WorldCat Identities

Lin, Herbert

Overview
Works: 42 works in 168 publications in 1 language and 25,406 library holdings
Genres: Abstracts 
Roles: Editor, Author
Classifications: QA76.9.A25, 005.82
Publication Timeline
.
Most widely held works by Herbert Lin
Cryptography's role in securing the information society by Kenneth W Dam( Book )

15 editions published between 1900 and 1997 in English and held by 523 WorldCat member libraries worldwide

This book presents a comprehensive examination of cryptography and its evolution from a national security tool to a key compenent of the global information super-highway. It addresses the urgent need for a strong national policy on cryptography that promotes and encourages its widespread use to protect the information interests of individuals, businesses, and the nation as a whole, while respecting legitimate national needs of law enforcement and intelligence for national security and foreign policy purposes
Youth, pornography and the Internet by Dick Thornburgh( Book )

11 editions published in 2002 in English and held by 483 WorldCat member libraries worldwide

The Internet has changed the way we access the world. Anyone who can use the technology, even a child, can now access an enormous array of material, including educational links, sports info, chat rooms-and pornography. Youth, Pornography, and the Internet examines how we can protect our children without losing the many positive features of the Internet
Computing the future : a broader agenda for computer science and engineering by Herbert Lin( Book )

15 editions published in 1992 in English and held by 480 WorldCat member libraries worldwide

Annotation
Rights and responsibilities of participants in networked communities by Dorothy Elizabeth Robling Denning( Book )

13 editions published between 1900 and 1994 in English and held by 362 WorldCat member libraries worldwide

This report is based on a November 1992 workshop and a February 1993 public forum which discussed some of the social issues raised by the emergence of electronic communities. The workshop examined user, provider, and other perspectives on different types of networked communities, including those on the Internet, commercial information services, and grass-roots networks. The following questions were addressed in the workshop: (1) What policies, laws, regulations, or ethical standards apply to the use of networked services; who sets them; how are they developed; and how are they enforced? (2) What are users' expectations regarding privacy and protection of their proprietary rights? (3) What are the rights, responsibilities, and liabilities of providers or operators of networked services or of users of these services? And (4) What problems arise from connecting systems offering these services to systems that operate under different policies? The forum was organized around a set of hypothetical scenarios designed to illuminate how issues related to and associated with free speech, electronic vandalism, the protection of intellectual property interests, and privacy might emerge. The intent was to focus on the concerns that policymakers in government and the private sector might have, so much of the discussion involved questions of law and how the current legal regime helps to define the boundaries of what is or is not acceptable conduct on electronic networks. Background materials on technology, legal underpinnings, and the current policy environment are incorporated into chapters 1 through 3. Chapters 4 through 7 are devoted primarily to discussions of free speech, electronic vandalism, intellectual property interests, and privacy. Chapter 8 focuses on the deliberations of the steering committee. Five appendices provide information about network technology, the agendas for the workshop and forum, and biographies of the steering committee. (Mas)
Engaging privacy and information technology in a digital age( Book )

8 editions published in 2007 in English and held by 280 WorldCat member libraries worldwide

Engaging Privacy and Information Technology in a Digital Age presents a multidisciplinary examination of privacy in the information age. It explores such important concepts as how the threats to privacy evolve, how privacy can be protected, and how society can balance the interests of individuals, businesses, and government in ways that promote privacy reasonably and effectively
Information technology for counterterrorism : immediate actions and future possibilities by National Research Council (U.S.)( Book )

9 editions published in 2003 in English and held by 266 WorldCat member libraries worldwide

Information technology (IT) is essential to virtually all of the nation s critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation s communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks
Toward a safer and more secure cyberspace by National Research Council Committee on Improving Cybersecurity Research in the United States( Book )

9 editions published between 1900 and 2007 in English and held by 198 WorldCat member libraries worldwide

The basic premise underlying this report is that research can produce a better understanding of why cyberspace is as vulnerable as it is and that such research can lead to new technologies and policies and their effective implementation, making cyberspace safer and more secure. The report also addresses the nature of the cybersecurity threat, explores some of the reasons that previous cybersecurity research efforts and agendas have had less impact on the nationʹs cybersecurity posture than desired, and considers the human resource base needed to advance the cybersecurity research agenda. -- from Executive summary (p. 1)
New weapon technologies & the ABM Treaty by Herbert Lin( Book )

6 editions published in 1988 in English and held by 185 WorldCat member libraries worldwide

Catalyzing inquiry at the interface of computing and biology by John C Wooley( Book )

8 editions published between 1900 and 2006 in English and held by 180 WorldCat member libraries worldwide

This study is the first comprehensive NRC study that suggests a high-level intellectual structure for Federal agencies for supporting work at the biology/computing interface. The report seeks to establish the intellectual legitimacy of a fundamentally cross-disciplinary collaboration between biologists and computer scientists. That is, while some universities are increasingly favorable to research at the intersection, life science researchers at other universities are strongly impeded in their efforts to collaborate. This report addresses these impediments and describes proven strategies for overcoming them. An important feature of the report is the use of well-documented examples that describe clearly to individuals not trained in computer science the value and usage of computing across the biological sciences, from genes and proteins to networks and pathways, from organelles to cells, and from individual organisms to populations and ecosystems. It is hoped that these examples will be useful to students in the life sciences to motivate (continued) study in computer science that will enable them to be more facile users of computing in their future biological studies
Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities by National Research Council (U.S.)( Book )

8 editions published in 2009 in English and Undetermined and held by 175 WorldCat member libraries worldwide

The US armed forces, among other intelligence agencies, are increasingly dependent on information and information technology for both civilian and military purposes. Although there is ample literature written on the potential impact of an offensive or defensive cyberattack on societal infrastructure, little has been written about the use of cyberattack as a national policy tool. This book focuses on the potential for the use of such attacks by the United States and its policy implications. Since the primary resource required for a cyberattack is technical expertise, these attacks can be implemented by terrorists, criminals, individuals and corporate actors. Cyberattacks can be used by U.S. adversaries against particular sectors of the U.S. economy and critical national infrastructure that depend on computer systems and networks. Conversely, they can be used by the U.S. intelligence community with adequate organizational structure and appropriate oversight. Focusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores the important characteristics of cyberattacks and why they are relatively ideal for covert action. Experts argue that the United States should establish a national policy for launching cyberattacks, whether for purposes of exploitation, offense or defense for all sectors of government. This book will be of special interest to the Department of Defense, the Department of Homeland Security, law enforcement, and the greater intelligence community
Asking the right questions about electronic voting( Book )

7 editions published in 2006 in English and held by 172 WorldCat member libraries worldwide

"Many election officials look to electronic voting systems as a means for improving their ability to more effectively conduct and administer elections. At the same time, many information technologists and activists have raised important concerns regarding the security of such systems. Policy makers are caught in the midst of a controversy with both political and technological overtones. The public debate about electronic voting is characterized by a great deal of emotion and rhetoric. Asking the Right Questions About Electronic Voting describes the important questions and issues that election officials, policy makers, and informed citizens should ask about the use of computers and information technology in the electoral process--focusing the debate on technical and policy issues that need resolving. The report finds that while electronic voting systems have improved, federal and state governments have not made the commitment necessary for e-voting to be widely used in future elections. More funding, research, and public education are required if e-voting is to become viable."--Publisher's website
Computational technology for effective health care : immediate steps and strategic directions by National Research Council (U.S.)( Book )

9 editions published in 2009 in English and Undetermined and held by 115 WorldCat member libraries worldwide

"The National Library of Medicine launched this study to support the engagement of individuals from the computer science research community in meeting two challenges posed by health care information technology: identifying how today's computer science-based methodologies and approaches might be applied more effectively to health care, and explicating how the limitations in these methodologies and approaches might be overcome through additional research and development. The study described in this report was conducted by an interdisciplinary committee of experts in biomedical informatics, computer science and information technology (including databases, security, networking, human-computer interaction, and large-scale system deployments), and health care providers (e.g., physicians who have worked with information technologies). The committee's work focused primarily on understanding the nature and impact of the information technology investments made by major health care institutions."--Page vii
At the nexus of cybersecurity and public policy : some basic concepts and issues by National Research Council (U.S.)( Book )

7 editions published in 2014 in English and Undetermined and held by 85 WorldCat member libraries worldwide

"According to this report, cybersecurity is a never-ending battle; threats will evolve as adversaries adopt new tools and techniques to compromise security. Cybersecurity is therefore an ongoing process that needs to evolve as new threats are identified. At the Nexus of Cybersecurity and Public Policy is a call for action to make cybersecurity a public safety priority. For a number of years, the cybersecurity issue has received increasing public attention; however, most policy focus has been on the short-term costs of improving systems. In its explanation of the fundamentals of cybersecurity and the discussion of potential policy responses."--
Emerging and readily available technologies and national security : a framework for addressing ethical, legal, and societal issues by National Research Council (U.S.)( Book )

6 editions published in 2014 in English and Undetermined and held by 60 WorldCat member libraries worldwide

Emerging and Readily Available Technologies and National Security is a study on the ethical, legal, and societal issues relating to the research on, development of, and use of rapidly changing technologies with low barriers of entry that have potential military application, such as information technologies, synthetic biology, and nanotechnology. The report also considers the ethical issues associated with robotics and autonomous systems, prosthetics and human enhancement, and cyber weapons. These technologies are characterized by readily available knowledge access, technological advancements that can take place in months instead of years, the blurring of lines between basic research and applied research, and a high uncertainty about how the future trajectories of these technologies will evolve and what applications will be possible. Emerging and Readily Available Technologies and National Security addresses topics such as the ethics of using autonomous weapons that may be available in the future; the propriety of enhancing the physical or cognitive capabilities of soldiers with drugs or implants or prosthetics; and what limits, if any, should be placed on the nature and extent of economic damage that cyber weapons can cause. This report explores three areas with respect to emerging and rapidly available technologies: the conduct of research; research applications; and unanticipated, unforeseen, or inadvertent ethical, legal, and societal issues. The report articulates a framework for policy makers, institutions, and individual researchers to think about issues as they relate to these technologies of military relevance and makes recommendations for how each of these groups should approach these considerations in its research activities. Emerging and Readily Available Technologies and National Security makes an essential contribution to incorporate the full consideration of ethical, legal, and societal issues in situations where rapid technological change may outpace our ability to foresee consequences
A review of the FBI's trilogy information technology modernization program( Book )

8 editions published in 2004 in English and held by 37 WorldCat member libraries worldwide

The Federal Bureau of Investigation (FBI) is in the process of developing a modern information technology (IT) system-the Trilogy program- that is designed to provide a high-speed network, modern workstations and software, and an application-the Virtual Case File (VCF)-to enhance the ability of agents to organize, access, and analyze information. Implementation of this system has encountered substantial difficulties, however, and has been the subject of much investigation and congressional concern. To help address these problems, the FBI asked the National Research Council (NRC) to undertake a quick review of the program and the progress that has been made to date. This report presents that review. The current status of four major aspects of the program-the enterprise architecture, system design, program management, and human resources-are discussed, and recommendations are presented to address the problems
Youth, pornography and the Internet( )

2 editions published in 2002 in English and held by 2 WorldCat member libraries worldwide

Cryptography's role in securing the information society : Kenneth W. Dam and Herbert S. Lin, editors( Book )

1 edition published in 1996 in English and held by 2 WorldCat member libraries worldwide

Computational Technology for Effective Health Care : Immediate Steps and Strategic Directions by William W Stead( Book )

1 edition published in 1900 in English and held by 2 WorldCat member libraries worldwide

Software for ballistic missile defense by Herbert Lin( Book )

2 editions published in 1985 in English and held by 2 WorldCat member libraries worldwide

Youth, Pornography and the Internet: Can We Provide Sound Choices in a Safe Environment? by Dick Thornburgh( )

in English and held by 0 WorldCat member libraries worldwide

 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.10 (from 0.03 for Computatio ... to 0.74 for Youth, Por ...)

Cryptography's role in securing the information societyCryptography's role in securing the information society : Kenneth W. Dam and Herbert S. Lin, editors
Alternative Names
Lin, Herb

Lin, Herbert S.

Languages
English (142)

Covers
Youth, pornography and the InternetComputing the future : a broader agenda for computer science and engineeringRights and responsibilities of participants in networked communitiesEngaging privacy and information technology in a digital ageInformation technology for counterterrorism : immediate actions and future possibilitiesToward a safer and more secure cyberspaceCatalyzing inquiry at the interface of computing and biologyTechnology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities