Advanced search Help
Searching for terms: EXACT: "Tehan, Rita" in: author
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
E-Commerce Statistics: Explanation and Sources [Updated June 4, 2003]
"The value of e-commerce transactions, while still small relative to the size of
the U.S. economy, continues to show strong growth despite a recent economic
downturn. Congress will play a vital role in many e-commerce policy issues,
including Internet taxation, encryption and electronic authentication (i.e., digital signatures), intellectual property protection (i.e., patent or copyright infringement), computer network security, and privacy safeguards for individuals and organizations, as well as consideration of how European Union (EU) and World Trade Organization (WTO) policies may affect U.S. e-commerce activities. This report addresses the complexities of measuring e-commerce growth and provides background information on government and private firms' methods for estimating it. This report will be updated periodically."
Library of Congress. Congressional Research Service
Tehan, Rita
2003-06-04
-
Cybersecurity: Authoritative Reports and Resources [July 24, 2012]
"Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which also makes a response problematic. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues."
Library of Congress. Congressional Research Service
Tehan, Rita
2012-07-24
-
Cybersecurity: Authoritative Reports and Resources [June 8, 2012]
"Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which also makes a response problematic. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues."
Library of Congress. Congressional Research Service
Tehan, Rita
2012-06-08
-
Cybersecurity: Authoritative Reports and Resources [July 3, 2012]
"Cybersecurity is a sprawling topic that includes national, international, government, and private industry dimensions. More than 40 bills and resolutions with provisions related to cybersecurity have been introduced in the first session of the 112th Congress, including several proposing revisions to current laws. In the 111th Congress, the total was more than 60. Several of those bills received committee or floor action, but none have become law. In fact, no comprehensive cybersecurity legislation has been enacted since 2002. This report provides links to cybersecurity hearings and legislation under consideration in the 112th Congress, as well as executive orders and presidential directives, data and statistics, glossaries, and authoritative reports."
Library of Congress. Congressional Research Service
Tehan, Rita
2012-07-03
-
Cybersecurity: Authoritative Reports and Resources [May 2, 2012]
"Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which also makes a response problematic. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues."
Library of Congress. Congressional Research Service
Tehan, Rita
2012-05-02
-
Data Security Breaches: Context and Incident Summaries [Updated September 28, 2006]
"Personal data security breaches are being reported with increasing regularity. Within the last few years, numerous examples of data such as Social Security numbers, bank account, credit card, driver's license numbers, and medical and student records have been compromised. A major reason for the increased awareness of these security breaches is a California law that requires notice of security breaches to the affected individuals. This law, implemented in July 2003, was the first of its kind in the nation. State security breach notification laws require companies and other entities that have lost data to notify affected consumers. Over half the states considered security breach notice and security freeze legislation in 2005, and several states passed laws requiring that individuals be notified of security breaches. Congress is considering legislation to address personal data security breaches, following a series of high-profile data security breaches at major financial services firms, data brokers (including ChoicePoint and LexisNexis), and universities. Multiple measures were introduced in 2005 and 2006, but to date, none have been enacted."
Library of Congress. Congressional Research Service
Tehan, Rita
2006-09-28
-
Cybersecurity: Authoritative Reports and Resources [April 26, 2012]
"Cybersecurity is a sprawling topic that includes national, international, government, and private industry dimensions. More than 40 bills and resolutions with provisions related to cybersecurity have been introduced in the first session of the 112th Congress, including several proposing revisions to current laws. In the 111th Congress, the total was more than 60. Several of those bills received committee or floor action, but none have become law. In fact, no comprehensive cybersecurity legislation has been enacted since 2002. This report provides links to cybersecurity hearings and legislation under consideration in the 112th Congress, as well as executive orders and presidential directives, data and statistics, glossaries, and authoritative reports."
Library of Congress. Congressional Research Service
Tehan, Rita
2012-04-26
-
Data Security Breaches: Context and Incident Summaries [Updated January 29, 2007]
"Personal data security breaches are being reported with increasing regularity. Within the last few years, numerous examples of data such as Social Security numbers, bank account, credit card, driver's license numbers, and medical and student records have been compromised. A major reason for the increased awareness of these security breaches is a California law that requires notice of security breaches to the affected individuals. This law, implemented in July 2003, was the first of its kind in the nation. State data security breach notification laws require companies and other entities that have lost data to notify affected consumers. As of December 2006, 34 states had implemented data security laws. Congress is considering legislation to address personal data security breaches, following a series of high-profile data security breaches at major financial services firms, data brokers (including ChoicePoint and LexisNexis), and universities. Multiple measures were introduced in 2005 and 2006, but to date, none have been enacted."
Library of Congress. Congressional Research Service
Tehan, Rita
2007-01-29
-
Cybersecurity: Authoritative Reports and Resources [May 8, 2012]
"Cybersecurity is a sprawling topic that includes national, international, government, and private industry dimensions. More than 40 bills and resolutions with provisions related to cybersecurity have been introduced in the first session of the 112th Congress, including several proposing revisions to current laws. In the 111th Congress, the total was more than 60. Several of those bills received committee or floor action, but none have become law. In fact, no comprehensive cybersecurity legislation has been enacted since 2002. This report provides links to cybersecurity hearings and legislation under consideration in the 112th Congress, as well as executive orders and presidential directives, data and statistics, glossaries, and authoritative reports."
Library of Congress. Congressional Research Service
Tehan, Rita
2012-05-08
-
Cybersecurity: Authoritative Reports and Resources, by Topic [July 25, 2014]
"This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups."
Library of Congress. Congressional Research Service
Tehan, Rita
2014-07-25
-
Cybersecurity: Authoritative Reports and Resources, by Topic [December 4, 2013]
"Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which also makes a response problematic. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues. It includes information on [1] 'CRS Reports by Topic' [2] Government Accountability Office (GAO) reports [3] White House/Office of Management and Budget reports [4] Military/DOD [5] Cloud Computing [6] Critical Infrastructure [7] National Strategy for Trusted Identities in Cyberspace (NSTIC) [8] Cybercrime/Cyberwar [9] International [10] Education/Training/Workforce [11] Research and Development (R&D) [12] 'Related Resources: Other Websites.'"
Library of Congress. Congressional Research Service
Tehan, Rita
2013-12-04
-
Cybersecurity: Authoritative Reports and Resources [September 20, 2013]
"Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which also makes a response problematic. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics."
Library of Congress. Congressional Research Service
Tehan, Rita
2013-09-20
-
Cybersecurity: Authoritative Reports and Resources, by Topic [May 7, 2015]
"This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: [1] Policy overview [2] National Strategy for Trusted Identities in Cyberspace (NSTIC) [3] Cloud computing and the Federal Risk and Authorization Management Program (FedRAMP) [4] Critical infrastructure [5] Cybercrime, data breaches, and data security [6] National security, cyber espionage, and cyberwar (including Stuxnet) [7] International efforts [8] Education/training/workforce [9] Research and development (R&D). In addition, the report lists selected cybersecurity-related websites for congressional and government agencies; news; international organizations; and other organizations, associations, and institutions."
Library of Congress. Congressional Research Service
Tehan, Rita
2015-05-07
-
Cybersecurity: Data, Statistics, and Glossaries [September 8, 2015]
"This report describes data and statistics from government, industry, and information technology (IT) security firms regarding the current state of cybersecurity threats in the United States and internationally. These include incident estimates, costs, and annual reports on data security breaches, identity thefts, cybercrimes, malwares, and network securities."
Library of Congress. Congressional Research Service
Tehan, Rita
2015-09-08
-
Cybersecurity: Authoritative Reports and Resources, by Topic [February 27, 2015]
"This report provides references to analytical reports on cybersecurity from CRS [Congressional Research Service], other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: [1] Policy overview [2] National Strategy for Trusted Identities in Cyberspace (NSTIC) [3] Cloud computing and the Federal Risk and Authorization Management Program (FedRAMP) [4] Critical infrastructure [5] Cybercrime, data breaches, and data security [6] National security, cyber espionage, and cyberwar (including Stuxnet) [7] International efforts [8] Education/training/workforce [9] Research and development (R&D) In addition, the report lists selected cybersecurity-related websites for congressional and government agencies; news; international organizations; and other organizations, associations, and institutions."
Library of Congress. Congressional Research Service
Tehan, Rita
2015-02-27
-
Cybersecurity: Legislation, Hearings, and Executive Branch Documents [October 21, 2016]
"Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated against individuals, corporations, and countries. Targets have included government networks, companies, and political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, engaging in cybercrime, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which may make responding problematic. Despite many recommendations made over the past decade, most major legislative provisions relating to cybersecurity had been enacted prior to 2002. However, on December 18, 2014, five cybersecurity bills were signed by the President. These bills change federal cybersecurity programs in a number of ways: codifying the role of the National Institute of Standards and Technology (NIST) in developing a 'voluntary, industry-led set of standards' to reduce cyber risk; [1] codifying the Department of Homeland Security's (DHS's) National Cybersecurity and Communications Integration Center as a hub for interactions with the private sector; [2] updating the Federal Information Security Management Act (FISMA) by requiring the Office of Management and Budget (OMB) to 'eliminate ... inefficient and wasteful reports'; [3] and requiring DHS to develop a 'comprehensive workforce strategy' within a year and giving DHS new authorities for cybersecurity hiring. [...] Executive orders authorize the President to manage federal government operations. Presidential directives pertain to all aspects of U.S. national security policy as authorized by the President. This report provides a list of executive orders and presidential directives pertaining to information and computer security."
Library of Congress. Congressional Research Service
Tehan, Rita
2016-10-21
-
Cybersecurity: Overview Reports and Links to Government, News, and Related Resources [March 2, 2016]
"Much is written on the topic of cybersecurity. This CRS [Congressional Research Service] report and those listed below direct the reader to authoritative sources that address many of the most prominent issues. Included in the reports are resources and studies from government agencies (federal, state, local, and international), think tanks, academic institutions, news organizations, and other sources. This report is intended to serve as a starting point for congressional staff assigned to cover cybersecurity issues."
Library of Congress. Congressional Research Service
Tehan, Rita
2016-03-02
-
Cybersecurity: Education, Training, and R&D Authoritative Reports and Resources [March 3, 2016]
"Much is written on the topics of current gaps in the education and training of a cybersecurity workforce and the need for technology research and development (R&D) to solve cybersecurity technical issues. This CRS [Congressional Research Service] report directs the reader to authoritative sources that address these issues. The annotated descriptions of these sources are listed in reverse chronological order, with an emphasis on material published in the past several years. This report also includes resources and studies from government agencies (federal, state, local, and international), think tanks, academic institutions, news organizations, and other sources."
Library of Congress. Congressional Research Service
Tehan, Rita
2016-03-03
-
Cybersecurity: Critical Infrastructure Authoritative Reports and Resources [March 8, 2016]
"This report serves as a starting point for congressional staff assigned to cover cybersecurity issues as they relate to critical infrastructure. Much is written about protecting U.S. critical infrastructure, and this CRS [Congressional Research Service] report directs the reader to authoritative sources that address many of the most prominent issues. The annotated descriptions of these sources are listed in reverse chronological order with an emphasis on material published in the past several years. The report includes resources and studies from government agencies (federal, state, local, and international), think tanks, academic institutions, news organizations, and other sources."
Library of Congress. Congressional Research Service
Tehan, Rita
2016-03-08
-
Cybersecurity: Data, Statistics, and Glossaries [February 5, 2015]
"This report describes data and statistics from government, industry, and information technology (IT) security firms regarding the current state of cybersecurity threats in the United States and internationally. These include incident estimates, costs, and annual reports on data security breaches, identity thefts, cybercrimes, malwares, and network securities. For information on cybersecurity-related issues, including authoritative reports by topic, see CRS [Congressional Research Service] Report R42507, 'Cybersecurity: Authoritative Reports and Resources, by Topic,' by Rita Tehan. For information on legislation, hearings, and executive orders, see CRS Report R43317, 'Cybersecurity: Legislation, Hearings, and Executive Branch Documents,' by Rita Tehan." "Cybersecurity: Authoritative Reports and Resources, by Topic" can be found in the Homeland Security Digital Library at: [https://www.hsdl.org/?abstract&did=762456]
Library of Congress. Congressional Research Service
Tehan, Rita
2015-02-05
-
Cybersecurity: Critical Infrastructure Authoritative Reports and Resources [April 21, 2017]
"Presidential Decision Directive 63, or PDD-63, identified activities whose critical infrastructures should be protected: information and communications; banking and finance; water supply; aviation, highways, mass transit, pipelines, rail, and waterborne commerce; emergency and law enforcement services; emergency, fire, and continuity of government services; public health services; electric power, oil and gas production; and storage. In addition, the PDD identified four activities in which the federal government controls the critical infrastructure: (1) internal security and federal law enforcement; (2) foreign intelligence; (3) foreign affairs; and (4) national defense. In February 2013, the Obama Administration issued PPD-21, Critical Infrastructure Security and Resilience, which superseded HSPD-7 issued during the George W. Bush Administration. PPD-21 made no major changes in policy, roles and responsibilities, or programs, but did order an evaluation of the existing public-private partnership model, the identification of baseline data and system requirements for efficient information exchange, and the development of a situational awareness capability. PPD-21 also called for an update of the National Infrastructure Protection Plan, and a new Research and Development Plan for Critical Infrastructure, to be updated every four years.This report serves as a starting point for congressional staff assigned to cover cybersecurity issues as they relate to critical infrastructure. Much is written about protecting U.S. critical infrastructure, and this CRS report directs the reader to authoritative sources that address many of the most prominent issues."
Library of Congress. Congressional Research Service
Tehan, Rita
2017-04-21
-
Cybersecurity: Legislation, Hearings, and Executive Branch Documents [May 12, 2017]
"Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated against individuals, corporations, and countries. Targets have included government networks, companies, and political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, engaging in cybercrime, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which may make responding problematic. Despite many recommendations made over the past decade, most major legislative provisions relating to cybersecurity had been enacted prior to 2002. However, on December 18, 2014, five cybersecurity bills were signed by the President."
Library of Congress. Congressional Research Service
Tehan, Rita
2017-05-12
-
Cybersecurity: Legislation, Hearings, and Executive Branch Documents [June 23, 2017]
"Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated against individuals, corporations, and countries. Targets have included government networks, companies, and political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, engaging in cybercrime, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which may make responding problematic."
Library of Congress. Congressional Research Service
Tehan, Rita
2017-06-23
-
Cybersecurity: Critical Infrastructure Authoritative Reports and Resources [December 6, 2016]
"Critical infrastructure is defined in the USA PATRIOT Act (P.L. 107-56, §1016(e)) as 'systems and assets, physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health and safety, or any combination of those matters.' Presidential Decision Directive 63, or PDD-63, identified activities whose critical infrastructures should be protected: information and communications; banking and finance; water supply; aviation, highways, mass transit, pipelines, rail, and waterborne commerce; emergency and law enforcement services; emergency, fire, and continuity of government services; public health services; electric power, oil and gas production; and storage. In addition, the PDD identified four activities in which the federal government controls the critical infrastructure: (1) internal security and federal law enforcement; (2) foreign intelligence; (3) foreign affairs; and (4) national defense. In February 2013, the Obama Administration issued PPD-21, Critical Infrastructure Security and Resilience, which superseded HSPD-7 issued during the George W. Bush Administration. PPD-21 made no major changes in policy, roles and responsibilities, or programs, but did order an evaluation of the existing public-private partnership model, the identification of baseline data and system requirements for efficient information exchange, and the development of a situational awareness capability. PPD-21 also called for an update of the National Infrastructure Protection Plan, and a new Research and Development Plan for Critical Infrastructure, to be updated every four years. This report serves as a starting point for congressional staff assigned to cover cybersecurity issues as they relate to critical infrastructure."
Library of Congress. Congressional Research Service
Tehan, Rita
2016-12-06
-
Cybersecurity: Cybercrime and National Security Authoritative Reports and Resources [November 14, 2017]
"As online attacks grow in volume and sophistication, the United States is expanding its cybersecurity efforts. Cybercriminals continue to develop new ways to ensnare victims, whereas nation-state hackers compromise companies, government agencies, and businesses to create espionage networks and steal information. Threats come from both criminals and hostile countries, especially China, Russia, Iran, and North Korea. Much is written on this topic, and this CRS [Congressional Research Service] report directs the reader to authoritative sources that address many of the most prominent issues."
Library of Congress. Congressional Research Service
Tehan, Rita
2017-11-14
-
Cybersecurity: Legislation, Hearings, and Executive Branch Documents [November 9, 2017]
"Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated against individuals, corporations, and countries. Targets have included government networks, companies, and political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, engaging in cybercrime, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which may make responding problematic. [...] This report provides links to cybersecurity legislation in the 112th, 113th, 114th, and 115th Congresses. Congress has held cybersecurity hearings every year since 2001. This report also provides links to cybersecurity-related committee hearings in the 113th, 114th, and 115th Congresses. [...] Executive orders authorize the President to manage federal government operations. Presidential directives pertain to all aspects of U.S. national security policy as authorized by the President. This report provides a list of executive orders and presidential directives pertaining to information and computer security."
Library of Congress. Congressional Research Service
Tehan, Rita
2017-11-09
-
Cybersecurity: Legislation, Hearings, and Executive Branch Documents [February 1, 2018]
"This report provides links to cybersecurity legislation in the 112th, 113th, 114th, and 115th Congresses. Congress has held cybersecurity hearings every year since 2001. This report also provides links to cybersecurity-related committee hearings in the 113th, 114th, and 115th Congresses."
Library of Congress. Congressional Research Service
Tehan, Rita
2018-02-01
-
Cybersecurity: Authoritative Reports and Resources [March 20, 2013]
"Cybersecurity is a sprawling topic that includes national, international, government, and private industry dimensions. In the 113th Congress, one bill has been introduced in the Senate and two in the House. More than 40 bills and resolutions with provisions related to cybersecurity were introduced in the first session of the 112th Congress, including several proposing revisions to current laws. In the 111th Congress, the total was more than 60. Several of those bills received committee or floor action, but none have become law. In fact, no comprehensive cybersecurity legislation has been enacted since 2002. This report provides links to cybersecurity hearings and legislation under consideration in the 113th and 112th Congresses, as well as executive orders and presidential directives, data and statistics, glossaries, and authoritative reports."
Library of Congress. Congressional Research Service
Tehan, Rita
2013-03-20
-
Cybersecurity: Authoritative Reports and Resources [March 8, 2013]
"Cybersecurity is a sprawling topic that includes national, international, government, and private industry dimensions. In the 113th Congress, one bill has been introduced in the Senate and two in the House. More than 40 bills and resolutions with provisions related to cybersecurity were introduced in the first session of the 112th Congress, including several proposing revisions to current laws. In the 111th Congress, the total was more than 60. Several of those bills received committee or floor action, but none have become law. In fact, no comprehensive cybersecurity legislation has been enacted since 2002. This report provides links to cybersecurity hearings and legislation under consideration in the 113th and 112th Congresses, as well as executive orders and presidential directives, data and statistics, glossaries, and authoritative reports."
Library of Congress. Congressional Research Service
Tehan, Rita
2013-03-08
-
Cybersecurity: Authoritative Reports and Resources [October 22, 2012]
"Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which also makes a response problematic. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. [...] The report will be updated as needed."
Library of Congress. Congressional Research Service
Tehan, Rita
2012-10-22