35,255 research outputs found
Recommended from our members
Recording Victim Video Statements as Evidence to Advance Legal Outcomes in Family Violence Cases (ReVEAL)
This Implementation Guide provides an overview of the video-recording practices currently in place across several Texas jurisdictions. It provides guidance and considerations for jurisdictions in the collection and use of video evidence in family violence cases. This guide is divided into seven sections, including this Background and Overview. The second section includes information for law enforcement on the purpose of video statements, how to develop and implement a video program, and considerations for sustaining a program. The third section focuses on prosecutorial practices for the use of video statements including legal considerations, coordination with partners, and victim engagement around the video statement. The fourth section provides specific information for victim advocates and includes considerations for victim privacy and confidentiality. The fifth section focuses on technology and equipment, with information on type of equipment, technology infrastructure, and efficient transfer of evidence between agencies. The sixth section is the Summary Report of the ReVEAL project. The Summary Report is a technical overview of the evaluation that includes major findings and links to the ReVEAL reports that were previously released. The seventh and final section is comprised of the appendices and provides sample protocols, site overviews, equipment charts, and additional resources that may be helpful to users of this guide. Throughout this guide, there are several examples of cases and practices that illustrate the specific issues that may present themselves when launching a video-recording program. These
examples highlight the complexities of the practice while using real world examples of how video impacts family violence cases,
victim safety, and privacy.IC2 Institut
Verifying Policy Enforcers
Policy enforcers are sophisticated runtime components that can prevent
failures by enforcing the correct behavior of the software. While a single
enforcer can be easily designed focusing only on the behavior of the
application that must be monitored, the effect of multiple enforcers that
enforce different policies might be hard to predict. So far, mechanisms to
resolve interferences between enforcers have been based on priority mechanisms
and heuristics. Although these methods provide a mechanism to take decisions
when multiple enforcers try to affect the execution at a same time, they do not
guarantee the lack of interference on the global behavior of the system. In
this paper we present a verification strategy that can be exploited to discover
interferences between sets of enforcers and thus safely identify a-priori the
enforcers that can co-exist at run-time. In our evaluation, we experimented our
verification method with several policy enforcers for Android and discovered
some incompatibilities.Comment: Oliviero Riganelli, Daniela Micucci, Leonardo Mariani, and Yli\`es
Falcone. Verifying Policy Enforcers. Proceedings of 17th International
Conference on Runtime Verification (RV), 2017. (to appear
Policy issues in interconnecting networks
To support the activities of the Federal Research Coordinating Committee (FRICC) in creating an interconnected set of networks to serve the research community, two workshops were held to address the technical support of policy issues that arise when interconnecting such networks. The workshops addressed the required and feasible technologies and architectures that could be used to satisfy the desired policies for interconnection. The results of the workshop are documented
Designing Economic Instruments for the Environment in a Decentralized Fiscal System
When external effects are important, markets will be inefficient, and economists have considered several broad classes of economic instruments to correct these inefficiencies. However, the standard economic analysis has tended to take the region, and the government, as a given; that is, this work has neglected important distinctions and interactions between the geographic scope of different pollutants, the enforcement authority of various levels of government, and the fiscal responsibilities of the various levels of government. It typically ignores the possibility that the externality may be created and addressed by local governments, and it does not consider the implications of decentralization for the design of economic instruments targeted at environmental problems. This paper examines the implications of decentralization for the design of corrective policies; that is, how does one design economic instruments in a decentralized fiscal system in which externalities exist at the local level and in which subnational governments have the power to provide local public services and to choose tax instruments that can both finance these expenditures and correct the market failures of externalities?market failure, environmental federalism, externalities, fiscal decentralization, subsidiarity principle, economic instruments
Context-aware adaptation in DySCAS
DySCAS is a dynamically self-configuring middleware for automotive control systems. The addition of autonomic, context-aware dynamic configuration to automotive control systems brings a potential for a wide range of benefits in terms of robustness, flexibility, upgrading etc. However, the automotive systems represent a particularly challenging domain for the deployment of autonomics concepts, having a combination of real-time performance constraints, severe resource limitations, safety-critical aspects and cost pressures. For these reasons current systems are statically configured. This paper describes the dynamic run-time configuration aspects of DySCAS and focuses on the extent to which context-aware adaptation has been achieved in DySCAS, and the ways in which the various design and implementation challenges are met
Empowering users to control their privacy in context-aware system through interactive consent
Context-aware systems adapt their behaviour based on the context a user is in. Since context is potentially privacy sensitive information, users should be empowered to control how much of their context they are willing to share, under what conditions and for what purpose. We propose an interactive consent mechanism that allows this. It is interactive in the sense that users are asked for consent when a request for their context information is received. Our interactive consent mechanism complements a more traditional pre-configuration approach. We describe the architecture, the implementation of our interactive consent mechanism and a use case
iTETRIS: An Integrated Wireless and Traffic Platform for Real-Time Road Traffic Management Solutions
Wireless vehicular cooperative systems have been identified as an attractive solution to improve road traffic management, thereby contributing to the European goal of safer, cleaner, and more efficient and sustainable traffic solutions. V2V-V2I communication technologies can improve traffic management through real-time exchange of data among vehicles and with road infrastructure. It is also of great importance to investigate the adequate combination of V2V and V2I technologies to ensure the continuous and costefficient operation of traffic management solutions based on wireless vehicular cooperative solutions. However, to adequately design and optimize these communication protocols and analyze the potential of wireless vehicular cooperative systems to improve road traffic management, adequate testbeds and field operational tests need to be conducted.
Despite the potential of Field Operational Tests to get the first insights into the benefits and problems faced in the development of wireless vehicular cooperative systems, there is yet the need to evaluate in the long term and large dimension the true potential benefits of wireless vehicular cooperative systems to improve traffic efficiency. To this aim, iTETRIS is devoted to the development of advanced tools coupling traffic and wireless communication simulators
Tell the Smart House to Mind its Own Business!: Maintaining Privacy and Security in the Era of Smart Devices
Consumers want convenience. That convenience often comes in the form of everyday smart devices that connect to the internet and assist with daily tasks. With the advancement of technology and the âInternet of Thingsâ in recent years, convenience is at our fingertips more than ever before. Not only do consumers want convenience, they want to trust that their product is performing the task that they purchased it for and not exposing them to danger or risk. However, due to the increasing capabilities and capacities of smart devices, consumers are less likely to realize the implications of what they are agreeing to when they purchase and begin using these products. This Note will focus on the risks associated with smart devices, using smart home devices as an illustration. These devices have the ability to collect intimate details about the layout of the home and about those who live within it. The mere collection of this personal data opens consumers up to the risk of having their private information shared with unintended recipients whether the information is being sold to a third party or accessible to a hacker. Thus, to adequately protect consumers, it is imperative that they can fully consent to their data being collected, retained, and potentially distributed. This Note examines the law that is currently in place to protect consumers who use smart devices and argues that a void ultimately leaves consumers vulnerable. Current data privacy protection in the United States centers on the self-regulatory regime of ânotice and choice.â This Note highlights how the self-regulatory notice-and-choice model fails to ensure sufficient protection for consumers who use smart devices and discusses the need for greater privacy protection in the era of the emerging Internet of Things. Ultimately, this Note proposes a state-level resolution and calls upon an exemplar state to experiment with privacy protection laws to determine the best way to regulate the Internet of Things
- âŠ