36,126 research outputs found

    Wheatland-Chili Central School District and Wheatland-Chili Federation of Teachers (Bus Drivers, Custodians & Cafeteria Workers Unit)

    Get PDF
    In the Matter of Fact-Finding Between Wheatland-Chili Central School District and Wheatland-Chili Federation of Teachers (Bus Drivers, Custodians & Cafeteria Workers Unit). PERB Case No. M2007-142. Before: Stephen P. LaLonde, Impartial Fact Finder

    York Central School District and York Central School Custodial Personnel Association (2014)

    Get PDF

    Critique of Architectures for Long-Term Digital Preservation

    Get PDF
    Evolving technology and fading human memory threaten the long-term intelligibility of many kinds of documents. Furthermore, some records are susceptible to improper alterations that make them untrustworthy. Trusted Digital Repositories (TDRs) and Trustworthy Digital Objects (TDOs) seem to be the only broadly applicable digital preservation methodologies proposed. We argue that the TDR approach has shortfalls as a method for long-term digital preservation of sensitive information. Comparison of TDR and TDO methodologies suggests differentiating near-term preservation measures from what is needed for the long term. TDO methodology addresses these needs, providing for making digital documents durably intelligible. It uses EDP standards for a few file formats and XML structures for text documents. For other information formats, intelligibility is assured by using a virtual computer. To protect sensitive information—content whose inappropriate alteration might mislead its readers, the integrity and authenticity of each TDO is made testable by embedded public-key cryptographic message digests and signatures. Key authenticity is protected recursively in a social hierarchy. The proper focus for long-term preservation technology is signed packages that each combine a record collection with its metadata and that also bind context—Trustworthy Digital Objects.

    Retirement Security: Improved Guidance Could Help Account Owners Understand the Risks of Investing in Unconventional Assets

    Get PDF
    [Excerpt] Federal law places few restrictions on the types of investments allowable in tax-favored retirement accounts, such as IRAs or employer-sponsored 401(k) plans. Recent federal and state investigations and litigation have raised questions as to whether investing in unconventional assets may jeopardize the accounts’ tax-favored status, placing account owners’ retirement security at risk. GAO was asked to examine issues related to the potential risks and responsibilities associated with investments in unconventional assets. GAO examined: (1) what is known about the prevalence of accounts that invest in unconventional assets; (2) how these accounts are managed; and (3) what challenges are associated with administering these retirement accounts. GAO reviewed relevant federal laws, regulations, and guidance; analyzed data collected from the retirement industry; analyzed available industry documents; and reviewed 334 related consumer complaints collected from three federal agencies and two independent entities

    Laptop theft: a case study on effectiveness of security mechanisms in open organizations

    Get PDF
    Organizations rely on physical, technical and procedural mechanisms to protect their physical assets. Of all physical assets, laptops are the probably the most troublesome to protect, since laptops are easy to remove and conceal. Organizations open to the public, such as hospitals and universities, are easy targets for laptop thieves, since every day hundreds of people not employed by the organization wander in the premises. The problem security professionals face is how to protect the laptops in such open organizations. \ud \ud In this study, we look at the eectiveness of the security mechanisms against laptop theft in two universities. We analyze the logs from laptop thefts in both universities and complement the results with penetration tests. The results from the study show that surveillance cameras and access control have a limited role in the security of the organization and that the level of security awareness of the employees plays the biggest role in stopping theft. The results of this study are intended to aid security professionals in the prioritization of security mechanisms

    Global environmental governance: the role of local governments

    Full text link
    This repository item contains a single issue of Sustainable Development Insights, a series of short policy essays that began publishing in 2008 by the Boston University Frederick S. Pardee Center for the Study of the Longer-Range Future. The series seeks to promote a broad interdisciplinary dialogue on how to accelerate sustainable development at all levels.Is there a role for cities in the Global Environmental Governance (GEG) system and, if so, what exactly should that role be? Konrad Otto-Zimmermann, the Director of ICLEI, argues that cities and local governments have played a leading role in developing programs to reduce greenhouse gases, and have much to offer in national and global efforts to address climate change and other major environmental issues. A new and improved GEG framework should include direct connections to and involvement by local and subnational governments as well as business, giving these important stakeholders input into important policies and decisions that ultimately affect them

    An Economic Analysis of Privacy Protection and Statistical Accuracy as Social Choices

    Get PDF
    Statistical agencies face a dual mandate to publish accurate statistics while protecting respondent privacy. Increasing privacy protection requires decreased accuracy. Recognizing this as a resource allocation problem, we propose an economic solution: operate where the marginal cost of increasing privacy equals the marginal benefit. Our model of production, from computer science, assumes data are published using an efficient differentially private algorithm. Optimal choice weighs the demand for accurate statistics against the demand for privacy. Examples from U.S. statistical programs show how our framework can guide decision-making. Further progress requires a better understanding of willingness-to-pay for privacy and statistical accuracy
    • …
    corecore