1,101 research outputs found

    PREVIEW — Denezpi v. United States (2022). Double Jeopardy in Indian Country

    Get PDF
    On February 22, the Supreme Court of the United States will decide the single issue of whether a Court of Indian Offenses constitutes a federal entity and, therefore, separate prosecutions in federal district court and a Court of Indian Offenses for the same act violates the Double Jeopardy Clause as prosecutions for the same offense

    Federal Regulation of Atomic Energy Activities

    Get PDF
    The Atomic Energy Act of 1954 expressly recognizes in Section One that atomic energy is capable of application for peaceful purposes as well as military uses. The Act also provides that United policy is to direct the development, use, and control of atomic energy so as to make the maximum contribution to the general welfare, promote world peace, improve the general welfare, increase the standard of living, and strengthen free competition in private enterprise. These objectives are subject at all times to the paramount objective of maximum contribution to the common defense and security. The Atomic Energy Act of 1954 also stresses the necessity of regulating the processing and utilisation of source, byproduct, and special nuclear material, and facilitates for the production and utilization of source, byproduct, and special nuclear material, and facilities for the production and utilization of atomic energy. Such regulation is deemed necessary in the national interest to assure the common defense and security and protect the health and safety of the public

    A question of trust: can we build an evidence base to gain trust in systematic review automation technologies?

    Get PDF
    Background Although many aspects of systematic reviews use computational tools, systematic reviewers have been reluctant to adopt machine learning tools. Discussion We discuss that the potential reason for the slow adoption of machine learning tools into systematic reviews is multifactorial. We focus on the current absence of trust in automation and set-up challenges as major barriers to adoption. It is important that reviews produced using automation tools are considered non-inferior or superior to current practice. However, this standard will likely not be sufficient to lead to widespread adoption. As with many technologies, it is important that reviewers see “others” in the review community using automation tools. Adoption will also be slow if the automation tools are not compatible with workflows and tasks currently used to produce reviews. Many automation tools being developed for systematic reviews mimic classification problems. Therefore, the evidence that these automation tools are non-inferior or superior can be presented using methods similar to diagnostic test evaluations, i.e., precision and recall compared to a human reviewer. However, the assessment of automation tools does present unique challenges for investigators and systematic reviewers, including the need to clarify which metrics are of interest to the systematic review community and the unique documentation challenges for reproducible software experiments. Conclusion We discuss adoption barriers with the goal of providing tool developers with guidance as to how to design and report such evaluations and for end users to assess their validity. Further, we discuss approaches to formatting and announcing publicly available datasets suitable for assessment of automation technologies and tools. Making these resources available will increase trust that tools are non-inferior or superior to current practice. Finally, we identify that, even with evidence that automation tools are non-inferior or superior to current practice, substantial set-up challenges remain for main stream integration of automation into the systematic review process

    Evapotranspiration from Natural Vegetation in the Central Valley of California: Monthly Grass Reference-Based Vegetation Coefficients and the Dual Crop Coefficient Approach

    Get PDF
    Restoration activities in the Central Valley of California and elsewhere require accurate evapotranspiration information, which can then be used for a wide variety of surface and subsurface hydrologic evaluations. However, directly measuring evapotranspiration can be difficult or impossible depending on the evaluation’s time frame. Transferability of measured evapotranspiration in time and space is also necessary but typically requires a weather-based reference. For nonagricultural vegetation, there is at present time no standard reference, which makes the evaluation of a variety of vegetation types from different sources difficult and time-consuming. This paper examines several methods used to estimate evapotranspiration from native vegetation, including the use of vegetation coefficients (Kv). Vegetation coefficients are based on a standardized reference and are computed as the ratio of vegetation evapotranspiration (ETv) to the grass reference evapotranspiration (ETo). These monthly Kvvalues are used to compute the long-term (for this study, 1922–2009) average ETvfor vegetation types documented to exist in California’s Central Valley prior to the arrival of the first European settlers in the mid-18th century. For vegetation that relies on precipitation and soil moisture storage, a calibrated daily soil–water balance with a dual crop coefficient approach was used to compute evapotranspiration regionally over the time frame

    Protecting the Brand: Evaluating the Cost of Security Breach from a Marketer’s Perspective

    Get PDF
    Cyberattacks have increased over the years both at the individual and firm level. Yet, the organizational budgets directed toward information security remains low. One reason is that the ramifications of information breach, such as increased consumer perception of risk and brand equity erosion remain, to the senior executives and board of directors in organizations, almost invisible. The second reason is that managers are required to justify budgets. The cost of system breach is often difficult to quantify. There are direct and enduring costs of information breach. As such, it has implications that impact not just the downtime during a data breach but loss of customers, trust, loyalty and brand equity, all of great concern to marketing managers. This paper analyzes the impact of a breach announcement on the market valuation of the company. Such an analysis using the event study methodology provides a clear indication of how the market reacts to the firm’s breach in information. The results of the study indicate that the market punishes the firm with a small but significant negative abnormal return on the announcement of the breach, and this trend persists. This result, together with the indirect or enduring costs related to brand erosion, provides a good justification to senior executives for protecting the integrity of information, and by so doing, protecting the equity of the brand

    Adaptive Skill as The<i> Conditio Sine Qua Non</i> of Expertise

    Get PDF
    This critical interpretive research synthesis is on the topic of adaptation and skill. After an initial identification of 1995 abstracts we identified and collated a database of 140 publications that explicitly reference expertise and adaptation. We found that empirical data on adaptive skill are sparse and the literature base is largely conceptual. We differentiate the adaptive nature of expertise from routine or every day skill, and we redress the balance between what constitutes expertise and when expertise matters. We present an overview of current models of expertise including a project that we completed for the UK Ministry of Defence on the nature of adaptive skill. We discuss implications for future training by presenting empirically based training principles designed to develop adaptive skill. We assert that adaptive skill is the conditio sine qua non of expertise and conclude with suggestions for further research.</p
    corecore