9,324 research outputs found
Recommended from our members
U.S. Customs and Border Protection: Trade Facilitation, Enforcement, and Security
[Excerpt] This report describes and analyzes import policy and CBP’s role in the U.S. import process. (The report does not cover CBP’s role in the U.S. export control system.) The first section of the report describes the three overarching goals of U.S. import policy and the tension among them. Second, the report provides a legislative history of customs laws, followed by an overview of the U.S. import process as it operates today. Third, the import process and CBP’s role in it are discussed. The final section highlights several policy issues that Congress may consider in its oversight role or as part of customs or trade legislation, including measures seeking to provide additional trade facilitation benefits to importers and others enrolled in “trusted trader” programs, to improve enforcement of intellectual property and trade remedy laws, to strengthen cargo scanning practices, and/or to promote modernization of customs data systems, among other issues. A list of trade-related acronyms used in the report is provided in Appendix A
Recommended from our members
Immigration: Visa Security Policies
[Excerpt] The report opens with an overview of visa issuance policy. It then explains the key provisions that guide the documentary requirements and approval/disapproval process. The section on consular screening procedures includes an analysis of trends over time in denying visas. Visa revocation, a reoccurring issue of concern to Congress, and the visa security program are discussed as well
Strategies for Improving Semi-automated Topic Classification of Media and Parliamentary documents
Since 1995 the techniques and capacities to store new electronic data and to make it available to many persons have become a common good. As of then, different organizations, such as research institutes, universities, libraries, and private companies (Google) started to scan older documents and make them electronically available as well. This has generated a lot of new research opportunities for all kinds of academic disciplines. The use of software to analyze large datasets has become an important part of doing research in the social sciences. Most academics rely on human coded datasets, both in qualitative and quantitative research. However, with the increasing amount of datasets and the complexity of the questions scholars pose to the datasets, the quest for more efficient and effective methods is now on the agenda. One of the most common techniques of content analysis is the Boolean key-word search method. To find certain topics in a dataset, the researcher creates first a list of keywords, added with certain parameters (AND, OR etc.). All keys are usually grouped in families and the entire list of keys and groups is called the ontology. Then the keywords are searched in the dataset, retrieving all documents containing the specified keywords. The online newspaper dataset, LexisNexis, provides the user with such a Boolean search method. However, the Boolean key-word search is not always satisfying in terms of reliability and validity. For that reason social scientists rely on hand-coding. Two projects that do so are the congressional bills project (www.congressionalbills.org ) and the policy agenda-setting project (see www.policyagendas.org ). They developed a topic code book and coded various different sources, such as, the state of the union speeches, bills, newspaper articles etcetera. The continuous improving automated coding techniques, and the increasing number of agenda setting projects (in especially European countries), however, has made the use of automated coding software a feasible option and also a necessity
Recommended from our members
Foreign Students in the United States: Policies and Legislation
[Excerpt] Five years after the September 11, 2001, terrorist attacks by foreign nationals — including several terrorists on students visas — the security concerns over foreign student visas are being supplanted by competitiveness concerns. Potential foreign students, as well as all aliens, must satisfy Department of State (DOS) consular officers abroad and immigration inspectors upon entry to the United States that they are not ineligible for visas under the so-called “grounds for inadmissibility” of the Immigration and Nationality Act, which include security and terrorist concerns. The consular officers who process visa applicants are required to check the National Counterterrorism Center’s (NCTC) automated lookout systems before issuing any visa. In part because of these security measures, student visa debates have shifted from security to market-based discussions
Recommended from our members
The President’s Immigration Accountability Executive Action of November 20, 2014: Overview and Issues
[Excerpt] On November 20, 2014, President Obama announced his Immigration Accountability Executive Action which revises some U.S. immigration policies and initiates several programs, including a revised border security policy for the Southwest border; deferred action programs for some unauthorized aliens; revised interior enforcement priorities; changes to aid the entry of skilled workers; the promotion of immigrant integration and naturalization; and several other initiatives the President indicated would improve the U.S. immigration system. The most controversial among these provisions will grant deferred action to as many as 5 million unauthorized aliens. The President announced the executive action through ten Department of Homeland Security (DHS) memoranda, two White House memoranda, and three Department of Labor (DOL) fact sheets.
According to the President, the actions were taken in response to the absence of legislation addressing major problems within the immigration system. The President has stated that his actions are temporary, and that his successor can rescind them. Those opposed to the executive actions argue they were taken largely for political purposes. They contend that once granted, such temporary measures would be difficult to revoke. Separately, a debate has arisen as to whether the President has the legal authority to take such actions, with the Administration and others arguing the President’s actions fall within his authority, and many in Congress arguing the President has overstepped it. That debate and its attendant legal questions are beyond the scope of this report. As the Administration proceeds to implement the executive actions, some in Congress have vowed to halt some or all of them
Recommended from our members
Unauthorized Aliens in the United States
[Excerpt] The unauthorized alien (illegal alien) population in the United States is a key and controversial immigration issue. In recent years, competing views on how to address this population have proved to be a major obstacle to enacting comprehensive immigration reform legislation. The unauthorized alien issue is likely to be a key challenge if, as the Senate Majority Leader and the Speaker of the House have indicated, the 111th Congress takes up immigration reform legislation this year.
It is unknown, at any point in time, how many unauthorized aliens are in the United States, what countries they are from, when they came to the United States, where they are living, and what their demographic, family, and other characteristics are. Demographers develop estimates about unauthorized aliens using available survey data on the U.S. foreign-born population. These estimates can help inform possible policy options to address the unauthorized alien population. According to recent estimates by the Department of Homeland Security (DHS), approximately 10.8 million unauthorized aliens were living in the United States in January 2009. Using different sources, the Pew Hispanic Center has estimated the March 2008 unauthorized resident population at about 11.9 million.
The Immigration and Nationality Act (INA) and other federal laws place various restrictions on unauthorized aliens. They have no legal right to live or work in the United States and are subject to removal from the country. At the same time, the INA provides limited avenues for certain unauthorized aliens to obtain legal permanent residence.
Over the years, a range of options has been offered for addressing the unauthorized resident alien population. In most cases, the ultimate goal is to reduce the number of aliens in the United States who lack legal status. One set of options centers on requiring or encouraging illegal aliens to depart the country. Those who support this approach argue that these aliens are in the United States in violation of the law and that their presence variously threatens social order, national security, and economic prosperity. One departure strategy is to locate and deport unauthorized aliens from the United States. Another departure strategy, known as attrition through enforcement, seeks to significantly reduce the size of the unauthorized alien population by across-the-board enforcement of immigration laws.
One of the basic tenets of the departure approach is that unauthorized aliens in the United States should not be granted benefits. An opposing strategy would grant qualifying unauthorized aliens various benefits, including an opportunity to obtain legal status. Supporters of this type of approach do not characterize unauthorized aliens in the United States as lawbreakers, but rather as contributors to the economy and society at large. A variety of proposals have been put forth over the years to grant some type of legal status to some portion of the unauthorized population. Some of these options would use existing mechanisms under immigration law to grant legal status. Others would establish new legalization programs. Some would benefit a particular subset of the unauthorized population, such as students or agricultural workers, while others would make relief available more broadly.
This report will be updated if developments warrant
Electronic fraud detection in the U.S. Medicaid Healthcare Program: lessons learned from other industries
It is estimated that between 850 billion annually is lost to fraud, waste, and abuse in the US healthcare system,with 175 billion of this due to fraudulent activity (Kelley 2009). Medicaid, a state-run, federally-matchedgovernment program which accounts for roughly one-quarter of all healthcare expenses in the US, has been particularlysusceptible targets for fraud in recent years. With escalating overall healthcare costs, payers, especially government-runprograms, must seek savings throughout the system to maintain reasonable quality of care standards. As such, the need foreffective fraud detection and prevention is critical. Electronic fraud detection systems are widely used in the insurance,telecommunications, and financial sectors. What lessons can be learned from these efforts and applied to improve frauddetection in the Medicaid health care program? In this paper, we conduct a systematic literature study to analyze theapplicability of existing electronic fraud detection techniques in similar industries to the US Medicaid program
- …