20,734 research outputs found

    Delivering on Open Government: The Obama Administration's Unfinished Legacy

    Get PDF
    This report examines progress made during President Obama's first term toward open government goals outlined in a comprehensive set of recommendations that the open government community issued in November 2008, titled Moving Toward a 21st Century Right-to-Know Agenda. We examine activity in the three main areas of the 2008 report: creating an environment within government that is supportive of transparency, improving public use of government information, and reducing the secrecy related to national security issues

    Subprime Education: For-Profit Colleges and the Problem with Title IV Federal Student Aid

    Get PDF
    Federal student-aid policy is designed with the goal of expanding access to higher education for all students. It has been enormously successful in achieving that goal. Yet, for many students, federal student aid has served only to burden them with oppressive student-debt obligations. These obligations are a particular problem with respect to the for-profit higher-education sector, which receives a large and ever-growing proportion of federal aid. This Note examines the interaction between federal student-aid policy and for-profit institutions, arguing that the noble goals of modern federal student-aid policy enable the very practices that lead to negative outcomes for many students by creating a lucrative market for subprime education. This Note analyzes a continuum of approaches to reducing the negative student outcomes caused by many for-profit institutions, concluding that the blame lies not with for-profit institutions but with federal student-aid policy. Ultimately, the modern federal student-aid regime requires regulators to choose between abetting negative student outcomes and reducing access to higher education. This dilemma can be avoided only by deemphasizing the student-oriented aid model in favor of an institution-centered model that is focused on reducing the price of education

    Impact of Embedded Carbon Fiber Heating Panel on the Structural/Mechanical Performance of Roadway Pavement

    Get PDF
    INE/AUTC 12.3

    Encouraging Corporate Charity

    Get PDF
    The tax law governing corporate philanthropy is stuck in an archaic notion of corporate charity that does not necessarily benefit either charities or corporate stakeholders. Four developments in the last few years provoked this reexamination of the Internal Revenue Code and its awkward dichotomy between business expenses and charitable contributions. They offer new reasons for replacing the charitable contribution deduction for corporations with a business expense deduction: (1) a statutory reduction in the rate of tax on dividends received by individual shareholders, (2) empirical evidence showing very low effective tax rates paid by corporations, (3) death of the preeminent model of corporate philanthropy - Berkshire Hathaway\u27s shareholder-designation program, and (4) adoption of final capitalization regulations that significantly weaken the capitalization requirement and no longer pose much of an obstacle to immediate deduction of corporate payments to charities. This seemingly small legal change offers many benefits in today\u27s climate: it would increase the coherence of a corporation\u27s tax treatment, help to minimize the agency costs in corporate philanthropy, and change the way that corporations define their charitable endeavors, encouraging greater overall corporate commitment to charitable and community needs, both within and outside their business operations

    A Study on Security Attributes of Software-Defined Wide Area Network

    Get PDF
    For organizations to communicate important data across various branches, a reliable Wide Area Network (WAN) is important. With the increase of several factors such as usage of cloud services, WAN bandwidth demand, cost of leased lines, complexity in building/managing WAN and changing business needs led to need of next generation WAN. Software-defined wide area network (SD- WAN) is an emerging trend in today’s networking world as it simplifies management of network and provides seamless integration with the cloud. Compared to Multiprotocol Label Switching (MPLS) majorly used in traditional WAN architecture, SD-WAN incurs less cost, highly secure and offers great performance. This paper will mainly focus to investigate this next-generation WAN’s security attributes as security plays a crucial role in SD-WAN implementation. The goal of the paper is to analyze SD-WAN security by applying principles of CIA triad principle. Comparison of SD-WAN products offered by three different vendors in SD-WAN market with respect to its security is another important area that will be covered in this paper

    Standards and practices necessary to implement a successful security review program for intrusion management systems

    Get PDF
    Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2002Includes bibliographical references (leaves: 84-85)Text in English; Abstract: Turkish and Englishviii, 91 leavesIntrusion Management Systems are being used to prevent the information systems from successful intrusions and their consequences. They also have detection features. They try to detect intrusions, which have passed the implemented measures. Also the recovery of the system after a successful intrusion is made by the Intrusion Management Systems. The investigation of the intrusion is made by Intrusion Management Systems also. These functions can be existent in an intrusion management system model, which has a four layers architecture. The layers of the model are avoidance, assurance, detection and recovery. At the avoidance layer necessary policies, standards and practices are implemented to prevent the information system from successful intrusions. At the avoidance layer, the effectiveness of implemented measures are measured by some test and reviews. At the detection layer the identification of an intrusion or intrusion attempt is made in the real time. The recovery layer is responsible from restoring the information system after a successful intrusion. It has also functions to investigate the intrusion. Intrusion Management Systems are used to protect information and computer assets from intrusions. An organization aiming to protect its assets must use such a system. After the implementation of the system, continuous reviews must be conducted in order to ensure the effectiveness of the measures taken. Such a review can achieve its goal by using principles and standards. In this thesis, the principles necessary to implement a successful review program for Intrusion Management Systems have been developed in the guidance of Generally Accepted System Security Principles (GASSP). These example principles are developed for tools of each Intrusion Management System layer. These tools are firewalls for avoidance layer, vulnerability scanners for assurance layer, intrusion detection systems for detection layer and integrity checkers for recovery layer of Intrusion Management Systems
    • …
    corecore