WorldCat Identities

Lin, Herbert

Overview
Works: 41 works in 169 publications in 1 language and 25,198 library holdings
Genres: Abstracts 
Roles: Editor, Author
Publication Timeline
.
Most widely held works by Herbert Lin
Cryptography's role in securing the information society by Kenneth W Dam( )

16 editions published between 1900 and 1997 in English and held by 2,482 WorldCat member libraries worldwide

"For every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security of the nation, U.S. businesses, and citizens in their private lives. Rival companies can glean proprietary secrets. Anti-U.S. terrorists can plot attacks. Network hackers can do anything from charging purchases on someone else's credit card to accessing military installations. What is the nature of business markets for cryptography in the United States and abroad? What is the impact of encryption on law enforcement and national security interests? How can cryptography help protect the nation's information infrastructure? This important book provides answers to these and other questions."--BOOK JACKET. "Cryptography's Role in Securing the Information Society addresses the urgent need for a strong national policy on cryptography that promotes and encourages the widespread use of this powerful tool for protecting the information interests of individuals, businesses, and the nation as a whole, while respecting legitimate national needs of law enforcement and intelligence. The book presents a comprehensive examination of U.S. national cryptography policy and the evolution of cryptography from a national security tool a key component of the global information superhighway. It enlarges the scope of policy options and offers specific conclusions and recommendations. The major themes of the book are illustrated throughout with many examples from the worlds of government and business as well as the international network of hackers."--BOOK JACKET
Youth, pornography and the Internet by Dick Thornburgh( )

11 editions published in 2002 in English and held by 2,402 WorldCat member libraries worldwide

The Internet has changed the way we access the world. Anyone who can use the technology, even a child, can now access an enormous array of material, including educational links, sports info, chat rooms-and pornography. Youth, Pornography, and the Internet examines how we can protect our children without losing the many positive features of the Internet
Information technology for counterterrorism : immediate actions and future possibilities by National Research Council (U.S.)( )

9 editions published in 2003 in English and held by 2,274 WorldCat member libraries worldwide

Information technology (IT) is essential to virtually all of the nation s critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation s communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks
Rights and responsibilities of participants in networked communities by Dorothy Elizabeth Robling Denning( )

13 editions published between 1900 and 1994 in English and held by 2,188 WorldCat member libraries worldwide

This report is based on a November 1992 workshop and a February 1993 public forum which discussed some of the social issues raised by the emergence of electronic communities. The workshop examined user, provider, and other perspectives on different types of networked communities, including those on the Internet, commercial information services, and grass-roots networks. The following questions were addressed in the workshop: (1) What policies, laws, regulations, or ethical standards apply to the use of networked services; who sets them; how are they developed; and how are they enforced? (2) What are users' expectations regarding privacy and protection of their proprietary rights? (3) What are the rights, responsibilities, and liabilities of providers or operators of networked services or of users of these services? And (4) What problems arise from connecting systems offering these services to systems that operate under different policies? The forum was organized around a set of hypothetical scenarios designed to illuminate how issues related to and associated with free speech, electronic vandalism, the protection of intellectual property interests, and privacy might emerge. The intent was to focus on the concerns that policymakers in government and the private sector might have, so much of the discussion involved questions of law and how the current legal regime helps to define the boundaries of what is or is not acceptable conduct on electronic networks. Background materials on technology, legal underpinnings, and the current policy environment are incorporated into chapters 1 through 3. Chapters 4 through 7 are devoted primarily to discussions of free speech, electronic vandalism, intellectual property interests, and privacy. Chapter 8 focuses on the deliberations of the steering committee. Five appendices provide information about network technology, the agendas for the workshop and forum, and biographies of the steering committee. (Mas)
Computing the future : a broader agenda for computer science and engineering by Herbert Lin( )

16 editions published between 1992 and 1993 in English and held by 1,977 WorldCat member libraries worldwide

Annotation
Asking the right questions about electronic voting( )

8 editions published between 2005 and 2006 in English and held by 1,765 WorldCat member libraries worldwide

"Many election officials look to electronic voting systems as a means for improving their ability to more effectively conduct and administer elections. At the same time, many information technologists and activists have raised important concerns regarding the security of such systems. Policy makers are caught in the midst of a controversy with both political and technological overtones. The public debate about electronic voting is characterized by a great deal of emotion and rhetoric. Asking the Right Questions About Electronic Voting describes the important questions and issues that election officials, policy makers, and informed citizens should ask about the use of computers and information technology in the electoral process--focusing the debate on technical and policy issues that need resolving. The report finds that while electronic voting systems have improved, federal and state governments have not made the commitment necessary for e-voting to be widely used in future elections. More funding, research, and public education are required if e-voting is to become viable."--Publisher's website
A review of the FBI's trilogy information technology modernization program( )

7 editions published in 2004 in English and held by 1,743 WorldCat member libraries worldwide

The Federal Bureau of Investigation (FBI) is in the process of developing a modern information technology (IT) system-the Trilogy program- that is designed to provide a high-speed network, modern workstations and software, and an application-the Virtual Case File (VCF)-to enhance the ability of agents to organize, access, and analyze information. Implementation of this system has encountered substantial difficulties, however, and has been the subject of much investigation and congressional concern. To help address these problems, the FBI asked the National Research Council (NRC) to undertake a quick review of the program and the progress that has been made to date. This report presents that review. The current status of four major aspects of the program-the enterprise architecture, system design, program management, and human resources-are discussed, and recommendations are presented to address the problems
Catalyzing inquiry at the interface of computing and biology by John C Wooley( )

7 editions published between 1900 and 2006 in English and held by 1,686 WorldCat member libraries worldwide

This study is the first comprehensive NRC study that suggests a high-level intellectual structure for Federal agencies for supporting work at the biology/computing interface. The report seeks to establish the intellectual legitimacy of a fundamentally cross-disciplinary collaboration between biologists and computer scientists. That is, while some universities are increasingly favorable to research at the intersection, life science researchers at other universities are strongly impeded in their efforts to collaborate. This report addresses these impediments and describes proven strategies for overcoming them. An important feature of the report is the use of well-documented examples that describe clearly to individuals not trained in computer science the value and usage of computing across the biological sciences, from genes and proteins to networks and pathways, from organelles to cells, and from individual organisms to populations and ecosystems. It is hoped that these examples will be useful to students in the life sciences to motivate (continued) study in computer science that will enable them to be more facile users of computing in their future biological studies
Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities by National Research Council (U. S.)( )

9 editions published in 2009 in English and held by 1,681 WorldCat member libraries worldwide

Since the primary resource required for a cyberattack is technical expertise, these attacks can be implemented by terrorists, criminals, individuals and corporate actors. Cyberattacks can be used by U.S. adversaries against particular sectors of the U.S. economy and critical national infrastructure that depend on computer systems and networks. Conversely, they can be used by the U.S. intelligence community with adequate organizational structure and appropriate oversight
Toward a safer and more secure cyberspace by National Research Council Committee on Improving Cybersecurity Research in the United States( )

9 editions published between 1900 and 2007 in English and held by 1,610 WorldCat member libraries worldwide

The basic premise underlying this report is that research can produce a better understanding of why cyberspace is as vulnerable as it is and that such research can lead to new technologies and policies and their effective implementation, making cyberspace safer and more secure. The report also addresses the nature of the cybersecurity threat, explores some of the reasons that previous cybersecurity research efforts and agendas have had less impact on the nationʹs cybersecurity posture than desired, and considers the human resource base needed to advance the cybersecurity research agenda. -- from Executive summary (p. 1)
Computational technology for effective health care : immediate steps and strategic directions by William W Stead( )

10 editions published between 1900 and 2009 in English and held by 1,605 WorldCat member libraries worldwide

Despite a strong commitment to delivering quality health care, persistent problems involving medical errors and ineffective treatment continue to plague the industry. Many of these problems are the consequence of poor information and technology (IT) capab
Engaging privacy and information technology in a digital age( )

8 editions published in 2007 in English and held by 1,601 WorldCat member libraries worldwide

Engaging Privacy and Information Technology in a Digital Age presents a multidisciplinary examination of privacy in the information age. It explores such important concepts as how the threats to privacy evolve, how privacy can be protected, and how society can balance the interests of individuals, businesses, and government in ways that promote privacy reasonably and effectively
At the nexus of cybersecurity and public policy : some basic concepts and issues( )

6 editions published in 2014 in English and held by 1,011 WorldCat member libraries worldwide

"According to this report, cybersecurity is a never-ending battle; threats will evolve as adversaries adopt new tools and techniques to compromise security. Cybersecurity is therefore an ongoing process that needs to evolve as new threats are identified. At the Nexus of Cybersecurity and Public Policy is a call for action to make cybersecurity a public safety priority. For a number of years, the cybersecurity issue has received increasing public attention; however, most policy focus has been on the short-term costs of improving systems. In its explanation of the fundamentals of cybersecurity and the discussion of potential policy responses."--
Emerging and readily available technologies and national security : a framework for addressing ethical, legal, and societal issues by National Research Council (U.S.)( )

6 editions published in 2014 in English and held by 959 WorldCat member libraries worldwide

"Emerging and Readily Available Technologies and National Security addresses topics such as the ethics of using autonomous weapons that may be available in the future; the propriety of enhancing the physical or cognitive capabilities of soldiers with drugs or implants or prosthetics; and what limits, if any, should be placed on the nature and extent of economic damage that cyber weapons can cause. This report explores three areas with respect to emerging and rapidly available technologies: the conduct of research; research applications; and unanticipated, unforeseen, or inadvertent ethical, legal, and societal issues. The report articulates a framework for policy makers, institutions, and individual researchers to think about issues as they relate to these technologies of military relevance and makes recommendations for how each of these groups should approach these considerations in its research activities."--Publisher's description
New weapon technologies & the ABM Treaty by Herbert Lin( Book )

6 editions published in 1988 in English and held by 187 WorldCat member libraries worldwide

Youth, Pornography and the Internet: Can We Provide Sound Choices in a Safe Environment? by Dick Thornburgh( )

in English and held by 3 WorldCat member libraries worldwide

Cryptography's role in securing the information society : Kenneth W. Dam and Herbert S. Lin, editors( Book )

1 edition published in 1996 in English and held by 2 WorldCat member libraries worldwide

Problem solving in introductory physics : demons and difficulties by Herbert Lin( )

1 edition published in 1979 in English and held by 2 WorldCat member libraries worldwide

Governance of dual-use technologies : theory and practice( Book )

1 edition published in 2016 in English and held by 2 WorldCat member libraries worldwide

Software for ballistic missile defense by Herbert Lin( Book )

2 editions published in 1985 in English and held by 2 WorldCat member libraries worldwide

 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.07 (from 0.03 for A review o ... to 0.81 for Problem so ...)

Cryptography's role in securing the information societyCryptography's role in securing the information society : Kenneth W. Dam and Herbert S. Lin, editors
Alternative Names
Lin, Herb

Lin, Herbert S.

Languages
English (147)

Covers
Youth, pornography and the InternetInformation technology for counterterrorism : immediate actions and future possibilitiesRights and responsibilities of participants in networked communitiesComputing the future : a broader agenda for computer science and engineeringAsking the right questions about electronic votingA review of the FBI's trilogy information technology modernization programCatalyzing inquiry at the interface of computing and biologyTechnology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities