172,569 research outputs found

    Whither Goest Government Documents? A Story and a Study

    Get PDF
    federal publications, government documents, Google, HathiTrust, discovery services, Catalog of Government Publications, library catalogsA study was conducted to determine the findability of known print U.S. government documents using five different resources: the Catalog of Government Publications (CGP), in-house library catalog, library discovery service, HathiTrust, and Google. Overall, Google was the most effective finding tool, followed by the library discovery service, the in-house library catalog, Catalog of Government Publications, and HathiTrust. Three-quarters of documents were available full-text via Google. Implications of the online availability of government publications on the need for large print document collections and the continuing reconsideration of library spaces are discussed as are future studies.Ye

    Notes on Operations: One Title, Hundreds of Volumes, Thousands of Documents: Collaborating to Describe the Congressional Serial Set

    Get PDF
    As part of its participation in the Google Books government documents scanning project, the Purdue University Libraries agreed to contribute volumes of the Congressional Serial Set (CSS). Realizing that the results would be far more useful if the individual documents within this title were cataloged separately, librarians developed procedures to create brief records and began cataloging CSS documents from the 1890s. The University of Iowa became a partner in this collaborative pilot project, and its cataloging staff used the Purdue template and procedures to create records from the CSS for individual documents from two years in the 1890s. Purdue staff used those records to barcode their own corresponding CSS documents before sending those volumes to Google for scanning. Staff subsequently loaded the records into WorldCat to improve discoverability for scholars. The result of the collaborative cataloging effort was the ability to prepare CSS volumes for scanning quickly and efficiently

    Cross Border Data Flows: Could Foreign Protectionism Hurt U.S. Jobs?: Hearing Before the Subcomm. On Commerce, Mfg. & Trade of the H. Comm. on Energy & Commerce, 113th Cong., Sept. 17, 2014 (Statement of Laura K. Donohue)

    Get PDF
    Documents released over the past year detailing the National Security Agency’s telephony metadata collection program and interception of international content under the Foreign Intelligence Surveillance Act (FISA) directly implicated U.S. high technology companies in government surveillance. The result was an immediate, and detrimental, impact on U.S. firms, the economy, and U.S. national security. The first Snowden documents, printed June 5, 2013, revealed that the U.S. government had served orders on Verizon, directing the company to turn over telephony metadata under Section 215 of the USA PATRIOT Act. The following day, The Guardian published classified slides detailing how the NSA had intercepted international content under Section 702 of the FISA Amendments Act. The type of information obtained ranged from E-mail, video and voice chat, videos, photos, and stored data, to Voice over Internet Protocol, file transfers, video conferencing, notifications of target activity, and online social networking details. The companies involved read like a who’s who of U.S. Internet giants: Microsoft, Yahoo, Google, Facebook, PalTalk, YouTube, Skype, AOL, and Apple. More articles highlighting the extent to which the NSA had become embedded in the U.S. high tech industry followed. In September 2013 ProPublica and the New York Times revealed that the NSA had enjoyed considerable success in cracking commonly-used cryptography. The following month the Washington Post reported that the NSA, without the consent of the companies involved, had obtained millions of customers’ address book data: in one day alone, some 444,743 email addresses from Yahoo, 105,068 from Hotmail, 82,857 from Facebook, 33,697 from Gmail, and 22,881 from other providers. The extent of upstream collection stunned the public – as did slides demonstrating how the NSA had bypassed the companies’ encryption, intercepting data as it transferred between the public Internet and the Google cloud. Further documents suggested that the NSA had helped to promote encryption standards for which it already held the key or whose vulnerabilities the NSA understood but not taken steps to address. Beyond this, press reports indicated that the NSA had at times posed as U.S. companies—without their knowledge—in order to gain access to foreign targets. In November 2013 Der Spiegel reported that the NSA and the United Kingdom’s Government Communications Headquarters (GCHQ) had created bogus versions of Slashdot and LinkedIn, so that when employees from the telecommunications firm Belgacom tried to access the sites from corporate computers, their requests were diverted to the replica sites that then injected malware into their machines. As a result of growing public awareness of these programs, U.S. companies have lost revenues, even as non-U.S. firms have benefited. In addition, numerous countries, concerned about consumer privacy as well as the penetration of U.S. surveillance efforts in the political sphere, have accelerated localization initiatives, begun restricting U.S. companies’ access to local markets, and introduced new privacy protections—with implications for the future of Internet governance and U.S. economic growth. These effects raise attendant concerns about U.S. national security. Congress has an opportunity to redress the current situation in at least three ways. First, and most importantly, reform of the Foreign Intelligence Surveillance Act would provide for greater restrictions on NSA surveillance. Second, new domestic legislation could extend better protections to consumer privacy. These shifts would allow U.S. industry legitimately to claim a change in circumstance, which would help them to gain competitive ground. Third, the integration of economic concerns at a programmatic level within the national security infrastructure would help to ensure that economic matters remain central to national security determinations in the future

    Automatic extraction and representation of geographic entities in eGovernment

    Get PDF
    In this paper we present a system that automatically extracts and geocodes named entities from unstructured, natural language textual documents. The system uses the Geo-Net-PT ontology and Google maps as auxiliary data sources. This type of system is particularly useful to automate the geocoding of existing information in e-government applications, which usually requires human intervention. Within the paper we introduce the relevant human language technologies, describe the system that was developed, present and discuss the preliminary results and draw the relevant conclusions and future work

    Articulating the Cloud: Understanding Data Centers, Renewable Energy, and Public Policy

    Get PDF
    Experts urge that drastic steps must be taken to reduce carbon dioxide emissions as the ongoing climate crisis worsens. Amid this, it is also important to understand the relationships between media infrastructures and the finite resources they require. This thesis goes beyond arguing that data centers are inherently unsustainable media infrastructures that consumers rely on to access the Internet and cloud storage. Instead, this thesis focuses on Google as an industry leading company in the United States to assess how the company understands their role in the climate crisis, and how they define renewable energy and sustainability. To do so, this thesis used critical discourse analysis of Google’s public-facing documents, government documents, and related joint reports between external research organizations and Google related to their data centers. The findings revealed the company defines sustainability as a commitment and company value, and that they have an immense renewable energy portfolio through additional acquisitions measures. Ultimately, this thesis argues that Google discursively positions themselves as corporately benevolent and masks retroactive sustainability in the guise of activism while simultaneously firing activist employees, having fossil fuel industry clientele, and financially contributing to anti-climate change organizations. This thesis contributes to important conversations related to media infrastructure sustainability, in particular emphasizing the complex tensions and dynamics at work to make banal technologies possible. It is important for consumers to understand the limitations and items lacking in corporate discourse to advocate for a more sustainable future for everyone

    Which World Bank reports are widely read?

    Get PDF
    Knowledge is central to development. The World Bank invests about one-quarter of its budget for country services in knowledge products. Still, there is little research about the demand for these knowledge products and how internal knowledge flows affect their demand. About 49 percent of the World Bank’s policy reports, which are published Economic and Sector Work or Technical Assistance reports, have the stated objective of informing the public debate or influencing the development community. This study uses information on downloads and citations to assesses whether policy reports meet this objective. About 13 percent of policy reports were downloaded at least 250 times while more than 31 percent of policy reports are never downloaded. Almost 87 percent of policy reports were never cited. More expensive, complex, multi-sector, core diagnostics reports on middle-income countries with larger populations tend to be downloaded more frequently. Multi-sector reports also tend to be cited more frequently. Internal knowledge sharing matters as cross support provided by the World Bank’s Research Department consistently increases downloads and citations

    Race to the Bottom: Corporate Complicity in Chinese Internet Censorship

    Get PDF
    China's system of Internet censorship and surveillance, popularly known as the "Great Firewall," is the most advanced in the world. In this 149-page report, Human Rights Watch documents how extensive corporate and private sector cooperation -- including by some of the world's major Internet companies -- enables this system of censorship. Research was performed through interviews and extensive testing of search engines in China, and includes 18 screen shots to illustrate examples of censorship. The report vividly illustrates how various companies, including Yahoo!, Microsoft, Google, and Skype block terms they believe the Chinese government will want them to censor

    Regulating Search Warrant Execution Procedure for Stored Electronic Communications

    Get PDF
    Electronic communication services, from email, to social media, tomessaging applications, have not only dramatically changed daily life but have also had a profound impact on criminal investigations and procedure.The often large volume of electronically stored information has led to a two-step process for search warrant execution, codified in Federal Criminal Procedure Rule 41. When conducting a search pursuant to Rule 41, law enforcement often retains both responsive items—materials that fall within the scope of the warrant—and nonresponsive materials—intermingled items that can be searched, but ultimately exceed the scope of the warrant. This possession of nonresponsive material creates a tension between the account holder’s privacy interests and the government’s ability to conduct an effective search.Courts and scholars have implemented and proposed a range of approaches for search warrant execution inlight of concerns about sweeping general searches and the practicalities of searching electronically stored information. This Note examines these approaches to regulate search warrant execution procedure in the context of stored electronic communications. This Note also discusses the strengths and shortcomings of these various mechanisms and concludes that Rule 41 should be amended to provide standards for the retention and use of nonresponsive material
    • 

    corecore