WorldCat Identities

Anderson, Robert H. (Robert Helms) 1939-

Overview
Works: 76 works in 331 publications in 2 languages and 10,829 library holdings
Genres: Conference papers and proceedings  Abstracts  Case studies 
Roles: Author, Contributor, Other, Editor, Honoree
Classifications: HE6239.E54, 384.34
Publication Timeline
.
Most widely held works by Robert H Anderson
Sending your government a message : e-mail communication between citizens and government by C. R Neu( )

14 editions published in 1999 in English and Undetermined and held by 2,320 WorldCat member libraries worldwide

In 1995, RAND published a book exploring the feasibility and societal implications of providing "universal" access to electronic mail within the United States (Robert H. Anderson et al., Universal Access to E-Mail: Feasibility and Societal Implications, MR-650-MF). Among the nine policy conclusions and recommendations in that report were these: It is critical that electronic mail be a basic service in a national information infrastructure; it is important to reduce the increasing gaps in access to basic electronic information services, specifically, access to electronic mail services; there are no fundamental technical barriers to providing universal access to electronic mail services. This book explores the possibility for expanded citizen-government personalized electronic communication. Of particular interest are interactions between government agencies and individual citizens--interactions involving personal information, iterated communications between an individual and a government agency, and the use of a personal electronic mailbox for the individual. It provides an informal survey of current state uses of such communication, supplemented by two case studies of potential use. It also uses 1997 Current Population Survey data to update the electronic access trends in the United States that were highlighted in the 1995 study
The legal and economic implications of electronic discovery : options for future research by James N Dertouzos( )

19 editions published in 2008 in English and held by 2,137 WorldCat member libraries worldwide

Pretrial discovery--the exchange of relevant information between litigants--is central to the American civil legal process. As computer technologies continue to develop, concerns have arisen that, because of the sheer volume of electronically stored information, requests for electronic discovery (e-discovery) can increase litigation costs, impose new risks on lawyers and their clients, and alter expectations about likely court outcomes. For example, concerns about e-discovery may cause businesses to alter the ways in which they track and store information, or they may make certain types of plaintiffs and defendants more likely to sue, settle out of court, or go to trial. This paper presents the results of an exploratory study to identify the most important legal and economic implications of e-discovery. The authors interviewed plaintiffs and defense attorneys as well as corporate information technology staff and in-house counsel, and they reviewed the current state of e-discovery law and procedure. They then developed a preliminary model to explore the range of plausible effects that e-discovery might have on case outcomes. After summarizing this research, the authors propose five studies that will evaluate how e-discovery affects and is affected by technology, costs, business practices, legal outcomes, and public policy
Securing the U.S. defense information infrastructure : a proposed approach by Robert H Anderson( )

8 editions published between 1999 and 2000 in English and held by 1,813 WorldCat member libraries worldwide

"It is widely believed, and increasingly documented, that the United States is vulnerable to various types of "information warfare" attacks. Threats range from "nuisance" attacks by hackers to those potentially putting national security at risk. The latter might include attacks on essential U.S. information systems in a major regional crisis or theater war. The purpose might be to deter (or coerce) a U.S. intervention, to degrade U.S. power projection capabilities, to punish the United States or its allies, or to undermine the support of the American public for the conflict. Critical command-and-control and intelligence systems are designed to be robust and secure under attack. However, their survivability cannot be taken for granted, and they depend on a diverse, primarily civilian and commercial, information infrastructure (consisting of the Internet and the public telephone network, among other elements). As the diversity and potential seriousness of threats to the U.S. information infrastructure have become apparent, national-security planners and analysts have begun to think of ways to counter such threats--to increase the infrastructure's availability for essential functions. The authors analyze the concept of a minimum essential information infrastructure (MEII) in light of the characteristics of the national information infrastructure and the nature of the threat. They suggest that it is useful to think of the MEII as a process rather than a hardened stand-alone structure, and they provide a methodology and a tool to support the implementation of that process by military units and other organizations. -- Rand website
Universal access to E-mail : feasibility and societal implications by Robert H Anderson( Book )

7 editions published between 1995 and 1996 in English and held by 486 WorldCat member libraries worldwide

E-mail has swept the communications and information world, providing near-instantaneous global information and data exchange. However, this revolution primarily benefits an information elite: those with access to and knowledge about computers and e-mail. The diverging trends in access based on income and education are placing significant groups of current and next-generation U.S. citizens at a serious disadvantage in relevant job-related skills and in access to social programs and information. Information haves may leave the have-nots further behind, unless concerted efforts are made to provide all citizens with access to the technology. This report gives serious consideration to closing the access gap. The study details the benefits--on the personal as well as national and global level--of e-mail access. It recommends support of a U.S. policy of universal access and addresses the technical and economic aspects of putting such a policy into operation
Hypoplastic left heart syndrome by Robert H Anderson( )

17 editions published between 2003 and 2005 in English and German and held by 465 WorldCat member libraries worldwide

"Hypoplastic Left Heart Syndrome draws together the experiences of the leading experts in the field. Through their work in all aspects of congenital cardiac care, they have become acknowledged as the world leaders in the diagnostic, medical and social needs of children born with hypoplasia of the left heart. More importantly, for the first time, the book recognizes the crucial contributions made by the families of these children." "This book provides the ultimate reference for anyone treating children with this heart condition, particularly pediatric cardiac clinical and nursing teams, radiologists and radiographers, obstetric medical and nursing teams, psychologists, pathologists, geneticists and workers in social care."--Jacket
Effective use of information technology : lessons about state governance structures and processes by Robert H Anderson( Book )

8 editions published in 2003 in English and held by 238 WorldCat member libraries worldwide

The California Department of Information Technology was to provide leadership, guidance, and oversight for IT initiatives and projects throughout the state. In 2002 the agency's sunset clause was allowed to take effect and it ceased to exist. To determine what lessons can be learned from states with exemplary practices in IT governance, the authors conducted case studies in four states. They identify common success factors and challenges and make recommendations for a new agency of information technology in California
An exploration of cyberspace security R & D investment strategies for DARPA : "the day after-- in cyberspace II" by Robert H Anderson( Book )

4 editions published in 1996 in English and held by 170 WorldCat member libraries worldwide

In recent years, a RAND-developed "The Day After ..." exercise methodology has been used to explore strategic planning options, both for nuclear proliferation and counter-proliferation, and for questions involving "security in cyberspace" and "information warfare" (IW). On March 23, 1996, a "The Day After ... in Cyberspace" exercise with approximately 60 participants was conducted at RAND's Washington D.C. offices, under the sponsorship of the Defense Advanced Research Projects Agency. The purpose was to generate suggestions and options regarding research and development initiatives to enhance the security of the U.S. information infrastructure. The scenario in the exercise involved a Mideast crisis situation, with Iran as an aggressor. Exercise participants discussed both short-term technical fixes to counter IW attacks that were hypothesized to occur in the year 2000 and longer-term research strategies that could be initiated now to avoid significant vulnerabilities in the future
The global course of the information revolution : technological trends : proceedings of an international conference by Technological Trends Global Course of the Information Revolution( Book )

7 editions published in 2000 in English and held by 158 WorldCat member libraries worldwide

Reports on a conference sponsored by the National Intelligence Council in May 2000 that concentrated on technical trends in the information revolution, focusing in particular on the resulting new artifacts and services that might become widespread during the next 20 years. Participants saw a convergence of voice and data communications and a quantum jump in bandwidth during the next two decades, along with limited machine translation. A multitude of diverse, powerful, inexpensive sensors and devices capable of limited-distance wireless communications will come onto the market and computing and information systems will become much more ubiquitous, with convergence of wireless telephones, voice and e-mail messaging, and smart appliances. A likely shift in business emphasis from products to services will have an impact in such areas as health care, education, entertainment, and supply-chain management. Participants also discussed individual and societal tensions that could arise from these developments, such as battles between advocates of "open" and "closed" worlds of protocols and standards, and the threats to intellectual property rights and to individual privacy
Understanding the insider threat : proceedings of a March 2004 workshop by Richard C Brackney( Book )

6 editions published in 2004 in English and held by 156 WorldCat member libraries worldwide

Reports the results of a workshop on the problems of ensuring the security of information against malevolent actions by insiders in the intelligence community (IC) with access to sensitive information and information systems. Attendees discussed community system models, vulnerabilities and exploits, attacker models, and event characterization, and discussed databases that would aid them in their work
Tools for 21st century diplomacy : an approach to improved information and communication technology for Romania's Foreign Affairs Ministry by Tora K Bikson( Book )

10 editions published in 2002 in English and held by 155 WorldCat member libraries worldwide

At the request of Romania's Ministry of Foreign Affairs (MFA), the authors conducted a preliminary needs assessment and feasibility study of information and communication technology (ICT) in the Ministry to lay the foundation for future modernization stages, including the development of a detailed system design and subsequent system implementation. The researchers see future ICT implementation as having two main components: (1) providing a basic infrastructure for digital work practices and (2) completing projects to improve specific critical business processes. The MFA has made a go-ahead decision for ICT modernization, and the initial pieces of an implementation strategy are in place. The study suggests that the Ministry immediately acquire the needed human and financial resources to take the next implementation steps. Current positive developments in the Romanian government indicate that now is the right time for the MFA to move forward aggressively on its modernization agenda
Improving the composability of Department of Defense models and simulations by Paul K Davis( Book )

8 editions published between 2003 and 2004 in English and held by 153 WorldCat member libraries worldwide

This monograph investigates actions that could be taken by the Department of Defense (DoD) to improve the composability of its future models and simulations. In modeling and simulation, composability is the capability to select and assemble components in various combinations to satisfy specific user requirements meaningfully. Factors that determine what can be composed and the expense and risk of composing various components are examined, and many suggestions are presented on both policies and investments that would enhance prospects for composability. It is concluded that DoD must recognize that models are different from general software components and that model composability needs to be based not simply on software practice, but on the emerging science of modeling and simulation. DoD should also develop and communicate a set of realistic images and expectations, back away from excessive promises, and approach improvement measures as a "system problem" involving actions and investments in multiple areas ranging from science and technology to education and training
Toward an ethics and etiquette for electronic mail by Norman Z Shapiro( Book )

6 editions published in 1985 in English and held by 147 WorldCat member libraries worldwide

This report discusses some important general attributes of electronic mail and message systems, and the effects of those attributes on the quality and appropriateness of communication. The authors discuss the "etiquette" of sending and receiving electronic mail, drawing on personal observation of inappropriate or counterproductive uses of these systems. By presenting some initial guidelines, the authors attempt to accelerate the process by which social customs and behavior appropriate to electronic mail become established, and thereby to accelerate the effective use of such systems
Research on mitigating the insider threat to information systems--#2 : proceedings of a workshop held August, 2000 by Robert H Anderson( Book )

4 editions published in 2000 in English and held by 145 WorldCat member libraries worldwide

This is the second in a series of conference reports on the topic of R & D initiatives to mitigate and thwart the insider threat to critical U.S. defense and infrastructure information systems. (The first conference, held August 1999, is reported on in RAND/CF-151-OSD.) This August 2000 workshop's three main focus areas were long-term (2-5 year) research challenges and goals toward mitigating the insider threat; developing insider threat models; and developing near-term solutions using commercial off-the-shelf (COTS) and government off-the-shelf (GOTS) products. The long-term research recommendations stressed the need to develop an underlying system architecture designed explicitly with security and survivability in mind (unlike essentially all operating systems and network architectures in use today). Other topics included R & D needed on differential access controls, means of recording and saving the "provenance" of a digital document, and dealing with the increasing use of mobile code (e.g., in the form of "applets, " viruses, worms, or macros) in complex information systems. The report also contains a number of recommendations regarding the purposes and design of models of insider behavior, and near-term recommendations for helping to prevent, discover, and mitigate the threat of insider misuse of information systems
Research and development initiatives focused on preventing, detecting, and responding to insider misuse of critical defense information systems : results of a three-day workshop by Robert H Anderson( Book )

4 editions published in 1999 in English and held by 143 WorldCat member libraries worldwide

It is widely acknowledged that "insider misuse" is one of the major threats to (and obstacles to achieving) defense information system security. To combat such misuse, the Office of the Assistant Secretary of Defense (Command, Control, Communications, and Information) has requested that workshops be conducted to develop recommendations on mitigating insider threats and reducing information system vulnerabilities. These conference proceedings report on one such workshop, which included input from military officials, researchers, and industry participants. The workshop's main purpose was to propose technical research initiatives regarding how to identify threats and vulnerabilities, how to prevent such threats through security controls, how to detect that misuse has occurred, and how best to respond to such misuse. The workshop participants also identified the need for policies and procedures including (1) a clear definition of "insider," (2) guidance from legal and law enforcement communities regarding the attribution, collection, maintenance, processing, and storage of data to permit proper forensic analysis and trails that lead to appropriate legal prosecution, (3) cost/benefit analyses that will help determine the true value of new security procedures, (4) technology transfer plans, and (5) support for multiple, diverse, concurrent security approaches
Design considerations for computer-based interactive map display systems by Robert H Anderson( Book )

9 editions published between 1976 and 1979 in English and held by 130 WorldCat member libraries worldwide

A discussion of the key features of an interactive map display system that affect both the usefulness of the system and the design and architecture of its hardware and software. Recent developments in computer graphics offer the possibility of creating interactive map display systems having many of the advantages of traditional paper maps, but significant additional advantages as well. This report presents observations and guidelines for developers of interactive map systems. The techniques and design principles discussed are applicable to command and control systems ranging from support of a field commander through systems tailored to the needs of the National Command Authority
High performance computing opportunities and challenges for Army R & D( Book )

6 editions published in 2006 in English and held by 123 WorldCat member libraries worldwide

This study identifies key potential users of high-performance computing within the Army science and technology community and develops a strategy to build an initiative that will help the Army compete effectively for Department of Defense computing resources. Particular attention was given to applications of HPC in biotechnology and biomedicine and modeling and simulation of complex battlefield wireless network communication systems
Electronic data interchange (EDI) : using electronic commerce to enhance defense logistics by Judith E Payne( Book )

5 editions published in 1991 in English and held by 117 WorldCat member libraries worldwide

Electronic data interchange (EDI) is the electronic exchange of formatted business transactions between one organization's computer and another's. This report considers where the Department of Defense (DOD) should focus its limited resources to implement this powerful new capability in ways that will enhance its effectiveness, and discusses how logistics functions must change to take full advantage of EDI. It focuses on the use of EDI for logistics functions that could increase the readiness and sustainability of U.S. defense forces; suggests ways in which statutes and regulations might need to change to accommodate EDI's potential benefits; and offers approaches that DOD might take to develop a software and hardware infrastructure to support EDI
A change of course : the importance to DOD of international standards for electronic commerce by Judith E Payne( Book )

6 editions published in 1991 in English and held by 111 WorldCat member libraries worldwide

The U.S. Department of Defense (DOD) is now implementing electronic commerce--the use of electronic documents, rather than hard-copy forms--for business transactions. Conducting business in this way requires standard formats that are acceptable both to DOD's vendors and to the hundreds of DOD sites involved. It has chosen the most commonly used standard for such transactions today: the American National Standards Institute's (ANSI) X12 standard. This report presents results of a study that examined the special implications to the DOD of the international standards under development to enable electronic commerce. It presents recommendations regarding the use of standards by DOD and DOD's role in standards development
Seizing the moment : harnessing the information technologies by Steven C Bankes( Book )

4 editions published in 1992 in English and held by 102 WorldCat member libraries worldwide

This Note reviews some of the historical trends and events that suggest the scope and power of the information revolution. It speculates on how these trends and events may be interpreted in new models or theories of human affairs, in perhaps the greatest and most fundamental change since the latter part of the 18th century for human transactions of power of all kinds--political, economic, and military--and at all levels--global, national, and factional. Traditional hierarchies, based on the control of information, are being eroded and bypassed. At a time of great change, where institutions can provide for some measure of stability and continuity, many may be unable to function effectively given the new abundance of public information. The relationships among information, the information technologies, and conflict are complex and not universally positive; but positive effects are evident and pose apparent opportunities for harnessing the information technologies to inhibit conflicts. The authors describe some of these opportunities as they consider worlds in which anyone can hear or watch or broadcast anything they want on global networks. They conclude with an initial agenda for research into issues that must be addressed to properly support a program that explores and invests in high-leverage information initiatives that can open societies and enhance human rights
Toward a comprehensive environment for computer modeling, simulation, and analysis by Rand Corporation( Book )

6 editions published in 1993 in English and held by 93 WorldCat member libraries worldwide

Describes the authors' views about a new type of computer "environment" that is both needed and possible for modeling and analysis. This Note also describes a relatively concrete plan for developing and testing prototype versions of such an environment at RAND, with the intention of later exporting successful tools and methods to other analytic organizations inside and outside government. Work consistent with the plan is now well under way, but it will take years to realize the vision. Further, many elements of the approach reflect judgments and hypotheses that will need to be revisited and iterated as experience is gained with the prototypes. Although it was developed for internal purposes, this Note is being published because of interest in the effort expressed by many colleagues in the scientific and analytic community, many of whom are concerned with similar issues
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.21 (from 0.02 for Securing t ... to 0.64 for High perfo ...)

Associated Subjects
Administrative agencies--Communication systems Armed Forces--Automation Armed Forces--Data processing California Cardiology Children--Diseases--Treatment Command and control systems Command and control systems--Security measures Computer networks--Security measures Computer networks--Security measures--Government policy Computers--Access control Computer security Computer security--Government policy Computer simulation Congenital heart disease in children Defense industries--Security measures Electronic data interchange Electronic discovery (Law) Electronic information resources--Access control Electronic mail systems Employee theft--Investigation Employee theft--Prevention Ethics Executive departments--Communication systems Heart--Surgery High performance computing Human anatomy Information display systems Information services--Security measures Information technology Information technology--Government policy Information technology--Government policy--U.S. states Information technology--Social aspects Intelligence service--Computer networks--Security measures Intelligence service--Data processing International relations--Administration Management Military art and science--Mathematical models Military art and science--Simulation methods Military maps--Data processing Military planning Military research Operations research Romania Romania.--Ministerul Afacerilor Străine Telecommunication systems United States United States.--Army United States.--Defense Logistics Agency United States.--Department of Defense
Sending your government a message : e-mail communication between citizens and government
Covers
The legal and economic implications of electronic discovery : options for future researchSecuring the U.S. defense information infrastructure : a proposed approachUniversal access to E-mail : feasibility and societal implicationsHypoplastic left heart syndromeEffective use of information technology : lessons about state governance structures and processesAn exploration of cyberspace security R & D investment strategies for DARPA : "the day after-- in cyberspace II"The global course of the information revolution : technological trends : proceedings of an international conferenceUnderstanding the insider threat : proceedings of a March 2004 workshop
Alternative Names
Anderson, R. H. 1939-

Anderson, R. H. (Robert Helms), 1939-

Anderson, Robert 1939-

Anderson, Robert H., 1959-

Anderson, Robert H. (Robert Henry)

Anderson, Robert Helms 1939-

Helms Anderson, Robert 1939-

Languages
English (156)

German (1)