Recess Appointments Made by President George W. Bush (open access)

Recess Appointments Made by President George W. Bush

None
Date: April 15, 2009
Creator: unknown
System: The UNT Digital Library
[U.S. Army and Marine Corps Equipment Requirements: Background and Issues for Congress, June 15, 2007] (open access)

[U.S. Army and Marine Corps Equipment Requirements: Background and Issues for Congress, June 15, 2007]

None
Date: June 15, 2007
Creator: Feickert, Andrew
System: The UNT Digital Library
Corrections and Prison Reform: A Selected Reading List, 1972-1974 (open access)

Corrections and Prison Reform: A Selected Reading List, 1972-1974

This report is a collection of published works concerning prison reform from 1972 to 1974.
Date: May 15, 1974
Creator: Pellegrino, Loya C. & Wolf, Jean D.
System: The UNT Digital Library
Multinational Corporations 1968-70: Selected References (open access)

Multinational Corporations 1968-70: Selected References

This report provides a bibliography of resources related to multinational corporations which were published from 1968 to 1970.
Date: June 15, 1970
Creator: Billings, Elden E.
System: The UNT Digital Library
Federal Assistance to States and Communities for the Control of Drug Abuse (open access)

Federal Assistance to States and Communities for the Control of Drug Abuse

This report discusses federal aid to states for use in preventing drug abuse.
Date: December 15, 1971
Creator: Wolf, Jean Dempsey
System: The UNT Digital Library
The Role of the House of Representatives in Judicial Impeachment Proceedings: Procedure, Practice, and Data (open access)

The Role of the House of Representatives in Judicial Impeachment Proceedings: Procedure, Practice, and Data

None
Date: March 15, 2010
Creator: unknown
System: The UNT Digital Library
Cleanup at Abandoned Hardrock Mines: Issues Raised by “Good Samaritan” Legislation in the 109th Congress (open access)

Cleanup at Abandoned Hardrock Mines: Issues Raised by “Good Samaritan” Legislation in the 109th Congress

This report discusses four bills introduced in the 109th Congress. This report also discusses several key issues within the bills.
Date: December 15, 2006
Creator: Copeland, Claudia & Meltz, Robert
System: The UNT Digital Library
Comparative Clinical Effectiveness and Cost-Effectiveness Research: Background, History, and Overview (open access)

Comparative Clinical Effectiveness and Cost-Effectiveness Research: Background, History, and Overview

This report summarizes research efforts that have been funded and conducted showing the comparative clinical effectiveness and cost-effectiveness.
Date: October 15, 2007
Creator: Jacobson, Gretchen A.
System: The UNT Digital Library
Resolutions of Inquiry: An Analysis of Their Use in the House, 1947-2011 (open access)

Resolutions of Inquiry: An Analysis of Their Use in the House, 1947-2011

A resolution of inquiry is a simple resolution making a direct request or demand of the President or the head of an executive department to furnish the House with specific factual information in the Administration's possession. Under the rules and precedents of the U.S. House of Representatives, such resolutions, if properly drafted, are given a privileged parliamentary status. This means that, under certain circumstances, a resolution of inquiry can be brought up on the House floor even if the committee to which it was referred has not reported it and the majority party leadership has not scheduled it for consideration. This report discusses the background, purpose, and efficiency of these inquiries.
Date: May 15, 2012
Creator: Davis, Christopher M.
System: The UNT Digital Library
Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws (open access)

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

This report discusses The Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud.
Date: October 15, 2014
Creator: Doyle, Charles
System: The UNT Digital Library