily rural) areas, and the High Cost fund is growing quickly. In response to this growth, policymakers are considering using reverse auctions, or bids for the minimum subsidy, as a way to reduce expenditures. While the U.S. has not yet distributed funds for universal service programs using reverse auctions, the method has been used widely.<br /><br /><span style="font-weight:bold;"><br /><br />Previous issues of Information Technologies – Documents on the Web are available at: http://france.usembassy.gov/irc/econ/webalert/default.htm<span style="font-style:italic;"></span></span>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-3006136363383946274.post-58732978166601129952008-07-31T07:00:00.000-07:002008-07-31T07:12:51.421-07:00MEDIAS USA<span style="font-weight:bold;"><a href="http://www.pff.org/mediametrics/Media%20Metrics%20%5BVersion%201.0%5D.pdf">MEDIA METRICS: </a>THE TRUE STATE OF THE MODERN MEDIA MARKETPLACE</span><br />Progress & Freedom Foundation, July 17, 2008<br /><br />Debates about the state of the media marketplace continue to garner interest in Washington. Many policymakers, regulators, and consumer groups bemoan the supposed lack of “localism,” ownership concentration and an absence of quality programming as a rationale to further regulate in the media sector.<br />The report shows that, contrary to what some media critics believe, there are more media choice, competition, and diversity than ever before. The report offers a comprehensive look at a variety of media sectors such as audio, video and print, providing policymakers with a snapshot of the media sector.<br /><br /><a href="http://journalism.org/node/11961"><span style="font-weight:bold;">THE CHANGING NEWSROOM</span></a><br />Project for Excellence in Journalism, July 21, 2008<br /><br />Despite an image of decline, more people today in more places read the content produced in the newsrooms of American daily newspapers than at any time in years. But revenues are tumbling. The editors expect the financial picture only to worsen, and they have little confidence that they know what their papers will look like in five years.<br /><br /><br />Voir <a href="http://www.geoscopies.net/CHRONIQUES/c84presse.php"><span style="font-weight:bold;">LA PRESSE </span></a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3006136363383946274.post-30353821406347570362008-07-30T01:27:00.000-07:002008-07-30T01:32:17.912-07:00Encyclopedie Larousse<a href="http://www.larousse.fr/encyclopedie/">Encyclopedie Larousse </a><br /><br />Une nouvelle encyclopédie contributive, sur le modèle de Wikipedia. <br />150000 articles mis gratuitement à disposition du public.<br /> Les internautes peuvent aussi rédiger des articles dans un espace personnel: ces contenus ne peuvent être modifiés que par l'auteur lui-même ou par un modérateur en cas d'abus . <br />Ceci fournira à Larousse de nouveaux rédacteurs spécialisés.<br /><br />Voir <a href="http://geoscopies.net/sources/BIBLIO/b001net.php">BIBLIOTHEQUES EN LIGNE</a>Unknownnoreply@blogger.com0