196,947 research outputs found

    Overview of Final Medicaid Eligibility Regulation

    Get PDF
    Summarizes final Medicaid eligibility rules, including by category, residency, and income; verification; and coordination of eligibility and enrollment between Medicaid and other programs

    IoTSan: Fortifying the Safety of IoT Systems

    Full text link
    Today's IoT systems include event-driven smart applications (apps) that interact with sensors and actuators. A problem specific to IoT systems is that buggy apps, unforeseen bad app interactions, or device/communication failures, can cause unsafe and dangerous physical states. Detecting flaws that lead to such states, requires a holistic view of installed apps, component devices, their configurations, and more importantly, how they interact. In this paper, we design IoTSan, a novel practical system that uses model checking as a building block to reveal "interaction-level" flaws by identifying events that can lead the system to unsafe states. In building IoTSan, we design novel techniques tailored to IoT systems, to alleviate the state explosion associated with model checking. IoTSan also automatically translates IoT apps into a format amenable to model checking. Finally, to understand the root cause of a detected vulnerability, we design an attribution mechanism to identify problematic and potentially malicious apps. We evaluate IoTSan on the Samsung SmartThings platform. From 76 manually configured systems, IoTSan detects 147 vulnerabilities. We also evaluate IoTSan with malicious SmartThings apps from a previous effort. IoTSan detects the potential safety violations and also effectively attributes these apps as malicious.Comment: Proc. of the 14th ACM CoNEXT, 201

    Workforce Innovation and Opportunity Act (WIOA) of 2014: A Preliminary Analysis

    Get PDF
    A preliminary analysis of provisions contained in the Workforce Innovation and Opportunity Act (WIOA) of 2014 related to employment, training, education, supports, and prioritization of workforce services for adults and youth with barriers to employment

    Computer Technology for the Benefit of the Rule of Law: Communication and Research

    Get PDF
    This Essay suggests a number of ways in which rule of law partners in the United States and abroad with modest technical background might more easily communicate, plan, coordinate, and research joint projects. Without the new computer technologies it would be very difficult to conduct rule of law projects between partners in the United States and Russia. Recent advances in technologies now make communication with colleagues across the world by computer easier than ever

    GROWTH MANAGEMENT TOOLS AND PROGRAMS TARGETING SPECIFIC OUTCOMES WITH NON-MARGINAL INSTITUTIONAL CHANGE

    Get PDF
    Communities across the country are struggling to accommodate population growth and economic development while limiting negative impacts of associated land development patterns.. At federal, state and local levels, policies and programs are being implemented in an attempt to mitigate the negative impacts of growth. Many of these programs are united under the concept of Smart Growth. There are numerous resources available that explain and describe applications of tens, if not hundreds, of smart growth tools (for example: see ICMA, 2003). The purpose of this paper is to highlight a few growth management programs that have incorporated tools characterized by fairly significant institutional changes. Of particular interest are the economic incentives and disincentives created by the institutional change. First, sprawl and growth management are defined. Next, the role of federal policy in growth patterns is reviewed briefly. Third, specific examples of growth management policy tools are provided. Finally, several policy issues critical to the achievement of growth management are discussed. Because this paper was initially presented as a general resource for public policy educators, the background material references include an internet site where available.Institutional and Behavioral Economics,

    Supporting Career Development and Employment: Benefits Planning, Assistance and Outreach (BPA&O) and Protection and Advocacy for Beneficiaries of Social Security (PABSS)

    Get PDF
    This training curriculum is dedicated to increasing knowledge and understanding of the Social Security Administration\u27s disability and return to work programs and work incentive provisions as prescribed in the Social Security Act and Ticket to Work and Work Incentives Improvement Act of 1999 as well as other federal benefit programs. These informational resources were compiled and edited to provide continuing education and print materials for benefits specialists and protection and advocacy personnel on the interplay of these benefit programs and impact or employment

    Watching You: Systematic Federal Surveillance of Ordinary Americans

    Get PDF
    To combat terrorism, Attorney General John Ashcroft has asked Congress to "enhance" the government's ability to conduct domestic surveillance of citizens. The Justice Department's legislative proposals would give federal law enforcement agents new access to personal information contained in business and school records. Before acting on those legislative proposals, lawmakers should pause to consider the extent to which the lives of ordinary Americans already are monitored by the federal government. Over the years, the federal government has instituted a variety of data collection programs that compel the production, retention, and dissemination of personal information about every American citizen. Linked through an individual's Social Security number, these labor, medical, education and financial databases now empower the federal government to obtain a detailed portrait of any person: the checks he writes, the types of causes he supports, and what he says "privately" to his doctor. Despite widespread public concern about preserving privacy, these data collection systems have been enacted in the name of "reducing fraud" and "promoting efficiency" in various government programs. Having exposed most areas of American life to ongoing government scrutiny and recording, Congress is now poised to expand and universalize federal tracking of citizen life. The inevitable consequence of such constant surveillance, however, is metastasizing government control over society. If that happens, our government will have perverted its most fundamental mission and destroyed the privacy and liberty that it was supposed to protect

    Unmet Needs of Unaccompanied Minors from Central America: Perceptions of Professionals from Multiple Sectors

    Get PDF
    Background: In recent years, there has been a significant influx of Central American youth who cross the U.S.-Mexico border without a parent or legal guardian. While federal procedures are established to oversee the treatment and placement of unaccompanied minors, less is known about the needs of unaccompanied minors and available services afterthey are placed in appropriate custody. Methods: Purposive and strategic sampling of professionals from medical, social work, education and legal fields was conducted. Fourteen informants were recruited across the U.S. for confidential semi-structured interviews, which were audio recorded and transcribed in 2016 to 2017. Standard anthropological methods were employed, including immersion and crystallization techniques that incorporated within-case and across-case analytic strategies. Results: Recruited informants had previous or current direct experience working with immigrant minors for three or more years in addition to extensive public health experience. Unaccompanied minors were described as predominantly adolescent boys, ranging from 2 to 18 years old. Children faced unmet mental, medical and psychosocial needs that are interconnected and largely unmet due to children’s legal status and ineligibility to access services in most jurisdictions. The most pressing challenge affecting the health of youth was their immigration status. Across sectors,informants revealed an imbalance between the growing demand for services, including legal counsel, and the limited supply of professionals and well-funded services to meet children’s complex needs. Informants emphasized the value of trauma-informed practice, Spanish language proficiency, child-informed practice and intercultural awareness and humility towards their clients as key features of equipped professionals working with this vulnerable population. Regardless of sector, professionals emphasized the importance of culturally-informed care to immigrant youth. Building these skills is associated with greater confidence to provide services to unaccompanied minors, many of whom have experienced as significant burden of childhood trauma. Conclusions: The health needs of unaccompanied minors are complex and span across medical, social work, education, and legal fields. Interdisciplinary collaboration is needed to address the challenges faced by unaccompanied minors in their efforts to integrate themselves into their new communities and promote their resilience. Promising initiatives include co-location of inter-sector services for increased access and efficiency of services and development of professional trainings and resources for professionals in sectors that serve this population
    • …
    corecore