205,954 research outputs found

    Using Lessons from Health Care to Protect the Privacy of Library Users: Guidelines for the De-Identification of Library Data based on HIPAA

    Get PDF
    While libraries have employed policies to protect the data about use of their services, these policies are rarely specific or standardized. Since 1996 the U.S. healthcare system has been grappling with the Health Insurance Portability and Accountability Act (HIPAA), which is designed to provide those handling personal health information with standardized, definitive instructions as to the protection of data. In this work, the authors briefly discuss the present situation of privacy policies about library use data, outline the HIPAA guidelines to understand parallels between the two, and finally propose methods to create a de-identified library data warehouse based on HIPAA for the protection of user privacy

    Hybrid Software Development Approaches in Practice: A European Perspective

    Get PDF
    Agile and traditional development approaches are used in combination in todays software development. To improve the understanding and to provide better guidance for selecting appropriate development approaches, it is important to analyze such combinations in practice. Results obtained from an online survey strongly confirm that hybrid development approaches are widely used in industry. Our results show that hybrid development approaches: (i) have become reality for nearly all companies; (ii) are applied to specific projects even in the presence of company-wide policies for process usage; (iii) are neither planned nor designed but emerge from the evolution of different work practices; and, (iv) are consistently used regardless of company size or industry secto

    PEPFAR Public Health Evaluation-Care and Support -Phase I Kenya

    Get PDF
    Phase 1, a survey of 120 care facilities in Kenya and Uganda, found that over 90% of facilities provided some level of clinical, psychological,and preventive care. Pain control was very limited with paracetamol often the only analgesic. In focus group discussions, patients appreciated free care and positive attitudes from staff, but said that services would be improved by more staff, shorter queues, and reliable drug supplies

    Finding the Fit: A Review of Three Intervention Models for Working with HIV/AIDS Impacted Substance Users who are Homeless

    Get PDF
    This report reflects research on three different models of services for people living with Human Immunodeficiency Virus (HIV) or Acquired Immunodeficiency Syndrome (AIDS) who are also low-income, substance users and are homeless or at risk of becoming homeless. This review of intervention modalities is intended to document what is being done in Chicago to serve this population, illuminate what is known about outcomes for those receiving services and suggest areas for further investigation

    Using Blockchain Technology for The Organ Procurement and Transplant Network

    Get PDF
    The organ donation system in the United States is centralized and difficult to audit by the general public. This centralized approach may lead to data integrity issues in the future. The Organ Procurement and Transplant Network (OPTN) was built and maintained by a non-governmental organization called the United Network for Organ Sharing (UNOS) under its proprietary UNet(SM) umbrella platform. This platform is made up of proprietary closed source software and does not provide the general public easy access to the organ transplant data for auditing. This study investigates the feasibility, challenges, and advantages of a blockchain-based OPTN. A prototype of a blockchain-based OPTN was created using the Hyperledger Fabric framework. The policies and guidelines issued by the United States Department of Health and Human Services for UNOS and the OPTN were used as the basis of this prototype. Four factors were identified to have a direct effect on the performance of this system, viz. max batch time out, max block size, endorsement policy, and transaction rate. Additionally, two variants of the blockchain chaincode were also developed. The first variant performed the organ-candidate matching inside the blockchain (Scheme A), and the second variant performed it outside the blockchain (Scheme B). Analysis of these data showed that Scheme A outperformed Scheme B in all experiments for write-operations. However, the read operations remained unaffected by any of the experiment variables in the given environment. Based on these results, it is recommended to perform the organ-candidate matching on the blockchain with the max batch time out close to the transaction rate

    The Taxation of Capital and Labor Through the Self-Employment Tax

    Get PDF
    [Excerpt] Since 1950, self-employed individuals have been covered by the Social Security system. In many regards, their obligation to pay Self-Employment Contributions Act (SECA) taxes into the Old-Age, Survivors, and Disability Insurance (OASDI) and Hospital Insurance (HI) trust funds and their entitlement to Social Security and Medicare benefits parallel those of workers who are not self-employed and who thus are covered under the Federal Insurance Contributions Act (FICA). In both cases, the OASDI tax base is limited to income below a certain threshold, and the HI tax base is not constrained by any income ceiling. The two systems, however, diverge in an important way: The FICA tax is based solely on income from labor, but the SECA tax is based on net business income, which can also include income from capital. Such a difference in the tax code (say, among businesses providing the same goods and services) can prompt people to make choices that they would not otherwise make about self-employment or the organizational form of a business, thereby reducing the efficient allocation of resources. For this analysis, the Congressional Budget Office (CBO) decomposed the SECA tax bases for HI and OASDI into their labor and capital components, but the discussion focuses on the HI tax base because it is unconstrained by the income ceiling of the OASDI tax. CBO estimates that approximately 40 percent of the SECA-HI tax base (the amount of self-employment income subject to the HI tax) derives from capital, and the remainder derives from labor. Furthermore, more than half of the labor income of self-employed people—that is, the portion of their business income that would be subject to the FICA-HI tax if the business was incorporated instead of being a sole proprietorship or a partnership—is not included in the SECA-HI tax base. That occurs because when net income from all of a taxpayer’s businesses is less than the labor income from those businesses, the excess labor income is excluded from the SECA tax base. There is no similar exclusion from the FICA tax base. With both the taxed capital income and the excluded labor income accounted for, the total SECA-HI tax base is roughly three-quarters of the amount of income that would be taxable under the FICA-HI rules. Lawmakers could change the SECA tax base to try to align it more closely with the rules governing the FICA tax base. CBO analyzed three options for alignment that would modify the SECA tax base by either reducing the share of capital income or increasing the share of labor income included in that base. No option by itself would accomplish both of those objectives when applied to both sole proprietorships and partnerships, but one option would do so if applied only to partnerships. Two of the options would reduce the size of the SECA tax base—in one case by more than half—whereas the third option would increase the SECA tax base by a little

    Mesmerizer: A Effective Tool for a Complete Peer-to-Peer Software Development Life-cycle

    Get PDF
    In this paper we present what are, in our experience, the best practices in Peer-To-Peer(P2P) application development and how we combined them in a middleware platform called Mesmerizer. We explain how simulation is an integral part of the development process and not just an assessment tool. We then present our component-based event-driven framework for P2P application development, which can be used to execute multiple instances of the same application in a strictly controlled manner over an emulated network layer for simulation/testing, or a single application in a concurrent environment for deployment purpose. We highlight modeling aspects that are of critical importance for designing and testing P2P applications, e.g. the emulation of Network Address Translation and bandwidth dynamics. We show how our simulator scales when emulating low-level bandwidth characteristics of thousands of concurrent peers while preserving a good degree of accuracy compared to a packet-level simulator

    A comparison of proposals to restructure the U.S. financial system

    Get PDF
    Banking law ; Banking structure ; Bank holding companies

    Scalable discovery of hybrid process models in a cloud computing environment

    Get PDF
    Process descriptions are used to create products and deliver services. To lead better processes and services, the first step is to learn a process model. Process discovery is such a technique which can automatically extract process models from event logs. Although various discovery techniques have been proposed, they focus on either constructing formal models which are very powerful but complex, or creating informal models which are intuitive but lack semantics. In this work, we introduce a novel method that returns hybrid process models to bridge this gap. Moreover, to cope with today’s big event logs, we propose an efficient method, called f-HMD, aims at scalable hybrid model discovery in a cloud computing environment. We present the detailed implementation of our approach over the Spark framework, and our experimental results demonstrate that the proposed method is efficient and scalabl

    Measuring and mitigating AS-level adversaries against Tor

    Full text link
    The popularity of Tor as an anonymity system has made it a popular target for a variety of attacks. We focus on traffic correlation attacks, which are no longer solely in the realm of academic research with recent revelations about the NSA and GCHQ actively working to implement them in practice. Our first contribution is an empirical study that allows us to gain a high fidelity snapshot of the threat of traffic correlation attacks in the wild. We find that up to 40% of all circuits created by Tor are vulnerable to attacks by traffic correlation from Autonomous System (AS)-level adversaries, 42% from colluding AS-level adversaries, and 85% from state-level adversaries. In addition, we find that in some regions (notably, China and Iran) there exist many cases where over 95% of all possible circuits are vulnerable to correlation attacks, emphasizing the need for AS-aware relay-selection. To mitigate the threat of such attacks, we build Astoria--an AS-aware Tor client. Astoria leverages recent developments in network measurement to perform path-prediction and intelligent relay selection. Astoria reduces the number of vulnerable circuits to 2% against AS-level adversaries, under 5% against colluding AS-level adversaries, and 25% against state-level adversaries. In addition, Astoria load balances across the Tor network so as to not overload any set of relays.Comment: Appearing at NDSS 201
    corecore