30,802 research outputs found

    City Open Data Policies

    Get PDF
    The capture and analysis of data is transforming the 21st Century. As society becomes more data driven, data has the ability to drive the bottom line for private companies and help the public sector to define where and how services can best be delivered. In City Open Data Policies: Learning by Doing, the National League of Cities identifies how cities can take advantage of the opportunities presented by open data initiatives.SUMMARY OF RECOMMENDATIONSLeadership: Political support stands out as one of the key requirements to implementing a successful open data project.Appropriate Legislation: Enacting legislation or formal policies is a crucial step toward ensuring the growth and sustainability of open data portals. Funding: Open data initiatives do not require high levels of funding. It is, however, important that the programs have their own budget line items where resources are specifically allocated. Technical Approach: Leading U.S. cities rely on commercial platforms that facilitate the implementation of open data initiatives, provide technical expertise, and ensure 24/7 customer support, often at a lower cost than providing these services in-house. Stakeholder Involvement: Open data is a two-way process. It is, therefore, essential to encourage participation and engagement among multiple stakeholders including: community members; non-profits; universities; the press; businesses; city departments; and other levels of government. Many cities adopt a flexible, and usually informal, approach to interact with the stakeholders. Measuring Success: Developing evaluation tools should be an integral part of any future open data policies

    Activating Latino Millennial Civic Power: A Report of the Aspen Institute Latinos and Society Convening - Unlocking Latino Millennial Civic Potential

    Get PDF
    The report highlights the ideas and conversations that came from a June 2016 convening of 26 bright minds who developed five inspirational and impactful projects designed to increase Latino Millennial civic engagement

    Unlocking the Fifth Amendment: Passwords and Encrypted Devices

    Get PDF
    Each year, law enforcement seizes thousands of electronic devices—smartphones, laptops, and notebooks—that it cannot open without the suspect’s password. Without this password, the information on the device sits completely scrambled behind a wall of encryption. Sometimes agents will be able to obtain the information by hacking, discovering copies of data on the cloud, or obtaining the password voluntarily from the suspects themselves. But when they cannot, may the government compel suspects to disclose or enter their password? This Article considers the Fifth Amendment protection against compelled disclosures of passwords—a question that has split and confused courts. It measures this right against the legal right of law enforcement, armed with a warrant, to search the device that it has validly seized. Encryption cases present the unique hybrid scenario that link and entangle the Fourth and Fifth Amendments. In a sense, this Article explores whose rights should prevail. This Article proposes a novel settlement that draws upon the best aspects of Fourth and Fifth Amendment law: the government can compel a suspect to decrypt only those files it already knows she possesses. This rule follows from existing Fifth Amendment case law and, as a corollary to the fundamental nature of strong encryption, also represents the best accommodation of law enforcement needs against individual privacy

    The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences

    Full text link
    Current smartphone operating systems regulate application permissions by prompting users on an ask-on-first-use basis. Prior research has shown that this method is ineffective because it fails to account for context: the circumstances under which an application first requests access to data may be vastly different than the circumstances under which it subsequently requests access. We performed a longitudinal 131-person field study to analyze the contextuality behind user privacy decisions to regulate access to sensitive resources. We built a classifier to make privacy decisions on the user's behalf by detecting when context has changed and, when necessary, inferring privacy preferences based on the user's past decisions and behavior. Our goal is to automatically grant appropriate resource requests without further user intervention, deny inappropriate requests, and only prompt the user when the system is uncertain of the user's preferences. We show that our approach can accurately predict users' privacy decisions 96.8% of the time, which is a four-fold reduction in error rate compared to current systems.Comment: 17 pages, 4 figure

    Crossing Boundaries: Report to Community 2015

    Get PDF
    Annual Repor

    Sanitation in the Circular Economy: Transformation to a Commercially Valuable, Self-sustaining, Biological System

    Get PDF
    In 2016 the Toilet Board Coalition ran a Feasibility Study to explore the potential role of Sanitation in the Circular Economy. The following questions were at the centre of our inquiry:- Are there products or materials of value being upcycled from toilet resources?- Are there scalable business models to deliver sustainable supply of these products to the market?- Is there commercial interest and demand from large industrial operations to become buyers into the system? This paper presents the findings of our study in the form of a thought piece on the topic of sanitation in the Circular Economy. Our intent is to present a number of business opportunity spaces, where we believe that value has been left on the table and customer needs unmet, which we recommend are to be explored further in the decade ahead.
    • …
    corecore