6,473 research outputs found
Information Guide: Introduction to Ownership of Rights in Research Data. CREATe, University of Glasgow, 2018
No abstract available
Choose the Right Rights, Use the Data Right
On Thursday 2nd November, the University of Glasgow Research Information Management Services Team, Jisc, and CREATe held an all-day workshop on licencing research datasets.
The purpose of the workshop was to draw out issues around licencing of research datasets with a focus on identifying whether clarifications in terminology and guidance would be useful
Information Guide: FAQ: Using Research Data. CREATe, University of Glasgow, 2018
No abstract available
Information Guide: Making Research Data Available. CREATe, University of Glasgow, 2018
No abstract available
Electronic security - risk mitigation in financial transactions : public policy issues
This paper builds on a previous series of papers (see Claessens, Glaessner, and Klingebiel, 2001, 2002) that identified electronic security as a key component to the delivery of electronic finance benefits. This paper and its technical annexes (available separately at http://www1.worldbank.org/finance/) identify and discuss seven key pillars necessary to fostering a secure electronic environment. Hence, it is intended for those formulating broad policies in the area of electronic security and those working with financial services providers (for example, executives and management). The detailed annexes of this paper are especially relevant for chief information and security officers responsible for establishing layered security. First, this paper provides definitions of electronic finance and electronic security and explains why these issues deserve attention. Next, it presents a picture of the burgeoning global electronic security industry. Then it develops a risk-management framework for understanding the risks and tradeoffs inherent in the electronic security infrastructure. It also provides examples of tradeoffs that may arise with respect to technological innovation, privacy, quality of service, and security in designing an electronic security policy framework. Finally, it outlines issues in seven interrelated areas that often need attention in building an adequate electronic security infrastructure. These are: 1) The legal framework and enforcement. 2) Electronic security of payment systems. 3) Supervision and prevention challenges. 4) The role of private insurance as an essential monitoring mechanism. 5) Certification, standards, and the role of the public and private sectors. 6) Improving the accuracy of information on electronic security incidents and creating better arrangements for sharing this information. 7) Improving overall education on these issues as a key to enhancing prevention.Knowledge Economy,Labor Policies,International Terrorism&Counterterrorism,Payment Systems&Infrastructure,Banks&Banking Reform,Education for the Knowledge Economy,Knowledge Economy,Banks&Banking Reform,International Terrorism&Counterterrorism,Governance Indicators
Tree Regular Model Checking for Lattice-Based Automata
Tree Regular Model Checking (TRMC) is the name of a family of techniques for
analyzing infinite-state systems in which states are represented by terms, and
sets of states by Tree Automata (TA). The central problem in TRMC is to decide
whether a set of bad states is reachable. The problem of computing a TA
representing (an over- approximation of) the set of reachable states is
undecidable, but efficient solutions based on completion or iteration of tree
transducers exist. Unfortunately, the TRMC framework is unable to efficiently
capture both the complex structure of a system and of some of its features. As
an example, for JAVA programs, the structure of a term is mainly exploited to
capture the structure of a state of the system. On the counter part, integers
of the java programs have to be encoded with Peano numbers, which means that
any algebraic operation is potentially represented by thousands of applications
of rewriting rules. In this paper, we propose Lattice Tree Automata (LTAs), an
extended version of tree automata whose leaves are equipped with lattices. LTAs
allow us to represent possibly infinite sets of interpreted terms. Such terms
are capable to represent complex domains and related operations in an efficient
manner. We also extend classical Boolean operations to LTAs. Finally, as a
major contribution, we introduce a new completion-based algorithm for computing
the possibly infinite set of reachable interpreted terms in a finite amount of
time.Comment: Technical repor
Mental Health And The Role Of The States
Researchers from the State Health Care Spending Project -- a collaboration between The Pew Charitable Trusts and the John D. and Catherine T. MacArthur Foundation -- sought to better understand the country's mental health challenges and, in particular, the states' role in addressing them. The project found that:In 2013, approximately 44 million adults -- 18.5 percent of the population 18 and older -- were classified as having a mental illness. Of these, 10 million had a serious mental illness. The rate of serious mental illness varied from state to state.In 2009, the most recent year for which national mental health data are available, 22 billion (15 percent) in 2009. This total does not include state and local Medicaid expenditures. Counting those contributions brings total state and local spending up to $35.5 billion (24 percent).This report is intended to help federal, state, and local policymakers working to address the country's mental health challenges to better understand their prevalence, treatment, and funding trends
Fertilizer Consumption Trends in Sub-Saharan Africa
Crop Production/Industries, Downloads December 2008 - July 2009: 12,
Alternative Approaches for Promoting Fertilizer Use in Africa, with Emphasis on the Role of Subsidies
Crop Production/Industries, Downloads December 2008 - June 2009: 5,
- âŠ