80,877 research outputs found

    Applying the take-grant protection model

    Get PDF
    The Take-Grant Protection Model has in the past been used to model multilevel security hierarchies and simple protection systems. The models are extended to include theft of rights and sharing information, and additional security policies are examined. The analysis suggests that in some cases the basic rules of the Take-Grant Protection Model should be augmented to represent the policy properly; when appropriate, such modifications are made and their efforts with respect to the policy and its Take-Grant representation are discussed

    Applying the Take-Grant Protection Model

    Get PDF
    The Take-Grant Protection Model has in the past been used to model multilevel security hierarchies and simple protection systems. The models are extended to include theft of rights and sharing of information, and additional security policies are examined. The analysis suggests that in some cases the basic rules of the Take-Grant Protection Model should be augmented to represent the policy properly; when appropriate, such modifications are made and their effects with respect to the policy and its Take-Grant representations are discussed

    Stolen Wages in the Nation's Capital: Fixing DC's Broken Wage Theft Claims Process

    Get PDF
    Today in the District of Columbia ("the District" or "DC"), low wage workers are being shortchanged. Policies currently in place make it very difficult, to nearly impossible, for victims of wage theft to hold employers accountable for failing to pay wages owed. The Wage Theft Prevention Act of 2014, co-introduced on February 4, 2014 by Councilmembers Vincent Orange, Jim Graham, and Mary Cheh, would provide needed accountability and stronger protections to ensure that those working an honest day receive honest pay for their labor. This document provides an introduction to the current barriers affecting workers in the District, and presents an overview of the ways in which the Wage Theft Prevention Act of 2014 would ameliorate these problems; thereby making the District a better place for workers and responsible businesses

    Newspaper Theft, Self-Preservation and the Dimensions of Censorship

    Get PDF
    One of the most common yet understudied means of suppressing free expression on college and university campuses is the theft of freely-distributed student publications, particularly newspapers. This study examines news accounts of nearly 300 newspaper theft incidents at colleges and universities between 1995 and 2008 in order to identify the manifestations and consequences of this peculiar form of censorship, and to augment existing research on censorship and tolerance by looking, not at what people say about free expression, but at what they do when they have the power of censorship in their own hands. Among the key findings is that men commit nearly 70% of newspaper thefts, which is inconsistent with much of the existing research on censorship and gender, and that those who censor college newspapers are far more concerned with their own self-preservation than with shaping public dialog on controversial social or political issues

    Law Firm Cybersecurity: The State of Preventative and Remedial Regulation Governing Data Breaches in the Legal Profession

    Get PDF
    With the looming threat of the next hacking scandal, data protection efforts in law firms are becoming increasingly crucial in maintaining client confidentiality. This paper addresses ethical and legal issues arising with data storage and privacy in law firms. The American Bar Association’s Model Rules present an ethical standard for cybersecurity measures, which many states have adopted and interpreted. Other than state legislation mandating timely disclosure after a data breach, few legal standards govern law firm data breaches. As technology advances rapidly, the law must address preventative and remedial measures more effectively to protect clients from data breaches caused by outdated or ineffective cybersecurity procedures in law firms. These measures should include setting a minimum standard of care for data security protection and creating a private cause of action for individuals whose personal information has been improperly accessed because of a failure to comply with those standards

    The sharing of rights and information in a capability-based protection system

    Get PDF
    The question of sharing of rights and information in the Take-Grant Protection Model is examined by concentrating on the similarities between the two; in order to do this, new theorems are stated and proven for each that specifically show the similarities. The proof for one of the original theorems is also provided. These statements of necessary and sufficient conditions are contrasted to illustrate the proposition that transferring rights and transferring information are fundamentally the same, as one would expect in a capability-based system. Directions are then discussed for future research in light of these results

    Credit bureaus between risk-management, creditworthiness assessment and prudential supervision

    Get PDF
    "This text may be downloaded for personal research purposes only. Any additional reproduction for other purposes, whether in hard copy or electronically, requires the consent of the author. If cited or quoted, reference should be made to the full name of the author, the title, the working paper or other series, the year, and the publisher."This paper discusses the role and operations of consumer Credit Bureaus in the European Union in the context of the economic theories, policies and law within which they work. Across Europe there is no common practice of sharing the credit data of consumers which can be used for several purposes. Mostly, they are used by the lending industry as a practice of creditworthiness assessment or as a risk-management tool to underwrite borrowing decisions or price risk. However, the type, breath, and depth of information differ greatly from country to country. In some Member States, consumer data are part of a broader information centralisation system for the prudential supervision of banks and the financial system as a whole. Despite EU rules on credit to consumers for the creation of the internal market, the underlying consumer data infrastructure remains fragmented at national level, failing to achieve univocal, common, or defined policy objectives under a harmonised legal framework. Likewise, the establishment of the Banking Union and the prudential supervision of the Euro area demand standardisation and convergence of the data used to measure debt levels, arrears, and delinquencies. The many functions and usages of credit data suggest that the policy goals to be achieved should inform the legal and institutional framework of Credit Bureaus, as well as the design and use of the databases. This is also because fundamental rights and consumer protection concerns arise from the sharing of credit data and their expanding use

    PlaceRaider: Virtual Theft in Physical Spaces with Smartphones

    Full text link
    As smartphones become more pervasive, they are increasingly targeted by malware. At the same time, each new generation of smartphone features increasingly powerful onboard sensor suites. A new strain of sensor malware has been developing that leverages these sensors to steal information from the physical environment (e.g., researchers have recently demonstrated how malware can listen for spoken credit card numbers through the microphone, or feel keystroke vibrations using the accelerometer). Yet the possibilities of what malware can see through a camera have been understudied. This paper introduces a novel visual malware called PlaceRaider, which allows remote attackers to engage in remote reconnaissance and what we call virtual theft. Through completely opportunistic use of the camera on the phone and other sensors, PlaceRaider constructs rich, three dimensional models of indoor environments. Remote burglars can thus download the physical space, study the environment carefully, and steal virtual objects from the environment (such as financial documents, information on computer monitors, and personally identifiable information). Through two human subject studies we demonstrate the effectiveness of using mobile devices as powerful surveillance and virtual theft platforms, and we suggest several possible defenses against visual malware

    Participatory Evaluation of the Tribal Victim Assistance Programs at the Lummi Nation and Passamaquoddy Tribe

    Full text link
    The high rate of crime in American Indian/Alaska Native (AI/AN) communities and/or against AI/AN people reflected in numerous studies in the last three decades, demonstrates the need for victim assistance programs in Indian Country to help victims cope with and heal from violent crime (Wolk 1982; Allen 1985; Sacred Shawl Women’s Society, no date; McIntire 1988; DeBruyn, Lujan & May 1995; Norton & Manson 1995; Fairchild et. al 1998; Greenfield & Smith 1999; Alba, Zieseniss, et al 2003; Perry 2004). The U.S. Department of Justice, Office for Victims of Crime (OVC) became aware of the lack of resources available to AI/AN crime victims living on Indian lands. OVC, acknowledging the intense and extensive need for culturally relevant resources on reservations, established the Victim Assistance in Indian Country (VAIC) Discretionary Program in 1988, which later became the Tribal Victim Assistance Program (TVA). OVC initiated this program to establish “on-reservation” victim assistance programs that would provide permanent, accessible, and responsive victim assistance services on tribal lands. Recognizing the need for evaluation of promising victim services programs operating in Indian Country, OVC, in collaboration with the USDOJ National Institute of Justice (NIJ) supported an evaluation of two TVA programs—the Lummi Victims of Crime (LVOC) Program in Washington and the Passamaquoddy Tribal Victim Outreach Advocate (TVOA) Program in Maine. This report summarizes the results of the participatory evaluation conducted at these two sites
    • …
    corecore