62,344 research outputs found
Make it so! Jean-Luc Picard, Bart Simpson and the design of e-public services
In this paper, we report on a project applying participatory design methods to include people who have experience of social exclusion (in one form or another) in designing possible technologies for e-(local)-government services. The work was part of a project for the Office of the Deputy Prime Minister in the UK, and was concerned with âaccess
tokensâ that can provide personal identification for individuals accessing public services, based on technologies such as multi-functional smartcards, flash memory sticks, mobile phone SIMs or similar devices.
In particular we report on our experience using the âpastiche scenariosâ technique recently developed by Mark Blythe. Our findings indicate that the technique can be effective and engaging in helping people to create realistic scenarios of future technology use and highlight some possible pitfalls to consider when using this technique.</p
Strong Cryptography: The Global Tide of Change
Encryption technology allows people using electronic networks to ensure that the messages they send remain private--secure from hackers, industrial espionage, government wiretap abuses, and spies. Encryption technology will prove vital to the future of electronic commerce. For example, thefts of nuclear secrets from U.S. national laboratories would be much less likely if the labs' commercial software had built-in encryption features that could be used to limit unauthorized access--a type of security product discouraged by export controls. For years the U.S. government has struggled unsuccessfully to control the export of encryption technology from this country. Those ineffectual controls do, however, adversely affect the competitive position of the U.S. software industry and national security. Despite the controls, powerful encryption products are increasingly available around the world. Those products include Pretty Good Privacy, which offers 128-bit encryption, and many others. This paper provides a list of Web sites where such products may be found, thus establishing beyond doubt the futility of controls. Although some of the Web sites may from time to time disappear, others will spring up in their place
Recommended from our members
Keys to academic success for under-represented minority young investigators: recommendations from the Research in Academic Pediatrics Initiative on Diversity (RAPID) National Advisory Committee.
BackgroundAlthough Latinos, African-Americans, and American Indians/Alaska Natives comprise 34% of Americans, these under-represented minorities (URMs) account for only 7% of US medical-school faculty. Even when URMs become faculty, they face many substantial challenges to success. Little has been published, however, on keys to academic success for URM young faculty investigators.MethodsThe Research in Academic Pediatrics Initiative on Diversity (RAPID) goal is to enhance the professional advancement of URM junior faculty pursuing research careers in general academic pediatrics. One important RAPID component is the annual mentoring/career-development conference, which targets URM residents, fellows, and junior faculty, and has included 62 URM participants since its 2013 inception. A conference highlight is the panel discussion on keys to academic success for URM young investigators, conducted by the RAPID National Advisory Committee, a diverse group of leading senior researchers. The article aim was to provide a guide to academic success for URM young investigators using the 2018 RAPID Conference panel discussion. A modified Delphi technique was used to provide a systematic approach to obtaining answers to six key questions using an expert panel: the single most important key to success for URM young investigators; ensuring optimal mentorship; how to respond when patients/families say, "I don't want you to see my child because you are ____"; best strategies for maximizing funding success; how to balance serving on time-consuming committees with enough time to advance research/career objectives; and the single thing you wish someone had told you which would have substantially enhanced your success early on.Results/conclusionsThis is the first published practical guide on keys to academic success for URM young investigators. Identified keys to success included having multiple mentors, writing prolifically, being tenaciously persistent, having mentors who are invested in you, dealing with families who do not want you to care for their child because of your race/ethnicity by seeking to understand the reasons and debriefing with colleagues, seeking non-traditional funding streams, balancing committee work with having enough time to advance one's research and career by using these opportunities to generate scholarly products, and asking for all needed resources when negotiating for new jobs
Swords into Plowshares: Nuclear Power and the Atomic Energy Actâs Preemptive Scope in Virginia Uranium, Inc. v. Warren
This commentary highlights the considerations the Supreme Court should attend to in its decision in Virginia Uranium, Inc. v. Warren, both in construing § 2021(k) and in reviewing the Fourth Circuitâs reading of precedent from other circuits and from the Courtâs prior opinions. Specifically, the Court must clarify how to interpret § 2021(k)âs activities component in concert with its âfor purposesâ language and determine the importance of the particular underlying activity the state seeks to regulate in a preemption analysis under the Atomic Energy Act. Clarification is necessary to ensure that courts properly effectuate Congressâs intent in regulating nuclear power, an important regulatory realm that implicates economic growth, technological development, and foreign policy
Three Keys to the Original Meaning of the Privileges or Immunities Clause
Establishing the original meaning of the Fourteenth Amendmentâs Privileges or Immunities Clause requires a wealth of evidence. But three key data points are crucial to identifying the core of its meaning. First, Supreme Court Justice Washingtonâs explanation of the meaning of âprivileges and immunitiesâ in Corfield v. Coryell; second, the rights protected by the Civil Rights Act of 1866; and third, Michigan Senator Jacob Howardâs speech explaining the content of the Privileges or Immunities Clause when introducing the Fourteenth Amendment to the United States Senate in 1866. Any theory of the Privileges or Immunities Clause and its original meaning that cannot comfortably accommodate these three items is highly questionable
Performative regulation: a case study in how powerful people avoid criminal labels
This paper explores the role of invested powerful business actors in the criminalisation process as applied to the illicit antiquities market. We present a case study of the precise mechanics of the role played by trade interests in the formation of the Dealing in Cultural Objects (Offences) Act 2003. This process involved the tradeâs entering appearance in the legislative process and neutralising the possible constraining effects on its members of the new criminal offence which was to be created. We begin by exploring the political, historical and economic context in which discussion of the terms of the 2003 Act first began. We then follow the Act from its genesis through its various stages of drafting and re-drafting, to its enactment. This case study of a single piece of legislation provides further data to add to the line of prior research that illustrates that powerful white-collar criminals, as well as sometimes preventing criminal legislation entering the statute books, can also influence the design of criminal legislation that does enter the statute books in order to protect themselves and their own business interests. We also use this case study of a process of contemporary law-making to outline the concept of performative regulation: broadly, that which in appearance serves political ends but in practice effects an inconsequential level of control
Privacy preserving protocol for detecting genetic relatives using rare variants.
MotivationHigh-throughput sequencing technologies have impacted many areas of genetic research. One such area is the identification of relatives from genetic data. The standard approach for the identification of genetic relatives collects the genomic data of all individuals and stores it in a database. Then, each pair of individuals is compared to detect the set of genetic relatives, and the matched individuals are informed. The main drawback of this approach is the requirement of sharing your genetic data with a trusted third party to perform the relatedness test.ResultsIn this work, we propose a secure protocol to detect the genetic relatives from sequencing data while not exposing any information about their genomes. We assume that individuals have access to their genome sequences but do not want to share their genomes with anyone else. Unlike previous approaches, our approach uses both common and rare variants which provide the ability to detect much more distant relationships securely. We use a simulated data generated from the 1000 genomes data and illustrate that we can easily detect up to fifth degree cousins which was not possible using the existing methods. We also show in the 1000 genomes data with cryptic relationships that our method can detect these individuals.AvailabilityThe software is freely available for download at http://genetics.cs.ucla.edu/crypto/
- âŠ